Number | Name | Date | Kind |
---|---|---|---|
5241594 | Kung | Aug 1993 | A |
5253251 | Aramaki | Oct 1993 | A |
5502725 | Pohjakallio | Mar 1996 | A |
5555244 | Gupta et al. | Sep 1996 | A |
5570361 | Norizuki et al. | Oct 1996 | A |
5583862 | Callon | Dec 1996 | A |
5592470 | Rudrapatna et al. | Jan 1997 | A |
5617417 | Sathe et al. | Apr 1997 | A |
5655077 | Jones et al. | Aug 1997 | A |
5671354 | Ito et al. | Sep 1997 | A |
5673265 | Gupta et al. | Sep 1997 | A |
5684950 | Dare et al. | Nov 1997 | A |
5699521 | Iizuka et al. | Dec 1997 | A |
5740171 | Mazzola et al. | Apr 1998 | A |
5740176 | Gupta et al. | Apr 1998 | A |
5793763 | Mayes et al. | Aug 1998 | A |
5799017 | Gupta et al. | Aug 1998 | A |
5802047 | Kinoshita | Sep 1998 | A |
5802316 | Ito et al. | Sep 1998 | A |
5835720 | Nelson et al. | Nov 1998 | A |
5835727 | Wong et al. | Nov 1998 | A |
5845070 | Ikudome | Dec 1998 | A |
5872783 | Chin | Feb 1999 | A |
5918016 | Brewer et al. | Jun 1999 | A |
5944824 | He | Aug 1999 | A |
5959990 | Frantz et al. | Sep 1999 | A |
5991810 | Shapiro et al. | Nov 1999 | A |
5991828 | Horie et al. | Nov 1999 | A |
6009103 | Woundy | Dec 1999 | A |
6011910 | Chau et al. | Jan 2000 | A |
6018770 | Little et al. | Jan 2000 | A |
6021496 | Dutcher et al. | Feb 2000 | A |
6055236 | Nessett et al. | Apr 2000 | A |
6091951 | Sturniolo et al. | Jul 2000 | A |
6092178 | Jindal et al. | Jul 2000 | A |
6092196 | Reiche | Jul 2000 | A |
6119160 | Zhang et al. | Sep 2000 | A |
6141687 | Blair | Oct 2000 | A |
Number | Date | Country |
---|---|---|
9953408 | Oct 1999 | WO |
Entry |
---|
Cisco Systems, Inc., “Layer 2 Tunnel Protocol”, Release 12.0(1)T and 11.3(5)AA, pp. 1-53. |
Carrel, D. et al., The TACACS+ Protocol, Version 1.78, Cisco Systems, Inc., printed from ftp://ftp-eng.cisco.com/edweber/tac-rfc.1.78.txt on Oct. 23, 2000. |
Active Software, Inc., “Active Software's Integration System”, printed from http://www.activesw.com/products/products.html, on Jul. 24, 1998. |
Ascend Communications, Inc., “Access Control (Product Information”, 4 pages. |
Ascend Communications, Inc., “Remote Access Network Security”, printed from http://www.ascend.com/1103.html, on Jul. 24, 1998, pp. 1-8. |
Droms, R., “Dynamic Host Configuration Protocol,” Network Working Group, RFC 1531, Oct. 1993. |
NAT and Networks, printed from http://www.csn.tu-chemnitz.de/˜mha/linux-ip-nat/diplom/node4.html, Sep. 19, 1998. |
“NAT-PC Webopaedia Definition and Links”, 1998, Mecklermedia Corporation, printed from http://webopedia.internet.com/TERM/N/NAT.html, on Sep. 19, 1998, 1 page. |
“Network Address Translation Information”, printed from http://www.uq.edu.au/˜gadmacka/content/natinformation.htm, on Sep. 19, 1998. |
Perkins, D., “Requirements for an Internet Standard Point-to-Point Protocol”, Dec. 1993, Network Working Group, RFC 1547, pp. 1-19. |
Simpson, W., “The Point-to-Point Protocol (PPP)”, Dec. 1993, Network Working Group, RFC 1548, pp. 1-53. |