OSPFv3 Auth Profiles Tab
- Network > Virtual Router > OSPFv3 > Auth Profiles
Use the following fields to configure authentication for OSPFv3.
OSPFv3 – Auth Profile Settings
Enter a name for the authentication profile. To authenticate the OSPF messages, first define the authentication profiles and then apply them to interfaces on the OSPF tab.
Specify the security parameter index (SPI) for packet traversal from the remote firewall to the peer.
Specify either of the following protocols:
Specify one of the following
Enter and confirm an authentication key.
Encryption (ESP protocol only)
Specify one of the following:
Enter and confirm an encryption key.
IKE Phase 2
IKE Phase 2 After the tunnel is secured and authenticated, in Phase 2 the channel is further secured for the transfer of data between the ...
Reference: GlobalProtect App Cryptographic Functions
Reference: GlobalProtect App Cryptographic Functions The GlobalProtect app uses the OpenSSL library 1.0.1h to establish secure communication with the GlobalProtect portal and GlobalProtect gateways. The ...
Internet Key Exchange (IKE) for VPN
Internet Key Exchange (IKE) for VPN The IKE process allows the VPN peers at both ends of the tunnel to encrypt and decrypt packets using ...
Refresh HA1 SSH Keys and Configure Key Options
If you enable encryption over the HA1 control link, you can refresh the SSH host keys, change various key options, and re-establish HA1 sessions between ...
Refresh SSH Keys and Configure Key Options for Management Interface Connection
Regenerate SSH keys and configure other key options for the connection to the management interface on the firewall. ...
Define Cryptographic Profiles
Define Cryptographic Profiles A cryptographic profile specifies the ciphers used for authentication and/or encryption between two IKE peers, and the lifetime of the key. The ...
Define IPSec Crypto Profiles
Define IPSec Crypto Profiles The IPSec crypto profile is invoked in IKE Phase 2 . It specifies how the data is secured within the tunnel ...
Deploy Machine Certificates for Authentication
Deploy Machine Certificates for Authentication To confirm that the endpoint belongs to your organization, use your own public-key infrastructure (PKI) to issue and distribute machine ...
Define IKE Crypto Profiles
Define IKE Crypto Profiles The IKE crypto profile is used to set up the encryption and authentication algorithms used for the key exchange process in ...