Ethereal Exercise 2 (Part B): Link Control Protocol

Size: px
Start display at page:

Download "Ethereal Exercise 2 (Part B): Link Control Protocol"

Transcription

1 Course: Semester: ELE437 Introduction Ethereal Exercise 2 (Part B): Link Control Protocol In this half of Exercise 2, you will look through a more complete capture of a dial-up connection being established. This includes the authentication and IP protocol setup. In addition, connection termination will be covered. Background Some of the information from Part A will be needed for this half of the exercise. This includes the LCP Configuration Option format as well as the meanings of the Code and Identifier fields. Additionally, some definitions are presented here that should be useful. NBNS NetBIOS Name Service Maps a computer or networking device s NetBIOS name to an IP address. WINS Windows Internet Naming Service WINS is the NBNS for Windows users. DNS Domain Name Server Server that maps alphanumeric addresses to IP addresses. Section 1: More LCP Packet Types In Part A of this exercise, details on the Configure-Request, Configure-Ack, and Configure-Reject packet types were given. In this section, details on two more LCP packets will be given: Identification and Configure-Nak Identification The Identification packet type is used to allow users to identify themselves to their peers. The packet format is shown below, as given in the RFC 1570 documentation. Magic-Number Message The Code field is equal to 12 (0x0C). The Identifier and Length fields have the same meaning as in all previous packet types.

2 The Magic-Number (MN) field is a 32-bit number that should almost uniquely identify a user. It is typically used to determine if the modem is connected to itself or a remote device. If the client s MN is equal to the server s MN (which is in the latest received Config-Request packet) then there is almost definitely a looped-back connection, meaning that the client s modem is connected to itself. The Message field is 0 or more bytes, typically in the form of ASCII characters, which identify the sender in some way. The information in this message can be anything including OS version, PPP revision number, and network hardware identifiers. For more information on the Identification packet type, see the RFC 1570 selection on page 14 of this handout. 1.2 Configure-Nak The Configure-Nak (Configuration Negative Acknowledgement) packet type is used when a Configure-Request arrives, all of the Configuration Options are recognized, but the value of one or more Configuration Options isn t acceptable. This is different from the Configure-Reject packet type, which is sent when one or more Configuration Options aren t even recognized. The packet format for Configure-Nak is shown below, as given in the RFC 1570 documentation. Options The Code field is equal to 3 (0x03). The Identifier and Length fields have the same meaning as in all previous packet types. The Options field contains the Configuration Options that were recognized but contained unacceptable values. They must be in the same order as they were received in the Configure-Request that carried the unacceptable Configuration Options, just with the accepted Options excluded. For more information on the Configure-Nak packet type, see the RFC 1548 selection on page 11 of this handout. 2

3 Section 2: Authentication with CHAP Before configuring PPP to carry IP packets for the Internet connection, authorization to set up such a connection must first be obtained. Since this isn t a network security course, this will not be an in-depth study. If an authentication protocol was negotiated during the configuration process then the user must be authenticated before any network protocol can be used over PPP. If no authentication protocol was configured then this process can be skipped. 2.1 CHAP Packet Formats The Authentication packet format for CHAP (Challenge-Handshake Authentication Protocol) is given below. Data The Code field is one byte and has four possible values shown in the table below. Table 2.1 CHAP Packet Codes CHAP Code Meaning 1 Challenge 2 Response 3 Success 4 Failure The Identifier and Length fields have the same size and meaning as in all previous packet types. The contents of the Data field depends on the value in the Code field. shown below. The format for Challenge (Code = 1) and Response (Code = 2) is the same, and is Value-Size Value... Name

4 The Identifier and Length fields have the same size and meaning as in all previous packet types. The Value-Size field is an 8-bit field that specifies how many bytes long the Value field is. The Value field for Challenge is a 128-bit value that is ideally unpredictable and globally random when the MD5 algorithm is used. The Value field for Response is a 128-bit value that is a function of the Identifier field, the Challenge value, and the user s password. Finally, the Name field may contain information such as a user name or the name of a computer or networking device. The format for Success (Code = 3) and Failure (Code = 4) is the same, and is shown below. Message The Identifier and Length fields have the same size and meaning as in all previous packet types. The Message field is 0 or more bytes, typically in the form of ASCII characters. It is more likely to be used for Failure packets so that a specific error message can be included. 2.2 Authentication Procedure The procedure for authentication is as follows: 1) The service provider sends a Challenge to the client 2) The client uses the Challenge Value, Identifier field, and their Password to calculate a Response to the Challenge 3) The Response is sent to the service provider 4) The service provider accepts the Response and sends a Success message, or the provider rejects the Response and sends a Failure message. 5) If a Success message was received, then network layer protocols can be configured. If a Failure message was received, the connection may be terminated or the link may be retained but the client will be limited to a subset of network layer protocols. Note that the LCP configuration may be changed during the authentication process. This may result in a Configuration Request being received rather than a Success or Failure packet after sending a Response to a Challenge. Once the configuration has been updated, the authentication process will be started over. 4

5 Section 3: IP Control Protocol (IPCP) Once the link has been configured and the client has been authenticated, they can configure and enable one or more network layer protocols for use over PPP. For each supported network layer protocol there is a corresponding network control protocol (NCP). The NCP for IP is called the IP Control Protocol, or IPCP. IPCP uses the same Configuration Option format as LCP, but it provides different options. Several of these options are shown in the table below. Table 3.1: IPCP Configuration Option Types Option Type Option ID IP Addresses 1 (0x01) IP Compression Protocol 2 (0x02) IP Address 3 (0x03) Primary DNS Server Address 129 (0x81) Primary WINS Server Address 130 (0x82) Secondary DNS Server Address 131 (0x83) Secondary WINS Server Address 132 (0x84) 3.1 IP Compression Configuration Option Format Table 3.2: Compression Configuration Option Format Byte Offset Field Size (Bytes) Length-4 Field Name Option ID Length IP Compression Protocol ID Data The Option ID and Length fields have the same meanings as in all Configuration Options. The IP Compression Protocol ID is a 16-bit value. This ID will be 0x002D in this exercise for the Van Jacobson (VJ) protocol. The Data field contains additional data specific to the compression protocol being used. 3.2 Address Configuration Option Format The IP, DNS, and WINS options all have the same Configuration Option format. Table 3.3: Address Configuration Option Format Byte Offset Field Size (Bytes) Field Name Option ID Length Address The Option ID and Length fields have the same meanings as in all Configuration Options. The Address field is a 32-bit address structured as four 8-bit values. 5

