User manual

42
Actiontec Broadband Router User Manual
43
Chapter 4 Using Network Connections
PPP Authentication
Point-to-Point Protocol (PPP) currently supports four authentication pro-
tocols: Password Authentication Protocol (PAP), Challenge Handshake
Authentication Protocol (CHAP), and Microsoft CHAP versions 1 and 2.
Select the authentication protocols the Router may use when negotiating with a
PPTP server in this section. Select all the protocols if no information is available
about the server’s authentication methods. Note that encryption is performed
only if Microsoft CHAP, Microsoft CHAP version 2, or both are selected.
M
Warning: The PPP Authentication settings should not be
changed unless instructed to do so by Verizon.
Login User Name Enter the user name (provided by the ISP) in this text box.
Login Password Enter the password (provided by the ISP) in this text box.
Support Unencrypted Password (PAP) Password Authentication Protocol (PAP)
is a simple, plain-text authentication scheme. The user name and password are
requested by the networking peer in plain-text. PAP, however, is not a secure
authentication protocol. Man-in-the-middle attacks can easily determine the
remote access client’s password. PAP offers no protection against replay attacks,
remote client impersonation, or remote server impersonation.
Support Challenge Handshake Authentication (CHAP) Click in this check box to
activate CHAP, a challenge-response authentication protocol that uses MD5 to
hash the response to a challenge. CHAP protects against replay attacks by using
an arbitrary challenge string per authentication attempt.
Support Microsoft CHAP Click in this check box if communicating with a peer
that uses Microsoft CHAP authentication protocol.
Support Microsoft CHAP Version 2 Select this check box if communicating with a
peer that uses Microsoft CHAP Version 2 authentication protocol.
PPP Compression
The PPP Compression Control Protocol (CCP) is responsible for configuring,
enabling, and disabling data compression algorithms on both ends of the point-
to-point link. It is also used to signal a failure of the compression/ decompres-
sion mechanism in a reliable manner.
For each compression algorithm (BSD and Deflate), select one of the following
from the drop-down list: