Administrators are advised to contact their vendors regarding future updates or releases.
Administrators are advised to review their networks for potentially vulnerable appliances or systems.
Administrators are advised to contact their vendors regarding workarounds specific to their situations.
Administrators are advised to use ACLs to restrict IKE traffic to affected devices.
Administrators may wish to configure affected devices to use IKE protocol version 2 rather than version 1.
Administrators are advised to configure IPS or IDS systems to watch for a large number of IKE packets that might indicate that an attack is underway.
Cisco IOS customers can mitigate this vulnerability by implementing the Call Admission Control for
IKE feature.
Documentation from Cisco detailing mitigation strategies for individual products is available at the following link: Cisco["http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"]