Home | History | Annotate | Download | only in pppd

Lines Matching full:peer

39 peer and/or supply authentication information to the peer.  PPP can be
46 peer. The string "/dev/" is prepended to \fIttyname\fR to form the
69 Pppd will ask the peer to send these characters as a 2-byte
73 so pppd will ask the peer not to escape any control characters.
77 Require the peer to authenticate itself before allowing network
80 \fInoauth\fR option is specified, pppd will only allow the peer to use
118 Add a default route to the system routing tables, using the peer as
134 (regardless of whether the peer requests them to be escaped with its
159 will ask the peer to send packets of no more than \fIn\fR bytes.
168 peer requests a smaller value via MRU negotiation, pppd will
176 peer, pppd will then just wait passively for a valid LCP packet from
177 the peer, instead of exiting, as it would without this option.
186 option is given). The remote address will be obtained from the peer
190 will not accept a different value from the peer in the IPCP
235 Request that the peer compress packets that it sends, using the
237 agree to compress packets sent to the peer with a maximum code size of
258 If this option is given, pppd will rechallenge the peer every \fIn\fR
279 a valid PPP packet from the peer. At the end of this time, or when a
280 valid PPP packet is received from the peer, pppd will commence
303 Request that the peer compress packets that it sends, using the
305 agree to compress packets sent to the peer with a maximum window size
313 requests Deflate compression in preference to BSD-Compress if the peer
321 connecting to the peer. When traffic is available, pppd will
322 connect to the peer and perform negotiation, authentication, etc.
337 and as the default name to send to the peer when authenticating itself
338 to the peer. This option is privileged.
346 is the device that pppd would be using to communicate with the peer.
354 Sets the endpoint discriminator sent by the local machine to the peer
370 If this option is given and pppd authenticates the peer with EAP
388 Set the maximum time to wait for the peer to send an EAP Request when
411 With this option, pppd will accept the peer's idea of our local IP
415 With this option, pppd will accept the peer's idea of its (remote) IP
464 obtained from the peer. If the peer does not have the network number,
470 node number. The second number \fIm\fR is the peer's node number. Each
474 obtained from the peer.
477 Set the name of the router. This is a string and is sent to the peer
488 Accept the peer's NAK for the node number specified in the ipx\-node
491 will permit the peer to override the entry of the node number.
494 Accept the peer's NAK for the network number specified in the
497 option then you will permit the peer to override the entry of the node
501 Use the peer's network number specified in the configure request
502 frame. If a node number was specified for the peer and this option was
503 not specified, the peer will be forced to use the value which you have
516 local system considers that the peer is not listening to them. The
540 If this option is given, pppd will presume the peer to be dead
551 the peer every \fIn\fR seconds. Normally the peer should respond to
553 with the \fIlcp\-echo\-failure\fR option to detect that the peer is no
576 which instance of pppd is responsible for the link to a given peer
598 Use the system password database for authenticating the peer using
599 PAP, and record the user in the system wtmp file. Note that the peer
658 Enables the use of the PPP multilink protocol. If the peer also
660 the local system and the peer. If there is an existing bundle to the
661 peer, pppd will join this link to that bundle, otherwise pppd will
669 field when looking for a secret to use in authenticating the peer. In
671 will be used as the name to send to the peer when authenticating the
672 local system to the peer. (Note that pppd does not append the domain
680 Do not require the peer to authenticate itself. This option is
689 should only be required if the peer is buggy and gets confused by
717 Disables pppd from sending an endpoint discriminator to the peer or
718 accepting one from the peer (see the MULTILINK section below). This
719 option should only be required if the peer is buggy.
723 only be required if the peer is buggy and gets confused by requests
728 only be required if the peer is buggy and gets confused by requests
734 hostname. With this option, the peer will have to supply the local IP
740 required if the peer is buggy and gets confused by requests from pppd
754 peer is buggy.
820 ask the peer to do so.
