“Access Control Product Information”, Ascend Communications, Inc., 4 pages. |
Alexander, S., “DHCP Options and BOOTP Vendor Extensions,” Network Working Group, RFC 1533. Oct. 1993. |
Bellare et al., “Keying Hash Functions for Message Authentication”, 1996, Advances in Cryptology-Crypto 96 Proceedings, Lecture Notes in Computer Science, vol. 1109, N. Koblitz ed., Springer-Verlag. |
Bellovin, Steven M., “Problem Areas for the IP Security Protocols”, Jul. 22-25, 1996, Proceedings of the Sixth Usenix UNIX Security Symposium, San Jose, CA. |
Cisco User Control Point, pp. 1-4, printed from http://www.cisco.com/warp.public/728/ucp/ucp ds.htm om Sep. 10, 1998. |
IPSec Network Security, pp. 1-69, printed from http://www.cisco.com/univercd/cc/td/doc/products/software/ios113ed/113t/113t3/ipsec. |
Krawczyk, Hugo, “SKEME: A Versatile Secure Key Exchange Mechanism for Internet”, 1996, IEEE, Proceedings of the 1996 Symposium on Network and Distributed Systems Security. |
Patel, B., et al., “Securing L2TP using IPSEC”, May 1998, PPPEXT Working Group, pp. 1-10, printed from http://www.masinter.net/˜12tp/ftp/draft-ietf-pppext-12tp-security-02.txt. on Sep. 21, 1998. |
“Remote Access Network Security”, Ascend Communications, Inc., printed from http://www.ascend.com/1103.html, on Jul. 24, 1998, pp. 1-8. |
Rigney, et al., “Remote Authentication Dial In User Service (RADIUS)”, Network Working Group, RFC 2138, Apr. 1997, pp. 1-57. |
Carrel, D. et al. The TACACS+ Protocol, version 1.78, Cisco Systems, Inc., printed from ftp://ftp-eng.cisco.com/gdweber/tac-rfc.1.78.txt on Oct. 23, 2000. |