6 3.3 IPCP Configuration Procedure The configuration of IPCP is done the same way as for LCP. The client and server exchange Configuration Request packets and accept or reject the received configuration. Once both parties have agreed on a configuration, IP packets can be sent over the PPP link. Section 4: Compression Control Protocol (CCP) The Compression Control Protocol (CCP) is another network layer protocol that can be used over a PPP link. Several different compression types have been defined, including the Microsoft Point-to-Point Compression (MPPC) protocol. MPPC and a few other types are shown in the table below. Table 4.1 CCP Compression Types Compression Hewlett-Packard PPC Stac Electronics LZS Microsoft PPC Gandalf FZA V.42bis compression BSD LZW Compress The CCP packet format is shown below. CCP Type 16 (0x10) 17 (0x11) 18 (0x12) 19 (0x13) 20 (0x14) 21 (0x15) Type Length Values The Type field is one of the CCP type values from Table 4.1. The Length field has the same meaning as in all previous packet types. The format of the Values field depends on the CCP type. Section 5: Link Termination Eventually, either the client or server will want to break the connection between them. While you could rip the phone cord out of the wall or turn off the modem, it is much better if both parties agree to terminate the link. To initiate the link termination process, a Termination Request packet is sent. Once this request is received by the current peer, they must send a Termination Acknowledgement packet. Both parties can then shut down the physical link between them over the phone line. 6

7 If a Terminate-Ack packet is not received after sending a Terminate-Request packet several times or after a wait time has elapsed, the user may assume that the link has already been lost and that the loss hasn t been detected yet at the physical layer. In this case, it is acceptable for the user to terminate the link from their end without acknowledgement from the other party. The format for the Terminate-Request (Code = 5) and Terminate-Ack (Code = 6) packets is shown below. Data The Identifier and Length fields have the same size and meaning as in all previous packet types. The Data field is any amount of data that can fit in the LCP packet. The meaning of this data is not defined and can therefore be used for anything. One possible use of this field is to specify the next time a connection can be established to a particular server. This would be useful if a service provider is temporarily shutting off equipment for maintenance. For more information on the Terminate-Request and Terminate-Ack packet types, see the RFC 1548 selection on page 13 of this handout. 7

8 Questions 1) Which of the four CHAP packet types isn t in the capture? 2) How does the client obtain an IP address and DNS server address from the server? (Hint: Look at packets 30, 31, 32, and 33) 3) In Packet 25, the server sends its IP address to the client. a. What is the IP address? b. Go to Enter the IP address, and then press the Lookup button. What domain name does the IP address resolve to? 4) The follow three questions are on Magic Numbers (from Page 2): a. What is the server s magic number? b. What is the dial-up user s magic number? c. Is the connection looped-back to the client? 5) Read the information on Page 9 about the Protocol-Reject LCP packet format, then answer the following questions: a. Which network protocol is rejected in the packet trace? b. Which compression protocol is rejected? c. At what offset (in bytes) is the CCP Type in Packet 24? d. What is the CCP Type value? Grading - 16 points - The questions for Part B have the following point values: 1) 1 point 2) 4 points 3) 4 points (1 for a, 3 for b) 4) 3 points (1 for each) 5) 4 points (1 for each) 8

9 Protocol-Reject LCP Packet Format Details Selection from RFC 1548 ( 5.7 Protocol-Reject Description Reception of a PPP packet with an unknown Protocol field indicates that the peer is attempting to use a protocol which is unsupported. This usually occurs when the peer attempts to configure a new protocol. If the LCP state machine is in the Opened state, then this error MUST be reported back to the peer by transmitting a LCP packet with the Code field set to 8 (Protocol- Reject), the Rejected-Protocol field set to the received Protocol, and the inducing packet copied to the Rejected-Information field. Upon reception of a Protocol-Reject, the implementation MUST stop sending packets of the indicated protocol at the earliest opportunity. Protocol-Reject packets can only be sent in the LCP Opened state. Protocol-Reject packets received in any state other than the LCP Opened state SHOULD be silently discarded. A summary of the Protocol-Reject packet format is shown below. The fields are transmitted from left to right. Rejected-Protocol Rejected-Information Code 8 for Protocol-Reject. Identifier The Identifier field MUST be changed for each Protocol-Reject sent. Rejected-Protocol The Rejected-Protocol field is two octets and contains the PPP Protocol field of the packet which is being rejected. Rejected-Information The Rejected-Information field contains a copy of the packet which is being rejected. It begins with the Information field, and does not include any Data Link Layer headers nor an FCS. The Rejected-Information MUST be truncated to comply with the peer's established MRU. 9

10 Authentication, Network Layer, and Link Termination Details Selections from RFC 1548 ( 3.5 Authentication Phase On some links it may be desirable to require a peer to authenticate itself before allowing network-layer protocol packets to be exchanged. By default, authentication is not mandatory. If an implementation desires that the peer authenticate with some specific authentication protocol, then it MUST negotiate the use of that authentication protocol during Link Establishment phase. Authentication SHOULD take place as soon as possible after link establishment. However, link quality determination MAY occur concurrently. An implementation MUST NOT allow the exchange of link quality determination packets to delay authentication indefinitely. Advancement from the Authentication phase to the Network-Layer Protocol phase MUST NOT occur until authentication has completed, using the negotiated authentication protocol. If authentication fails, PPP SHOULD proceed instead to the Link Termination phase. Any Network Control Protocol or network-layer protocol packets received during this phase MUST be silently discarded. 3.6 Network-Layer Protocol Phase Once PPP has finished the previous phases, each network-layer protocol (such as IP, IPX, or AppleTalk) MUST be separately configured by the appropriate Network Control Protocol (NCP). Each NCP MAY be Opened and Closed at any time. Implementation Note: Because an implementation may initially use a significant amount of time for link quality determination, implementations SHOULD avoid fixed timeouts when waiting for their peers to configure a NCP. After a NCP has reached the Opened state, PPP will carry the corresponding network-layer protocol packets. Any network-layer protocol packets received when the corresponding NCP is not in the Opened state MUST be silently discarded. 10

