Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 



Perfect Forward Secrecy (PFS)

Complete Definition:

PFS will ensure the same key will not be generated again, so forcing a new diffie-hellman key exchange. This would ensure if a hacker\criminal was to compromise a private key, they would only be able to access data in transit protected by that key and not any future data, as future data would not be associated with that compromised key.

Both sides of the VPN must be able to support PFS in order for PFS to work. When PFS is turned on, for every negotiation of a new phase 2 SA the two gateways must generate a new set of phase 1 keys. This is an extra layer of protection that PFS adds, which ensures if the phase 2 SA’s have expired, the keys used for new phase 2 SA’s have not been generated from the current phase 1 keying material. Of course if PFS is not turned on then the current keying material already established at phase 1 will be used again to generate phase 2 SA’s.

Therefore using PFS provides a more secure VPN connection. Although using PFS does have its drawback. It will require more processing power, and take slightly longer for phase 1 and 2 to complete. PFS in general is known as a session key. A session key is a key just created for a particular session, and when the session is bought down, the key is destroyed and not used again. Next time a session is initiated a new and completely different session key is created.

Wikipedia Definition

RFCs and Reference:

Version history
Revision #:
1 of 1
Last update:
‎06-09-2009 03:57 AM
Updated by:
Labels (1)
Everyone's tags (2)

You're missing the most basic point...

IKE Phase 1 uses a DH exchange regardless.

IKE Phase 2 can perform another DH key exchange if a PFS group is defined to derive it's keying material(session key) instead of using the DH values dervied from Phase 1.