- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-23-2013 10:57 AM
All,
First, please forgive me if this has been asked before, I wasn't able to find anything conclusive with any good explanation.
Recently I renewed a couple of web server certificates and in doing so the CA recommended that I use SHA2 with a 256-bit message digest as SHA1 was known to have been cracked and was weak. This lead to some further digging on some of the crypto stuff for the PAN firewalls and noticed that a site-to-site IPsec tunnel I had setup nearly a year ago is using SHA1 (both are PAN firewalls). My current config is:
IKE Crypto is using:
IPsec Crypto is using:
I kinda followed the 'book' based on PAN's documentation from a couple years ago, and some of the details are coming back to me, but what I am wondering if implementing some of the higher encryption/authentication standards can be done by stacking. I believe I can do this on both sides with no problem, but what I am little fuzzy on is the DH group setting and does that need to be adjusted. I found this site that explained the details a little bit more: Help - IBM z/OS Management Facility.
Additionally what has been your experience with using AES256 over AES128 for encryption - any performance issues? (IPsec crypto also supports AES128 CCM16). And for Authentication SHA512 over SHA256?
Thanks for any help.
07-23-2013 11:59 AM
Hi,
The DH group signifies the strength of the key. Higher the DH group, stronger is the key and hence more secure. Saying that, the higher the DH group more will be the processing time as the key size is larger. Below are the numbers:
If you you have enabled FIPS mode on the firewall and want to know what cipher suites are supported by the PA, go through the discussion on the following thread :
The key size in the AES signifies the number of repetition cycles with each cycle consisting of finite processing steps to convert a plain text into a cipher text. The repetition cycles are more in AES256 ( 14 cycles) as compared to AES128 ( 10 cycles ). The additional 4 cycles can delay the processing time.
If computing time for hash is not a concern, then SHA512 should be preferred. Note that more time to compute hash means more time to crack the hash. Hope this was helpful to you.
Regards
Tilak
07-25-2013 09:41 AM
ukhapre,
In our site to site setup, we are not using and Cisco products. Both sides are PAN-2020s.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!