<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Karsten, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782258#M160482</link>
    <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Does ASA5580 also support sha256?&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mady&lt;/P&gt;</description>
    <pubDate>Mon, 25 Jan 2016 06:27:50 GMT</pubDate>
    <dc:creator>Mady</dc:creator>
    <dc:date>2016-01-25T06:27:50Z</dc:date>
    <item>
      <title>Migration from sha1 to sha2</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782254#M160478</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you help me on migrating my asa from sha1 to sha2? What should be the requirement before I do that and also the method for migration.&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mady&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782254#M160478</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2019-03-12T07:10:47Z</dc:date>
    </item>
    <item>
      <title>For which function of the ASA</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782255#M160479</link>
      <description>&lt;OL&gt;
&lt;LI&gt;For which function of the ASA do you want to migrate?&lt;/LI&gt;
&lt;LI&gt;Which device and version are you using? Not all devices support SHA2 for all functionality.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Sat, 23 Jan 2016 13:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782255#M160479</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-23T13:54:01Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782256#M160480</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;We want to migrate our site-to-site VPN. We have Cisco ASA 5525 with 8.6.1 version.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mady&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jan 2016 23:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782256#M160480</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-01-23T23:07:59Z</dc:date>
    </item>
    <item>
      <title>ASA5525 supports SHA2, but I</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782257#M160481</link>
      <description>&lt;P&gt;ASA5525 supports SHA2, but I don't remember if it was supported from day one. But 8.6 is EOL anyway.&lt;/P&gt;
&lt;P&gt;I would upgrade to the newest 9.2 or even better to the newest 9.4 where SHA2 is available.&lt;/P&gt;
&lt;P&gt;But you don't have to stop with SHA2, the 5525 also supports Next-generation crypto like esp-gcm which you can use for your VPNs (if your peers support that).&lt;/P&gt;
&lt;P&gt;Edit: Forgot to mention that SHA2 on the ASA is only available when you use&amp;nbsp;IKEv2, not with IKEv1.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2016 11:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782257#M160481</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-24T11:59:05Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782258#M160482</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Does ASA5580 also support sha256?&lt;/P&gt;
&lt;P&gt;Thank you very much.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mady&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 06:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782258#M160482</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-01-25T06:27:50Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782259#M160483</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;as karsten mentioned SHA256 is available on IKEv2. if your 5580 image is 8.4 or above, then it's supported.&lt;/P&gt;
&lt;P&gt;see helpful link:&lt;/P&gt;
&lt;P&gt;http://ccnpsecuritywannabe.blogspot.com/2014/08/ikev2-ipsec-site-to-site-vpns.html&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 06:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782259#M160483</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-01-25T06:53:41Z</dc:date>
    </item>
    <item>
      <title>Hi johnlloyd_13,</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782260#M160484</link>
      <description>&lt;P&gt;Hi johnlloyd_13,&lt;/P&gt;
&lt;P&gt;I'm just confuse on below statement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Currently Sha256 is supported in newer ASA platforms (X-Gen Firewalls) like 5585. It is not supported in 5505, 5510, 5520, 5540 and 5550, platforms. Please check the below link. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;From ASA IPsec and Isakmp release notes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;"SHA-256 can be used for integrity and PRF to establish IKEv2 tunnels, but it can also be used for ESP integrity protection on the newer ASA platforms (and not 5505, 5510, 5520, 5540, or 5550)."&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri Light';"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/vpn/asa_91_vpn_config/vpn_ike.html#pgfId-1042794"&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/vpn/asa_91_vpn_config/vpn_ike.html#pgfId-1042794&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCus79188/?reffering_site=dumpcr"&gt;https://tools.cisco.com/bugsearch/bug/CSCus79188/?reffering_site=dumpcr&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 06:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782260#M160484</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-01-25T06:58:45Z</dc:date>
    </item>
    <item>
      <title>hi,</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782261#M160485</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;
&lt;P&gt;some cisco docs could be inaccurate.&lt;/P&gt;
&lt;P&gt;i'm running ASA version 9.x on some of my 5505 and 5510 and could see an option for IKEv2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Cisco Adaptive Security Appliance Software Version 9.0(4)&lt;/SPAN&gt; &lt;BR /&gt;Device Manager Version 7.5(1)&lt;BR /&gt;&lt;BR /&gt;Compiled on Wed 04-Dec-13 08:33 by builders&lt;BR /&gt;System image file is "disk0:/asa904-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;5510 up 96 days 7 hours&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5510&lt;/SPAN&gt;, 256 MB RAM, CPU Pentium 4 Celeron 1600 MHz,&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash M50FW080 @ 0xfff00000, 1024KB&lt;BR /&gt;&lt;BR /&gt;5510(config)# crypto ipsec ?&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; df-bit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set IPsec DF policy&lt;BR /&gt;&amp;nbsp; fragmentation&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set IPsec fragmentation policy&lt;BR /&gt;&amp;nbsp; ikev1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set IKEv1 settings&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; ikev2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Set IKEv2 settings&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; security-association&amp;nbsp; Set security association parameters&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;Encryption hardware device : Cisco ASA-5505&lt;/SPAN&gt; on-board accelerator (revision 0x0)&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Boot microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CN1000-MC-BOOT-2.00&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSL/IKE microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec microcode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : CNlite-MC-IPSECm-MAIN-2.08&lt;BR /&gt; &lt;BR /&gt; &lt;SPAN style="color: #ff0000;"&gt;Cisco Adaptive Security Appliance Software Version 9.0(1)&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;5505(config)# crypto ?&lt;BR /&gt;&lt;BR /&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; ca&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Certification authority&lt;BR /&gt;&amp;nbsp; dynamic-map&amp;nbsp; Configure a dynamic crypto map&lt;BR /&gt;&amp;nbsp; ikev1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure IKEv1 policy&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; ikev2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure IKEv2 policy&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; ipsec&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure transform-set, IPSec SA lifetime, and fragmentation&lt;BR /&gt;&amp;nbsp; isakmp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure ISAKMP&lt;BR /&gt;&amp;nbsp; key&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Long term key operations&lt;BR /&gt;&amp;nbsp; map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure a crypto map&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 07:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782261#M160485</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2016-01-25T07:23:10Z</dc:date>
    </item>
    <item>
      <title>IKEv2 is available on all</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782262#M160486</link>
      <description>&lt;P&gt;IKEv2 is available on all ASAs, but using better crypto than sha1 isn't. For that you need one of the newer -X ASAs.&lt;/P&gt;
&lt;P&gt;I never used a 5580, but I assume that SHA2 is only available for session-establishment, but not for ESP.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 07:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-sha1-to-sha2/m-p/2782262#M160486</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-25T07:46:02Z</dc:date>
    </item>
  </channel>
</rss>

