IPsec/IKEv2-based VPN software for Linux
| IKEv1 | IKEv2 (SIMPLE and RELIABLE!) |
| IPsec SA | Child SA (Changed) |
Exchange modes:
|
Only one exchange procedure is defined.
Exchange modes were obsoleted. |
Exchanged messages to establish VPN.
|
Only 4 messages. |
Authentication methods ( 4 methods ):
|
Only 2 methods:
|
| Both peers must use the same authentication method. |
Each peer can use a different authentication method (Asymmetrical authentication). (e.g. Initiator: PSK and Responder: RSA-Sig) |
Traffic selector:
|
|
| Lifetime for SAs:
Agreement between peers is required. |
NOT negotiated. Each peer can delete SAs anytime by exchanging DELETE payloads. |
| Multi-hosting:
Basically, NOT supported. |
Supported by using multiple IDs on a single IP address and port pair. |
| Rekeying:
NOT defined. |
Defined. |
| NAT Traversal:
Defined as an extension. |
Supported by default. |
| Dead Peer Detection / Keep-alive for SAs:
Defined as an extension. |
Supported by default. |
| Remote Access VPN:
NOT defined. Supported by vender-specific implementations:
|
Supported by default:
|
| Multi-homing:
Basically, NOT supported. |
Supported by MOBIKE (IKEv2 Mobility and Multihoming Protocol: RFC 4555). |
| Mobile Clients:
Basically, NOT supported. |
Supported by MOBIKE (IKEv2 Mobility and Multihoming Protocol: RFC 4555). |
| DoS protections:
Basically, NOT supported. |
|
| Less reliable than IKEv2. |
More reliable.
|
| Extensions are very poor. |
Useful extentions in actual network environment.
etc.
See the IETF
ipsecme-WG's web page. |
See also RFC 4303, 4306, 4718 and 5996 for more details.