Internet Key Exchange (IKE)
GPTKB entity
Statements (93)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:RFC_5929
|
gptkbp:based_on |
gptkb:XMPP_Extension_Protocol
ISAKMP |
gptkbp:can_be_used_with |
gptkb:SSL/_TLS
|
gptkbp:defines |
gptkb:RFC_7296
security associations protocol specifications IKE messages IKE algorithms IKE exchanges IKE exchanges types IKE negotiation process IKE parameters IKE phases IKE policies IKE proposals IKE session management Security Association (SA) establishment |
gptkbp:developed_by |
gptkb:Internet_Engineering_Task_Force_(IETF)
|
gptkbp:enhances |
network security
|
gptkbp:first_introduced |
gptkb:RFC_2409
|
gptkbp:has_version |
IK Ev1
IK Ev2 |
https://www.w3.org/2000/01/rdf-schema#label |
Internet Key Exchange (IKE)
|
gptkbp:includes |
Phase 1
Phase 2 |
gptkbp:is_compatible_with |
I Pv6
I Pv4 |
gptkbp:is_critical_for |
secure communications
|
gptkbp:is_implemented_in |
routers
firewalls security appliances VPN clients VPN gateways |
gptkbp:is_part_of |
gptkb:software
VPN technology secure communication protocols secure network architecture network layer security I Psec VP Ns I Psec framework |
gptkbp:is_related_to |
authentication protocols
network protocols security policies security protocols cryptographic protocols encryption methods encryption algorithms I Psec Security Architecture I Psec Security Associations |
gptkbp:is_standardized_by |
IETFRF Cs
|
gptkbp:is_supported_by |
various operating systems
network devices |
gptkbp:is_used_by |
network devices
VPN clients Virtual Private Networks (VP Ns) |
gptkbp:is_used_for |
secure remote access
establishing security associations secure key management secure key exchange secure site-to-site connections key agreement I Psec VP Ns establishing secure tunnels |
gptkbp:is_used_in |
gptkb:Cloud_Computing_Service
secure communications enterprise networks remote access VP Ns site-to-site VP Ns |
gptkbp:is_utilized_in |
secure data transmission
secure remote access |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
denial-of-service attacks |
gptkbp:latest_version |
IK Ev1
IK Ev2 |
gptkbp:operates |
gptkb:motorcycle
|
gptkbp:provides |
key management
key distribution mutual authentication |
gptkbp:security_features |
data integrity
data confidentiality anti-replay protection |
gptkbp:supports |
gptkb:X.509_certificates
encryption authentication NAT traversal multiple authentication methods pre-shared keys |
gptkbp:uses |
gptkb:Diffie-Hellman_key_exchange
digital signatures pre-shared keys |