IPSec Crypto Profile Protocol BPA Checks

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.
Retired Member
Not applicable
No ratings

IPSec Crypto Profile Protocol - Interpreting BPA Checks - Network


In this video, learn more about IPSec Crypto Profile Protocol checks, why they're important, and why ESP provides better security than AH. Select a protocol for securing data that traverses the VPN tunnel: Encapsulating Security Payload or Authentication Header. ESP encrypts data, authenticates the source, and verifies data integrity. AH authenticates the source and verifies data integrity. The IPSec Crypto Profile Protocol best practice check ensures that the ESP protocol is being used in an IPSec Crypto profile.


For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.
Rate this article: