I think for CHAP protocol figure is wrong. 1)After the completion of the link establishment phase, the authenticator(LOCAL HOST) sends a "challenge" message to the peer. 2)The peer(REMOTE HOST) responds with a value calculated using a one-way hash function on the challenge and the secret combined. 3)The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection. 4)At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3. REFERENCE : wikipedia
I think for CHAP protocol figure is wrong.
1)After the completion of the link establishment phase, the authenticator(LOCAL HOST) sends a "challenge" message to the peer.
2)The peer(REMOTE HOST) responds with a value calculated using a one-way hash function on the challenge and the secret combined.
3)The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
4)At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
REFERENCE : wikipedia
Thanks for making it simple and easy to understand... :)
hello sir can you provide the slides that you are using ?
sir ye pen konsa h
Thank you for sharing your knowledge
Thanks sir for your previous time.
Can we use ppp if we are connecting 3 or more routers?
Hi sir
May I know any specific interval of time to generate hash value for local router
If we use three or more number of routers.. how to do CHAP or Encapsulation
for every interface we need to write configuration
Some information about hash value after destination sending challenge value by md5
How to add serial port on router
Great
thank you sir
Thank you
esko share kro
agar free h to