References


1 Microsoft, Inc. "How to Configure an L2TP/IPSec Connection Using Pre-shared Key Authentication (Q240262)." http://support.microsoft.com/default.aspx?scid=kb;EN-US;q240262. September 2004.

2 Microsoft, Inc. "Mutual Authentication Methods Supported for L2TP/IPSec (Q248711)." http://support.microsoft.com/default.aspx?scid=kb;EN-US;q248711. September 2004.

3 Bruce Schneier and Mudge . "Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)." August 1999. http://www.counterpane.com/pptpv2-paper.html. September 2004.

4 Kory Hamzeh, Gurdeep Singh Pall , et al. "RFC 2637 Point-to-Point Tunneling Protocol." July 1999. http://www.ietf.org/rfc/rfc2637.txt. September 2004.

5 W. Townsley, A. Valencia , et al. "RFC 2661Layer Two Tunneling Protocol 'L2TP'." August 1999. http://www.ietf.org/rfc/rfc2661.txt. September 2004.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net