Authentication in ppp - point to point , Computer Networking

Assignment Help:

Authentication in PPP

PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpoints negotiate authentication in the same manner as other options. Authentication is pee r to peer again without  distinction between calling and called parties. This allows either or both endpoints to request authentication credentials from each other. In fact the protocols  for passing  credentials may be differently  may be different for each endpoint. The default is no authentication required. However you can  configure you PPP  software to require it.

The authenticating state  of a PPP connection follows  the establishing  state if either  endpoint agrees tousle an authentication protocols. Otherwise  the connection  transitions immediately  to eh network  state skipping authentication steps altogether. The two common  authentication protocols authentication protocols are:

a.The password authentication protocols (PAP)

b.The challenge  handshake authentication protocols ( CHAP)

These  protocols  have  assigned  numbers and are arguments to the authentication protocols  options  PPP endpoints  include in LCP configure packets. As usual if one PPP endpoint requests  its peer to authenticate itself with a protocols  the peer doesn't understand the  peer  rejects it in an LCP  configure nak response. This endpoint may  propose another  protocols  its peer understand  or terminate the connection.

Each  authentication protocols  has well defined  procedures regarding the messages that endpoint must  send and receive during the authenticating state.  Besides PSP  and CHAP there are  other extensible authentication protocols  in development  and there exists several proprietary protocols  as well.


Related Discussions:- Authentication in ppp - point to point

Responses - application layer, Responses Responses  are sent  from the...

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

How lans connected to internet, How LANs connected to Internet. Doublin...

How LANs connected to Internet. Doubling every 18 months means factor of four gains in 3 years. In 9 years, gain is then 43 or 64, which leads to 6.4 billion hosts. My intuitio

Which layer defines the physical topology, The Physical layer deals with th...

The Physical layer deals with the definite physical medium and the method of transporting 1s and 0s.

What are the basic lan topologies, What are the basic LAN topologies? ...

What are the basic LAN topologies? The three simple LAN topologies that are combined to shape any practical topology are called as basic LAN topologies. They are, Bus Topology

Electronic mail - application layer, Electronic Mail One  of the  most...

Electronic Mail One  of the  most popular internet  services is electronic mail ( e mail). At  the beginning  of the internet era teh message sent by  electronic  mail were sh

Fault tree analysis, FAULT TREE ANALYSIS Reliability engineering, in a ...

FAULT TREE ANALYSIS Reliability engineering, in a nutshell is concerned with failures.   How failures occur, how often they occur, and how to minimize them are the basic proble

What are the benefits of intranet applications, What are the benefits of In...

What are the benefits of Intranet applications The benefits of successful Intranet applications can be enumerated as follows: Cheaper: Use of client browsers with one

Configure basic switch parameters- ccna, Configure basic switch parameters....

Configure basic switch parameters. Configure the S1, S2, and S3 switches according to the following guidelines: Configure the switch hostname. Disable DNS lookup.

What is the frame, What is the Frame A presentation format, which en...

What is the Frame A presentation format, which enables Web page designers and users to mark a part of the screen for links to other pages. Frames usually appear on the left

Dns id hacking - domain name server, DNS ID hacking The Dns use ID sys...

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd