Created on
07-05-2024
02:08 AM
Edited on
08-28-2025
01:56 AM
By
Jean-Philippe_P
Description |
This article describes the implementation of QKD for site-to-site IPSec VPN. |
Scope | FortiOS v7.4.2. |
Solution |
Quantum Key Distribution (QKD) can be used in FortiGate IPsec configuration to manage the key between two endpoint tunnels via Key Management Entity (KME).
Step to configure IPsec S2S with QKD.
FortiGate-A.
config user peer edit "qkdtest" set ca "CA_Cert" next end
config vpn qkd edit "qkdtest" set server "10.100.0.1" <-- Server IPv4, IPv6 or DNS address of the KME. set port 443 <-- Port to connect to on the KME. set id "qkd00001" <-- ID Quantum Key Distribution ID assigned by the KME. set peer "qkdtest" <-- Peer Authenticate Quantum Key Device's certificate with the peer/peergrp. set certificate "client" next
config vpn ipsec phase1-interface edit "TEST-A" set interface "port1" set ike-version 2 set peertype any set net-device disable set childless-ike enable <- Requirement for qkd support. set proposal aes256-sha256 set dpd disable set dhgrp 21 set qkd ? disable --> Disable the use of a Quantum Key Distribution (QKD) server. allow --> Allow, but do not require, use of a Quantum Key Distribution (QKD) server. require --> Require the use of a Quantum Key Distribution (QKD) server. set qkd-profile "qkdtest" set remote-gw 192.168.1.1 set psksecret ENC XXXX next end
config vpn ipsec phase2-interface edit "TEST-A" set phase1name "TEST" set proposal aes256-sha256 set auto-negotiate enable set keylifeseconds 3600
FortiGate-B.
config user peer edit "qkdtest" set ca "CA_Cert" next end
config vpn qkd edit "qkdtest" set server "10.100.0.1" <-- Server IPv4, IPv6 or DNS address of the KME. set port 443 <-- Port to connect to on the KME. set id "qkd00002" <-- Id Quantum Key Distribution ID assigned by the KME. set peer "qkdtest" <-- Peer Authenticate Quantum Key Device's certificate with the peer/peergrp. set certificate "client" next
The command below can verify the status of QKD.
diagnose vpn ike qkd qkdtest diagnose debug application ike -1 diagnose de en
On FortiOS versions 7.6.1, 7.6.2, and 7.6.3, certain Quantum Key Distribution (QKD) servers may trigger a 'QKD error 5' message in the IKE debug logs. In this case, a possible workaround would be to increase the TLS handshake timeout on the server side to more than 10 seconds. If adjusting the server-side timeout is not possible, an upgrade to FortiOS v7.6.4 is recommended. This behavior has been addressed in FortiOS v7.6.4 and is documented in the release notes under Engineering Case ID 1145391.
Notes:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.