IKE/IPsec Inspector
Flexible software tools deliver verifiable IT security
Established network protocols, such as Standard Transport Layer Security (TLS) and Internet Key Exchange (IKE)/Internet Protocol Security (IPsec), are recognised standards that today form the basis for secure networks. However, implementation and configuration are extremely complex and can present loopholes for hackers if not performed correctly.
Potential threats associated with cyber security
Systems communicate via public networks
- Internet, wireless networks
- Data can be intercepted and changed
Protecting the integrity of the data
- Sensor data, control signals
Preventing interception by third parties
- Trade secrets, personal data
Identification of the communication partners
- Contracts
In many cases, all of these measures are required
- Banking transactions, Critical infrastructure
achelos test suites secure your network
achelos offers test tools to test your products and solutions for security and conformity in a manufacturer-independent approach. With our IKE/IPsec Inspector test suite, you can find loopholes and errors in the implementation and configuration of your network connections and then eliminate these in a targeted way. The IKE/IPsec inspector tests the complete structure of the IKE connection, all the way up to mutual authentication and reaction to incorrect behaviour, such as
- Missing or wrong parts of communication
- Incorrect key material
- Incorrect certificates
- Unsuitable cipher suites
- Incorrect reaction to manipulations
The IKE Inspector from achelos can be used flexibly, all the way up to automated test runs. Extremely efficient test management and various simulation environments are available for this purpose. Implementation of the security protocols is investigated in detail and results are logged for future reference.
Protocols guarantee authenticity, integrity and confidentiality
Internet Protocol Security (IPsec) is one protocol family
- Encapsulating Security Payload (ESP) defined in RFC 4303
- ESP secures IP packets
- For example used by VPN gateways
achelos test suites are based on strict security requirements
The catalogue of test cases is continuously expanded and is based on requirements from the following sources:
- Functional specifications
- Technical guidelines (TR)
- Certifications
- Cryptographic standards
- Application notes for Common Criteria certification
- Evaluation standards
- Penetration tests
- Documentation requirements in line with Common Criteria