IPSec, “ICSA IPSEC Product Certification Criteria Version 1.0A”, ICSA IPSec Product Certification Version 1.0A Testing, Dec. 22, 1999 (pp. 1 of 8). |
IPSec, “ICSA IPSEC Product Certificat Criteria Version 1.1”, ICSA IPSec Product Certification Version 1.1 Testing, Dec. 22, 1999 (pp. 1 of 4). |
Security SnapShot, ICSA.net's Security Snapshot and ESnap are the quickest way's to estimate your company's Internet security posture in six important risk categories, (pp. 1 of 3) Apr. 5, 2000. |
Harkins, D. et al., “The Internet Key Exchange (IKE)”, Network Working Group, RFC 2409 (Nov. 1998) pp. 1-38. |
Maughan, D. et al., Internet Security Association and Key Management Protocol (ISAKMP), Network Working Group RFC 2408, (Nov. 1998) pp. 1-79. |
Piper, D., “The Internet IP Security Domain of Interpretation for ISAKMP”, Network Working Group, RFC 2407, (Nov. 1998) pp. 1-30. |
Kent, S., et al., “IP Encapsulating Security Payload (ESP)”, Network Working Group, RFC 2406, (Nov. 1998) pp. 1-21. |
Madson, C., et al., “The ESP DES-CBC Cipher Algorithm With Explicit IV”, Network Working Group, RFC 2405, (Nov. 1998) pp. 1-10. |
Madson, C., et al., “The Use of HMAC-SHA-1-96 within ESP and AH”, Network Working Group, RFC 2404, (Nov. 1998) pp. 1-7. |
Madson, C., et al., “The Use of HMAC-MD5-96 within ESP and AH”, Network Working Group, RFC 2403, (Nov. 1998) pp. 1-7. |
Pereira, R., et al., “The ESP CBC-Mode Cipher Algorithms”, Network Working Group, RFC 2451, (Nov. 1998) pp. 1-13. |
Orman, H., “The Oakley Key Determination Protocol”, Network Working Group, RFC 2412, (Nov. 1998) pp. 1-51. |
Kent, S. et al., “IP Authentication Header”, Network Working Group, RFC 2402, (Nov. 1998) pp. 1-21. |
Thayer, R., et al., “IP Security Document Roadmap”, Network Working Group, RFC 2411, (Nov. 1998) pp. 1-11. |
Glenn, R., et al., “The Null Encryption Algorithm and Its Use with IPsec”, Network Working Group, RFC 2410, (Nov. 1998) pp. 1-6. |
Kent, S., et al., “Security Architecture for the Internet Protocol”, Network Working Group, RFC 2401, (Nov. 1998) pp. 1-61. |
Oehler, M., et al., “HMAC-MD5 IP Authentication with Replay Prevention”, Network Working Group, RFC 2085, (Feb. 1997) pp. 1-6. |
Krawczyk, H., et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group, RFC 2104, (Feb. 1997) pp. 1-11. |
Karn, P., et al., “The ESP DES-CBC Transform”, Network Working Group, RFC 1829, (Aug. 1995) pp. 1-10. |
Metzger, P. et al., “IP Authentication Using Keyed MD5”, Network Working Group, RFC 1828, (Aug. 1995) pp. 1-6. |
Oehler, M. et al., “HMAC-MD5 Ip Authentication with Replay Prevention”, Network Working Group, RFC 2085 (Feb. 1997) pp. 1-6. |