<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKE V2 benefits in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244205#M47530</link>
    <description>&lt;P&gt;In my classes I summarize IKEv2 as a simplification and roll-up of RFC features like DPD/NAT-T that were tacked on to the original IKEv1 to handle situations not envisioned in the original IKEv1 spec (which was codified in the late 1990s).&amp;nbsp; IKEv2 also supports IPv6.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regards to security of IKEv1 vs. IKEv2, as noted by Wikipedia IKEv2 is more resistant to DoS attacks, but overall IKEv1 is still plenty secure as long as the the proper encryption/hashing algorithms and Diffie Hellman groups are employed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My overall recommendation is to use IKEv2 (especially for Check Point to Check Point VPNs) but if functionality or stability issues are encountered with IKEv2 in an interoperable scenario, do not hesitate to return to IKEv1.&amp;nbsp; It took almost ten years for IKEv1 interoperability to become more or less seamless, and IKEv2 has definitely had some growing pains.&amp;nbsp; Mention the term "IKEv2 tunnel narrowing" to an experienced Check Point VPN administrator and watch them shudder.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Mar 2025 14:00:02 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2025-03-19T14:00:02Z</dc:date>
    <item>
      <title>IKE V2 benefits</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244194#M47527</link>
      <description>&lt;P&gt;Does Check Point have any documentation specifically on IKE V2 and benefits (and limitations) from a Check Point perspective?&lt;/P&gt;
&lt;P&gt;I can't find any SK or guide apart from the VPN Admin Guides.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Don&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 13:08:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244194#M47527</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2025-03-19T13:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: IKE V2 benefits</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244196#M47528</link>
      <description>&lt;P&gt;I never seen any sk about it myself, but I know generally speaking, ikev2 is more secure, faster and more reliable and uses less bandwidth compared to ikev1.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 13:10:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244196#M47528</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-19T13:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKE V2 benefits</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244198#M47529</link>
      <description>&lt;P&gt;I don't think there are specifically for CP, but Wikipedia has an interesting list:&amp;nbsp;&lt;A href="https://en.wikipedia.org/wiki/Internet_Key_Exchange" target="_blank"&gt;https://en.wikipedia.org/wiki/Internet_Key_Exchange&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="mw-heading mw-heading3"&gt;
&lt;H3 id="Improvements_with_IKEv2"&gt;Improvements with IKEv2&lt;/H3&gt;
&lt;/DIV&gt;
&lt;TABLE class="box-Confusing plainlinks metadata ambox ambox-style ambox-confusing" role="presentation"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="mbox-image"&gt;
&lt;DIV class="mbox-image-div"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alex_0-1742390029625.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29945iB6496EDF51274D06/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Alex_0-1742390029625.png" alt="Alex_0-1742390029625.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="mbox-text"&gt;
&lt;DIV class="mbox-text-span"&gt;This section &lt;STRONG&gt;may be &lt;A title="Wikipedia:Vagueness" href="https://en.wikipedia.org/wiki/Wikipedia:Vagueness" target="_blank"&gt;confusing or unclear&lt;/A&gt; to readers&lt;/STRONG&gt;.&lt;SPAN class="hide-when-compact"&gt; Please help &lt;A title="Wikipedia:Please clarify" href="https://en.wikipedia.org/wiki/Wikipedia:Please_clarify" target="_blank"&gt;clarify the section&lt;/A&gt;. There might be a discussion about this on &lt;A title="Talk:Internet Key Exchange" href="https://en.wikipedia.org/wiki/Talk:Internet_Key_Exchange" target="_blank"&gt;the talk page&lt;/A&gt;.