Best Practices for Quantum Safe Key Exchange and VPN Tunnel Encryption

Important - Quantum Safe Key Exchange is supported only for Security Gateways with version R82 and higher. Best Practices for VPN TunnelClosed An encrypted connection between two hosts using standard protocols (such as L2TP) to encrypt traffic going in and decrypt it coming out, creating an encapsulated network through which data can be safely shared as though on a physical private line. Encryption are relevant for all supported Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. versions.

Introduction

In modern cyber security environments, ensuring the robustness of encryption is important. Internet Key Exchange version 2 (IKEv2) is critical for establishing secure VPN tunnels. Quantum Safe Key Exchange includes these enhancements to IKEv2 that strengthen its resilience:

In addition, this section includes recommended Post Quantum Encryption Best Practices for VPN tunnel encryption.

Configuring Quantum Safe Key Exchange in SmartConsole

Configuring Quantum Safe Key Exchange with Management API

Post-Quantum VPN Tunnel Encryption Best Practices

In addition to Quantum Safe Key Exchange, we recommend Best Practices for VPN Tunnel Encryption. To follow all of these Best Practices, all member gateways in the VPN Community must support all of these settings.

  1. In SmartConsole, click the Objects menu > Object Explorer (or press the CTRL+E keys).

  2. From the left navigation tree, click VPN Communities.

  3. Double-click an existing VPN Community object (or create a new object).

    The VPN Community object window opens and shows the Gateways page.

  4. From the navigation tree, click Encryption.

  5. For Encryption Method, select IKEv2 only.

  6. Select Custom encryption suite.

  7. For Encryption algorithm, select AES-256.

  8. For Data Integrity, select SHA-384.

  9. For Diffie-Hellman Group, select a group higher than 15.

  10. Select the checkbox Use Perfect Forward Secrecy.

  11. Select the checkbox Quantum Safe Key Exchange.

    Note - When you select this checkbox, the VPN Community object uses the default PQC profile.

    To change the default PQC profile settings, you must use Management API. See Configuring Quantum Safe Key Exchange with Management API.

  12. Configure other required settings in this VPN Community object.

  13. Click OK.

  14. Install the Access Control Policy on all Security Gateways that participate in this VPN Community.

Advanced Configuration: Setting the Security Gateway to Use Only Quantum Safe Key Exchange

Quantum Safe Key Exchange with Post-Quantum Cryptography (PQC) is possible only if all VPN peers support it and agree to use it. In an advanced configuration, a Security Gateway agrees to create a VPN tunnel only with a VPN peer that agrees to use PQC.

New: R82.10 added support for the ML-KEM set of algorithms as required by the FIPS 203 standard to address Post-Quantum Cryptography (PQC).

For information on Gateway compatibility and PQC behavior in mixed environments, refer to sk184080

Default Behavior

A Security Gateway with Quantum Safe Key Exchange and standard exchange enabled starts an IKE negotiation by sending a PQC proposal and a standard proposal. If the VPN peer gateway does not agree to use PQC,the peer gateway continues the negotiation using the standard proposal.

Advanced Configuration

A Security Gateway with only Quantum Safe Key Exchange enabled starts an IKE negotiation by proposing only to use PQC. If the VPN peer gateway does not agree to use Quantum Safe Key Exchange, the Security Gateway stops the IKE negotiation.