11 Implementation Note: There is an exception to the preceding paragraphs, due to the availability of the LCP Protocol-Reject (described below). While LCP is in the Opened state, any protocol packet which is unsupported by the implementation MUST be returned in a Protocol- Reject. Only protocols which are supported are silently discarded. During this phase, link traffic consists of any possible combination of LCP, NCP, and network-layer protocol packets. 3.7 Link Termination Phase PPP can terminate the link at any time. This might happen because of the loss of carrier, authentication failure, link quality failure, the expiration of an idle-period timer, or the administrative closing of the link. LCP is used to close the link through an exchange of Terminate packets. When the link is closing, PPP informs the network-layer protocols so that they may take appropriate action. After the exchange of Terminate packets, the implementation SHOULD signal the physical-layer to disconnect in order to enforce the termination of the link, particularly in the case of an authentication failure. The sender of the Terminate-Request SHOULD disconnect after receiving a Terminate-Ack, or after the Restart counter expires. The receiver of a Terminate-Request SHOULD wait for the peer to disconnect, and MUST NOT disconnect until at least one Restart time has passed after sending a Terminate-Ack. PPP SHOULD proceed to the Link Dead phase. Any non-lcp packets received during this phase MUST be silently discarded. Configure-Nak LCP Packet Format Details Selection from RFC 1548 ( 5.3 Configure-Nak Description If every element of the received Configuration Options is recognizable but some values are not acceptable, then the implementation MUST transmit a LCP packet with the Code field set to 3 (Configure-Nak), the Identifier field copied from the received Configure-Request, and the Options field filled with only the unacceptable Configuration Options from the Configure-Request. All acceptable Configuration Options are filtered out of the Configure-Nak, but otherwise the Configuration Options from the Configure-Request MUST NOT be reordered. 11

12 Options which have no value fields (boolean options) MUST use the Configure-Reject reply instead. Each Configuration Option which is allowed only a single instance MUST be modified to a value acceptable to the Configure-Nak sender. The default value MAY be used, when this differs from the requested value. When a particular type of Configuration Option can be listed more than once with different values, the Configure-Nak MUST include a list of all values for that option which are acceptable to the Configure-Nak sender. This includes acceptable values that were present in the Configure-Request. Finally, an implementation may be configured to request the negotiation of a specific Configuration Option. If that option is not listed, then that option MAY be appended to the list of Nak'd Configuration Options in order to prompt the peer to include that option in its next Configure-Request packet. Any value fields for the option MUST indicate values acceptable to the Configure-Nak sender. On reception of a Configure-Nak, the Identifier field MUST match that of the last transmitted Configure-Request. Invalid packets are silently discarded. Reception of a valid Configure-Nak indicates that a new Configure-Request MAY be sent with the Configuration Options modified as specified in the Configure-Nak. When multiple instances of a Configuration Option are present, the peer SHOULD select a single value to include in its next Configure-Request packet. Some Configuration Options have a variable length. Since the Nak'd Option has been modified by the peer, the implementation MUST be able to handle an Option length which is different from the original Configure-Request. A summary of the Configure-Nak packet format is shown below. The fields are transmitted from left to right. Options Code 3 for Configure-Nak. Identifier The Identifier field is a copy of the Identifier field of the Configure-Request which caused this Configure-Nak. 12

13 Options The Options field is variable in length and contains the list of zero or more Configuration Options that the sender is Nak'ing. All Configuration Options are always Nak'd simultaneously. Terminate-Request and Terminate-Ack LCP Packet Format Details Selection from RFC 1548 ( 5.5 Terminate-Request and Terminate-Ack Description LCP includes Terminate-Request and Terminate-Ack Codes in order to provide a mechanism for closing a connection. A LCP implementation wishing to close a connection SHOULD transmit a LCP packet with the Code field set to 5 (Terminate-Request), and the Data field filled with any desired data. Terminate-Request packets SHOULD continue to be sent until Terminate-Ack is received, the lower layer indicates that it has gone down, or a sufficiently large number have been transmitted such that the peer is down with reasonable certainty. Upon reception of a Terminate-Request, a LCP packet MUST be transmitted with the Code field set to 6 (Terminate-Ack), the Identifier field copied from the Terminate-Request packet, and the Data field filled with any desired data. Reception of an unelicited Terminate-Ack indicates that the peer is in the Closed or Stopped states, or is otherwise in need of re-negotiation. A summary of the Terminate-Request and Terminate-Ack packet formats is shown below. The fields are transmitted from left to right. Data Code 5 for Terminate-Request; 6 for Terminate-Ack. Identifier On transmission, the Identifier field MUST be changed whenever the content of the Data field changes, and whenever a valid reply has 13

