?
Solved

Firebox VPN config--which method is most secure?

Posted on 2007-11-15
3
Medium Priority
?
317 Views
Last Modified: 2013-11-16
hi

im setting up our watchguard firebox for VPN users.

which method should i use for the best security?

sha1-hmac
md5-hamc

also

aes-256bit
3des-cbc
des-cbc

thanks
0
Comment
Question by:phrea84
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Expert Comment

by:hstiles
ID: 20294395
3DES-SHA1 would be the most secure.

I don't believe you can use aes from VPN clients to Firebox,it is only supported between Fireboxes running Fireware.

To be honest, the more important thing when configuring your VPN is to limit the access granted to your VPN users and don;t use the ANY rule unnecessarily.
0
 
LVL 2

Author Comment

by:phrea84
ID: 20315485
can anyone vouch for this?  agree?  disagree?
0
 
LVL 2

Accepted Solution

by:
phrea84 earned 0 total points
ID: 20379351
your answer is not right.  watchguard says its shae and aes 256.

your also wrong on the vpn clients.

MODS:  please close this ticket and refund points to me.

thanks
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month11 days, 18 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question