&lt;/SPAN&gt; &lt;SPAN class="date-container"&gt;&lt;I&gt;(&lt;SPAN class="date"&gt;February 2009&lt;/SPAN&gt;)&lt;/I&gt;&lt;/SPAN&gt;&lt;SPAN class="hide-when-compact"&gt;&lt;I&gt; (&lt;SMALL&gt;&lt;A title="Help:Maintenance template removal" href="https://en.wikipedia.org/wiki/Help:Maintenance_template_removal" target="_blank"&gt;Learn how and when to remove this message&lt;/A&gt;&lt;/SMALL&gt;)&lt;/I&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;The IKEv2 protocol was described in Appendix A of RFC 4306 in 2005. The following issues were addressed:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Fewer &lt;A class="mw-redirect" title="Requests for Comments" href="https://en.wikipedia.org/wiki/Requests_for_Comments" target="_blank"&gt;Requests for Comments&lt;/A&gt; (RFCs): The specifications for IKE were covered in at least three RFCs, more if one takes into account &lt;A title="NAT traversal" href="https://en.wikipedia.org/wiki/NAT_traversal" target="_blank"&gt;NAT traversal&lt;/A&gt; and other extensions that are in common use. IKEv2 combines these in one RFC as well as making improvements to support for &lt;A title="NAT traversal" href="https://en.wikipedia.org/wiki/NAT_traversal" target="_blank"&gt;NAT traversal&lt;/A&gt; (&lt;A class="mw-redirect" title="Network Address Translation" href="https://en.wikipedia.org/wiki/Network_Address_Translation" target="_blank"&gt;Network Address Translation&lt;/A&gt; (NAT)) and &lt;A class="mw-redirect" title="Firewall (networking)" href="https://en.wikipedia.org/wiki/Firewall_(networking)" target="_blank"&gt;firewall&lt;/A&gt; traversal in general.&lt;/LI&gt;
&lt;LI&gt;Standard Mobility support: There is a standard extension for IKEv2 named [rfc:4555 Mobility and Multihoming Protocol] (MOBIKE) (see also, &lt;A title="IPsec" href="https://en.wikipedia.org/wiki/IPsec#IETF_documentation" target="_blank"&gt;IPsec&lt;/A&gt;) used to support mobility and multihoming for it and &lt;A title="IPsec" href="https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload" target="_blank"&gt;Encapsulating Security Payload&lt;/A&gt; (ESP). By use of this extension IKEv2 and &lt;A title="IPsec" href="https://en.wikipedia.org/wiki/IPsec" target="_blank"&gt;IPsec&lt;/A&gt; can be used by mobile and multihomed users.&lt;/LI&gt;
&lt;LI&gt;&lt;A title="NAT traversal" href="https://en.wikipedia.org/wiki/NAT_traversal" target="_blank"&gt;NAT traversal&lt;/A&gt;: The encapsulation of IKE and &lt;A title="IPsec" href="https://en.wikipedia.org/wiki/IPsec#Encapsulating_Security_Payload" target="_blank"&gt;ESP&lt;/A&gt; in &lt;A title="User Datagram Protocol" href="https://en.wikipedia.org/wiki/User_Datagram_Protocol" target="_blank"&gt;User Datagram Protocol&lt;/A&gt; (UDP port 4500) enables these protocols to pass through a device or firewall performing &lt;A class="mw-redirect" title="Network Address Translation" href="https://en.wikipedia.org/wiki/Network_Address_Translation" target="_blank"&gt;NAT&lt;/A&gt;.&lt;SUP id="cite_ref-14" class="reference"&gt;&lt;A href="https://en.wikipedia.org/wiki/IKEv2#cite_note-14" target="_blank"&gt;&lt;SPAN class="cite-bracket"&gt;[&lt;/SPAN&gt;14&lt;SPAN class="cite-bracket"&gt;]&lt;/SPAN&gt;&lt;/A&gt;&lt;/SUP&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="Stream Control Transmission Protocol" href="https://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol" target="_blank"&gt;Stream Control Transmission Protocol&lt;/A&gt; (SCTP) support: IKEv2 allows for the &lt;A title="Stream Control Transmission Protocol" href="https://en.wikipedia.org/wiki/Stream_Control_Transmission_Protocol" target="_blank"&gt;SCTP&lt;/A&gt; protocol as used in Internet telephony protocol, &lt;A title="Voice over IP" href="https://en.wikipedia.org/wiki/Voice_over_IP" target="_blank"&gt;Voice over IP&lt;/A&gt; (VoIP).&lt;/LI&gt;
&lt;LI&gt;Simple message exchange: IKEv2 has one four-message initial exchange mechanism where IKE provided eight distinctly different initial exchange mechanisms, each one of which had slight advantages and disadvantages.&lt;/LI&gt;
&lt;LI&gt;Fewer cryptographic mechanisms: IKEv2 uses cryptographic mechanisms to protect its packets that are very similar to what IPsec ESP uses to protect the IPsec packets. This led to simpler implementations and certifications for &lt;A title="Common Criteria" href="https://en.wikipedia.org/wiki/Common_Criteria" target="_blank"&gt;Common Criteria&lt;/A&gt; and &lt;A title="FIPS 140-2" href="https://en.wikipedia.org/wiki/FIPS_140-2" target="_blank"&gt;FIPS 140-2&lt;/A&gt;(&lt;A class="mw-redirect" title="Federal Information Processing Standard" href="https://en.wikipedia.org/wiki/Federal_Information_Processing_Standard" target="_blank"&gt;Federal Information Processing Standard&lt;/A&gt; (FIPS), which require each cryptographic implementation to be separately validated.&lt;/LI&gt;
&lt;LI&gt;Reliability and State management: IKEv2 uses sequence numbers and acknowledgments to provide reliability and mandates some error processing logistics and shared state management. IKE could end up in a dead state due to the lack of such reliability measures, where both parties were expecting the other to initiate an action - which never eventuated. Work arounds (such as &lt;A class="mw-redirect" title="Dead Peer Detection" href="https://en.wikipedia.org/wiki/Dead_Peer_Detection" target="_blank"&gt;Dead-Peer-Detection&lt;/A&gt;) were developed but not standardized. This meant that different implementations of work-arounds were not always compatible.&lt;/LI&gt;