14 been received for a previous request. For retransmissions, the Identifier MAY remain unchanged. On reception, the Identifier field of the Terminate-Request is copied into the Identifier field of the Terminate-Ack packet. Data The Data field is zero or more octets and contains uninterpreted data for use by the sender. The data may consist of any binary value and may be of any length from zero to the peer's established MRU minus four. LCP Identification Packet Format Details Selection from RFC 1570 ( Identification Description This Code provides a method for an implementation to identify itself to its peer. This Code might be used for many diverse purposes, such as link troubleshooting, license enforcement, etc. Identification is a Link Maintenance packet. Identification packets MAY be sent at any time, including before LCP has reached the Opened state. The sender transmits a LCP packet with the Code field set to 12 (Identification), the Identifier field set, the local Magic-Number (if any) inserted, and the Message field filled with any desired data, but not exceeding the default MRU minus eight. Receipt of an Identification packet causes the RXR or RUC event. There is no response to the Identification packet. Receipt of a Code-Reject for the Identification packet SHOULD generate the RXJ+ (permitted) event. Rationale: This feature is defined as part of LCP, rather than as a separate PPP Protocol, in order that its benefits may be available during the earliest possible stage of the Link Establishment phase. It allows an operator to learn the identification of the peer even when negotiation is not converging. Non-LCP packets cannot be sent during the Link Establishment phase. 14

15 This feature is defined as a separate LCP Code, rather than a Configuration-Option, so that the peer need not include it with other items in configuration packet exchanges, and handle "corrected" values or "rejection", since its generation is both rare and in one direction. It is recommended that Identification packets be sent whenever a Configure-Reject is sent or received, as a final message when negotiation fails to converge, and when LCP reaches the Opened state. A summary of the Identification packet format is shown below. The fields are transmitted from left to right. Magic-Number Message Code 12 for Identification Identifier Length The Identifier field MUST be changed for each Identification sent. >= 8 Magic-Number The Magic-Number field is four octets and aids in detecting links which are in the looped-back condition. Until the Magic-Number Configuration Option has been successfully negotiated, the Magic- Number MUST be transmitted as zero. See the Magic-Number Configuration Option for further explanation. Message The Message field is zero or more octets, and its contents are implementation dependent. It is intended to be human readable, and MUST NOT affect operation of the protocol. It is recommended that the message contain displayable ASCII characters 32 through 126 decimal. Mechanisms for extension to other character sets are the topic of future research. The size is determined from the Length field. Implementation Note: The Message will usually contain such things as the sender's hardware type, PPP software revision level, and PPP product 15

16 serial number, MIB information such as link speed and interface name, and any other information that the sender thinks might be useful in debugging connections. The format is likely to be different for each implementor, so that those doing serial number tracking can validate their numbers. A robust implementation SHOULD treat the Message as displayable text, and SHOULD be able to receive and display a very long Message. 16

17 Exercise 2b: - Protocol Encapsulation (CHAP, IP, CCP, etc) - LCP Connection Termination - Ask for info from the Challenge, Response, Success items without providing packet formats - Return the book to Professor Tufts On Linux, you won't be able to capture control protocol traffic, as that's not supplied to the networking stack. You will be able to capture IP traffic, for example, but you won't be able to see the PPP headers, as the PPP code doesn't supply them to the networking stack. (XXX - add pppd information.) On Mac OS X, you won't be able to capture on a PPP interface until it's set up, so you won't be able to see initial control protocol traffic. - Brief coverage of CHAP - Brief coverage of CCP o Notice that CCP is rejected and NOT used in the end - Explain what Magic Numbers are - LCP packet for config renegotiation and NAK packet - Explain the IPCP packets including: o The NAK packet o What WINS is o What DHCP is o What DNS servers are o What the address is (backbone address) an4.bos24.da.uu.net [ ] ipt-mtcc04 (IP Telephony dial-up router s ID) ANSWERS 1) Failure (4) 2) By sending out 0 s and getting them filled in by a Configure-Nak message 3) i ii. an4.bos24.da.uu.net 4) Q: Ask about the backbone address - ipt-mtcc04 (IP Telephony dial-up router s ID) 17

Ethereal Exercise 2 (Part A): Link Control Protocol

Ethereal Exercise 2 (Part A): Link Control Protocol Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol

More information

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996

Network Working Group Request for Comments: 1962 Category: Standards Track June 1996 Network Working Group D. Rand Request for Comments: 1962 Novell Category: Standards Track June 1996 Status of this Memo The PPP Compression Control Protocol (CCP) This document specifies an Internet standards

More information

Lecture 1.1: Point to Point Protocol (PPP) An introduction

Lecture 1.1: Point to Point Protocol (PPP) An introduction Lecture 1.1: Point to Point Protocol (PPP) An introduction "the watchword for a point-to-point protocol should be simplicity" (RFC 1547, PPP requirements). disattended by 50+ RFCs Recommended reading:

More information

Request for Comments: 1661 STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track

Request for Comments: 1661 STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track Network Working Group W. Simpson, Editor Request for Comments: 1661 Daydreamer STD: 51 July 1994 Obsoletes: 1548 Category: Standards Track The Point-to-Point Protocol (PPP) Status of this Memo This document

More information

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP)

Request for Comments: 1332 Obsoletes: RFC 1172 May The PPP Internet Protocol Control Protocol (IPCP) Network Working Group G. McGregor Request for Comments: 1332 Merit Obsoletes: RFC 1172 May 1992 The PPP Internet Protocol Control Protocol (IPCP) Status of this Memo This RFC specifies an IAB standards

More information

Request for Comments: August 1996

Request for Comments: August 1996 Network Working Group Request for Comments: 1963 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 Status of This Memo PPP Serial Data Transport Protocol (SDTP) This memo provides

More information

Teldat Router. PPP Interface

Teldat Router. PPP Interface Teldat Router PPP Interface Doc. DM710-I Rev. 10.11 December, 2003 INDEX Chapter 1 PPP Interface...1 1. Description...2 2. PPP Frame structure...3 2.1. Asynchronous PPP adaptation...3 3. Link Control Protocol...5

More information

The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links

The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point Links Network Working Group W. Simpson Request for Comments: 1331 Daydreamer Obsoletes: RFCs 1171, 1172 May 1992 The Point-to-Point Protocol (PPP) for the Transmission of Multi-protocol Datagrams over Point-to-Point

