Configure Quantum Resistant IKEv2 VPNs
Focus
Focus
Network Security

Configure Quantum Resistant IKEv2 VPNs

Table of Contents

Configure Quantum Resistant IKEv2 VPNs

Exchanging Post-quantum pre-shared keys out-of-band makes IKEv2 VPNs resistant to attacks by quantum computers.
Where Can I Use This?
What Do I Need?
  • PAN-OS
  • PAN-OS 11.1 or later.
Quantum-resistant IKEv2 VPNs based on RFC 8784 prevent attackers who are attempting to execute Harvest Now, Decrypt Later attacks from stealing the cryptographic key material used to encrypt data in the VPN. Without the cryptographic keys, attackers can't decrypt harvested data later with a cryptographically relevant quantum computer. Even if attackers successfully steal the encrypted data, without a cryptographically relevant quantum computer to decrypt the key material, they can't compromise the harvested data because they can't decrypt it without the key. RFC 8784 provides a quantum-resistant transition from today's classical cryptography to post-quantum cryptography that you can implement today.
This chapter shows you how to configure post-quantum IKEv2 VPNs, including how to configure post-quantum IKEv2 VPNs in scenarios where you know the IKEv2 peer and its capabilities and scenarios where don't control the IKEv2 peer and don't know its capabilities. Configure Post-Quantum IKEv2 VPNs shows you the post-quantum IKEv2 VPN configuration steps and options. Post-Quantum IKEv2 VPN Configuration Example provides an example of a simple topology and how to configure post-quantum IKEv2 VPN support for the topology.
In addition to configuring post-quantum IKEv2 VPNs based on RFC 8784, follow RFC 6379 for
Suite B Cryptographic Suites for IPsec
to upgrade your VPN connections to tough cipher suites, upgrade your CA to 4K RSA key sizes to mitigate brute force attacks that can break smaller key sizes and migrate your VPN certificate authentication to new certificates, and upgrade to higher-bit SHA hash sizes such as SHA-384 and SHA-512.

Recommended For You