Library: Lasat Networks to RFCs  













Stop SPAM

What are the most active viruses and worms today.

Test your virus protection with non-destructive test file. Please read the instructions carefully.

Lasat Networks  
Secure and versatile networking with LASAT SafePipe™ VPN 302K PDF
Lucent Technologies  
Virtual Private Networks: Industry Survey 2000 422K PDF
Secure VPNs for Enterprise Networks 154K PDF
PKI: How it Works 28K PDF
Virtual Private Networks Resource Guide 1079K PDF
Microsoft  
QoS Overview 562K PDF
Installing, Configuring, and Using PPTP with Microsoft Clients and Servers A Step by Step Guide 140K PDF
Windows 98 Remote Networking and Mobile Computing Includes detailed VPN setup Instructions 257K ZIP (PDF)
How to Configure IPSec Tunneling in Windows 2000 72K PDF
Smart Cards 36K PDF
Virtual Private Networking: An Overview, NT Server 172K PDF
Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security 524K PDF
Microsoft Virtual Private Networking: Using PPTP 299K PDF
Unicast Routing Principals 119K PDF
Routing and Remote Access Service for Windows NT Server: >New Opportunities Today and Looking Ahead 144K PDF
Microsoft Windows Telephony Platform: Using TAPI 2.0 282K PDF
Microsoft Windows NT 3.5/3.51/4.0: TCP/IP Implementation Details 486K PDF
Understanding Point-to-Point Tunneling Protocol (PPTP) 99K PDF
Virtual Private Networking: An Overview Windows 2000 Server 213K PDF
Microsoft Virtual Private Networking Security 133K PDF
Miora  
Dealing with the MSC Hidden Form Field Vulnerability 60K PDF
A White Paper Analyzing the MSC Hidden Form Field Web Site Vulnerability 60K PDF
Miscellaneous  
Armoring NT: Preparing NT for a Firewall 30K PDF
Auditing Your Firewall Setup 69K PDF
Internet Security Issues: Tips to Keep You & Your Information Safe 81K PDF
Building Your Firewall Rulebase 1463K PDF
The Study of an Attack: Forensic Analysis 41K PDF
Know Your Enemy: I >The Tools and Methodologies of the Script Kiddie 28K PDF
Know Your Enemy: II Tracking their moves 40K PDF
Know Your Enemy: III They Gain Root 30K PDF
Know Your Enemy: Motives The Motives and Psychology of the Black-hat Community 49K PDF
OpenBSD 2.4 IPSEC VPN Configuration 48K PDF
Remote OS detection via TCP/IP Stack FingerPrinting 58K PDF
Building the 21st Century Internet 51K PDF
DSL Architecture and Business Case 187K PDF
High Performance Security Methods: Comparisons and Case Studies 188K PDF
Residential Broadband Access and the Teleworker: Security Considerations for the IT Manager 112K PDF
Efficient DES Key Search 243K PDF
Introduction to Encryption 305K PDF
What is LDAP? 102K PDF
E-mail Security 60K PDF
Firewalls and Proxies in the NT Environment 94K PDF
G.lite: Making the Internet Fast Enough for Consumers 246K PDF
IP Address Subnetting Tutorial 73K PDF
Customer Management and Control of Broadband VPN Services 93K PDF
Internet Technologies Deployed Behind the Firewall 86K PDF
Mail Essentials for Exchange  
Email Security and Management for Your Exchange Server 145K PDF
Email Encryption: What it is and why you need it. 59K PDF
Putting VPNs to Work for Small Businesses and Offices 166K PDF
What is a VPN? 7K PDF
NetScreen  
Ensuring the Success of E-Business Sites 292K PDF
Meeting the Needs of E-Business 96K PDF
Securing Enterprise Networks with VPN & Firewall Solutions 131K PDF
Traffic Management Overview 49K PDF
Next Generation Security Solutions for the Broadband Internet 117K PDF
Securing the Broadband Internet 123K PDF
Secure Operating Environments and Their Impact to Bandwidth 14K PDF
HIPAA Compliance:How NetScreen Meets the Security Requirements of the Health Care Industry 64K PDF
Recent Internet Worms and the Malicious URL feature 48K PDF
Managing IT Security Risks 348K PDF
Principles of Secure Network Design 68K PDF
The Opportunity and Requirements for Managed Internet Security Services 4.1MB PDF
Net Security Solutions  
Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks. 29K PDF
Newbridge Networks  
The Changing Face of VPNs 141K PDF
Nokia  
VPN Companies Meeting the Challenge A Business Case for VPN Technology 2052K PDF
The Network Alchemy VPN Solution 1333K PDF
Understanding Secure Virtual Private Networking 97K PDF
Building Infrastructure for Outsourced Data Services 62K PDF
Nortel / Bay  
Cost Benefits of High Density Dial Access Products 91K PDF
Off-loading Dial-up Traffic from the PSTN 111K PDF
Extranets Emerge 347K PDF
Internet Telephony Report 314K PDF
The Case for IPv6 267K PDF
RADIUS Security Technology ISPs Simplify Remote Access For Enterprises 168K PDF
Remote Access Market and Product Evolution 237K PDF
A Unified Approach to Retail Networks 70K PDF
Security in an "Always On" World 273K PDF
Understanding and Implementing Dial VPN Services 137K PDF
Virtual Private Network Business Case 110K PDF
Virtual Private Network Product Development Guide 129K PDF
A Framework for IP Based Virtual Private Networks 169K PDF
Understanding and Implementing Dial VPN Services 137K PDF
Pilot Networks  
Pilot Secure Road Warrior: Secure Mobile Telecommuting for Corporations 67K PDF
Radguard  
Hardware Implementation of IPSec: Performance implications 103K PDF
Secure Virtual Private Networks: The future of data communications 347K PDF
RedCreek  
Financial Services & Public Networks 280K PDF
Delivering Trusted Networks 401K PDF
Combining Firewalls and Secure Virtual Private Network Hardware for Robust Corporate Security 107K PDF
Government Business & Public Networks 98K PDF
Medical Records & Public Networks 258K PDF
The Internet Protocol Security (IPSec) Standard: Clearing up the Confusion 16K PDF
Private Council & Public Networks 90K PDF
RFCs  
1631 The IP Address Translator NAT 26K PDF
2138 Remote Authentication Dial In User Service (RADIUS) 209K PDF
2139 RADIUS Accounting 79K PDF
2196 Site Security Handbook 154K PDF
2207 RSVP Extensions for IPSEC Data Flows 33K PDF
2251 LDAP (Lightweight Directory Access Protocol) v 3 137K PDF
2401 Security Architecture for the Internet Protocol 128K PDF
2410 The NULL Encryption Algorithm and Its Use With IPSec 14K PDF
2411 IP Security Document Roadmap 20K PDF
2547 BGP/MPLS VPNs 60K PDF
2663 IP Network Address Translator (NAT) Terminology and Considerations 67K PDF
2685 Virtual Private Networks Identifier 16K PDF
2709 Security Model with Tunnel-mode IPSec for NAT Domains 25K PDF