Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)

Slides:



Advertisements
Similar presentations
ADSL Systems - An Overview Praveen Reguraman InterOperability Lab University of New Hampshire 1999.
Advertisements

McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.
Labcourse “Routerlab”
Point-to-Point Protocol (PPP) ผศ. ดร. อนันต์ ผลเพิ่ม Asst.Prof.Anan Phonphoem, Ph.D. Computer Engineering.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
Understanding IPv6 Slide: 1 Appendix A Link-Layer Support for IPv6.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 1 Local Area Network (LAN) Technologies.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
What is EAP EAP stands for Extensible Authentication Protocol. Offers a basic framework for authentication. Many different authentication protocols can.
1 Data Communications Point-to-Point Protocol (PPP)
Introduction to PPP Sharon Katz. History Dial-up file transfer protocol Early 80`s: PC users begin to communicate through file transfer protocols: X-Modem.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
PPP Protocol PPP Stack -Establish a link (Link Control Protocol) -Authenticate Parties involved (Authentication Protocols) -Carry Network Layer (Network.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
As first introduced in Chapter 2, “Wide Area Network (WAN) Technologies,” PPP is a stan- dard for using point-to-point network links that provides the.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (I.e connecting to the internet) requires a data-link layer protocol widely-spread.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Introduction to PPP. Using dial-up modems for packet-oriented- networking (i.e connecting to the internet) requires a data-link layer protocol widely-spread.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
Chapter 7 Low-Level Protocols
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
資 管 Lee Appendix A1 Link-Layer Support for IPv6. 資 管 Lee Lesson Objectives Basic structure of IPv6 packets LAN media WAN media IPv6 over IPv4.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Lesson 1: Local Area Network (LAN) Technologies LAN encapsulations Ethernet Token Ring FDDI IEEE
Computer Networks Module 3: Data Link Layer (Framing) Dr. Vikram Shete St. Francis Institute of Technology.
12. Point-to-Point Access: PPP
Chapter 11 Data Link Control
PPP Configuration.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: PPP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 12 Point-to-Point Access: (PPP)
Virtual Private Networks
Point-to-Point Protocol (PPP)
PPP Protocol.
PPP Protocol.
Microsoft Windows NT 4.0 Authentication Protocols
Lesson 6 Point to Point Protocol
Chapter 11 - Part 2 Data Link Control.
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
Point-to-Point Access:
Point-to-Point Access:
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
PPP Protocol.
Point-to-Point Access:
Data Link Control (DLC) Services
Presentation transcript:

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 2 Point to Point Protocol (PPP) PPP overview PPP connection process LCP PPP authentication protocols NCPs PPPoE

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 3 PPP Overview A Data Link Layer encapsulation method A protocol for negotiating the Data Link Layer characteristics named the Link Control Protocol (LCP) A series of protocols for negotiating Network Layer protocols over the point-to-point connection named Network Control Protocols (NCPs)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 4 PPP Connection Process 1. PPP configuration using LCP 2. Authentication 3. Callback 4. Protocol configuration using NCPs

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 5 LCP Frame Structure Flag Address Control Protocol Code Identifier Length Data Frame Check Sequence Flag = 0x7E = 0xFF = 0x03 = 0xC0-21 = 0x7E... LCP Frame

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 6 LCP Options Protocol Code Identifier Length Type Length Option Data = 0xC LCP Option

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 7 LCP Negotiations LCP messages Configure-Request Configure-Nak Configure-Reject Configure-Ack For Peer A and Peer B: Peer A initiates an LCP negotiation for the data to be sent by Peer B Peer B initiates a separate LCP negotiation for the data to be sent by Peer A

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 8 PPP Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) MS-CHAP version 2 (MS-CHAP v2) Extensible Authentication Protocol (EAP)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 9 PAP Very simple, plaintext authentication protocol PAP authentication process: 1. Connection-initiating PPP peer (the calling peer) sends a PAP Authenticate-Request message to the authenticating PPP peer (the answering peer) 2. The answering peer validates the user name and password and sends either a PAP Authenticate- Ack or PAP Authenticate-Nak message

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 10 PAP Authentication Request Frame Structure Protocol Code Identifier Length Peer ID Length Peer ID Password Length Password = 0xC = 1...

