T. Ylonen and C. Lonvick, The Secure Shell (SSH) Protocol Architecture, RFC, vol.4251, 2006.
DOI : 10.17487/rfc4251

S. Kent and K. Seo, Security Architecture for the Internet Protocol, RFC, vol.4301, 2005.

D. Harkins and D. Carrel, The Internet Key Exchange (IKE) RFC 2409 (Proposed Standard), 1998.

S. Kent, IP Encapsulating Security Payload (ESP), RFC, vol.4303, 2005.
DOI : 10.17487/rfc4303

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.4556

K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little et al., Point-to-Point Tunneling Protocol (PPTP), 1999.
DOI : 10.17487/rfc2637

D. Piper, The Internet IP Security Domain of Interpretation for ISAKMP, 1998.
DOI : 10.17487/rfc2407

C. Kaufman, Internet Key Exchange (IKEv2) Protocol. RFC 4306 (Proposed Standard), 2005.
DOI : 10.17487/rfc5996

«. Website and . Kerberos, The Network Authentication Protocol, p.13, 2011.

M. Richardson and D. H. Redelmeier, Opportunistic Encryption using the Internet Key Exchange (IKE) [17] The Openswan project website, https, RFC, vol.4322, issue.03, p.9, 2005.

S. Website, the Open Source IPsec-based VPN Solution, p.9, 2012.

C. Partridge and A. Jackson, IPv6 Router Alert Option, RFC, vol.2711, 1999.
DOI : 10.17487/rfc2711

. Virtualbox-website, The Network Emulation webpage, p.13, 2011.

A. Varet and N. Larrieu, Security Capability discovery protocol Over Unsecured IP-based Topologies, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01022282

T. Kivinen and B. Swander, Negociation of NAT-Traversal in the IKE, RFC, vol.3947, 2005.