04-19-2018 08:13 AM - edited 03-12-2019 05:13 AM
Hi
We currently have site to site VPNs to various 3rd parties. I am in the process of reviewing the current proposals and updating these.
Currently we use IKEV1, aes256, sha-1, dh group 5, lifetime 86400, no pfs
I am planning to use IKEV2, aes256, sha256, dh group 21, lifetime 28800, pfs group 5
What are the industry best practices for a standard VPN tunnel at this time? I want to have a generic template but then also tighten the proposal where required.
Am I right in thinking this maybe depends on the 3rd party type and firewall resource, or should it be go for the best as long as there is firewall resource available and the other end supports it?
Solved! Go to Solution.
04-19-2018 08:28 AM
Here are the Cisco recommended encryption algorithms:
https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
I believe the recommended settings are Suite-B-GCM:
https://tools.ietf.org/html/rfc6379
If the VPN peer supports it and there is no performance problem, I would go with the recommended settings.
HTH
Bogdan
04-19-2018 08:28 AM
Here are the Cisco recommended encryption algorithms:
https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
I believe the recommended settings are Suite-B-GCM:
https://tools.ietf.org/html/rfc6379
If the VPN peer supports it and there is no performance problem, I would go with the recommended settings.
HTH
Bogdan
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide