gptkbp:instance_of
|
gptkb:protocol
|
gptkbp:can_be_used_with
|
gptkb:SSL/_TLS
|
gptkbp:developed_by
|
gptkb:Internet_Engineering_Task_Force
|
gptkbp:enables
|
secure communication
|
gptkbp:first_introduced
|
gptkb:RFC_2409
|
gptkbp:has_version
|
gptkb:IKEv2
gptkb:IKEv1
|
https://www.w3.org/2000/01/rdf-schema#label
|
IKE (Internet Key Exchange)
|
gptkbp:is_based_on
|
gptkb:SKEME_protocol
Oakley protocol
|
gptkbp:is_compatible_with
|
gptkb:IPv4
gptkb:IPv6
|
gptkbp:is_critical_for
|
data integrity
data confidentiality
VPN security
|
gptkbp:is_defined_by
|
gptkb:RFC_4306
gptkb:RFC_5996
|
gptkbp:is_enhanced_by
|
gptkb:IPsec_ESP
gptkb:IPsec_AH
NAT traversal
|
gptkbp:is_implemented_in
|
routers
firewalls
|
gptkbp:is_part_of
|
VPN technology
secure communication protocols
secure network architecture
IPsec architecture
|
gptkbp:is_related_to
|
gptkb:IPsec
|
gptkbp:is_standardized_by
|
gptkb:IETF
|
gptkbp:is_supported_by
|
various operating systems
network devices
|
gptkbp:is_used_by
|
network administrators
|
gptkbp:is_used_for
|
key exchange
session establishment
|
gptkbp:is_used_in
|
gptkb:cloud_services
enterprise networks
site-to-site VPNs
remote access VPNs
|
gptkbp:is_vulnerable_to
|
man-in-the-middle attacks
denial-of-service attacks
|
gptkbp:operates
|
gptkb:IPsec
|
gptkbp:provides
|
key management
mutual authentication
|
gptkbp:security
|
data transmission
|
gptkbp:supports
|
encryption
authentication
multiple authentication methods
|
gptkbp:used_for
|
establishing security associations
|
gptkbp:uses
|
gptkb:crypt
gptkb:Diffie-Hellman_key_exchange
security associations
|
gptkbp:bfsParent
|
gptkb:IPSec
gptkb:IPsec
|
gptkbp:bfsLayer
|
5
|