IKE Implementation Analysis

From royhills
Revision as of 13:30, 26 January 2008 by Royhills (talk | contribs) (Added FortiGate link)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

This section contains details of various vendor's IKE implementations, and how they respond to ike-scan.

This is a useful resource if you are trying to fingerprint an implementation, or if you want to know the idiosyncrasies of a particular vendor's product.

The following general points apply to the implementation details shown above:

  • The details shown only apply to IKE Phase-1;
  • The details apply to remote access VPNs unless otherwise noted; and
  • The system under test is acting as a responder, with ike-scan as the initiator.