10.7 Endnotes


10.7 Endnotes

1. Housley, R. "Wireless LAN Security Solution Motives and Rationale." December 4 “5, 2002 , NIST WLAN Security Workshop Presentation, Vigil Security, LLC.

2. IEEE. "Status of Project IEEE 802.11i." Retrieved August 23, 2003 , from http://grouper.ieee.org/groups/802/11/Reports/tgiupdate.htm .

3. Sourceforge . " WEPCrack ." Retrieved August 23, 2002 , from http://wepcrack.sourceforge.net .

4. Shmoo. "AirSnort" Homepage. Retrieved August 23, 2002 , from http://airsnort.shmoo.com .

5. IEEE. Status of Project IEEE 802.11i. Retrieved August 23, 2003 from http://grouper.ieee.org/groups/802/11/Reports/tgiupdate.htm .

6. IEEE. "802.1x-Port-Based Network Access Control." Retrieved August 23, 2003 , from http://www.ieee802.org/1/pages/802.1x.html .

7. Condon, P., et al. "Request for Comments: 3580-IEEE 802.1X Remote Authentication Dial-In User Service (RADIUS) Usage Guidelines." Retrieved September 19, 2002 , from http://www.ietf.org/rfc/rfc3580.txt .

8. Cisco. "Application Note: Authentication with 802.1x and EAP Across Congested WAN Links." Retrieved August 23, 2003 , from http://www.cisco.com/en/US/netsol/ns110/ns175/ns176/ns178/networking_solutions_white_paper09186a00800a9e8e.shtml .

9. The reader is encouraged to visit http://www.ietf.org .

10. Aboba, B., and D. Simon. "RFC 2716-PPP EAP TLS Authentication Protocol." Retrieved August 23, 2003 , from http://www.faqs.org/rfcs/rfc2716.html .

11. Microsoft Knowledgebase Article 325725, "Protected EAP (PEAP) Support Added to Windows XP SP1 and Windows Server 2003," at http://support.microsoft.com/default.aspx?scid=kb;en-us;325725 .

12. The reader is encouraged to visit http://www.funk.com/radiouswlan for more information on this topic.

13. Blunk, L., and J. Vollbrecht. "RFC 2284 - PPP Extensible Authentication Protocol (EAP)." Retrieved August 23, 2003 , from http://www.faqs.org/rfcs/rfc2284.html .

14. Andersson, H., S. Josefsson., G. Zorn, D. Simon, and A. Palekar. "PPPEXT Working Group Internet ”DRAFT: Protected EAP Protocol (PEAP)." Retrieved August 23, 2003 , from http://www.globecom.net/ietf/draft/draft-josefsson-pppext-eaptls-eap-02.html .

15. Layer 2 Tunnelling Protocol Daemon. Retrieved August 23, 2003 , from http://www.12tpd.org

16. IETF. "IP Security Protocol (ipsec)." Retrieved August 23, 2003 , from http://www.ietf.org/html. charters /ipsec-charter.html .

17. SourceForge.net. "PPTP Client." Retrieved August 23, 2003 , from http://pptpclient.sourceforge.net .

18. Microsoft. "Point-Point Tunneling Protocol (PPTP) FAQ." Retrieved August 23, 2003 , from http://www.microsoft.com/ntserver/ProductInfo/faqs/PPTPfaq.asp .

19. See note 15.

20. Aalto, T. "IPv6 Authentication Header and Encapsulated Security Payload." Retrieved August 23, 2003 , from http://www.tml.hut.fi/Opinnot/Tik-110.551/1 .

21. Aalto, T. "IPv6 Authentication Header and Encapsulated Security Payload." Retrieved August 23, 2003 , from http://www.tml.hut.fi/Opinnot/Tik-110.551/1996/ahesp.html .

22. IETF. "Secure Shell (secsh)." Retrieved August 23, 2003 , from http://www.ietf.org/html.charters/secsh-charter.html .

23. SSH. "SSH2." Retrieved August 23, 2003 . from http://www.ssh.com/documents/32/ssh2.txt, and Wellington, B. sftp. Retrieved August 23 2003 , from http://www.xbill.org/sftp/oldindex.html .

24. VanDyke Software. "SSH Overview: Security Benefits." Retrieved September 15, 2003, from http://www.vandyke.com/solutions/ssh_overview/ssh_overview_integrity.html .

25. Ibid.

26. IETF. "RFC 2002: IP Mobility Support." Retrieved August 23, 2003 , from http://www.ietf.org/rfc/rfc2002.txt .

27. IEEE. "Status of Project IEEE 802.11f: Recommended Practice for Inter Access Point Protocol." Retrieved August 23, 2003 , from http://grouper.ieee.org/groups/802/11/Reports/tgfupdate.htm .




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net