W. R. Cheswick, S. M. Bellovin, and A. D. Rubin, Firewalls and Internet security: repelling the Wily Hacker, 1994.

P. Srisuresh and K. Egevang, Traditional IP Network Address Translator (Traditional NAT). IETF Informational document, 2001.
DOI : 10.17487/rfc3022

C. Aoun and E. Davies, Reasons to Move NAT-PT to Experimental. IETF Draft (work in progress), draft-ietf-v6ops-natpt-to-exprmntl-02, 2005.

C. Aoun, E. Davies, H. Tschofenig, and S. Thiruvengadam, Interaction of firewalls and network address translators with internet applications, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005., 2005.
DOI : 10.1109/CONTEL.2005.185907

J. Rosenberg, J. Weinberger, C. Huitema, and R. Mahy, STUN -Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). IETF proposed standard, 2003.

M. Stiemerling, H. Tschofenig, and C. Aoun, NAT/Firewall NSIS Signaling Layer Protocol (NSLP) IETF draft (work in progress), draft-ietf-nsis-nslp-natfw-08, 2005.
DOI : 10.17487/rfc5973

T. Tsenov, H. Tschofenig, X. Fu, C. Aoun, and E. Davies, GIST State Machine. IETF draft (work in progress), draft-ietf-nsis-ntlp-statemachine-01, 2005.

H. Schulzrinne, R. Hancock, and . Gist, General Internet Signaling Transport. IETF draft (work in progress), draft-ietf-nsis-ntlp-08, 2005.
DOI : 10.17487/rfc5971

C. Aoun and O. Paul, Résolution desprobì emes de routage asymétrique et de partage de charge dans les pare-feux, Proceedings of Colloque Francophone sur l'Ingénierie des Protocoles 2005, 2005.

C. Aoun, E. Davies, and H. Tschofenig, Securing Middlebox Discovery for Path-Directed Signaling in the Internet, IEEE ASWN 2005 workshop proceedings, 2005.

C. Aoun, E. Davies, H. Tschofenig, and M. Stiemerling, Path-directed signaling in the Internet, IEEE IPOM 2004 workshop proceedings, 2004.

H. Tschofenig and D. Kroeselberg, Security Threats for NSIS. IETF Informational document, RFC, vol.4081, 2005.
DOI : 10.17487/rfc4081

A. Fessi, M. Stiemerling, S. Thiruvengadam, H. Tschofenig, and C. Aoun, Security Threats for the NATFW NSLP. Expired IETF draft, draft-fessi-nsis-natfw-threats-02, 2004.

C. Aoun, H. Tschofenig, M. Stiemerling, M. Brunner, and M. Martin, NATFW NSLP Intra-Realm Considerations. Expired IETF draft, draft-aoun-nsis-nslp-natfw-intrarealm- 01, 2004.

C. Aoun and N. Hamer, Potential Solutions to the Middlebox discovery problem. Expired IETF draft, draft-aoun-midcom-discovery-01, 2002.

C. Aoun, Middlebox discovery integration solutions within the Midcom architecture

M. Barnes, Middlebox communications (MIDCOM) Protocol Evaluation, IETF Informational document RFC, vol.4097, 2005.
DOI : 10.17487/rfc4097

C. Aoun, K. Chan, L. Hamer, R. Penno, and S. Sen, COPS applicability as the MIDCOM PROTOCOL. Expired IETF draft, draft-aoun-midcom-cops-02, 2002.

S. Sen, C. Aoun, and T. Taylor, Applicability of MEGACO to Middlebox Control. Expired IETF draft, draft-sct-midcom-megaco-02, 2002.

