IPsec/IKEv2-based VPN software for Linux
IKEv1 | IKEv2 (SIMPLE and RELIABLE!) |
IPsec SA | Child SA (Changed) |
Exchange modes:
|
Only one exchange procedure is defined.
Exchange modes were obsoleted. |
Exchanged messages to establish VPN.
|
Only 4 messages. |
Authentication methods ( 4 methods ):
|
Only 2 methods:
|
Both peers must use the same authentication method. |
Each peer can use a different authentication method (Asymmetrical authentication). (e.g. Initiator: PSK and Responder: RSA-Sig) |
Traffic selector:
|
|
Lifetime for SAs:
Agreement between peers is required. |
NOT negotiated. Each peer can delete SAs anytime by exchanging DELETE payloads. |
Multi-hosting:
Basically, NOT supported. |
Supported by using multiple IDs on a single IP address and port pair. |
Rekeying:
NOT defined. |
Defined. |
NAT Traversal:
Defined as an extension. |
Supported by default. |
Dead Peer Detection / Keep-alive for SAs:
Defined as an extension. |
Supported by default. |
Remote Access VPN:
NOT defined. Supported by vender-specific implementations:
|
Supported by default:
|
Multi-homing:
Basically, NOT supported. |
Supported by MOBIKE (IKEv2 Mobility and Multihoming Protocol: RFC 4555). |
Mobile Clients:
Basically, NOT supported. |
Supported by MOBIKE (IKEv2 Mobility and Multihoming Protocol: RFC 4555). |
DoS protections:
Basically, NOT supported. |
|
Less reliable than IKEv2. |
More reliable.
|
Extensions are very poor. |
Useful extentions in actual network environment.
etc.
See the IETF
ipsecme-WG's web page. |
See also RFC 4303, 4306, 4718 and 5996 for more details.