yurisk.info
Yuri Slobodyanyuk's blog on IT Security and Networking sharing experience and expertise
Available encryption and hashing algorithms by default in Check Point R77.30
August 3, 2015
/
These are enabled by default for use in VPN site to site configurations: Phase 1 encryption:
Phase 1 hashing:
Phase 2 encryption:
Phase 2 hashing :
Checkpoint NG/NGX/GAIA
Previous post
RHEL get firewall zones and their interfaces in one go
Advertisements
© 2016
yurisk.info
Theme by
Anders Noren
—
Up ↑