Solved

ASA 5505

Posted on 2011-02-13
6
294 Views
Last Modified: 2012-06-21
Is there a waay to disable AES on a Cisco 5505 and just use the 3DES?
0
Comment
Question by:jbell72
6 Comments
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 34882415
HI,

yep, please show your config, and we tell you the required commands!
0
 

Author Comment

by:jbell72
ID: 34882576
:) I dont have a config yet, just was wondering if it could be done before we order the ASA's. We are not authorized to use AES so I just wanted to make sure.
0
 
LVL 34

Expert Comment

by:Istvan Kalmar
ID: 34882713
ok..


Don't forget there is 3 type 5505:

ASA-5505-10-BUNK9
ASA-5505-50-BUNK9
ASA-5505-UL-BUNK9

10, 50, UL means how many IP address able to communicate behind the ASA to internet!

Best regards,
Istvan
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 1

Expert Comment

by:lomaree
ID: 34882885
Hi

Based on your ASA you can choose to use any encryption i.e. AES, DES and 3DES in your configuration for VPN site-2-site tunnels or VPN Dial-In.

HTH
0
 
LVL 18

Accepted Solution

by:
decoleur earned 500 total points
ID: 34947873
you can enable or disable the features that you want to use, to change from using AES to 3DES look at the example here: http://www.cisco.com/en/US/products/sw/secursw/ps2308/products_configuration_example09186a00801e71c0.shtml

change the following lines:
crypto ipsec transform-set trmset1 esp-aes-256 esp-sha-hmac
to
crypto ipsec transform-set trmset1 esp-3des esp-sha-hmac

and
isakmp policy 10 encryption aes-256
to
isakmp policy 10 encryption 3des

if you do not have aes configured it will never accept an aes connection...

hope this helps,

-t
0
 

Author Comment

by:jbell72
ID: 35121600
THAnk you everyone, will try this this week.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

You cannot be 100% sure that you can protect your organization against crypto ransomware but you can lower down the risk and impact of the infection.
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now