<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IKEV1 supported ASA version in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695336#M1093739</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Hi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Could someone please help me with IKEV1 supported ASA versions?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt; I mean the most recent version that will support IKEV1.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Nik&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Sep 2022 11:50:44 GMT</pubDate>
    <dc:creator>NIKHIL M K</dc:creator>
    <dc:date>2022-09-28T11:50:44Z</dc:date>
    <item>
      <title>IKEV1 supported ASA version</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695336#M1093739</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Hi&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Could someone please help me with IKEV1 supported ASA versions?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt; I mean the most recent version that will support IKEV1.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Nik&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 11:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695336#M1093739</guid>
      <dc:creator>NIKHIL M K</dc:creator>
      <dc:date>2022-09-28T11:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 supported ASA version</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695337#M1093740</link>
      <description>&lt;P&gt;I think all ASA ver. support IKEv1&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 11:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695337#M1093740</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-09-28T11:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 supported ASA version</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695340#M1093742</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1407178"&gt;@NIKHIL M K&lt;/a&gt; IKEv1 the older IKE protocol, but it's supported on the really old ASA versions up to the current latest versions. It's not yet depreciated.&lt;/P&gt;
&lt;P&gt;IKEv1 does not support the latest Next Generation Encryption algorithms, if you want those you'll need to use IKEv2.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 11:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695340#M1093742</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-09-28T11:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 supported ASA version</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695358#M1093750</link>
      <description>&lt;P&gt;yes it is supported IKEV1 but stay away from the DH group 1,2,5,24. they are gone depreciated. the industry use are 19,20,21 DH group.&lt;/P&gt;
&lt;P&gt;would highly recommand you to use the IKEV2 as it more secure and scalable.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://tools.cisco.com/security/center/resources/next_generation_cryptography" target="_self"&gt;Here&lt;/A&gt; for your reference look on provided document.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 12:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695358#M1093750</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-09-28T12:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 supported ASA version</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695927#M1093771</link>
      <description>&lt;P&gt;Confirming that all ASA versions as of this writing support IKEv1. Older ciphers, hashes and DH groups were deprecated beginning in ASA 9.13 as listed below. 9.15 was the release that removed support altogether for those:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;From the 9.13 release notes:&lt;/P&gt;
&lt;UL&gt;
&lt;LI id="reference_yw3_ngz_vhb__li_low_sec_cipher" class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Low-Security Cipher Deprecation&lt;/STRONG&gt;— Several encryption ciphers used by the ASA IKE, IPsec, and SSH modules are considered insecure and have been deprecated. They will be removed in a later release.&lt;/P&gt;
&lt;P class="p"&gt;IKEv1: The following subcommands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto ikev1 policy&lt;/STRONG&gt; &lt;EM class="ph i"&gt;priority&lt;/EM&gt;:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;hash md5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;encryption 3des&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;encryption des&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;group 2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;group 5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;IKEv2: The following subcommands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto ikev2 policy&lt;/STRONG&gt; &lt;EM class="ph i"&gt;priority&lt;/EM&gt;&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;integrity md5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;prf md5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;group 2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;group 5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;group 24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;encryption 3des&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;encryption des&lt;/STRONG&gt; (this command is still available when you have the DES encryption license only)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;encryption null&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;IPsec: The following commands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto ipsec ikev1 transform-set &lt;EM class="ph i"&gt;name&lt;/EM&gt; esp-3des esp-des esp-md5-hmac&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto ipsec ikev2 ipsec-proposal &lt;EM class="ph i"&gt;name&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;protocol esp integrity md5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;protocol esp encryption 3des aes-gmac aes-gmac- 192 aes-gmac -256 des&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto ipsec profile &lt;EM class="ph i"&gt;name&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;set pfs group2 group5 group24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;SSH: The following commands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;ssh cipher integrity custom hmac-sha1-96:hmac-md5: hmac-md5-96&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;ssh key-exchange group dh-group1-sha1&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;SSL: The following commands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;ssl dh-group group2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;ssl dh-group group5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;ssl dh-group group24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="p"&gt;Crypto Map: The following commands are deprecated:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto map &lt;EM class="ph i"&gt;name sequence&lt;/EM&gt; set pfs group2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto map &lt;EM class="ph i"&gt;name sequence&lt;/EM&gt; set pfs group5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto map &lt;EM class="ph i"&gt;name sequence&lt;/EM&gt; set pfs group24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto map &lt;EM class="ph i"&gt;name sequence&lt;/EM&gt; set ikev1 phase1-mode aggressive group2&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;crypto map &lt;EM class="ph i"&gt;name sequence&lt;/EM&gt; set ikev1 phase1-mode aggressive group5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI id="reference_yw3_ngz_vhb__li_dh_default" class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;In 9.13(1), Diffie-Hellman Group 14 is now the default &lt;/STRONG&gt;for the &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;group&lt;/SPAN&gt; &lt;/SPAN&gt; command under &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto ikev1 policy&lt;/SPAN&gt; &lt;/SPAN&gt;, &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;ssl dh-group&lt;/SPAN&gt; &lt;/SPAN&gt;, and &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto ikev2 policy&lt;/SPAN&gt; &lt;/SPAN&gt;for IPsec PFS using &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto map set pfs&lt;/SPAN&gt; &lt;/SPAN&gt;, &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto ipsec profile&lt;/SPAN&gt; &lt;/SPAN&gt;, &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto dynamic-map set pfs&lt;/SPAN&gt; &lt;/SPAN&gt;, and &lt;SPAN class="ph synph"&gt;&lt;SPAN class="keyword kwd"&gt;crypto map set ikev1 phase1-mode&lt;/SPAN&gt; &lt;/SPAN&gt;. The former default Diffie-Hellman group was Group 2.&lt;/P&gt;
&lt;P class="p"&gt;When you upgrade from a pre-9.13(1) release, if you need to use the old default (Diffie-Hellman Group 2), then you must &lt;EM class="ph i"&gt;manually&lt;/EM&gt; configure the DH group as &lt;STRONG class="ph b"&gt;group 2&lt;/STRONG&gt; or else your tunnels will default to Group 14. Because group 2 will be removed in a future release, you should move your tunnels to group 14 as soon as possible.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 12:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-supported-asa-version/m-p/4695927#M1093771</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-09-29T12:55:23Z</dc:date>
    </item>
  </channel>
</rss>

