O'Reilly logo

VPNs Illustrated: Tunnels, VPNs, and IPsec by Jon C. Snader

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

Aboba, B., Blunk, L. J., Vollbrecht, J. R., Carlson, J., and Levkowetz, H. 2004. “Extensible Authentication Protocol (EAP),” RFC 3748 (June).

Aboba, B. and Dixon, W. 2004. “IPsec-NAT Compatibility Requirements,” RFC 3715 (Mar.).

Agarwal, P. and Akyol, B. 2003. “Time to Live (TTL) Processing in Multi-Protocol Label Switching (MPLS),” RFC 3443 (Jan.).

Alvestrand, H. T. 2001. “Tags for the Identification of Languages,” RFC 3066 (Jan.).

Anderson, R. 1993. “The Classification of Hash Functions,” Proceedings of the Fourth IMA Conference on Cryptography and Coding, pp. 83–93.

http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/hash.ps.Z

Andersson, L., Doolan, P., Feldman, N., Fredette, A., and Thomas, B. 2001. “LDP Specification,” RFC 3036 (Jan.). ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required