ppp.8.m4 (31173) | ppp.8.m4 (31272) |
---|---|
1.\" $Id: ppp.8,v 1.78 1997/11/11 22:58:12 brian Exp $ | 1.\" $Id: ppp.8,v 1.79 1997/11/14 20:07:39 brian Exp $ |
2.Dd 20 September 1995 3.Os FreeBSD 4.Dt PPP 8 5.Sh NAME 6.Nm ppp 7.Nd Point to Point Protocol (a.k.a. iijppp) 8.Sh SYNOPSIS 9.Nm --- 1533 unchanged lines hidden (view full) --- 1543means that the option will be requested by us. 1544.Dq Disable 1545means that the option will not be requested by us. 1546.Pp 1547.Dq Option 1548may be one of the following: 1549 1550.Bl -tag -width 20 | 2.Dd 20 September 1995 3.Os FreeBSD 4.Dt PPP 8 5.Sh NAME 6.Nm ppp 7.Nd Point to Point Protocol (a.k.a. iijppp) 8.Sh SYNOPSIS 9.Nm --- 1533 unchanged lines hidden (view full) --- 1543means that the option will be requested by us. 1544.Dq Disable 1545means that the option will not be requested by us. 1546.Pp 1547.Dq Option 1548may be one of the following: 1549 1550.Bl -tag -width 20 |
1551.It vjcomp 1552Default: Enabled and Accepted. This option decides if Van Jacobson 1553header compression will be used. | 1551.It acfcomp 1552Default: Enabled and Accepted. ACFComp stands for Address and Control 1553Field Compression. Non LCP packets usually have very similar address 1554and control fields - making them easily compressible. |
1554 | 1555 |
1555.It lqr 1556Default: Disabled and Accepted. This option decides if Link Quality 1557Requests will be sent. LQR is a protocol that allows 1558.Nm 1559to determine that the link is down without relying on the modems 1560carrier detect. 1561 | |
1562.It chap 1563Default: Disabled and Accepted. CHAP stands for Challenge Handshake 1564Authentication Protocol. Only one of CHAP and PAP (below) may be 1565negotiated. With CHAP, the authenticator sends a "challenge" message 1566to its peer. The peer uses a one-way hash function to encrypt the 1567challenge and sends the result back. The authenticator does the same, 1568and compares the results. The advantage of this mechanism is that no 1569passwords are sent across the connection. --- 18 unchanged lines hidden (view full) --- 1588 1589Some 1590.Em PPP 1591implementations use "MS-CHAP" rather than MD5 when encrypting the 1592challenge. Refer to the description of the 1593.Dq set encrypt 1594command for further details. 1595 | 1556.It chap 1557Default: Disabled and Accepted. CHAP stands for Challenge Handshake 1558Authentication Protocol. Only one of CHAP and PAP (below) may be 1559negotiated. With CHAP, the authenticator sends a "challenge" message 1560to its peer. The peer uses a one-way hash function to encrypt the 1561challenge and sends the result back. The authenticator does the same, 1562and compares the results. The advantage of this mechanism is that no 1563passwords are sent across the connection. --- 18 unchanged lines hidden (view full) --- 1582 1583Some 1584.Em PPP 1585implementations use "MS-CHAP" rather than MD5 when encrypting the 1586challenge. Refer to the description of the 1587.Dq set encrypt 1588command for further details. 1589 |
1590.It lqr 1591Default: Disabled and Accepted. This option decides if Link Quality 1592Requests will be sent. LQR is a protocol that allows 1593.Nm 1594to determine that the link is down without relying on the modems 1595carrier detect. 1596 1597.It msext 1598Default: Disabled. This option allows the use of Microsoft's 1599.Em PPP 1600extensions, supporting the negotiation of the DNS and the NetBIOS NS. 1601Enabling this allows us to pass back the values given in "set ns" 1602and "set nbns". 1603 |
|
