REFERENCES






REFERENCES

  1. J. Romkey, "A Nonstandard for Transmission of IP Datagrams over Serial Lines: SLIP," Request for Comments 1055, STD 47, June 1988.

  2. W. Simpson, "The Point-to-Point Protocol (PPP)," Request for Comments 1661, STD 51, July 1994.

  3. IEEE 802.10, "IEEE Standards for Local and Metropolitan Area Networks: Interoperable LAN/MAN Security (SILS)," 1998.

  4. IEEE 802.10c, "Supplements to IEEE Std 802.10, Interoperable LAN/MAN Security (SILS): Key Management (Clause 3)," 1992.

  5. A. Valencia, M. Littlewood, and T. Kolar, "Cisco Layer Two Forwarding (Protocol) L2F," Request for Comments 2341, May 1998.

  6. C. Scott, P. Wolfe, and M. Erwin, Virtual Private Networks, 2nd Edition, O'Reilly & Associates, Sebastopol, CA, 1998.

  7. S. Brown, Implementing Virtual Private Networks, McGraw-Hill, New York, 1999.

  8. S. Hanks, et al., "Generic Routing Encapsulation (GRE)," Request for Comments 1701, October 1994.

  9. D. Rand, "The PPP Compression Control Protocol (CCP)," Request for Comments 1962, June 1996.

  10. W. Simpson, "PPP Challenge Handshake Authentication Protocol (CHAP)," Request for Comments 1994, August 1996.

  11. G. Meyer, "The PPP Encryption Control Protocol (ECP)," Request for Comments 1968, June 1996.

  12. L. Blunk and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)," Request for Comments 2284, March 1998.

  13. G. Zorn and S. Cobb, "Microsoft PPP CHAP Extensions," Request for Comments 2433, October 1998.

  14. G. S. Pall and G. Zorn, "Microsoft Point-to-Point Encryption (MPPE) Protocol," Request for Comments 2118, April 1998.

  15. B. Schneier and P. Mudge, "Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol," Proceedings of ACM Conference on Communcations and Computer Security, November 1998.

  16. G. Zorn, "Microsoft PPP CHAP Extensions, Version 2," Request for Comments 2759, January 2000.

  17. B. Schneier and P. Mudge, "Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)," June 1999.

  18. R. Shea, L2TP: Implementation and Operation, Addison-Wesley, Reading, MA, 1999.

  19. W. Townsley, et al., "Layer Two Tunneling Protocol ‘L2TP’," Request for Comments 2661, August 1999.

  20. R. Shirey, "Internet Security Glossary," Request for Comments 2828, May 2000.

  21. B. S. Davie and Y. Rekhter, MPLS: Technology and Applications, Morgan Kaufmann Publishers, San Francisco, CA, 2000.

  22. U. Black, MPLS and Label Switching Networks, Prentice-Hall, Englewood Cliffs, NJ, 2001.



 Python   SQL   Java   php   Perl 
 game development   web development   internet   *nix   graphics   hardware 
 telecommunications   C++ 
 Flash   Active Directory   Windows