enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Point-to-Point Protocol over Ethernet - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Protocol...

    The Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames. It appeared in 1999, in the context of the boom of DSL as the solution for tunneling packets over the DSL connection to the ISP's IP network, and from there to the rest of the Internet.

  3. IPoE - Wikipedia

    en.wikipedia.org/wiki/IPoE

    Internet Protocol over Ethernet (IPoE) is a method of delivering an IP payload over an Ethernet-based access network or an access network using bridged Ethernet over Asynchronous Transfer Mode (ATM) without using PPPoE. It directly encapsulates the IP datagrams in Ethernet frames, using the standard RFC 894 encapsulation.

  4. Point-to-Point Protocol - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Protocol

    As there are only two endpoints on a tunnel, the tunnel is a point-to-point connection and PPP is a natural choice as a data link layer protocol between the virtual network interfaces. PPP can assign IP addresses to these virtual interfaces, and these IP addresses can be used, for example, to route between the networks on both sides of the tunnel.

  5. Point-to-Point Protocol over ATM - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Protocol...

    It also avoids the issues that PPPoE suffers from, related to sometimes needing to use an IP MTU of 1492 bytes or less, lower than the standard 1500 bytes. The use of PPPoA over PPPoE is not geographically significant; rather, it varies by the provider's preference.

  6. Point-to-Point Protocol daemon - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Protocol_daemon

    PPP is used to manage network connections between two nodes on Unix-like operating systems. It is configured using command-line arguments and configuration files . While it has initially been used to manage only dial-up access , it is also used to manage broadband connections such as DSL , if Point-to-Point Protocol over Ethernet (PPPoE) or ...

  7. Password Authentication Protocol - Wikipedia

    en.wikipedia.org/wiki/Password_authentication...

    PAP is also used in PPPoE, for authenticating DSL users. As the Point-to-Point Protocol (PPP) sends data unencrypted and "in the clear", PAP is vulnerable to any attacker who can observe the PPP session. An attacker can see the users name, password, and any other information associated with the PPP session.

  8. Point-to-Point Tunneling Protocol - Wikipedia

    en.wikipedia.org/wiki/Point-to-Point_Tunneling...

    PPTP has been the subject of many security analyses and serious security vulnerabilities have been found in the protocol. The known vulnerabilities relate to the underlying PPP authentication protocols used, the design of the MPPE protocol as well as the integration between MPPE and PPP authentication for session key establishment. [2] [3] [4] [5]

  9. Challenge-Handshake Authentication Protocol - Wikipedia

    en.wikipedia.org/wiki/Challenge-Handshake...

    CHAP is also used in PPPoE, for authenticating DSL users. As the PPP sends data unencrypted and "in the clear", CHAP is vulnerable to any attacker who can observe the PPP session. An attacker can see the user's name, CHAP challenge, CHAP response, and any other information associated with the PPP session.