More information

Network Working Group. Category: Standards Track June 1996

Network Working Group. Category: Standards Track June 1996 Network Working Group G. Meyer Request for Comments: 1968 Spider Systems Category: Standards Track June 1996 Status of this Memo The PPP Encryption Control Protocol (ECP) This document specifies an Internet

More information

HP VSR1000 Virtual Services Router

HP VSR1000 Virtual Services Router HP VSR1000 Virtual Services Router Layer 2 - WAN Access Configuration Guide Part number: 5998-6023 Software version: VSR1000_HP-CMW710-R0202-X64 Document version: 6W100-20140418 Legal and notice information

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Rab Nawaz Jadoon Department of Computer Science DCS COMSATS Institute of Information Technology Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Flow control: Ensuring the source sending frames does not overflow the receiver

Flow control: Ensuring the source sending frames does not overflow the receiver Layer 2 Technologies Layer 2: final level of encapsulation of data before transmission over a physical link responsible for reliable transfer of frames between hosts, hop by hop, i.e. on a per link basis

More information

Network Working Group Request for Comments: October 1996

Network Working Group Request for Comments: October 1996 Network Working Group Request for Comments: 2023 Category: Standards Track D. Haskin E. Allen Bay Networks, Inc. October 1996 IP Version 6 over PPP Status of this Memo This document specifies an Internet

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 FRAMING The data link layer needs to pack bits into frames, so that each

More information

Network Working Group Request for Comments: 2059 Category: Informational January 1997

Network Working Group Request for Comments: 2059 Category: Informational January 1997 Network Working Group C. Rigney Request for Comments: 2059 Livingston Category: Informational January 1997 Status of this Memo RADIUS Accounting This memo provides information for the Internet community.

More information

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994

Network Working Group Request for Comments: 1663 Category: Standards Track July 1994 Network Working Group D. Rand Request for Comments: 1663 Novell Category: Standards Track July 1994 Status of this Memo PPP Reliable Transmission This document specifies an Internet standards track protocol

More information

Request for Comments: 1333 May 1992

Request for Comments: 1333 May 1992 Network Working Group Request for Comments: 1333 W. Simpson Daydreamer May 1992 PPP Link Quality Monitoring Status of this Memo This RFC specifies an IAB standards track protocol for the Internet community,

More information

Network Working Group Request for Comments: 2058 Category: Standards Track. Merit W. Simpson Daydreamer S. Willens. Livingston.

Network Working Group Request for Comments: 2058 Category: Standards Track. Merit W. Simpson Daydreamer S. Willens. Livingston. Network Working Group Request for Comments: 2058 Category: Standards Track C. Rigney Livingston A. Rubens Merit W. Simpson Daydreamer S. Willens Livingston January 1997 Status of this Memo Remote Authentication

More information

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP)

Request for Comments: 1552 Category: Standards Track December The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Network Working Group W. Simpson Request for Comments: 1552 Daydreamer Category: Standards Track December 1993 The PPP Internetwork Packet Exchange Control Protocol (IPXCP) Status of this Memo This document

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements

More information

Operation Manual User Access. Table of Contents

Operation Manual User Access. Table of Contents Table of Contents Table of Contents Chapter 1 PPP Configuration... 1-1 1.1 Introduction to PPP... 1-1 1.1.1 Introduction to PPP... 1-1 1.2 Configuring PPP... 1-2 1.2.1 Configuring PPP Encapsulation on

More information

RADIUS Attributes. RADIUS IETF Attributes

RADIUS Attributes. RADIUS IETF Attributes Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

thus, the newly created attribute is accepted if the user accepts attribute 26.

thus, the newly created attribute is accepted if the user accepts attribute 26. Remote Authentication Dial-In User Service (RADIUS) attributes are used to define specific authentication, authorization, and accounting (AAA) elements in a user profile, which is stored on the RADIUS

More information

PPP Configuration Options

PPP Configuration Options PPP Configuration Options 1 PPP Configuration Options PPP can be configured to support various functions including: Authentication using either PAP or CHAP Compression using either Stacker or Predictor

More information

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139

Network Working Group Request for Comments: 2866 Category: Informational June 2000 Obsoletes: 2139 Network Working Group C. Rigney Request for Comments: 2866 Livingston Category: Informational June 2000 Obsoletes: 2139 Status of this Memo RADIUS Accounting This memo provides information for the Internet

More information

Service Managed Gateway TM. Configuring a V90 Modem on an SMG

Service Managed Gateway TM. Configuring a V90 Modem on an SMG Service Managed Gateway TM Configuring a V90 Modem on an SMG Issue 2.1 Date 18 August 2010 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 More information... 3 1.3.1

More information

Network Working Group

Network Working Group Network Working Group Request for Comments: 2637 Category: Informational K. Hamzeh Ascend Communications G. Pall Microsoft Corporation W. Verthein 3Com J. Taarud Copper Mountain Networks W. Little ECI

More information

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016

POINT TO POINT DATALINK PROTOCOLS. ETI 2506 Telecommunication Systems Monday, 7 November 2016 POINT TO POINT DATALINK PROTOCOLS ETI 2506 Telecommunication Systems Monday, 7 November 2016 TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember PPP Frame

More information

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE)

Request for Comments: August PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Network Working Group Request for Comments: 1976 Category: Informational K. Schneider S. Venters ADTRAN, Inc. August 1996 PPP for Data Compression in Data Circuit-Terminating Equipment (DCE) Status of

More information

Point-to-Point Protocol (PPP)

Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) www.ine.com PPP» Point-to-Point Protocol» Open standard» Operates in the LLC sub-layer of data link layer in OSI» Originally designed for dial-up connections (modems, ISDN,

More information

SLIP and PPP Configuration Commands

SLIP and PPP Configuration Commands CHAPTER 15 SLIP and PPP Configuration Commands SLIP and PPP define methods of sending Internet Protocol (IP) packets over standard EIA/TIA-232 asynchronous serial lines with minimum line speeds of 1200

More information

Time Division Multiplexing (TDM) Demarcation Point Serial and parallel ports HDLC Encapsulation PPP

Time Division Multiplexing (TDM) Demarcation Point Serial and parallel ports HDLC Encapsulation PPP CCNA4 Chapter 2 * Time Division Multiplexing (TDM) TDM divides the bandwidth of a single link into separate channels or time slots. The multiplexer (MUX) accepts input from attached devices in a round-robin

More information

Increasing Bandwidth. Contents

Increasing Bandwidth. Contents 2 Increasing Bandwidth Contents Overview...................................................... 2-2 Configuring MLPPP............................................. 2-4 PPP.......................................................

More information

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements...

INTERNET-DRAFT IP Version 6 over PPP February Table of Contents. 1. Introduction Specification of Requirements... HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 03:48:38 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Thu, 15 Feb 1996 23:00:00 GMT ETag: "2f52fa-4e8d-3123baf0" Accept-Ranges: bytes Content-Length: 20109 Connection:

More information

Debugging a Virtual Access Service Managed Gateway

Debugging a Virtual Access Service Managed Gateway Debugging a Virtual Access Service Managed Gateway Issue: 1.0 Date: 09 July 2013 Table of Contents 1 About this document... 3 1.1 Scope... 3 2 WAN connectivity... 4 2.1 ADSL... 4 2.1.1 Active data connections...

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Network Working Group. Category: Informational DayDreamer August 1996

Network Working Group. Category: Informational DayDreamer August 1996 Network Working Group Request for Comments: 1974 Category: Informational R. Friend Stac Electronics W. Simpson DayDreamer August 1996 PPP Stac LZS Compression Protocol Status of this Memo This memo provides

More information

Network Working Group Request for Comments: 1762 Obsoletes: 1376 March 1995 Category: Standards Track. The PPP DECnet Phase IV Control Protocol (DNCP)

Network Working Group Request for Comments: 1762 Obsoletes: 1376 March 1995 Category: Standards Track. The PPP DECnet Phase IV Control Protocol (DNCP) Network Working Group S. Senum Request for Comments: 1762 DigiBoard Obsoletes: 1376 March 1995 Category: Standards Track Status of this Memo The PPP DECnet Phase IV Control Protocol (DNCP) This document

More information

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links Network Working Group Request for Comments: 1504 A. Oppenheimer Apple Computer August 1993 Status of This Memo Appletalk Update-Based Routing Protocol: Enhanced Appletalk Routing This memo provides information

More information

The flow of data must not be allowed to overwhelm the receiver

The flow of data must not be allowed to overwhelm the receiver Data Link Layer: Flow Control and Error Control Lecture8 Flow Control Flow and Error Control Flow control refers to a set of procedures used to restrict the amount of data that the sender can send before

More information

RADIUS Attributes Overview and RADIUS IETF Attributes

RADIUS Attributes Overview and RADIUS IETF Attributes RADIUS Attributes Overview and RADIUS IETF Attributes First Published: March 19, 2001 Last Updated: September 23, 2009 Remote Authentication Dial-In User Service (RADIUS) attributes are used to define

More information

Functional Specification (Preliminary) S-7600A

Functional Specification (Preliminary) S-7600A S-7600A TCP/IP NETWORK PROTOCOL STACK LSI Preliminary - Revision 011 Functional Specification (Preliminary) S-7600A TCP/IP Network Protocol LSI Components Marketing Dept Marketing Section 2 Tel +81-43-211-1028

More information

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values First Published: September 23, 2005 Last Updated: August 18, 2010 The Internet Engineering Task Force (IETF) draft standard

More information

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation.

No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. [MS-CBCP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP)

Network Working Group Request for Comments: 1377 November The PPP OSI Network Layer Control Protocol (OSINLCP) Network Working Group Request for Comments: 1377 D. Katz cisco November 1992 Status of this Memo The PPP OSI Network Layer Control Protocol (OSINLCP) This RFC specifies an IAB standards track protocol

More information

Chapter 11 Data Link Control 11.1

Chapter 11 Data Link Control 11.1 Chapter 11 Data Link Control 11.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 11-1 1 FRAMING The data link layer needs to pack bits into frames,, so that

More information

Configuring TACACS. Finding Feature Information. Prerequisites for Configuring TACACS

Configuring TACACS. Finding Feature Information. Prerequisites for Configuring TACACS TACACS+ is a security application that provides centralized validation of users attempting to gain access to a router or network access server. TACACS+ provides detailed accounting information and flexible

More information

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents

Operation Manual AAA RADIUS HWTACACS H3C S5500-EI Series Ethernet Switches. Table of Contents Table of Contents Table of Contents... 1-1 1.1 AAA/RADIUS/HWTACACS Over... 1-1 1.1.1 Introduction to AAA... 1-1 1.1.2 Introduction to RADIUS... 1-3 1.1.3 Introduction to HWTACACS... 1-9 1.1.4 Protocols

More information

Network Working Group Request for Comments: 1877 Category: Informational December 1995

Network Working Group Request for Comments: 1877 Category: Informational December 1995 Network Working Group S. Cobb Request for Comments: 1877 Microsoft Category: Informational December 1995 PPP Internet Protocol Control Protocol Extensions for Name Server Addresses Status of this Memo

More information

DHCP Client on WAN Interfaces

DHCP Client on WAN Interfaces DHCP Client on WAN Interfaces First Published: February 25, 2002 Last Updated: September 12, 2008 The DHCP Client on WAN Interfaces feature extends the Dynamic Host Configuration Protocol (DHCP) to allow

More information

Configuring and Troubleshooting Dialer Profiles

Configuring and Troubleshooting Dialer Profiles Configuring and Troubleshooting Dialer Profiles Document ID: 10219 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Are Dialer Profiles Right for You?

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-3 Introduction to RADIUS 1-3

More information

Table of Contents 1 AAA Overview AAA Configuration 2-1

Table of Contents 1 AAA Overview AAA Configuration 2-1 Table of Contents 1 AAA Overview 1-1 Introduction to AAA 1-1 Authentication 1-1 Authorization 1-1 Accounting 1-2 Introduction to ISP Domain 1-2 Introduction to AAA Services 1-2 Introduction to RADIUS 1-2

More information

Configuring a GSM (3G) modem on a GW2040 Series Router

Configuring a GSM (3G) modem on a GW2040 Series Router Configuring a GSM (3G) modem on a GW2040 Series Router Issue 1.5 Date 10 May 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 More information... 3 1.3.1 Assigned

More information

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols

Data-link. Examples of protocols. Generating polynomials. Example. Error detection in TCP/IP. Multiple Access Links and Protocols Computer Networking Data-link layer Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr Data Link Layer Our goals: Understand principles behind link layer services: sharing a broadcast channel: multiple

More information

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2

Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial

More information

Point-to-Point Protocol (PPP)

Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) Accessing the WAN Chapter 2 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Describe the fundamental concepts of point-to-point serial

More information

DDR Routing Commands

DDR Routing Commands DDR Routing Commands This section describes the function and displays the syntax of each dial-on-demand routing (DDR) command. For more information about defaults and usage guidelines, see the corresponding

More information

Vendor-Proprietary Attribute

Vendor-Proprietary Attribute RADIUS s The IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the network access server and the RADIUS server. However, some vendors have extended

More information

Command Manual Network Protocol. Table of Contents

Command Manual Network Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Address Configuration Commands... 1-1 1.1 IP Address Configuration Commands... 1-1 1.1.1 display ip host... 1-1 1.1.2 display ip interface... 1-1 1.1.3

More information

PPPoE Technology White Paper

PPPoE Technology White Paper PPPoE Technology White Paper Keywords: PPP, Ethernet, PPPoE Abstract: Point-to-Point Protocol over Ethernet (PPPoE) provides access to the Internet for hosts on an Ethernet through a remote access device

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: March 24, 2011, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 SIP Session Timers, page 4-7 Limitations

More information

Understanding and Troubleshooting Idle Timeouts

Understanding and Troubleshooting Idle Timeouts Understanding and Troubleshooting Idle Timeouts Document ID: 23423 Contents Introduction Prerequisites Requirements Components Used Conventions Common Problems and Symptoms Idle Timeouts Interesting Traffic

More information

Configuring Interfaces and Circuits

Configuring Interfaces and Circuits CHAPTER 5 This chapter describes how to configure the CSS interfaces and circuits and how to bridge interfaces to Virtual LANs (VLANs). Information in this chapter applies to all CSS models, except where

More information

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model

RADIUS Configuration. Overview. Introduction to RADIUS. Client/Server Model Table of Contents RADIUS Configuration 1 Overview 1 Introduction to RADIUS 1 Client/Server Model 1 Security and Authentication Mechanisms 2 Basic Message Exchange Process of RADIUS 2 RADIUS Packet Format

More information

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7) HP MSR Router Series Layer 2 - WAN Access Configuration Guide(V7) Part number: 5998-6465 Software version: CMW710-R0106 Document version: 6PW101-20140807 Legal and notice information Copyright 2014 Hewlett-Packard

More information

Network Working Group. Category: Informational August 1996

Network Working Group. Category: Informational August 1996 Network Working Group J. Woods Request for Comments: 1979 Proteon, Inc. Category: Informational August 1996 Status of This Memo PPP Deflate Protocol This memo provides information for the Internet community.

More information

Troubleshooting. Verifying Network Connectivity. Using the ping or ping6 Command

Troubleshooting. Verifying Network Connectivity. Using the ping or ping6 Command This chapter provides information and instructions for using the system command line interface (CLI) for troubleshooting any issues that may arise during system operation. Verifying Network Connectivity,

More information

Category: Standards Track Motorola, Inc. M. Tuexen Univ. of Applied Sciences Muenster S. Maruyama M. Kozuka Kyoto University September 2007

Category: Standards Track Motorola, Inc. M. Tuexen Univ. of Applied Sciences Muenster S. Maruyama M. Kozuka Kyoto University September 2007 Network Working Group Request for Comments: 5061 Category: Standards Track R. Stewart Cisco Systems, Inc. Q. Xie Motorola, Inc. M. Tuexen Univ. of Applied Sciences Muenster S. Maruyama M. Kozuka Kyoto

More information

Network Working Group Request for Comments: D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation January 2008

Network Working Group Request for Comments: D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation January 2008 Network Working Group Request for Comments: 5176 Obsoletes: 3576 Category: Informational M. Chiba G. Dommety M. Eklund Cisco Systems, Inc. D. Mitton RSA, Security Division of EMC B. Aboba Microsoft Corporation

More information

Service Managed Gateway TM. Configuring Dual ADSL PPP with Worker Standby or Load Share Mode

Service Managed Gateway TM. Configuring Dual ADSL PPP with Worker Standby or Load Share Mode Service Managed Gateway TM Configuring Dual ADSL PPP with Worker Standby or Load Share Mode Issue 1.3 Date 15 November 2011 Table of contents 1 Introduction... 3 1.1 Scope... 3 1.2 Readership... 3 1.3

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

Configuring GTP Services on the GGSN

Configuring GTP Services on the GGSN CHAPTER 3 This chapter describes how to configure a gateway GPRS service node (GGSN) and how to configure GPRS tunneling protocol (GTP) options. For complete description of the GGSN commands in this chapter,

More information

A Method for Transmitting PPP Over Ethernet (PPPoE)

A Method for Transmitting PPP Over Ethernet (PPPoE) Network Working Group Request for Comments: 2516 Category: Informational L. Mamakos K. Lidl J. Evarts UUNET Technologies, Inc. D. Carrel D. Simone RedBack Networks, Inc. R. Wheeler RouterWare, Inc. February

More information

Terminal Services Commands translate lat

Terminal Services Commands translate lat translate lat translate lat To translate a connection request to another protocol connection type when receiving a local-area transport (LAT) request, use the translate lat command in global configuration

