1998
DOI: 10.17487/rfc2408
|View full text |Cite
|
Sign up to set email alerts
|

Internet Security Association and Key Management Protocol (ISAKMP)

Abstract: Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
140
0
4

Year Published

1999
1999
2013
2013

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 277 publications
(144 citation statements)
references
References 15 publications
0
140
0
4
Order By: Relevance
“…o In addition, for all security associations bound to the mobile node's home address established by IKE, the mobile node MUST include an ISAKMP Identification Payload [8] in the IKE phase 2 exchange, giving the mobile node's home address as the initiator of the Security Association [7].…”
Section: Interaction With Outbound Ipsec Processingmentioning
confidence: 99%
“…o In addition, for all security associations bound to the mobile node's home address established by IKE, the mobile node MUST include an ISAKMP Identification Payload [8] in the IKE phase 2 exchange, giving the mobile node's home address as the initiator of the Security Association [7].…”
Section: Interaction With Outbound Ipsec Processingmentioning
confidence: 99%
“…For the replacement of Key N, this new key will be sent encrypted in the newly replaced Key K (for Users 9, 10, and 12) and will also be encrypted in the node key shared by Users 13, 14, 15, and 16 (Key L). For the replacement of Key O, this new key will be sent encrypted in the newly replaced Key N (for Users 9, 10, 12, 13, 14, 15, and 16) and will also be encrypted in the node key shared by Users 1,2 ,3,4,5,6,7,and 8 (Key M).) The number of transmissions required is the sum of the degrees of the replaced nodes.…”
Section: The Exclusion Principlementioning
confidence: 99%
“…In this case application level encryption is not sufficient; IPSEC ESP [24] SHOULD be used instead. Regardless of which level performs the encryption, the IPSEC ISAKMP [25] service SHOULD be used for key management. The SCTP Payload Protocol Identifier value "3" SHOULD be included in each SCTP DATA chunk, to indicate that the SCTP is carrying the M3UA protocol.…”
Section: Protecting Confidentialitymentioning
confidence: 99%
“…Thus these extensions are assigned by IANA through an IETF Consensus action as defined in Guidelines for Writing an IANA Considerations Section in RFCs (25] The proposed extension must in no way adversely affect the general working of the protocol. In the example above, each signalling process (SGP, ASP or IPSP) is the end point to more than one SCTP association, leading to more than one other signalling processes.…”
Section: M3ua Protocol Extensionsmentioning
confidence: 99%