08-03-2016 12:22 AM - edited 02-21-2020 08:55 PM
Dear all,
Do you know this issue "ISAKMP Allows Weak IPsec Encryption Settings (ipsec-weak-encryption-settings)"?
How to fix this issue ?
Best Regards,
08-03-2016 06:42 AM
You have probably weak IKE (and IPsec) policies configured. Can you share your config?
08-03-2016 07:28 PM
Dear Karsten,
this is sample configuration
access-list branch01 extended permit ip 10.10.10.0 255.255.255.0 20.20.20.0 255.255.255.0
!
crypto ipsec ikev1 transform-set HQ esp-3des esp-md5-hmac
crypto map Branch 1 match address branch01
crypto map Branch 1 set peer 200.200.200.10
crypto map Branch 1 set ikev1 transform-set HQ
crypto map Branch interface outside
!
crypto ikev1 policy 1
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
08-03-2016 09:42 PM
Although it's not encryption, MD5 and DH group 2 are considered weak nowadays. 3DES is not really weak, but legacy.
Which tool gives you this output? Perhaps there is some more info available what is considered weak.
And you could ask your peer to migrate to AES, SHA1 and DH5.
08-04-2016 12:45 AM
Dear Karsten,
For monitor tool i don't know my team used.
could you verify on command as below is it strong or weak?
crypto ipsec transform-set HQ esp-aes esp-aes-256
!
crypto isakmp policy 65535
authentication pre-share
encryption aes-256
hash sha
group 5
lifetime 86400
If not strong please help to recommend.
best Regards,
08-04-2016 03:02 AM
Your new IKE-Policy is much stronger, but the more secure policies should have the lower policy numbers to make the router prefer them.
The transform-set needs an adjustment as you configured two encryption transforms. Replace the first esp-aes with esp-sha1-hmac.
And make sure that your peer makes the same adjustments as these parameters have to match on both sides.
08-04-2016 08:55 PM
Dear Karsten,
after i check with my ASA as below:
crypto ipsec transform-set HQ1 esp-aes-256 esp-sha-hmac
do we still using Group 2?
crypto isakmp policy 65535
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
Please help to correct !!
Best Regards,
08-04-2016 10:57 PM
Well, if that policy is part of your config, the ASA can use DH group2. Ideally, your config should only include policies with strong crypto.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide