Difference between revisions of "IKE Implementation Analysis"

From royhills
Jump to: navigation, search
(Added FortiGate link)
 
(No difference)

Latest revision as of 13:30, 26 January 2008

This section contains details of various vendor's IKE implementations, and how they respond to ike-scan.

This is a useful resource if you are trying to fingerprint an implementation, or if you want to know the idiosyncrasies of a particular vendor's product.

The following general points apply to the implementation details shown above:

  • The details shown only apply to IKE Phase-1;
  • The details apply to remote access VPNs unless otherwise noted; and
  • The system under test is acting as a responder, with ike-scan as the initiator.