Skip to content
arrow_back
search
ISM-1233 policy ASD Information Security Manual (ISM)

Use IKE Version 2 for IPsec Key Exchange

Ensure secure IPsec connection by using IKE version 2 for exchanging keys.

record_voice_over

Plain language

When setting up an IPsec connection, it's important to use a process called IKE version 2 for exchanging keys. If you don't use the correct method, you risk hackers intercepting sensitive information or disrupting communication by pretending to be someone they're not.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

IKE version 2 is used for key exchange when establishing IPsec connections.
policy ASD Information Security Manual (ISM) ISM-1233
priority_high

Why it matters

Using outdated IKE versions can lead to key exchange vulnerabilities, allowing attackers to intercept traffic or impersonate systems.

settings

Operational notes

Regularly confirm IPsec uses IKEv2 (no IKEv1) in VPN gateway and client configs; monitor for downgrade negotiation and fix misconfigurations promptly.

Mapping detail

Mapping

Direction

Controls