IPSec Crypto Profile Protocol BPA Checks

Printer Friendly Page

IPSec Crypto Profile Protocol - Interpreting BPA Checks - Network

 

In this video, learn more about IPSec Crypto Profile Protocol checks, why they're important, and why ESP provides better security than AH. Select a protocol for securing data that traverses the VPN tunnel: Encapsulating Security Payload or Authentication Header. ESP encrypts data, authenticates the source, and verifies data integrity. AH authenticates the source and verifies data integrity. The IPSec Crypto Profile Protocol best practice check ensures that the ESP protocol is being used in an IPSec Crypto profile.

 

For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.