Best Practices for Quantum Safe Key Exchange and VPN Tunnel Encryption
|
|
Important - Quantum Safe Key Exchange is supported only for Security Gateways with version R82 and higher. Best Practices for VPN Tunnel |
Introduction
In modern cyber security environments, ensuring the robustness of encryption is important. Internet Key Exchange version 2 (IKEv2) is critical for establishing secure VPN tunnels. Quantum Safe Key Exchange includes these enhancements to IKEv2 that strengthen its resilience:
This enhancement introduces an additional exchange that can occur multiple times. This accommodates complex authentication mechanisms that do notfit within the standard IKEv2 message flow.
With this enhancement, IKEv2 can perform multiple key exchanges with the use of different cryptographic algorithms, including Post-Quantum algorithms.
The security of the entire exchange is designed to be at least as strong as the most secure algorithm employed, to ensure that even if one method is compromised, the overall key exchange remains protected.
These enhancements greatly improve IKEv2 performance and security, especially in environments where large key exchanges and Post-Quantum Cryptography (PQC) are being adopted.
In addition, this section includes recommended Post Quantum Encryption Best Practices for VPN tunnel encryption.
Configuring Quantum Safe Key Exchange in SmartConsole
-
In SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., click the Objects menu > Object Explorer (or press the CTRL+E keys). -
From the left navigation tree, click VPN Communities.
-
Double-click an existing VPN Community
A named collection of VPN domains, each protected by a VPN gateway. object (or create a new object).The VPN Community object window opens and shows the Gateways page.
-
From the navigation tree, click Encryption.
-
Select the checkbox Quantum Safe Key Exchange.
Note - When you select this checkbox, the VPN Community object uses the default profile.
To change the default profile settings, you must use Management API. See Configuring Quantum Safe Key Exchange with Management API.
-
Configure other required settings in this VPN Community object.
-
Click OK.
-
Install the Access Control Policy on all Security Gateways that participate in this VPN Community.
Configuring Quantum Safe Key Exchange with Management API
Refer to one of these Management API References > Chapter "VPN":
-
Online Check Point Management API Reference (at the top, select the correct version) .
-
Offline Management API Reference on the Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. R82 and higher at this URL (must enable this access as described in sk174606):https://<IP Address of Management Server>/api_docs/#introductionExample:
https://192.168.3.57/api_docs/#introduction
-
If it is necessary to change the default PQC profile settings for Quantum Safe Key Exchange, then create the required Multiple Exchanges Proposal object.
In the Management API Reference, refer to the Chapter "VPN" > Section "Multiple Key Exchanges":
add multiple-key-exchanges -
Configure IKE parameters in the VPN Community.
In the Management API Reference, refer to the Chapter "VPN".
-
For a Meshed VPN Community, refer to the Section "VPN Community Meshed":
add vpn-community-meshedset vpn-community-meshed -
For a Star VPN Community, refer to the Section "VPN Community Star":
add vpn-community-starset vpn-community-star
Required API Parameters:
IKE Phase
Parameter
Sub-Parameter
IKE Phase 1
ike-phase-1-
multiple-key-exchanges -
use-multiple-key-exchanges
IKE Phase 2
ike-phase-2-
multiple-key-exchanges -
use-multiple-key-exchanges
-
-
Install the Access Control Policy on all Security Gateways that participate in this VPN Community.
In the Management API Reference, refer to the Chapter "Policy".
verify-policyinstall-policy
Post-Quantum VPN Tunnel Encryption Best Practices
In addition to Quantum Safe Key Exchange, we recommend Best Practices for VPN Tunnel Encryption. To follow all of these Best Practices, all member gateways in the VPN Community must support all of these settings.
-
In SmartConsole, click the Objects menu > Object Explorer (or press the CTRL+E keys).
-
From the left navigation tree, click VPN Communities.
-
Double-click an existing VPN Community object (or create a new object).
The VPN Community object window opens and shows the Gateways page.
-
From the navigation tree, click Encryption.
-
For Encryption Method, select IKEv2 only.
-
Select Custom encryption suite.
-
For Encryption algorithm, select AES-256.
