| Acknowledgments | | xi
|
| Preface to the Second Edition | | xiii
|
|
|
| CHAPTER ONE | Introduction | 1
|
| Packet Switching Networks | | 2
|
| Dial-Up File Transfer Protocols | | 3
|
| Dial-Up Networking | | 3
|
|
|
| CHAPTER TWO | PPP Communication Basics | 9
|
| How PPP Fits In | | 9
|
| Media | | 10
|
| HDLC | | 13
|
| PPP Framing | | 16
|
| Standard Encapsulations | | 29
|
| Statistics and Management | | 35
|
| Auto-Detecting | | 36
|
| AHDLC Start-Up Issues | | 42
|
| Switched Circuit Integration | | 44
|
| Null-Modem Connection to Windows NT | | 44
|
| General Implementation Issues | | 45
|
|
|
| CHAPTER THREE | LCP and the PPP State Machines | 47
|
| PPP Outline | | 47
|
| The Negotiation Messages | | 55
|
| LCP Negotiation Options | | 72
|
|
|
| CHAPTER FOUR | Authentication and Security | 95
|
| Authentication Protocols | | 95
|
| External Security Servers | | 118
|
| About Security | | 120
|
| Fast Reconnect | | 125
|
|
|
| CHAPTER FIVE | The Network Layer Protocols | 127
|
| Internet Protocol (IP; IPCP) | | 128
|
| Open Systems Interconnection (OSI; OSINLCP) | | 134
|
| Xerox Network Systems Internet Datagram Protocol (XNS IDP; XNSCP) | | 135
|
| DECnet Phase IV Routing Protocol (DECnet; DNCP) | | 136
|
| AppleTalk (AT; ATCP) | | 136
|
| Internet Packet Exchange (IPX; IPXCP) | | 140
|
| Bridging (BCP) | | 144
|
| Banyan Vines (VINES; BVCP) | | 149
|
| NetBIOS Frames Control Protocol (NetBIOS; NBFCP) | | 151
|
| Systems Network Architecture (SNA; SNACP) | | 152
|
| Serial Data Transport Protocol (SDTP; SDCP) | | 153
|
| Internet Protocol Version 6 (IVPv6; IPV6CP) | | 155
|
| Simple Transportation Management Framework (STMF; STMFCP) | | 156
|
| Multiprotocol Label Switching (MPLS; MPLSCP) | | 157
|
| IP Addressing Issues | | 158
|
|
|
| CHAPTER SIX | The Transforming Layers | 169
|
| Architecture | | 170
|
| Compression Negotiation | | 177
|
| Encryption Negotiation | | 196
|
|
|
| CHAPTER SEVEN | Bandwidth Management and Call Control | 201
|
| Demand-Dialing | | 202
|
| Aggregation of Multiple Links | | 203
|
| Active Bandwidth Management | | 226
|
| Cost Shifting | | 232
|
|
|
| CHAPTER EIGHT | Tunneling PPP | 239
|
| Why Tunnel PPP? | | 239
|
| PPP Tunneling Protocols | | 241
|
| Layer Two Forwarding -- L2F | | 242
|
| Point-to-Point Tunneling Protocol -- PPTP | | 243
|
| Layer Two Tunneling Protocol -- L2TP | | 243
|
| PPP over Ethernet (PPPoE) | | 245
|
| Ad Hoc Tunneling | | 246
|
|
|
| CHAPTER NINE | Debugging Links | 253
|
| Approach | | 253
|
| Network-Layer Problems | | 253
|
| Negotiation and Communications | | 255
|
| Configuration Problems | | 257
|
| Link Failure | | 258
|
| Common Implementation Errors and Effects | | 260
|
| Example Traces | | 264
|
| Network Data | | 274
|
| MP, CCP, and ECP | | 276
|
| Appearance of Packets on Various Media | | 277
|
| Getting Traces from Common PPP Software | | 277
|
| Unix Systems | | 278
|
| UNIX Vendor PPP Implementations | | 281
|
| Personal Computer Software | | 297
|
| Communications Servers and Routers | | 303
|
| Test Tools | | 310
|
|
|
| CHAPTER TEN | One PPP Implementation | 317
|
| Overview | | 317
|
| Kernel Details | | 319
|
| The pppd Daemon | | 323
|
| The Utility Programs | | 325
|
| Modifying pppd | | 326
|
| Differences from RFC 1661 | | 327
|
| Log Messages | | 329
|
| Other Notes | | 338
|
| The pppd Configuration Options | | 339
|
| Example Configuration | | 343
|
|
|
| CHAPTER ELEVEN | Resources | 347
|
| Other PPP-Related Books | | 347
|
| Related Books and Other Publications | | 348
|
| Getting RFCs, Internet Drafts, and Other Documents | | 350
|
| Help Sites | | 352
|
| USENET News Groups | | 355
|
| Meetings and Mailing Lists | | 357
|
| Publicly Available Source Code | | 359
|
| Binary-only Software | | 360
|
| Commercial Sources | | 361
|
| Other Resources | | 361
|
|
|
| APPENDIX A | Cross-References | 363
|
| APPENDIX B | Decimal, Hexadecimal, Octal, and Standard Characters | 375
|
| Index | | 379
|