<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disabling Weak Ciphers (Specifically DES) for IPSEC on R80.30 and R80.40 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115440#M16230</link>
    <description>&lt;P&gt;A new R80.30 cluster has been flagged by Qualys as supporting "Weak IPSec Encryption Settings".&amp;nbsp; I assumed this was over SHA-1 or 1024-bit keys, but got a bit of a surprise when I viewed the report and saw that it was complaining of DES.&amp;nbsp; Like RC4 and MD5, DES has been obsolete for about 20 years and there's absolutely no reason to have it enabled or even supported for that matter.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, how do I disable it?&amp;nbsp; It's not clear to me if unchecking it in traditional mode is adequate, or I should be looking somewhere else.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;LI-PRODUCT title="Security Gateway Appliances" id="security-gateway-appliances"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Apr 2021 22:38:38 GMT</pubDate>
    <dc:creator>johnnyringo</dc:creator>
    <dc:date>2021-04-06T22:38:38Z</dc:date>
    <item>
      <title>Disabling Weak Ciphers (Specifically DES) for IPSEC on R80.30 and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115440#M16230</link>
      <description>&lt;P&gt;A new R80.30 cluster has been flagged by Qualys as supporting "Weak IPSec Encryption Settings".&amp;nbsp; I assumed this was over SHA-1 or 1024-bit keys, but got a bit of a surprise when I viewed the report and saw that it was complaining of DES.&amp;nbsp; Like RC4 and MD5, DES has been obsolete for about 20 years and there's absolutely no reason to have it enabled or even supported for that matter.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, how do I disable it?&amp;nbsp; It's not clear to me if unchecking it in traditional mode is adequate, or I should be looking somewhere else.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;LI-PRODUCT title="Security Gateway Appliances" id="security-gateway-appliances"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Apr 2021 22:38:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115440#M16230</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-04-06T22:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling Weak Ciphers (Specifically DES) for IPSEC on R80.30 and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115449#M16233</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk82900" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk82900&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 02:30:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115449#M16233</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-04-07T02:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling Weak Ciphers (Specifically DES) for IPSEC on R80.30 and R80.40</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115463#M16236</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; The steps left me a bit confused because we're not configuring VPNs via Traditional Mode (which is the default) and this is a fresh policy created in R80.30.&amp;nbsp; Also, we don't use Remote Access VPN.&amp;nbsp; But I'll give that a shot and ask for a re-scan.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CheckPointR8040VPNConfigMethod.png" style="width: 697px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11293i6585378478288439/image-size/large?v=v2&amp;amp;px=999" role="button" title="CheckPointR8040VPNConfigMethod.png" alt="CheckPointR8040VPNConfigMethod.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 04:20:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Disabling-Weak-Ciphers-Specifically-DES-for-IPSEC-on-R80-30-and/m-p/115463#M16236</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-04-07T04:20:54Z</dc:date>
    </item>
  </channel>
</rss>