&lt;LI&gt;&lt;A class="mw-redirect" title="Denial of Service" href="https://en.wikipedia.org/wiki/Denial_of_Service" target="_blank"&gt;Denial of Service&lt;/A&gt; (DoS) attack resilience: IKEv2 does not perform much processing until it determines if the requester actually exists. This addressed some of the DoS problems suffered by IKE which would perform a lot of expensive cryptographic processing from &lt;A title="IP address spoofing" href="https://en.wikipedia.org/wiki/IP_address_spoofing" target="_blank"&gt;spoofed&lt;/A&gt; locations.&lt;/LI&gt;
&lt;/UL&gt;
&lt;DL&gt;
&lt;DD&gt;Supposing &lt;STRONG&gt;HostA&lt;/STRONG&gt; has a &lt;A title="Security Parameter Index" href="https://en.wikipedia.org/wiki/Security_Parameter_Index" target="_blank"&gt;Security Parameter Index&lt;/A&gt; (SPI) of &lt;CODE&gt;A&lt;/CODE&gt; and &lt;STRONG&gt;HostB&lt;/STRONG&gt; has an &lt;A title="Security Parameter Index" href="https://en.wikipedia.org/wiki/Security_Parameter_Index" target="_blank"&gt;SPI&lt;/A&gt; of &lt;CODE&gt;B&lt;/CODE&gt;, the scenario would look like this:&lt;/DD&gt;
&lt;/DL&gt;
&lt;PRE&gt;HostA -------------------------------------------------- HostB
     |HDR(A,0),sai1,kei,Ni--------------------------&amp;gt;   |
     |   &amp;lt;----------------------------HDR(A,0),N(cookie)|
     |HDR(A,0),N(cookie),sai1,kei,Ni----------------&amp;gt;   |
     |   &amp;lt;--------------------------HDR(A,B),SAr1,ker,Nr|
&lt;/PRE&gt;
&lt;DL&gt;
&lt;DD&gt;If &lt;STRONG&gt;HostB&lt;/STRONG&gt; (the responder) is experiencing large amounts of half-open IKE connections, it will send an unencrypted reply message of &lt;CODE&gt;IKE_SA_INIT&lt;/CODE&gt; to &lt;STRONG&gt;HostA&lt;/STRONG&gt; (the initiator) with a notify message of type &lt;CODE&gt;COOKIE&lt;/CODE&gt;, and will expect &lt;STRONG&gt;HostA&lt;/STRONG&gt; to send an &lt;CODE&gt;IKE_SA_INIT&lt;/CODE&gt; request with that cookie value in a notify payload to &lt;STRONG&gt;HostB&lt;/STRONG&gt;. This is to ensure that the initiator is really capable of handling an IKE response from the responder.&lt;/DD&gt;
&lt;/DL&gt;</description>
      <pubDate>Wed, 19 Mar 2025 13:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244198#M47529</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-03-19T13:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: IKE V2 benefits</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244205#M47530</link>
      <description>&lt;P&gt;In my classes I summarize IKEv2 as a simplification and roll-up of RFC features like DPD/NAT-T that were tacked on to the original IKEv1 to handle situations not envisioned in the original IKEv1 spec (which was codified in the late 1990s).&amp;nbsp; IKEv2 also supports IPv6.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regards to security of IKEv1 vs. IKEv2, as noted by Wikipedia IKEv2 is more resistant to DoS attacks, but overall IKEv1 is still plenty secure as long as the the proper encryption/hashing algorithms and Diffie Hellman groups are employed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My overall recommendation is to use IKEv2 (especially for Check Point to Check Point VPNs) but if functionality or stability issues are encountered with IKEv2 in an interoperable scenario, do not hesitate to return to IKEv1.&amp;nbsp; It took almost ten years for IKEv1 interoperability to become more or less seamless, and IKEv2 has definitely had some growing pains.&amp;nbsp; Mention the term "IKEv2 tunnel narrowing" to an experienced Check Point VPN administrator and watch them shudder.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 14:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244205#M47530</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-03-19T14:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: IKE V2 benefits</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244246#M47536</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Thanks&lt;/STRONG&gt; Tim and Alex, much appreciated.&lt;/P&gt;
&lt;P&gt;It does seem like an SK could be beneficial to have in Support Center to cover IKE V2 from a Check Point perspective.&lt;/P&gt;
&lt;P&gt;It could cover FAQs and other things like R82 gateway support for remote access with IKE V2.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Configuring-Policy.htm?cshid=ID002" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Configuring-Policy.htm?cshid=ID002&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 18:46:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKE-V2-benefits/m-p/244246#M47536</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2025-03-19T18:46:44Z</dc:date>
    </item>
  </channel>
</rss>

