Diffie-Hellman (DH) allows two devices to establish a shared secret over an unsecure network. In terms of VPN it is used in the in IKE or Phase1 part of setting up the VPN tunnel.
There are multiple Diffie-Hellman Groups that can be configured in an IKEv2 policy on a Cisco ASA running 9.1(3). In Nov 2016 ASA 9.6(x) is available and there are no new changes to the DH Groups.
Diffie-Hellman group 1 - 768 bit modulus - AVOID
Diffie-Hellman group 2 - 1024 bit modulus - AVOID
Diffie-Hellman group 5 - 1536 bit modulus - AVOID
Diffie-Hellman group 14 - 2048 bit modulus – MINIMUM ACCEPTABLE
Diffie-Hellman group 19 - 256 bit elliptic curve – ACCEPTABLE
Diffie-Hellman group 20 - 384 bit elliptic curve – Next Generation Encryption
Diffie-Hellman group 21 - 521 bit elliptic curve – Next Generation Encryption
Diffie-Hellman group 24 - modular exponentiation group with a 2048-bit modulus and 256-bit prime order subgroup – Next Generation Encryption
Algorithms marked as AVOID do not provide an adequate security level against modern threats and should not be used to protect sensitive information. It is recommended that these algorithms be replaced with stronger algorithms.
Next Generation Encryption (NGE) is expected to meet the security and scalability requirements of the next two decades.
If you are using encryption or authentication algorithms with a 128-bit key, use Diffie-Hellman groups 5, 14, 19, 20 or 24. If you are using encryption or authentication algorithms with a 256-bit key or higher, use Diffie-Hellman group 21 or 24.
I am wanting to make sure I log all users who connect to anyconnect and send the data to a syslog server. What I need to do is capture the IP of the user, login credentials (user), with a date and time stamp.What is the easiest method for doing this?...
I am a web developer trying to have an issue resolved that I believe is either hardware or networking issue, but all sides of communication indicate they have checked what they need to, yet it still has not been resolved. We have a connection setup u...
Hello, I have in environment ISE 2.2 patch 14 on SNS3495. We tried to migrate from ACS, but during window maintenance, Cisco ISE show errors with message: "Reached TACACS+ maximum client limit".Debuggind prrt-server.log, we can see the message:...
Good day,I am a security analyst trying to tame the log traffic from our firewall (2 FTD 4140 + FMC). I have had a CCNA in the past but primarily worked in systems so I am familiar with networking protocols and concepts but inexperienced at troubleshootin...