<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall security on different services in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685963#M12912</link>
    <description>Hi,&lt;BR /&gt;I agree with Ben, however I don't believe your ASA 5510 will support the latest NGE algorithms due to hardware limitations, so you might be restricted to what algorithms you can use. For example I think you can only use DH group 5, you should be able to use AES instead of DES and SHA instead of MD5.&lt;BR /&gt;&lt;BR /&gt;If your management are that concerned, suggest replacing with a newer 5500-X series, that will support NGE.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Fri, 10 Aug 2018 16:41:57 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-08-10T16:41:57Z</dc:date>
    <item>
      <title>Firewall security on different services</title>
      <link>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685555#M12909</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been running webvpn and other services on my Cisco ASA 5510 from a long time. Recently one of the bodies that inspect network security came up with different result concerning week points in my firewall which includes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Remote access service detected.&lt;/P&gt;
&lt;P&gt;2. Weak diffie-hellman groups identified on vpn devices (currently using group 2)&lt;/P&gt;
&lt;P&gt;3. Weak encryption ciphers&amp;nbsp;&lt;SPAN&gt;identified on vpn devices&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What should i need to do in order to resolve these week points in my firewall.&amp;nbsp;These are my current crypto configurations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 20 set pfs&lt;BR /&gt;crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-3DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map&lt;BR /&gt;crypto map Outside_map interface Outside&lt;BR /&gt;crypto isakmp enable Outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685555#M12909</guid>
      <dc:creator>M Talha</dc:creator>
      <dc:date>2020-02-21T16:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall security on different services</title>
      <link>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685887#M12910</link>
      <description>&lt;P&gt;Here is a pretty good document concerning next generation cryptography settings from Cisco:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html" target="_self"&gt;https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the issues in the current crypto config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;encryption des&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt; hash md5&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt; group 2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should probably switch from 3DES and MD5 to AES-256 and SHA512, as for the DH here are the groups related to the document I linked, I wouldn't use anything below group 14.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 1&amp;nbsp; -&amp;nbsp; 768 bit modulus&amp;nbsp; - AVOID&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 2&amp;nbsp; - 1024 bit modulus&amp;nbsp; - AVOID&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 5&amp;nbsp; - 1536 bit modulus &amp;nbsp;- AVOID&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 14 - 2048 bit modulus – MINIMUM ACCEPTABLE&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 19 - 256 bit elliptic curve – ACCEPTABLE&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 20 - 384 bit elliptic curve – Next Generation Encryption&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 21 - 521 bit elliptic curve – Next Generation Encryption&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT size="2"&gt;Diffie-Hellman group 24 - modular exponentiation group with a 2048-bit modulus and 256-bit prime order subgroup – Next Generation Encryption&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 10 Aug 2018 15:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685887#M12910</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2018-08-10T15:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall security on different services</title>
      <link>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685963#M12912</link>
      <description>Hi,&lt;BR /&gt;I agree with Ben, however I don't believe your ASA 5510 will support the latest NGE algorithms due to hardware limitations, so you might be restricted to what algorithms you can use. For example I think you can only use DH group 5, you should be able to use AES instead of DES and SHA instead of MD5.&lt;BR /&gt;&lt;BR /&gt;If your management are that concerned, suggest replacing with a newer 5500-X series, that will support NGE.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 10 Aug 2018 16:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3685963#M12912</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-10T16:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall security on different services</title>
      <link>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3691661#M12916</link>
      <description>&lt;P&gt;Thanks a lot Ben and RJI. It was very helpful what you people suggested.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Talha&lt;/P&gt;</description>
      <pubDate>Mon, 20 Aug 2018 17:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-security-on-different-services/m-p/3691661#M12916</guid>
      <dc:creator>M Talha</dc:creator>
      <dc:date>2018-08-20T17:46:52Z</dc:date>
    </item>
  </channel>
</rss>

