(NOTE: Each chapter concludes with Summary.)
1. Introduction. Why PPP Was Developed. What PPP Does. Applications of PPP. The Network Access Server (NAS). Operations of a Data Link Protocol. Eliminating ACKs, NAKs, and Retransmissions. The Data Link Handshake. How PPP Fits into the Picture. Beyond the Individual Link Operations: Layer Two Tunneling Protocol (L2TP). The Internet Layered Architecture. Data Link Protocols and the Internet Model. A General Look at PPP Operations. The PPP Family.
2. PPP, HDLC, and the Frames. HDLC. Relationship of PPP's Operations and HDLC. Relationship of PPP to Network Control Protocols (NCPs). PPP and HDLC Formats. Asynchronous HDLC (AHDLC). Octet-Synchronous HDLC. Bit-Synchronous HDLC. Explanation of Terms. The PPP PDU. Auto-Detect Operations. PPP and Error Checking. Error Checking and Retransmission. Error Checking but No Retransmission.
3. The Principal PPP Entities: LCP. Link Control Protocol (LCP) Basics. The PPP Phases. Link Dead (physical layer not ready). Link Establishment Phase. Authentication Phase. Network-Layer Protocol Phase. Link Termination Phase. Use of Timers During the Authentication and Network Layer Phases. Introduction to the Options. The PPP Option Negotiation Automaton. Another Look at the Layered Architecture. PPP States, Events, and Actions. States. Events. Actions. The LCP Information. The LCP Packets. Error Recovery. Link Configuration Packets. Link Termination Packets. Link Maintenance Packets.
4. The Principal PPP Entities: NCP. Purpose of NCP. Address Management and Assignment Operations. The Internet Protocol Control Protocol (IPCP). Configuration Options. The Internet Protocol Version 6 Control Protocol (IPv6CP). Other Network Protocols. Open Systems Interconnection NCP (OSINLCP). System Network Architecture (SNA) NCP (SNACP). Net BIOS Frames NCP (NBFCP). Internetwork Packet Exchange NCP (IPXCP). Bridge NCP (BCP). Apple Talk NCP (ATCP). Xerox Network Systems Internet Datagram NCP (XNSCP). BANYAN VINES NCP (BVCP). DECnet Phase IV NCP (DNCP).
5. PPP Security Operations. What Is Internet Security? Encryption Keys. Private and Public Keys. Distribution of Keys. The Password Authentication Protocol (PAP). The Challenge-Handshake Authentication Protocol (CHAP). The CHAP Packets. RADIUS. Example of RADIUS Configuration. The RADIUS Packet Exchange. IPSec. IPSec and the AH and ESP Operations. IPSec and L2TP. Other References.
6. Other PPP Operations. Recommended Extensions. Vendor Extensions. The OUI. Maximum Receive Unit (MRU). Asynchronous Control Character Map (ACCM). Authentication Protocol. Quality Protocol. Magic Number. Protocol Field Compression (PFC). Address and Control Field Compression. PPP and LAPB. The PPP Reliable Link Operations. Running PPP Over X.25. Running PPP Over ISDN. Running PPP Over SONET. Link Quality Monitoring (LQM). Other PPP Procedures. FCS Alternatives. Self Describing PAD. Numbered Mode. Multilink Procedure. DCE Identifier. Multilink Plus Procedure. Link Discriminator. Network-Layer Protocols.
7. PPP Multilink Protocol (MP). Purpose of the Multilink Protocol (MP). Model for MP. The PPP MP Approach. MP Negotiation During LCP Operations. Rules on the Use of PPP Options. Configuration Options. Packet Formats. Example of MP Operations. Example of Fragment-Loss Detection. Guidance on Buffer-Space Requirements. Protocol Extensions. MP Configuration Option Types. Multilink Maximum Received Reconstructed Unit (MRRU). Short Sequence Number Header Format Option. Endpoint Descriminator Option. PPP Bandwidth Allocation Protocol (BAP) and Bandwidth Allocation Control Protocol (BACP). BACP Operations. BAP Operations.
8. Layer Two Tunneling Protocol (L2TP). Purpose of L2TP. Benefits of L2TP. Terminology Dealing with L2TP. How the Components Fit Together. The L2TP Tunnel and Tunnel Sessions. The L2TP Messages. The L2TP Protocol Stack. The L2TP Header and Messages (AVPs). The Fields Following the Header. The AVPs. Avp Categories. The L2TP Control Messages. Examples of L2TP Operations. Window Management and Accounting for Traffic. Slow Start. Congestion Avoidance. Security Considerations. Tunnel Endpoint Security. L2TP and IPSec. Extensions. Link Extensions.
9. L2TP and Other Protocols and Services. Running L2TP over ATM or Frame Relay. Review of ATM and Frame Relay Excapsulation Procedures. ATM and L2TP. Frame Relay and L2TP. L2TP-Over-IP MTU Path Discovery (L2TPMTU). Review of IP Fragmentation. The Problem and Solution. Problem with MTU Path Discovery on L2TP Tunnels. L2TPMTU Operations. Mobile PPP (MPPP). The Three Methods. IPSec and L2TP. The Compulsory Tunnel. The Voluntary Tunnel. Summary of L2TP Requirements for Security. RADIUS and L2TP. Other Type of Tunnels. Authentication Alternatives. Multiprotocol Label-Switching (MPLS) Extension. Other Drafts of Interest. Alternate Data Channel Extension. L2TP Dynamic Data Window Adjustment. IP Tunnel MIB.
Appendix A: HDLC Overview. Appendix B: The Internet: Architecture. Abbreviations. Index.