Configure Quantum Resistant IKEv2 VPNs
Focus
Network Security

Configure Quantum Resistant IKEv2 VPNs

Table of Contents

Configure Quantum Resistant IKEv2 VPNs

Exchanging post-quantum pre-shared keys out-of-band makes IKEv2 VPNs resistant to attacks by quantum computers.
Where Can I Use This?What Do I Need?
  • PAN-OS
  • PAN-OS 11.1 or later.
Quantum-resistant IKEv2 VPNs based on RFC 8784 or RFC 9242 and RFC 9370 prevent attackers who attempt to execute Harvest Now, Decrypt Later attacks from stealing the cryptographic key material used to encrypt data in the VPN. Without the cryptographic keys, attackers can't decrypt harvested data later, even with a cryptographically relevant quantum computer. Even if attackers successfully steal the encrypted data, they can't compromise the harvested data without having both the keys and a cryptographically relevant quantum computer.
RFC 8784 provides a quantum-resistant transition from today's classical cryptography to post-quantum cryptography that you can implement today. RFC 8784 doesn’t require cryptography upgrades, making its implementation straightforward and fast as long as both VPN devices on each side of the tunnel support it.
RFC 9242 and RFC 9370 are more resource intensive than RFC 8784 but provide a dynamic key generation capability based on new PQC mathematical algorithms that aren't vulnerable to Shor’s algorithm. Because RFC 9242 and RFC 9370 require cryptography upgrades, deploying their hybrid key technology can take longer, so you need to take cryptographic agility into account.
This chapter shows how to configure post-quantum IKEv2 VPNs in scenarios where you know the IKEv2 peer and its capabilities and scenarios where you don't control the IKEv2 peer and don't know its capabilities.
In addition to configuring post-quantum IKEv2 VPNs based on RFC 8784, follow RFC 6379 for Suite B Cryptographic Suites for IPsec to upgrade your VPN connections to tough cipher suites, upgrade your CA to 4K RSA key sizes to mitigate brute-force attacks that can break smaller key sizes and migrate your VPN certificate authentication to new certificates, and upgrade to higher-bit SHA hash sizes such as SHA-384 and SHA-512.