Ieee 802.3 Ethernet; Point-To-Point Protocol (Ppp); Pap And Chap Security - Cabletron Systems CyberSWITCH CSX101 User's Information Manual

Advanced user information
Table of Contents

Advertisement

About the CyberSWITCH 100 Router

IEEE 802.3 Ethernet

The router provides a standard 802.3 Media Access Control (MAC) layer for CSMA/CD Ethernet
communications. All bridging and routing protocols are supported across the Ethernet link.

Point-to-Point Protocol (PPP)

PPP is a data link layer industry standard WAN protocol for transferring multi-protocol data traffic
over point-to-point connections. It is suitable for both high-speed synchronous ports as well as
lower speed asynchronous dial-up ports. With this protocol, options such as security and network
protocols can be negotiated over the connection.
This device supports synchronous PPP over the ISDN port. In Single Link Mode, PPP uses one
ISDN B channel for data transmission. PPP runs over each ISDN B channel for two separate
conversations (split B-channel). In Multi-Link Protocol Mode, PPP simultaneously sends and
receives data over two ISDN B-channels on the same connection to optimize bandwidth usage.
The STAC Electronics Stacker LZS Compression Protocol is supported over PPP providing up to
4:1 data compression.

PAP and CHAP Security

The CyberSWITCH 100 supports the Password Authentication Protocol (PAP) and Challenge
Handshake Authentication Protocol (CHAP) under PPP.
PAP provides verification of passwords between routers using a 2-way handshake. One router
(peer) sends its system name and password to the other router. Then the other router (known as the
authenticator) checks the peer's password against the configured remote router's password and
returns acknowledgment.
CHAP is more secure than PAP as unencrypted passwords are not sent across the network. CHAP
uses a 3-way handshake. One router (known as the authenticator) challenges the other router
(known as the peer) by generating a random number and sending it along with the system name.
The peer then applies a one-way hash algorithm to the random number and returns this encrypted
information along with the system name. The authenticator then runs the same algorithm and
compares the result with the expected value. This authentication method depends upon a password
or secret, known only to both ends.
CyberSWITCH 100 Advanced User Information 11

Advertisement

Table of Contents
loading

Table of Contents