Description:

Quantum computers pose a major challenge for current cryptographic methods, including those used in IKEv2 connections. Although these algorithms are currently considered to be very robust against attacks, it is conceivable that attackers could record encrypted data traffic now and decrypt it at a later date using a quantum computer. 

In order to protect data traffic on IKEv2 connections against attacks by quantum computers, the extension RFC 8784 “Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security” was introduced that allows IKEv2 connections with preshared key (PSK) to be additionally secured with a post-quantum preshared key (PPK).

This article describes how to extend an existing IKEv2 connection between two LANCOM routers with post-quantum preshared keys.

In the LMC, this feature is accessed and configured via the detail configuration of the router

Requirements:

Procedure:

1) Configuring the post-quantum preshared keys at the Headquarters:

1.1) Connect to the router at the Headquarters and navigate to the menu VPN → IKEv2/IPSec → Extended settings.

Open the Extended settings in the VPN menu

1.2) Go to the PPKs menu.

Open the PPKs menu

1.3) Create a new entry and adjust the following parameters:

  • PPK-ID: Enter a unique name for the PPK (in this example PPK-1).
  • PPK: Assign a password as PPK.
  • Mandatory: From the drop-down menu, select the option Yes. This means that the VPN connection will only be established if the remote site also uses a PPK. The setting No means that the use of PPKs is optional.

The PPK-ID and the PPK itself must match on both VPN routers in order for the VPN to connect.

Create a new entry with a PPK-ID and a PPK

1.4) Switch to the menu VPN → IKEv2/IPsec → Authentication

Open the menu Authentication in the VPN

1.5) Select the VPN connection to be secured and click Edit.

Edit the Authentication settings for the existing VPN connection to the branch office

1.6) From the drop-down menu for PPK-ID, select the PPK-ID created in step 1.3.

Select the created PPK-ID in the Authentication settings of the headquarter

1.7) This concludes the configuration steps at the headquarters.



2) Configuring the post-quantum preshared keys at the branch office:

2.1) Connect to the router at the office and navigate to the menu VPN → IKEv2/IPSec → Extended settings.

Open the Extended settings in the VPN menu

2.2) Go to the PPKs menu.

Open the PPKs menu

2.3) Create a new entry and adjust the following parameters:

  • PPK-ID: Enter the PPK-ID created in step 1.3 (in this example PPK-1).
  • PPK: Enter the password set in step 1.3.
  • Mandatory: From the drop-down menu, select the option Yes. This means that the VPN connection will only be established if the remote site also uses a PPK. The setting No means that the use of PPKs is optional.

The PPK-ID and the PPK itself must match on both VPN routers in order for the VPN to connect.

Create a new entry and enter the PPK-ID and PPK of the router in the headquarter

2.4) Switch to the menu VPN → IKEv2/IPsec → Authentication

Open the menu Authentication in the VPN

2.5) Select the VPN connection to be secured and click Edit.

Edit the Authentication settings for the existing VPN connection to the headquarter

2.6) From the drop-down menu for PPK-ID, select the PPK-ID created in step 2.3.

Select the created PPK-ID in the Authentication settings of the branch office

2.7) This concludes the configuration steps at the branch office.



3) Restart the VPN connection:

These changes only come into effect after restarting the VPN connection. The disconnect can be initiated at the branch office or at the headquarters.

3.1) Restart the VPN connection using LANmonitor:

Select the VPN connection, right-click, and select the context-menu option Disconnect.

Disconnect the VPN connection via the LANmonitor


3.2) Restart the VPN connection from the command line:

Enter the command to disconnect the VPN connection in the following format:

do Other/Manual-Dialing/Disconnect <Name of the VPN connection> 

In this example, the command would appear as follows: 

do Other/Manual-Dialing/Disconnect HEADQUARTER

Disconnect the VPN connection via the CLI



4) Checking the quantum resistance of the VPN connection in the VPN status:

With the CLI command ls Status/VPN/Connections you can check whether the configured PPK is used on the VPN connection. If the field Quantum-Resistant displays Yes, the connection uses the PPK.

Check the quantum resistance of the VPN connection via the CLI