Best Practices for Quantum Safe Key Exchange and VPN Tunnel Encryption

Important - This feature supports only Security Gateways with version R82 and higher.

Introduction

In modern cyber security environments, ensuring the robustness of encryption is important. Internet Key Exchange version 2 (IKEv2) is critical for establishing secure VPN tunnels. Quantum Safe Key Exchange includes these enhancements to IKEv2 that strengthen its resilience:

In addition, this section includes recommended Post Quantum Encryption Best Practices for VPN tunnel encryption.

Configuring Quantum Safe Key Exchange in SmartConsole

Configuring Quantum Safe Key Exchange with Management API

Post-Quantum VPN Tunnel Encryption Best Practices

In addition to Quantum Safe Key Exchange, we recommend Best Practices for VPN TunnelClosed An encrypted connection between two hosts using standard protocols (such as L2TP) to encrypt traffic going in and decrypt it coming out, creating an encapsulated network through which data can be safely shared as though on a physical private line. Encryption. To follow all of these Best Practices, all member gateways in the VPN Community must support all of these settings.

  1. In SmartConsole, click the Objects menu > Object Explorer (or press the CTRL+E keys).

  2. From the left navigation tree, click VPN Communities.

  3. Double-click an existing VPN Community object (or create a new object).

    The VPN Community object window opens and shows the Gateways page.

  4. From the navigation tree, click Encryption.

  5. For Encryption Method, select IKEv2 only.

  6. Select Custom encryption suite.

  7. For Encryption algorithm, select AES-256.

  8. For Data Integrity, select SHA-384.

  9. For Diffie-Hellman Group, select a group higher than 15.

  10. Select the checkbox Use Perfect Forward Secrecy.

  11. Select the checkbox Quantum Safe Key Exchange.

    Note - When you select this checkbox, the VPN Community object uses the default profile.

    To change the default profile settings, you must use Management API. See Configuring Quantum Safe Key Exchange with Management API.

  12. Configure other required settings in this VPN Community object.

  13. Click OK.

  14. Install the Access Control Policy on all Security Gateways that participate in this VPN Community.

Advanced Configuration: Setting the Security Gateway to Use Only Quantum Safe Key Exchange

Quantum Safe Key Exchange with Post-Quantum Cryptography (PQC) is possible only if all VPN peers support it and agree to use it. In an advanced configuration, a Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. agrees to create a VPN tunnel only with a VPN peer that agrees to use PQC.

New: R82 Jumbo Hotfix Accumulator Take 41 added support for the ML-KEM set of algorithms as required by the FIPS 203 standard to address Post-Quantum Cryptography (PQC).

For information on Gateway compatibility and PQC behavior in mixed environments, refer to sk184080

Default Behavior

A Security Gateway with Quantum Safe Key Exchange and standard exchange enabled starts an IKE negotiation by sending a PQC proposal and a standard proposal. If the VPN peer gateway does not agree to use PQC,the peer gateway continues the negotiation using the standard proposal.

Advanced Configuration

A Security Gateway with only Quantum Safe Key Exchange enabled starts an IKE negotiation by proposing only to use PQC. If the VPN peer gateway does not agree to use Quantum Safe Key Exchange, the Security Gateway stops the IKE negotiation.