Sunday, 29 June 2025

IPSec Parameters

  Ensure that the IPSec parameters (encryption, authentication, key exchange) match on both ends.


Parameters include:

Encryption Algorithms (e.g., AES, 3DES)
Hash Algorithms (e.g., SHA-1, SHA-256)
Authentication Methods (e.g., Pre-shared Key, Certificates)
Diffie-Hellman Groups
IPSec Policies: Check the security policies or ACLs (Access Control Lists) to ensure they allow the desired traffic.
IKE (Internet Key Exchange) Phases: Verify that the IKE Phase 1 and Phase 2 parameters match.

No comments:

Post a Comment

๐Ÿ”ฅ The Hidden Risk of “Wide Open” Internal Policies — And How To Remove Them Safely

In one of my recent projects, I noticed a wide open internal traffic policy in place. Later, I was asked to work on this issue and remove th...