IKE Implementation Analysis

From royhills
Jump to: navigation, search

This section contains details of various vendor's IKE implementations, and how they respond to ike-scan.

This is a useful resource if you are trying to fingerprint an implementation, or if you want to know the idiosyncrasies of a particular vendor's product.

The following general points apply to the implementation details shown above:

  • The details shown only apply to IKE Phase-1;
  • The details apply to remote access VPNs unless otherwise noted; and
  • The system under test is acting as a responder, with ike-scan as the initiator.