Search results
- ...encryption keys is left to the user. The [[wikipedia:Internet_Key_Exchange|IKE]] protocols are therefore used in IPSec VPNs to automatically negotiate key ...ace daemons on the server side. [https://strongswan.org/ strongSwan] is an IKE daemon with full support for ...16 KB (2,385 words) - 19:10, 21 March 2022
- ...es?K=BlackIkeEagle&SeB=m BlackIkeEagle]||[[User:BlackEagle|Ike Devolder]]||ike DOT devolder AT gmail DOT com ...15 KB (2,397 words) - 20:20, 30 October 2023
- * '''Maintainer:''' [https://archlinux.org/people/trusted-users/#idevolder Ike Devolder] * '''Maintainer:''' [https://archlinux.org/people/trusted-users/#idevolder Ike Devolder] ...49 KB (6,651 words) - 19:21, 25 November 2023
- * '''Mantenedor:''' [https://archlinux.org/people/trusted-users/#idevolder Ike Devolder] * '''Mantenedor:''' [https://archlinux.org/people/trusted-users/#idevolder Ike Devolder] ...43 KB (5,919 words) - 19:01, 25 November 2023
- ...tandarized VPN protocol based on ("IPsec") and the Internet Key Exchange ("IKE").|https://libreswan.org/|{{AUR|libreswan}}}} ...89 KB (12,242 words) - 11:08, 30 November 2023
- ...compatible y basado en ("IPsec") y el Intercambio de Claves de Internet ("IKE").|https://libreswan.org/|{{AUR|libreswan}}}} ...89 KB (12,958 words) - 11:04, 30 November 2023