Hi everyone!
I’d like to validate something with the community regarding legacy encryption algorithms in Remote Access VPN (C2S).
We are planning to disable DES and 3DES in both IKE Phase 1 and Phase 2 on our Check Point Remote Access VPN environment due to security hardening requirements.
Before proceeding, we want to understand whether this could impact users running the following client versions that we identified in production:
1.0.18.0
1.6
1.601.42
1.601.47
1.601.49
1.601.51
E85.30
E85.40
E86.00
E86.20
E86.50
E86.80
E87.00
E87.20
E87.31
E88.10
E88.20
E88.30
E88.40
E88.60
E88.63
E88.70
E88.72
E89.00
E89.10
E89.11
E89.20
Main questions:
- Has anyone disabled DES/3DES in Remote Access VPN and experienced issues with older Endpoint Security VPN clients?
- Are all E85+ clients expected to fully support AES-only configurations for both Phase 1 and Phase 2?
- Is there any official documentation or SK/article that maps supported VPN encryption algorithms by Endpoint client version?
- Besides checking the encryption suite, are there any additional compatibility validations you would recommend before disabling DES/3DES?
Our goal is to move toward stronger crypto standards without unexpectedly impacting legacy clients.
Any insights, field experience, or relevant documentation would be greatly appreciated.