| IPSec, “ICSA IPSEC Product Certification Criteria Version 1.0A”, ICSA IPSec Product Certification Version 1.0A Testing, Dec. 22, 1999 (pp. 1 of 8). |
| IPSec, “ICSA IPSEC Product Certificat Criteria Version 1.1”, ICSA IPSec Product Certification Version 1.1 Testing, Dec. 22, 1999 (pp. 1 of 4). |
| Security SnapShot, ICSA.net's Security Snapshot and ESnap are the quickest way's to estimate your company's Internet security posture in six important risk categories, (pp. 1 of 3) Apr. 5, 2000. |
| Harkins, D. et al., “The Internet Key Exchange (IKE)”, Network Working Group, RFC 2409 (Nov. 1998) pp. 1-38. |
| Maughan, D. et al., Internet Security Association and Key Management Protocol (ISAKMP), Network Working Group RFC 2408, (Nov. 1998) pp. 1-79. |
| Piper, D., “The Internet IP Security Domain of Interpretation for ISAKMP”, Network Working Group, RFC 2407, (Nov. 1998) pp. 1-30. |
| Kent, S., et al., “IP Encapsulating Security Payload (ESP)”, Network Working Group, RFC 2406, (Nov. 1998) pp. 1-21. |
| Madson, C., et al., “The ESP DES-CBC Cipher Algorithm With Explicit IV”, Network Working Group, RFC 2405, (Nov. 1998) pp. 1-10. |
| Madson, C., et al., “The Use of HMAC-SHA-1-96 within ESP and AH”, Network Working Group, RFC 2404, (Nov. 1998) pp. 1-7. |
| Madson, C., et al., “The Use of HMAC-MD5-96 within ESP and AH”, Network Working Group, RFC 2403, (Nov. 1998) pp. 1-7. |
| Pereira, R., et al., “The ESP CBC-Mode Cipher Algorithms”, Network Working Group, RFC 2451, (Nov. 1998) pp. 1-13. |
| Orman, H., “The Oakley Key Determination Protocol”, Network Working Group, RFC 2412, (Nov. 1998) pp. 1-51. |
| Kent, S. et al., “IP Authentication Header”, Network Working Group, RFC 2402, (Nov. 1998) pp. 1-21. |
| Thayer, R., et al., “IP Security Document Roadmap”, Network Working Group, RFC 2411, (Nov. 1998) pp. 1-11. |
| Glenn, R., et al., “The Null Encryption Algorithm and Its Use with IPsec”, Network Working Group, RFC 2410, (Nov. 1998) pp. 1-6. |
| Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, RFC 2401, (Nov. 1998) pp. 1-61. |
| Oehler, M., et al., “HMAC-MD5 IP Authentication with Replay Prevention”, Network Working Group, RFC 2085, (Feb. 1997) pp. 1-6. |
| Krawczyk, H., et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group, RFC 2104, (Feb. 1997) pp. 1-11. |
| Karn, P., et al., “The ESP DES-CBC Transform”, Network Working Group, RFC 1829, (Aug. 1995) pp. 1-10. |
| Metzger, P. et al., “IP Authentication Using Keyed MD5”, Network Working Group, RFC 1828, (Aug. 1995) pp. 1-6. |
| Oehler, M. et al., “HMAC-MD5 Ip Authentication with Replay Prevention”, Network Working Group, RFC 2085 (Feb. 1997) pp. 1-6. |