1596.It pap 1597Default: Disabled and Accepted. PAP stands for Password Authentication 1598Protocol. Only one of PAP and CHAP (above) may be negotiated. With 1599PAP, the ID and Password are sent repeatedly to the peer until 1600authentication is acknowledged or the connection is terminated. This 1601is a rather poor security mechanism. It is only performed when the 1602connection is first established. 1603 --- 10 unchanged lines hidden (view full) --- 1614When using PAP as the client, you need only specify 1615.Dq AuthName 1616and 1617.Dq AuthKey 1618in 1619.Pa /etc/ppp/ppp.conf . 1620PAP is accepted by default. 1621 | 1604.It pap 1605Default: Disabled and Accepted. PAP stands for Password Authentication 1606Protocol. Only one of PAP and CHAP (above) may be negotiated. With 1607PAP, the ID and Password are sent repeatedly to the peer until 1608authentication is acknowledged or the connection is terminated. This 1609is a rather poor security mechanism. It is only performed when the 1610connection is first established. 1611 --- 10 unchanged lines hidden (view full) --- 1622When using PAP as the client, you need only specify 1623.Dq AuthName 1624and 1625.Dq AuthKey 1626in 1627.Pa /etc/ppp/ppp.conf . 1628PAP is accepted by default. 1629 |
1622.It acfcomp 1623Default: Enabled and Accepted. ACFComp stands for Address and Control 1624Field Compression. Non LCP packets usually have very similar address 1625and control fields - making them easily compressible. | 1630.It pred1 1631Default: Enabled and Accepted. This option decides if Predictor 1 1632compression will be used. |
1626 1627.It protocomp 1628Default: Enabled and Accepted. This option is used to negotiate 1629PFC (Protocol Field Compression), a mechanism where the protocol 1630field number is reduced to one octet rather than two. 1631 | 1633 1634.It protocomp 1635Default: Enabled and Accepted. This option is used to negotiate 1636PFC (Protocol Field Compression), a mechanism where the protocol 1637field number is reduced to one octet rather than two. 1638 |
1632.It pred1 1633Default: Enabled and Accepted. This option decides if Predictor 1 1634compression will be used. 1635 1636.It msext 1637Default: Disabled. This option allows the use of Microsoft's 1638.Em PPP 1639extensions, supporting the negotiation of the DNS and the NetBIOS NS. 1640Enabling this allows us to pass back the values given in "set ns" 1641and "set nbns". 1642 | 1639.It vjcomp 1640Default: Enabled and Accepted. This option decides if Van Jacobson 1641header compression will be used. |
1643.El | 1642.El |
1643 1644.Pp |
|
1644The following options are not actually negotiated with the peer. 1645Therefore, accepting or denying them makes no sense. 1646 1647.Bl -tag -width 20 | 1645The following options are not actually negotiated with the peer. 1646Therefore, accepting or denying them makes no sense. 1647 1648.Bl -tag -width 20 |
1648.It proxy 1649Default: Disabled. Enabling this option will tell 1650.Nm 1651to proxy ARP for the peer. 1652 | |
1653.It passwdauth 1654Default: Disabled. Enabling this option will tell the PAP authentication 1655code to use the password file (see 1656.Xr passwd 5 ) 1657to authenticate the caller rather than the 1658.Pa /etc/ppp/ppp.secret 1659file. 1660 | 1649.It passwdauth 1650Default: Disabled. Enabling this option will tell the PAP authentication 1651code to use the password file (see 1652.Xr passwd 5 ) 1653to authenticate the caller rather than the 1654.Pa /etc/ppp/ppp.secret 1655file. 1656 |
1657.It proxy 1658Default: Disabled. Enabling this option will tell 1659.Nm 1660to proxy ARP for the peer. 1661 1662.It throughput 1663Default: Disabled. Enabling this option will tell 1664.Nm 1665to gather thoroughput statistics. Input and output is sampled over 1666a rolling 5 second window, and current, best and total figures are 1667retained. This data is output when the relevent 1668.Em PPP 1669layer shuts down, and is also available using the 1670.Dq show 1671command. Troughput statistics are available at the 1672.Dq IPCP 1673and 1674.Dq modem 1675levels. 1676 |
|
1661.It utmp 1662Default: Enabled. Normally, when a user is authenticated using PAP or 1663CHAP, and when 1664.Nm 1665is running in 1666.Fl direct 1667mode, an entry is made in the utmp and wtmp files for that user. Disabling 1668this option will tell --- 769 unchanged lines hidden --- | 1677.It utmp 1678Default: Enabled. Normally, when a user is authenticated using PAP or 1679CHAP, and when 1680.Nm 1681is running in 1682.Fl direct 1683mode, an entry is made in the utmp and wtmp files for that user. Disabling 1684this option will tell --- 769 unchanged lines hidden --- |