<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA uses crackable transforms in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3815224#M6641</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don not manage the other end of the VPN, so am I right in saying that I will need to check whether any of the tunnels use an crackable transform, and then liaise with the other party to work on re-configuring both ends to use more secure transforms?&lt;/P&gt;</description>
    <pubDate>Wed, 06 Mar 2019 20:59:46 GMT</pubDate>
    <dc:creator>Mokhalil82</dc:creator>
    <dc:date>2019-03-06T20:59:46Z</dc:date>
    <item>
      <title>ASA uses crackable transforms</title>
      <link>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3813650#M6639</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have a PCI compliancy vulnerability that states&lt;/P&gt;&lt;P&gt;"Your firewall/VPN system allows a crackable transform to be used. Transforms are a combination of encryption cipher, hashes, authentication types and mod key exchanges.&lt;BR /&gt;This is used to support encryption over a VPN connection. Crackable transforms (e.g. using DES or DH Group 1) could potentially be attacked by users."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I go about disabling certain transform sets. I have 3 IPSEC VPNs on the firewalls. One of the VPNs does have DES and 3DES available in the proposal, can I just remove DES from the proposal without affecting the VPN. What other action may be required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3813650#M6639</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2020-02-21T16:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA uses crackable transforms</title>
      <link>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3813682#M6640</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;Do you control both devices at either end of the VPN?&lt;BR /&gt;&lt;BR /&gt;You need to determine whether those algorithms are actually in use. For those 3 VPN's check the output of &lt;BR /&gt;"show crypto ikev1 sa" or "show crypto isakmp sa" and "show crypto ipsec sa" and determine from there which algorithms are in use. If not in use you can remove them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should probably look to use at least AES-GCM or AES-CBC encryption, SHA-256 integrity and DH group 19 or 21 etc.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 17:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3813682#M6640</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-04T17:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA uses crackable transforms</title>
      <link>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3815224#M6641</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don not manage the other end of the VPN, so am I right in saying that I will need to check whether any of the tunnels use an crackable transform, and then liaise with the other party to work on re-configuring both ends to use more secure transforms?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 20:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3815224#M6641</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2019-03-06T20:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA uses crackable transforms</title>
      <link>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3815229#M6642</link>
      <description>Hi,&lt;BR /&gt;Yes, that's correct. Using the commands previously provided should identify which tunnel is using what algorithms and you can proceed from there.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 06 Mar 2019 21:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-uses-crackable-transforms/m-p/3815229#M6642</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-03-06T21:19:20Z</dc:date>
    </item>
  </channel>
</rss>