F. Andreasen and B. Foster, Media Gateway Control Protocol (MGCP) Version 1.0. IETF informational document, 2003.

C. Groves, M. Pantaleo, T. Anderson, and T. Taylor, Gateway Control Protocol Version 1. IETF Standards Track document, 2003.
DOI : 10.17487/rfc3525

M. Holdrege and P. Srisuresh, Protocol Complications with the IP Network Address Translator, IETF Informational document, vol.3027, 2001.
DOI : 10.17487/rfc3027

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.2925

B. Carpenter and S. Brim, Middleboxes: Taxonomy and Issues. IETF Informational document, 2002.
DOI : 10.17487/rfc3234

E. Nordmark and R. E. Gilligan, Basic Transition Mechanisms for IPv6 Hosts and Routers. IETF draft (work in progress), draft-ietf-v6ops-mech-v2-07, 2005.

F. Audet and C. Jennings, Nat Behavioral Requirements for Unicast UDP. IETF draft (work in progress), draft-ietf-behave-nat-udp-00, 2005.

J. Rosenberg, R. Mahy, and C. Huitema, Traversal Using Relay NAT (TURN) IETF draft (work in progress), draft-rosenberg-midcom-turn-06, 2004.

C. Boulton and J. Rosenberg, Best Current Practices for NAT Traversal for SIP. IETF draft (work in progress), draft-ietf-sipping-nat-scenarios-01, 2004.

C. Aoun, M. Wakley, and T. Sassenberg, IETF draft (work in progress), draft-aoun-mgcp-nat-package-02, 2003.

R. Braden and R. Lindell, A Two-Level Architecture for Internet Signaling. IETF draft (expired), draft-braden-2level-signaling-01.txt, 2002.

R. Braden, L. Zhang, S. Berson, S. Herzog, and S. Jamin, Resource ReSerVation Protocol (RSVP) ? Version 1 Functional Specification, 1997.
DOI : 10.17487/rfc2205

D. Katz, IP Router Alert Option. IETF Standards Track document, RFC 2113, 1997.
DOI : 10.17487/rfc2113

C. Partridge and A. Jackson, IPv6 Router Alert Option. IETF Standards Track document , RFC 2711, 1999.
DOI : 10.17487/rfc2711

M. Rossi and M. Welzl, On the Impact of IP Option Processing, 2003.

M. Rossi and M. Welzl, On the Impact of IP Option Processing -Part 2, 2004.

P. Fransson and A. Jonsson, End-to-end measurements on performance penalties of IPv4 options, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004.
DOI : 10.1109/GLOCOM.2004.1378221

M. Trunk, Customer Support Bulletin, MLT), 2001.

R. Moskowitz and P. Nikander, Host Identity Protocol Architecture. IETF draft (work in progress), draft-ietf-hip-arch-02, 2004.

C. Neuman, T. Yu, S. Hartman, and K. Raeburn, The Kerberos Network Authentication Service (V5) IETF Standards Track document, 2005.

L. Hamer, B. Gage, and H. Shieh, Framework for session set-up with media authorization . IETF Standards Track document, 2003.

H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson, RTP: A Transport Protocol for Real-Time Applications. IETF Standards Track document, 2005.

R. Braden, Requirements for internet hosts ? communication layers. IETF Standards Track document, RFC 1122, 1989.

K. Nichols, S. Blake, F. Baker, and D. Black, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers, 1998.
DOI : 10.17487/rfc2474

S. Deering and R. Hinden, Internet Protocol, Version 6 (IPv6) Specification). IETF Standards Track document, RFC 2460, 1998.
DOI : 10.17487/rfc1883

S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, 1998.

T. Dierks and C. Allen, The TLS Protocol Version 1.0. IETF Standards Track, RFC 2246, 1999.

P. Ferguson and D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address. IETF Best Current Practices document, RFC 2827, 2000.

F. Baker and P. Savola, Ingress Filtering for Multihomed Networks. IETF Best Current Practices document, 2004.
DOI : 10.17487/rfc3704

R. Rosenberg, Interactive Connectivity Establishment (ICE): A Methodology for Network Address Translator (NAT) Traversal for Multimedia Session Establishment Protocols. IETF draft (work in progress), draft-ietf-mmusic-ice-03, 2004.