-
For Data Integrity, select SHA-384.
-
For Diffie-Hellman Group, select a group higher than 15.
-
Select the checkbox Use Perfect Forward Secrecy.
-
Select the checkbox Quantum Safe Key Exchange.
Note - When you select this checkbox, the VPN Community object uses the default PQC profile.
To change the default PQC profile settings, you must use Management API. See Configuring Quantum Safe Key Exchange with Management API.
-
Configure other required settings in this VPN Community object.
-
Click OK.
-
Install the Access Control Policy on all Security Gateways that participate in this VPN Community.
Advanced Configuration: Setting the Security Gateway to Use Only Quantum Safe Key Exchange
Quantum Safe Key Exchange with Post-Quantum Cryptography (PQC) is possible only if all VPN peers support it and agree to use it. In an advanced configuration, a Security Gateway agrees to create a VPN tunnel only with a VPN peer that agrees to use PQC.
|
|
New: R82.10 added support for the ML-KEM set of algorithms as required by the FIPS 203 standard to address Post-Quantum Cryptography (PQC). For information on Gateway compatibility and PQC behavior in mixed environments, refer to sk184080 |
Default Behavior
A Security Gateway with Quantum Safe Key Exchange and standard exchange enabled starts an IKE negotiation by sending a PQC proposal and a standard proposal. If the VPN peer gateway does not agree to use PQC,the peer gateway continues the negotiation using the standard proposal.
Advanced Configuration
A Security Gateway with only Quantum Safe Key Exchange enabled starts an IKE negotiation by proposing only to use PQC. If the VPN peer gateway does not agree to use Quantum Safe Key Exchange, the Security Gateway stops the IKE negotiation.
Refer to one of these Management API References > Chapter VPN:
-
Online Check Point Management API Reference (at the top, select the correct version) .
-
Offline Management API Reference on the Management ServerR82 and higher at this URL (must enable this access as described in sk174606):
https://<IP Address of Management Server>/api_docs/#introductionExample:
https://192.168.3.57/api_docs/#introduction
-
If you want to change the default Multiple Key Exchanges Proposal, in the Management API Reference, refer to the CVPN chapter > Multiple Key Exchanges section:
set multiple-key-exchanges -
Configure IKE parameters in the VPN Community.
In the Management API Reference, refer to the VPN chapter.
-
For a Meshed VPN Community, refer to the VPN Community Meshed section:
add vpn-community-meshedset vpn-community-meshed -
For a Star VPN Community, refer to the VPN Community Star section:
add vpn-community-starset vpn-community-star
API Parameters for Advanced Configuration of Quantum Safe Key Exchange (PQC):
IKE Phase
Parameter
Value of use-multiple-key-exchanges Boolean
Value of use-standard-proposal Boolean
Security Gateway Behavior during the IKE Phase
IKE Phase 1
ike-phase-1truetrue(default value)In an IKE Phase 1 negotiation, the Security Gateway proposes PQC and standard IKE. If the peer gateway does not agree to PQC, the Security Gateway agrees to use standard IKE.
IKE Phase 1
ike-phase-1truefalseIn an IKE Phase 1 negotiation, the Security Gateway proposes only PQC. If the VPN peer does not agree to PQC, the Security Gateway ends the negotiation.
IKE Phase 2
ike-phase-2truetrue(default value)In an IKE Phase 2 negotiation, the Security Gateway proposes PQC and standard IKE. If the peer gateway does not agree to PQC, the Security Gateway agrees to use standard IKE.
IKE Phase 2
ike-phase-2truefalseIn an IKE Phase 1 negotiation, the Security Gateway proposes only PQC. If the VPN peer does not agree to PQC, the Security Gateway ends the negotiation.
Note - If the value of
use-multiple-key-exchangesisfalse, the Security Gateway does not use PQC. It is not possible to set both use-multiple-key-exchanges and use-standard-proposal to false, because this would prevent the Security Gateway from completing any IKE negotiation. -
-
Install the Access Control Policy on all Security Gateways that participate in this VPN Community.
In the Management API Reference, refer to the Policy chapter.
verify-policyinstall-policy