More information

VPDN Tunnel Management

VPDN Tunnel Management VPDN Tunnel Management Finding Feature Information VPDN Tunnel Management Last Updated: July 22, 2011 This module contains information about managing virtual private dialup network (VPDN) tunnels and monitoring

More information

Basic Configuration D. Contents

Basic Configuration D. Contents 451-0084D Contents Overview...5 IP/PPP Protocols...7 IP/PPP (IPCP) Features...7 IPX /IPXCP Protocols...10 CCL Scripts... 27 Protocols and Features... 28 Automatic Protocol Detection (APD)... 30 APD Notes...30

More information

PPP configuration commands

PPP configuration commands Contents PPP configuration commands 1 ip address ppp-negotiate 1 ip pool 1 link-protocol ppp 2 ppp authentication-mode 2 ppp chap password 4 ppp chap user 5 ppp ipcp remote-address forced 5 ppp pap local-user

More information

Chapter 10 Security Protocols of the Data Link Layer

Chapter 10 Security Protocols of the Data Link Layer Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2005/06 10.1 Scope of Link Layer Security Protocols

More information

3. Data Link Layer 3-2

3. Data Link Layer 3-2 3. Data Link Layer 3.1 Transmission Errors 3.2 Error Detecting and Error Correcting Codes 3.3 Bit Stuffing 3.4 Acknowledgments and Sequence Numbers 3.5 Flow Control 3.6 Examples: HDLC, PPP 3. Data Link

More information

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1

Table of Contents 1 PPP Configuration Commands PPPoE Configuration Commands 2-1 Table of Contents 1 PPP Configuration Commands 1-1 PPP Configuration Commands 1-1 ip address ppp-negotiate 1-1 link-protocol ppp 1-2 mtu 1-2 ppp account-statistics enable 1-3 ppp authentication-mode 1-3

More information

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7) HP MSR Router Series Layer 2 - WAN Access Configuration Guide(V7) Part number: 5998-7721b Software version: CMW710-R0304 Document version: 6PW104-20150914 Legal and notice information Copyright 2015 Hewlett-Packard

More information

Configuring IEEE 802.1x Port-Based Authentication

Configuring IEEE 802.1x Port-Based Authentication CHAPTER 8 Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the switch. IEEE 802.1x authentication prevents unauthorized

More information

DHCP Technology White Paper

DHCP Technology White Paper DHCP Technology White Paper Keywords: DHCP, DHCP server, DHCP relay agent, DHCP client, BOOTP client. Abstract: This document describes DHCP basic concepts and applications, as well as the main functions

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Request for Comments: 3153 Category: Standards Track C. Fox Cisco Systems August 2001

Request for Comments: 3153 Category: Standards Track C. Fox Cisco Systems August 2001 Network Working Group Request for Comments: 3153 Category: Standards Track R. Pazhyannur I. Ali Motorola C. Fox Cisco Systems August 2001 PPP Multiplexing Status of this Memo This document specifies an

More information

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values RADIUS s and RADIUS Disconnect-Cause Values The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server

More information

RADIUS Change of Authorization Support

RADIUS Change of Authorization Support The RADIUS Change of Authorization (CoA) provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated Identity-Based Networking

More information

Configuring MLPPP. Finding Feature Information

Configuring MLPPP. Finding Feature Information The Multilink Point-to-Point (MLPPP) feature provides load balancing functionality over multiple WAN links, while providing multivendor interoperability, packet fragmentation and proper sequencing, and

More information

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER

SIP System Features. SIP Timer Values. Rules for Configuring the SIP Timers CHAPTER CHAPTER 4 Revised: October 30, 2012, This chapter describes features that apply to all SIP system operations. It includes the following topics: SIP Timer Values, page 4-1 Limitations on Number of URLs,

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Configuring Dial-on-Demand Routing

Configuring Dial-on-Demand Routing C H A P T E R 7 Configuring Dial-on-Demand Routing This chapter describes how to configure your communication server for dial-on-demand routing (DDR) and dial backup. For a complete description of the

More information

Network Working Group. Category: Informational February 1997

Network Working Group. Category: Informational February 1997 Network Working Group K. Hamzeh Request for Comments: 2107 Ascend Communications Category: Informational February 1997 Status of this Memo Ascend Tunnel Management Protocol - ATMP This memo provides information

More information

Operation Manual Security. Table of Contents

Operation Manual Security. Table of Contents Table of Contents Table of Contents Chapter 1 802.1x Configuration... 1-1 1.1 802.1x Overview... 1-1 1.1.1 802.1x Standard Overview... 1-1 1.1.2 802.1x System Architecture... 1-1 1.1.3 802.1x Authentication

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

ip dhcp-client network-discovery through ip nat sip-sbc

ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery, page 3 ip dhcp-client update dns, page 5 ip dhcp drop-inform, page 8 ip dhcp-relay information option server-override,

More information

AAA Server Groups. Finding Feature Information. Information About AAA Server Groups. AAA Server Groups

AAA Server Groups. Finding Feature Information. Information About AAA Server Groups. AAA Server Groups Configuring a device to use authentication, authorization, and accounting (AAA) server groups provides a way to group existing server hosts. Grouping existing server hosts allows you to select a subset

More information

1xEV-DO Inter-Operability Specification (IOS) for CDMA 2000 Access Network Interfaces

1xEV-DO Inter-Operability Specification (IOS) for CDMA 2000 Access Network Interfaces June, 00 SP--000 (TIA/EIA/IS-) xev-do IOS Ballot Version GPP A.S000 Ballot Version Date: June, 00 xev-do Inter-Operability Specification (IOS) for CDMA 000 Access Network Interfaces Release 0 (Ballot Version)

More information

RADIUS Logical Line ID

RADIUS Logical Line ID The feature, also known as the Logical Line Identification (LLID) Blocking feature enables administrators to track their customers on the basis of the physical lines on which customer calls originate.

More information