G. Camarillo and J. Rosenberg, The Alternative Network Address Types (ANAT) Semantics for the Session Description Protocol (SDP) Grouping Framework. IETF Standards Track document, 2005.

T. Kivinen, B. Swander, A. Huttunen, and V. Volpe, Negotiation of NAT-Traversal in the IKE. IETF Standards Track document, 2005.

A. Huttunen, B. Swander, V. Volpe, L. Diburro, and M. Stenberg, UDP Encapsulation of IPsec ESP Packets. IETF Standards Track document, 2005.

C. Huitema, Real Time Control Protocol (RTCP) attribute in Session Description Protocol (SDP). IETF Standards Track document, 2003.

C. Aoun, H. Tschofenig, and M. Stiemerling, NAT/Firewall NSLP Intra-Realm Considerations . Expired IETF draft, draft-aoun-nsis-nslp-natfw-intrarealm-01, 2004.

J. Hodges and R. Morgan, Lightweight Directory Access Protocol (v3): Technical Specification . IETF Standards Track document, 2002.
DOI : 10.17487/rfc3377

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.169.3939

R. Housley, Cryptographic Message Syntax (CMS) IETF Standards Track document, RFC, vol.3852, 2004.
DOI : 10.17487/rfc4853

R. Housley, Protecting multiple contents with the Cryptographic Message Syntax (CMS)
DOI : 10.17487/rfc4073

K. Seo, C. Lynn, and S. Kent, 509 Extensions for IP Addresses and AS Identifiers. IETF Standard Track document, 2004.

A. Gulbrandsen, P. Vixie, and L. Esibov, A DNS RR for specifying the location of services (DNS SRV) IETF Standards Track document, RFC 2782, 2000.

B. Tung and L. Zhu, Public Key Cryptography for Initial Authentication in Kerberos. IETF Draft (work in progress), draft-ietf-cat-kerberos-pk-init-29, 2005.

G. Tsirtsis and P. Srisuresh, Network Address Translation -Protocol Translation (NAT- PT). IETF Standards Track document, RFC 2766, 2000.
DOI : 10.17487/rfc2766

J. Linn, Generic Security Service Application Program Interface Version 2, Update 1. IETF Standards Track document, RFC 2743, 2000.
DOI : 10.17487/rfc2743

L. Zhu, K. Jaganathan, and S. Hartman, The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2. IETF Standards Track document, 2005.

A. Medvinsky and M. Hur, Addition of Kerberos Cipher Suites to Transport Layer Security (TLS). IETF Standards Track document, RFC 2712, 1999.

P. Eronen and H. Tschofenig, Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) IETF draft (work in progress), draft-ietf-tls-psk-09, 2005.

W. R. Stevens, B. Fennerand, and A. M. Rudoff, Unix network programming, ACM SIGCOMM Computer Communication Review, vol.20, issue.2, 2004.
DOI : 10.1145/378570.378600

S. Sakane, K. Kamada, M. Thomas, and J. Vilhuber, Kerberized Internet Negotiation of Keys (KINK) IETF draft (work in progress), draft-ietf-kink-kink-07, 2005.

S. M. Bellovin, Distributed firewalls, Login, pp.37-39, 1999.

S. Ioannidis, A. D. Keromytis, S. M. Bellovin, and J. M. Smith, Implementing a distributed firewall, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00
DOI : 10.1145/352600.353052

R. Draves, Default Address Selection for Internet Protocol version 6 (IPv6) IETF Standards Track document, 2003.

G. Ziemba, D. Reed, and P. Traina, Security Considerations for IP Fragment Filtering, 1995.
DOI : 10.17487/rfc1858

I. Miller, Protection Against a Variant of the Tiny Fragment Attack. IETF Informational document, RFC 3128, 2001.