OSPFv3 Auth Profiles Tab
- Network > Virtual Router > OSPFv3 > Auth Profiles
Use the following fields to configure authentication for OSPFv3.
OSPFv3 – Auth Profile Settings
Enter a name for the authentication profile. To authenticate the OSPF messages, first define the authentication profiles and then apply them to interfaces on the OSPF tab.
Specify the security parameter index (SPI) for packet traversal from the remote firewall to the peer.
Specify either of the following protocols:
Specify one of the following
Enter and confirm an authentication key.
Encryption (ESP protocol only)
Specify one of the following:
Enter and confirm an encryption key.
IKE Phase 2
IKE Phase 2 After the tunnel is secured and authenticated, in Phase 2 the channel is further secured for the transfer of data between the ...
Reference: GlobalProtect Agent Cryptographic Functions
Reference: GlobalProtect Agent Cryptographic Functions The GlobalProtect agent uses the OpenSSL library 1.0.1h to establish secure communication with the GlobalProtect portal and GlobalProtect gateways. The ...
Internet Key Exchange (IKE) for VPN
Internet Key Exchange (IKE) for VPN The IKE process allows the VPN peers at both ends of the tunnel to encrypt and decrypt packets using ...
PAN-OS 8.0 Cipher Suites Supported in FIPS-CC Mode
List of cipher suites supported on firewalls running PAN-OS® 8.0 in FIPS-CC mode. ...
Define Cryptographic Profiles
Define Cryptographic Profiles A cryptographic profile specifies the ciphers used for authentication and/or encryption between two IKE peers, and the lifetime of the key. The ...
Configure a GlobalProtect Gateway
Configure a GlobalProtect gateway to enforce security policies and provide VPN access for your users. ...
Define IPSec Crypto Profiles
Define IPSec Crypto Profiles The IPSec crypto profile is invoked in IKE Phase 2 . It specifies how the data is secured within the tunnel ...
Refresh SSH Keys and Configure Key Options for Management Interface Connection
Regenerate SSH keys and configure other key options for the connection to the management interface on the firewall. ...
Deploy Machine Certificates for Authentication
Deploy Machine Certificates for Authentication To confirm that the endpoint belongs to your organization, use your own public-key infrastructure (PKI) to issue and distribute machine ...