
893-741-B
A15-49
Using Model 5390 Security
Sending a CHAP Challenge
When the Model 5390 server sends a challenge, it includes the chap_auth_name parameter value
as the name field and a randomly generated number as the value field. If ACP is used, after receiving
a response, the Model 5390 server acquires the secret token based on the name in the response
message (the Model 5390 server uses the port_password parameter value as the secret token if
local security is used). If the result of running MD5 encryption on the secret token and the randomly
generated number produce the same value as in the Response value field, the Model 5390 server
sends a success message and the link enters NCP negotiation; otherwise, the Model 5390 server
sends a failure message and terminates the link.
The Model 5390 server sends a challenge only if the enable_security parameter is set to Y, the
ppp_security_protocol parameter is set to chap, and CHAP is ACKed during LCP. If the Model
5390 server is ACKed for CHAP, it will seek only one valid response. After the Model 5390 server
receives a valid response, it sends challenges at irregular intervals while the link is up.
ACP logging for CHAP includes good responses received, bad responses received, and peer refusal
to do CHAP (for more details on security logging, as well as a sample log file, see Host-based
Security Logging on page B1-22).
Using the PPP Security Parameters
There are a variety of settings one can choose when configuring the
Model 5390 server for PPP security. Table A15-11 lists the possible combinations of PPP security
NOTE:
The Model 5390 server terminates a link if it cannot authenti-
cate a challenge. If the Model 5390 server does not receive a response
to a challenge within the allotted time-out, it reissues the challenge for
the defined number of retries.
Summary of Contents for 5390
Page 28: ...893 741 B Figures xxviii ...
Page 44: ...893 741 B Preface xliv ...
Page 45: ......
Page 48: ......
Page 60: ...A1 12 893 741 B Introduction to the Model 5390 Server ...
Page 106: ...A3 18 893 741 B Configuring Ports ...
Page 142: ...A5 12 893 741 B Printers ...
Page 152: ...A6 10 893 741 B Modems ...
Page 168: ...A7 16 893 741 B Serial Line Internet Protocol SLIP ...
Page 224: ...A9 38 893 741 B Internetwork Packet Exchange IPX Protocol ...
Page 258: ...A11 12 893 741 B Dial up Networking ...
Page 289: ...893 741 B A12 31 Internet Protocol IP Routing that are possible ...
Page 506: ...A15 86 893 741 B Using Model 5390 Security ...
Page 507: ......
Page 544: ...B1 36 893 741 B Network Administration ...
Page 574: ...B2 30 893 741 B Simple Network Management Protocol SNMP ...
Page 575: ......
Page 606: ...C1 30 893 741 B na Commands ...
Page 676: ...C2 70 893 741 B Configuration Parameters ...
Page 772: ...C3 96 893 741 B Using the CLI Commands ...
Page 794: ...C5 12 893 741 B Network Protocols ...
Page 795: ......
Page 796: ... Appendix D1 Software Reference Part D Appendixes ...