2014
DOI: 10.17487/rfc7383
|View full text |Cite
|
Sign up to set email alerts
|

Internet Key Exchange Protocol Version 2 (IKEv2) Message Fragmentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…IKEv2 fragmentation is specified in RFC 7383 [42]. The main difference with the IKEv1 vendor-specific implementations of fragmentation is that IKEv2 fragments are encrypted.…”
Section: Ike Fragmentationmentioning
confidence: 99%
“…IKEv2 fragmentation is specified in RFC 7383 [42]. The main difference with the IKEv1 vendor-specific implementations of fragmentation is that IKEv2 fragments are encrypted.…”
Section: Ike Fragmentationmentioning
confidence: 99%
“…IKEv2 fragmentation is specified in RFC 7383 [36]. The main difference with the IKEv1 vendor-specific implementations is that IKEv2 fragments are encrypted.…”
Section: Ike Fragmentationmentioning
confidence: 99%
“…• The source and destination port ranges (0 for all) 36 • A link to the associated SA state • Direction (inbound, outbound, or forward 37 )…”
Section: The Security Policy Database (Spd)mentioning
confidence: 99%
“…IKE message fragmentation [RFC7383] is not required when using TCP encapsulation, since a TCP stream already handles the fragmentation of its contents across packets. Since fragmentation is redundant in this case, implementations might choose to not negotiate IKE fragmentation.…”
Section: Using Ike Message Fragmentation With Tcp Encapsulationmentioning
confidence: 99%