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 11 PAP Authenticate-Ack and Authenticate-Nak Protocol Code Identifier Length Message Length Message = 0xC = 2 or 3

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 12 CHAP More secure authentication protocol Provides proof of knowledge of password without sending the password CHAP authentication process 1. The answering peer sends a CHAP Challenge message that contains a challenge string 2. The calling peer sends a CHAP Response message that contains an MD5 hash of the CHAP session ID, the challenge string, and the user’s password 3. The answering peer verifies hash and sends a CHAP Success or CHAP Failure message

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 13 CHAP Challenge/Response Protocol Code Identifier Length Value Size Value Name = 0xC

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 14 CHAP Success/Failure Protocol Code Identifier Length Message = 0xC

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 15 MS-CHAP Microsoft authentication protocol Provides proof of knowledge of password without sending the password Uses MD-4 hash of the user’s password rather than a plaintext version MS-CHAP authentication process 1. The answering peer sends a CHAP Challenge message that contains a challenge string 2. The calling peer sends an MS-CHAP Response message that contains an encrypted response using the MD-4 hash of the user’s password 3. The answering peer verifies response and sends a CHAP Success or CHAP Failure message

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 16 MS-CHAP Response Protocol Code Identifier Length Value Size LAN Manager Response Windows NT Response Flags Name = 0xC (24 bytes) = 49

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 17 MS-CHAP v2 Microsoft authentication protocol MS-CHAP with mutual authentication MS-CHAP v2 authentication process 1. The answering peer sends a CHAP Challenge message that contains a challenge string 2. The calling peer sends an MS-CHAP v2 Response message that contains an encrypted response and a challenge for the answering peer 3. The answering peer verifies the response and sends a CHAP Success message with an encrypted response based on the calling peer’s challenge 4. The calling peer verifies the answering peer’s response

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 18 MS-CHAP v2 Response Protocol Code Identifier Length Value Size Peer Challenge Reserved Windows NT Response Flags Name = 0xC (16 bytes) (8 bytes)... (24 bytes) = 49

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 19 EAP An extension to PPP to allow for more extensibility and flexibility for authentication methods for PPP connections EAP messages: EAP-Request EAP-Response EAP-Success EAP-Failure

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 20 EAP Request/Response Message Protocol Code Identifier Length Type Type-specific data = 0xC = 1 or 2

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 21 EAP Success/Failure Message Protocol Code Identifier Length = 0xC2-27 = 3 or 4 = 4

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 22 EAP MD5 CHAP Request/Response Messages Protocol Code Identifier Length Type Value Size Value Name = 0xC2-27 = 1 or 2 = 4... = 16 (16 bytes)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 23 NCPs IP Control Protocol (IPCP) IP Compression Protocol IP Address Primary DNS Server Address Primary NBNS Server Secondary DNS Server Address Secondary NBNS Server Compression Control Protocol (CCP) Microsoft Point-Compression (MPPC) Microsoft Point-to-Point Encryption (MPPE) Encryption Control Protocol (ECP)

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 24 PPP over Ethernet (PPPoE) Method of encapsulating PPP frames so that they can be sent over an Ethernet network PPPoE connection phases: 1. Discovery phase  Presence of an access concentrator (AC)  Determine a PPPoE session ID 2. PPP session phase  A PPP connection is established and used for data transfer

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 25 Destination Address Source Address PPPoE payload... EtherType Frame Check Sequence Preamble ,494 bytes Version Type Code Session ID Length = 1 PPPoE Frame Format

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 26 PPPoE Frame Format for PPP Frames

Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 27 Review PPP overview PPP connection process LCP PPP authentication protocols NCPs PPPoE