<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Impact when disabling DES/3DES for Endpoint VPN clients? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276981#M105405</link>
    <description>&lt;P&gt;You'd probably have to go back to Secure Client days (more than 20 years now) to find a client that doesn't support AES.&lt;BR /&gt;Any you find that don't should likely be upgraded to a supported version.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 15 May 2026 22:33:21 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2026-05-15T22:33:21Z</dc:date>
    <item>
      <title>Impact when disabling DES/3DES for Endpoint VPN clients?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276979#M105403</link>
      <description>&lt;P&gt;Hi everyone!&lt;/P&gt;
&lt;P data-end="116" data-start="0"&gt;I’d like to validate something with the community regarding legacy encryption algorithms in Remote Access VPN (C2S).&lt;/P&gt;
&lt;P data-end="286" data-start="118"&gt;We are planning to disable &lt;STRONG data-end="161" data-start="145"&gt;DES and 3DES&lt;/STRONG&gt; in both &lt;STRONG data-end="197" data-start="170"&gt;IKE Phase 1 and Phase 2&lt;/STRONG&gt; on our Check Point Remote Access VPN environment due to security hardening requirements.&lt;/P&gt;
&lt;P data-end="432" data-start="288"&gt;Before proceeding, we want to understand whether this could impact users running the following client versions that we identified in production:&lt;/P&gt;
&lt;P data-end="432" data-start="288"&gt;1.0.18.0&lt;BR /&gt;1.6&lt;BR /&gt;1.601.42&lt;BR /&gt;1.601.47&lt;BR /&gt;1.601.49&lt;BR /&gt;1.601.51&lt;BR /&gt;E85.30&lt;BR /&gt;E85.40&lt;BR /&gt;E86.00&lt;BR /&gt;E86.20&lt;BR /&gt;E86.50&lt;BR /&gt;E86.80&lt;BR /&gt;E87.00&lt;BR /&gt;E87.20&lt;BR /&gt;E87.31&lt;BR /&gt;E88.10&lt;BR /&gt;E88.20&lt;BR /&gt;E88.30&lt;BR /&gt;E88.40&lt;BR /&gt;E88.60&lt;BR /&gt;E88.63&lt;BR /&gt;E88.70&lt;BR /&gt;E88.72&lt;BR /&gt;E89.00&lt;BR /&gt;E89.10&lt;BR /&gt;E89.11&lt;BR /&gt;E89.20&lt;/P&gt;
&lt;P data-end="658" data-start="643"&gt;Main questions:&lt;/P&gt;
&lt;UL data-end="1218" data-start="660"&gt;
&lt;LI data-end="776" data-start="660" data-section-id="tex8hu"&gt;Has anyone disabled DES/3DES in Remote Access VPN and experienced issues with older Endpoint Security VPN clients?&lt;/LI&gt;
&lt;LI data-end="879" data-start="777" data-section-id="wkm2sm"&gt;Are all E85+ clients expected to fully support AES-only configurations for both Phase 1 and Phase 2?&lt;/LI&gt;
&lt;LI data-end="1005" data-start="880" data-section-id="1lte1ds"&gt;Is there any official documentation or SK/article that maps supported VPN encryption algorithms by Endpoint client version?&lt;/LI&gt;
&lt;LI data-end="1144" data-start="1006" data-section-id="w0lvfh"&gt;Besides checking the encryption suite, are there any additional compatibility validations you would recommend before disabling DES/3DES?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1319" data-start="1220"&gt;Our goal is to move toward stronger crypto standards without unexpectedly impacting legacy clients.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="1408" data-start="1321"&gt;Any insights, field experience, or relevant documentation would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2026 21:25:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276979#M105403</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2026-05-15T21:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Impact when disabling DES/3DES for Endpoint VPN clients?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276981#M105405</link>
      <description>&lt;P&gt;You'd probably have to go back to Secure Client days (more than 20 years now) to find a client that doesn't support AES.&lt;BR /&gt;Any you find that don't should likely be upgraded to a supported version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2026 22:33:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276981#M105405</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-05-15T22:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Impact when disabling DES/3DES for Endpoint VPN clients?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276988#M105406</link>
      <description>&lt;P&gt;I totally get the point Phoneboy made.&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2026 02:31:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Impact-when-disabling-DES-3DES-for-Endpoint-VPN-clients/m-p/276988#M105406</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-05-17T02:31:52Z</dc:date>
    </item>
  </channel>
</rss>

