Cisco Secure Consulting Services (Security Wheel), http://www.cisco.com/warp/public/cc/serv/mkt/sup/advsv/pavsup/sposass/cscsb_br.pdf Configuring IKE Extended Authentication, http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps1834/products_feature_guide09186a008007feb8.html Designing and Implementing a Secure Network Infrastructure, M. Kaeo, NANOG, http://www.nanog.org/mtg-0310/pdf/kaeo.ppt, October 2003 How TLS/SSL Works, http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/TechRef/c22a4d3d-6335-4b9b-b344-bbae041203b4.mspx Internet Draft: Simple Certificate Validation Protocol, T. Freeman, R. Housley, A. Malpani., http://www.ietf.org/internet-drafts/draft-ietf-pkix-scvp-16.txt, October 2004 Internet Key Exchange Mode Config, http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps5014/products_feature_guide09186a0080088172.html Office for Civil RightsHIPAA, http://www.hhs.gov/ocr/hipaa/ PKI BasicsA Technical Perspective, Shashi Kiran, Patricia Lareau, Steve Lloyd, PKI Forum, http://www.pkiforum.org/pdfs/PKI_Basics-A_technical_perspective.pdf, 2002 Security of the MPLS Architecture, http://www.cisco.com/en/US/partner/tech/tk436/tk428/technologies_white_paper09186a00800a85c5.shtml Software IPPCP (LZS) with Hardware Encryption, http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps1839/products_feature_guide09186a0080110c00.html SSL/TLS Case Study, http://www.stanford.edu/class/cs259/lectures/02-SSL.pdf |