Advertisement

Implementations and Limitations of the IPSEC

  • Charles A. Shoniregun
Part of the Advances in Information Security book series (ADIS, volume 34)

Keywords

Virtual Private Network Screen Shot Network Address Translation Private Address Access List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bragg, R., (2001), IPsec Rules, http://redmondmag.com/columns/article.asp?Editorials ID=56 (28 January, 2007).Google Scholar
  2. Cisco, (2005), Implementing Basic Connectivity for IPv6, http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123cgcr/ipv6_c/sa_bconn.htm (January 27, 2007).Google Scholar
  3. Doraswamy, N. and Harkins, D., 2003, IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks, 2nd Edition, Prentice Hall USA.Google Scholar
  4. Harrison, J. 2003, VPN Technologies ?A COMPARISON, http://vnu.bitpi pe.com/detail/RES/1046358922_393.html (February 7, 2007)Google Scholar
  5. Jayawickrama, W., (2003), Demystifying IPSec Protocol, Implementations and Limitations; www.bridgepoint.com.au/Documents/ipsecpaper.pdf (January 15, 2007).Google Scholar
  6. Matkovich, E., (2003), IP Tunneling: All About Tunnels, PACKET, Vol. 15, No. 3, Third Quarter 2003Google Scholar
  7. Microsoft Corp, (2003), How IPsec works, Microsoft Corporation, http://technet2.microsoft.com/WindowsServer/en/Library/8fbd7659-ca23-4320-a350-6890049086bc1033.mspx (12 January, 2007).Google Scholar
  8. Murphy, N., and Malone, D., (2005), IPv6 Network Administration, First Edition, Published by Oreilly, March,Google Scholar
  9. Phifer, L.J., (2000a), The Trouble with NAT, The Internet Protocol Journal, Volume 3, Number 4, December.Google Scholar
  10. Phifer, L.J., (2000b), IP Security and NAT: Oil and Water?, ‘ISP-Planet’ http://www.isp planet.com/technology/nat_ipsec.html (January 29, 2007).Google Scholar
  11. Roland, J.F., and Newcomb, M.J., 2003, CSVPN Certificate Guide, Cisco Press.Google Scholar
  12. Sandsmark, F., (2004), ‘What You Need To Know About Network Security’, iQ Magazine, First Quarter.Google Scholar
  13. Singh, B., and Sofat, S., (2005), Future of Internet Security – IPSec, Security white papers, http://www.securitydocs.com/library/2926 (February 27, 2007).Google Scholar
  14. Weber, C., 2002. Using IPsec in Windows 2000 and XP, http://www.securityfocus.com/infocus/1528 (13 February, 2007).Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Charles A. Shoniregun
    • 1
  1. 1.Reader in Computing, KNURE/KSAC Distinguished Professor, School of Computing & TechnologyUniversity of East LondonLondon E16 2RDUnited Kingdom

Personalised recommendations