Enable Post-Quantum Encryption on Cloudflare IPsec Tunnels: A Step-by-Step Guide

By

Introduction

As quantum computing advances accelerate the timeline for breaking classical public-key cryptography, organizations must act now to protect their wide-area network (WAN) traffic from harvest-now-decrypt-later attacks. Cloudflare has made post-quantum encryption generally available for its IPsec tunnels using the new hybrid ML-KEM standard (FIPS 203). This guide walks you through configuring post-quantum encryption on Cloudflare IPsec, ensuring your site-to-site connections are resilient against future quantum threats. We’ve tested interoperability with Fortinet and Cisco branch connectors, so you can start securing your WAN with existing hardware.

Enable Post-Quantum Encryption on Cloudflare IPsec Tunnels: A Step-by-Step Guide
Source: blog.cloudflare.com

What You Need

Step-by-Step Configuration Guide

Step 1: Verify Your Cloudflare IPsec Setup

Before enabling post-quantum features, ensure your existing IPsec tunnels are operational. Log into the Cloudflare dashboard, navigate to Network > IPsec, and review your tunnel configurations. Confirm that you are using IKEv2 (the protocol supporting hybrid key exchange). If you’re still on legacy IKEv1, plan a migration to IKEv2 first, as post-quantum extensions require it.

Step 2: Choose Your Post-Quantum Algorithm – Hybrid ML-KEM

Cloudflare’s implementation uses hybrid ML-KEM, which combines classical Diffie-Hellman (ECDH) with the post-quantum ML-KEM (Module-Lattice-Based Key-Encapsulation Mechanism). This hybrid approach ensures backward compatibility while adding quantum resistance. Unlike TLS counterparts that required separate software stacks, IPsec’s hybrid design was standardized by the IETF in draft-ietf-ipsecme-ikev2-mlkem. No special hardware is needed – ML-KEM runs efficiently on standard processors.

Step 3: Update Branch Connector Firmware

For seamless interoperability, your branch connectors (e.g., Fortinet FortiGate, Cisco IOS/IOS-XE) must support the hybrid ML-KEM draft. Contact your vendor for firmware versions that include this feature. For example:

Install the updates on all participating branch devices.

Step 4: Configure the Cloudflare IPsec Tunnel with Post-Quantum Encryption

In the Cloudflare dashboard, create or edit an IPsec tunnel. Under the Encryption Settings section, enable Post-Quantum Encryption and select Hybrid ML-KEM (FIPS 203) as the key exchange method. If your tunnel uses IKEv2, this option automatically modifies the proposal payload to include the ML-KEM transform. Save the configuration – Cloudflare will push the new cryptographic parameters to its edge.

Step 5: Configure Branch Connector to Use Hybrid ML-KEM

On your branch device, configure the IPsec tunnel to match the Cloudflare settings. This typically involves:

Refer to your device’s CLI or GUI documentation for exact syntax. Test connectivity with a ping across the tunnel.

Enable Post-Quantum Encryption on Cloudflare IPsec Tunnels: A Step-by-Step Guide
Source: blog.cloudflare.com

Step 6: Validate the Post-Quantum Handshake

To confirm post-quantum encryption is active, check the IKEv2 security associations (SAs) on both ends. Look for key exchange identifiers indicating ML-KEM usage. On Cloudflare, you can view tunnel status in the dashboard – it will show Post-Quantum: Enabled. On your branch connector, issue a command like show crypto ikev2 sa detailed and verify that the Key Exchange field lists ML-KEM-768 (or similar). If you see only classical Diffie-Hellman, review your configurations.

Step 7: Monitor and Update Regularly

Post-quantum encryption is still evolving. IETF drafts may become standards, requiring algorithm updates. Cloudflare aims to provide backward compatibility, but you should regularly check for firmware upgrades from your branch vendor and Cloudflare’s release notes. Enable logging on your IPsec tunnels to monitor any negotiation failures or performance impacts – ML-KEM adds minimal overhead, but older hardware might see slight CPU increases.

Tips for Success

By following these steps, you can protect your WAN against future quantum attacks while maintaining compatibility with your existing network infrastructure. The age of post-quantum IPsec has arrived – seize it.

Tags:

Related Articles

Recommended

Discover More

Building a Simulation-First Manufacturing Pipeline with OpenUSD and NVIDIA OmniverseThe Hidden Gem of Circle to Search: A Feature Google Keeps Quiet AboutCritical Security Patches Flood Linux Ecosystem: Major Distributions Issue Urgent UpdatesA Complete Guide to Fortifying Your LLM Against Prompt Injection with StruQ and SecAlignPython 3.14.2 and 3.13.11: Quick-Fix Releases Address Regressions and Security Gaps