824 used for checking the identity of the peer are encrypted, and thus
837 Set the maximum time that pppd will wait for the peer to authenticate
858 Specifies the password to use for authenticating to the peer. Use
875 Request that the peer compress frames that it sends using Predictor-1
889 with the IP address of the peer and the Ethernet address of this
890 system. This will have the effect of making the peer appear to other
905 peer, including those marked in the receive asyncmap. Without this
907 This option should only be needed if the peer is buggy.
929 peer using CHAP.
933 peer using MS\-CHAP.
937 peer using MS\-CHAPv2.
941 peer using EAP.
945 peer using PAP.
948 Require the peer to authenticate itself using CHAP [Challenge
966 Require the peer to authenticate itself using MS\-CHAP [Microsoft Challenge
970 Require the peer to authenticate itself using MS\-CHAPv2 [Microsoft Challenge
974 Require the peer to authenticate itself using EAP [Extensible
978 Require the peer to authenticate itself using PAP [Password
987 connection until a valid LCP packet is received from the peer (as for
992 the peer (i.e., is the server), then pppd will use the optional
1009 file any pseudonym offered by the peer during authentication.
1034 Ask the peer for up to 2 DNS server addresses. The addresses supplied
1035 by the peer (if any) are passed to the /etc/ppp/ip\-up script in the
1039 the address(es) supplied by the peer.
1042 Sets the name used for authenticating the local system to the peer to
1081 addresses the peer may use, based on its authenticated identity (if
1088 The default behaviour of pppd is to allow an unauthenticated peer to
1096 a default route, so the peer will be able to use almost any IP address
1119 Authentication is the process whereby one peer convinces the other of
1120 its identity. This involves the first peer sending its name to the
1123 exchange, we will call the first peer the "client" and the other the
1152 requested, and to not require authentication from the peer. However,
1199 others. When pppd is authenticating the peer (checking the peer's
1200 identity), it chooses a secret with the peer's name in the first
1210 peer, it first determines what name it is going to use to identify
1211 itself to the peer. This name can be specified by the user with the
1215 field and the peer's name in the second field. Pppd will know the
1216 name of the peer if CHAP or EAP authentication is being used, because
1217 the peer will have sent it in the challenge packet. However, if PAP
1218 is being used, pppd will have to determine the peer's name from the
1219 options specified by the user. The user can specify the peer's name
1222 name will be used as the peer's name. Failing that, pppd will use the
1223 null string as the peer's name.
1225 When authenticating the peer with PAP, the supplied password is first
1229 peer can be stored in encrypted form if desired. If the
1239 password supplied by the peer. This avoids the need to have the same
1243 other Network Control Protocol) can be started. If the peer is
1252 authentication. If the peer refuses to authenticate itself when
1289 the interface (for example when the peer is an ISP that uses dynamic
1302 peer as another link using the peer's endpoint discriminator and the
1303 authenticated identity of the peer (if it authenticates itself). The
1305 for each peer. Several types of data can be used, including
1308 discriminator sent to the peer by pppd can be set using the endpoint
1311 In some circumstances the peer may send no endpoint discriminator or a
1313 added to the peer's endpoint discriminator and authenticated identity
1316 between the local system and the peer. Pppd uses a TDB database in
1319 Assuming that multilink is enabled and the peer is willing to
1321 link to the peer, it will detect that no other link is connected to
1322 the peer and create a new bundle, that is, another ppp network
1324 to the peer, it will detect the existing bundle and join its link to
1453 established and terminated at the peer's request.
1492 The peer system failed (or refused) to authenticate itself.
1506 The link was terminated because the peer is not responding to echo
1519 We failed to authenticate ourselves to the peer.
1549 The authenticated name of the peer. This is only set if the peer
1580 If the peer supplies DNS server addresses, this variable is set to the
1584 If the peer supplies DNS server addresses, this variable is set to the
1594 \fIinterface\-name peer\-name user\-name tty\-device speed\fR
1596 Note that this script is not executed if the peer doesn't authenticate
1712 permit non-privileged users to dial out without requiring the peer to