2011
DOI: 10.17487/rfc6071
|View full text |Cite
|
Sign up to set email alerts
|

IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap

Abstract: Over the past few years, the number of RFCs that define and use IPsec and Internet Key Exchange (IKE) has greatly proliferated. This is complicated by the fact that these RFCs originate from numerous IETF working groups: the original IPsec WG, its various spin-offs, and other WGs that use IPsec and/or IKE to protect their protocols' traffic.This document is a snapshot of IPsec-and IKE-related RFCs. It includes a brief description of each RFC, along with background information explaining the motivation and cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
1

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(78 citation statements)
references
References 13 publications
0
77
0
1
Order By: Relevance
“…The dual-stack configuration enables a gradual deployment for HIP, while providing backward compatibility with IPv6 hosts. The NCF provides end-to-end security using the ESP [26] protocol 6 . In the HIP case, a secure channel is established using the shared secret derived from the native Base Exchange (BEX) 7 mechanism, while in the MIPv6 case, the IPsec Internet Key Exchange (IKEv2) protocol is used.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The dual-stack configuration enables a gradual deployment for HIP, while providing backward compatibility with IPv6 hosts. The NCF provides end-to-end security using the ESP [26] protocol 6 . In the HIP case, a secure channel is established using the shared secret derived from the native Base Exchange (BEX) 7 mechanism, while in the MIPv6 case, the IPsec Internet Key Exchange (IKEv2) protocol is used.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, the public/private key pair used in the asymmetric step, can be also used to generate shared secrets, for securing end-to-end communication channels using any of the well-known symmetric key-based security protocols (e.g., Encapsulating Security Payload (ESP) [26], TLS, or application specific security).…”
Section: Infrastructure Accessmentioning
confidence: 99%
“…Transport Security NSH is always encapsulated by an outer transport encapsulation as detailed in Section 4 of this specification, and as depicted in Figure 1. If an operator deems cryptographic integrity protection necessary due to their risk analysis, then an outer transport encapsulation that provides such protection [RFC6071], such as IPsec, MUST be used.…”
Section: Sff/sf Nsh Verificationmentioning
confidence: 99%
“…The Point to Point Tunneling Protocol (PPTP) creates a virtual private network by using the Point to Point Protocol (PPP) and the Internet Protocol (IP). The Internet Protocol Security (IPsec) [6] or the Multi-Protocol Label Switching (MPLS) [7] are used at the level 3. The Secure Sockets Layer (SSL) [8] is used at level 4 and ensures the security and the confidentiality of the communication through the network.…”
Section: Basic Concepts Of the Distance Educationmentioning
confidence: 99%