SlideShare a Scribd company logo
1 of 18
Security Level:
Zeeshan Javaid CS- Access Network
PPPOE Packet flow and HSI’ Service Troubleshooting
Contents
1. Point to Point protocol
2. Point to Point over Ethernet
3. PPPoE Characteristics
4. PPPOE Packet Flow
5. Operational Description of PPPoE
6. Troubleshooting Discovery part in Access Network
7. Real Time Packet Flow
• PPP is a point-to-point protocol, meaning that one node
can access only one another specified node.
• PPP is located at the second layer of the Open Systems
Interconnection (OSI) reference model and the data link
layer of the TCP/IP model.
• An important function of PPP is identity authentication
for both communication parties, it does not provide
address information. Because Ethernet is a broadcast
multi-access network, PPP cannot be directly applied to
Ethernet links.
Point-to-Point Protocol
Huawei Proprietary - Restricted Distribution
4
• Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication
between network endpoints.
• PPPoE encapsulates Point-to-Point Protocol (PPP) frames inside Ethernet frames, offering the same
benefits as PPP, while providing connectivity across Ethernet networks.
Point-to-Point Protocol over Ethernet (PPPoE)
Huawei Proprietary - Restricted Distribution
5
• PPPoE provides the following characteristics:
• In terms of functions:
• PPPoE integrates the advantages of PPP and implements functions such as identity authentication,
encryption, and compression unsupported by traditional Ethernet.
• PPPoE uses unique session IDs to ensure user security.
• In terms of applications:
• PPPoE dial-up is the most common method of enabling terminals to connect to the ISP network
for broadband access.
• PPPoE can be used on Ethernet cables, such as cable modems and digital subscriber lines (DSLs), to
provide access services for users through Ethernet protocols.
PPPoE Characteristics
Huawei Proprietary - Restricted Distribution
6
• A PPPoE packet is a PPP packet encapsulated in an Ethernet frame
PPPoE Packet Flow
Huawei Proprietary - Restricted Distribution
7
PPPoE
Huawei Proprietary - Restricted Distribution
8
• Discovery
• Session
• Termination
• Discovery
• PADI is the initialization message sent by the Client
as broadcast to discover if are there any Server.
• PADO is the answer of the Servers available as
unicast to the requested Client.
• PADR is the selection message of Client. This
message is sent to the selected Server.
• PADS is the set up message sent by Server.
Session ID is sent in this last stage and the Session
is established.
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
9
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
10
• Session
• LCP Negotiation
• The PPPoE client and PPPoE server send LCP
Configure-Request packets to each other.
• After receiving the Configure-Request packet, the
client and server respond based on the negotiation
options in the packet.
• If both ends reply with a Configure-ACK packet,
the LCP link is successfully established. Before this
occurs, both ends keep sending LCP Configure-
Request packets.
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
11
• LCP Negotiation
> If both ends reply with a Configure-ACK packet within
the specified LCP negotiation interval and before the
timer for LCP negotiation expires, the LCP link is
successfully established.
> If no Configure-ACK packet is received before the
timer for LCP negotiation expires, LCP negotiation is
terminated.
• After the LCP link is established, the PPPoE server
periodically sends LCP Echo-Request packets to
the PPPoE client and receives Echo-Reply packets
from the PPPoE client to check whether the LCP
link is normal.
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
12
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
13
• PAP authentication
• PAP is a two-way handshake protocol that authenticates users
based on usernames and passwords. The usernames and
passwords are transmitted in cleartext. The PPPoE server (or
RADIUS server) checks whether the usernames and passwords
are correct based on the local user table. This mode applies to
environments with low network security requirements.
• CHAP authentication
• CHAP authentication is a three-way handshake protocol. It can
be used by the PPPoE server (or RADIUS server) to check
whether the username and password are correct based on the
local user table. In CHAP authentication mode, only the
username (and not the user password) is transmitted over the
network. As such, CHAP authentication is more secure than
PAP authentication.
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
14
• NCP negotiation mainly deals with network-layer parameters,
such as IPCP and IPv6CP, in PPP packets. A PPPoE client mainly
uses IPCP to obtain the IP address or IP address segment for
network access.
• The NCP negotiation process is similar to the LCP negotiation
process. After NCP negotiation succeeds, the PPPoE client can
normally access the network.
Operational Description of PPPoE
Huawei Proprietary - Restricted Distribution
15
• Customer Reported NO MAC Address learnt from All
ports.
• Following commands can be used to check the PPPOE
statistics
• For example the service port index is 0
Troubleshooting Discovery Part
Huawei Proprietary - Restricted Distribution
16
• To Verify this we captured the packet on uplink port.
Troubleshooting Discovery Part
Huawei Proprietary - Restricted Distribution
17
• PPPOE Can be simulated by using following commands at NE Level
PPPOE Simulation
Copyright©2018 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Bring digital to every person, home and
organization for a fully connected,
intelligent world.
Thank you.

More Related Content

Similar to PPPOE.pptx

CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxVishalThakor19
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkIRJET Journal
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaNitish Jadia
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Đồng Quốc Vương
 
ETE405-lec9.pdf
ETE405-lec9.pdfETE405-lec9.pdf
ETE405-lec9.pdfmashiur
 
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021StreamNative
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPROIDEA
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3Chaing Ravuth
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocolamigurumi21
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsAnuj Parajuli
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3Waqas Ahmed Nawaz
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsGayathri Kesavan
 

Similar to PPPOE.pptx (20)

CNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptxCNv6_instructorPPT_Chapter3.pptx
CNv6_instructorPPT_Chapter3.pptx
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
 
ETE405-lec9.pdf
ETE405-lec9.pdfETE405-lec9.pdf
ETE405-lec9.pdf
 
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021
Deep Dive into the Pulsar Binary Protocol - Pulsar Virtual Summit Europe 2021
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
Protocol.ppt
Protocol.pptProtocol.ppt
Protocol.ppt
 
CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3CCNA4 Verson6 Chapter3
CCNA4 Verson6 Chapter3
 
Point to-point-protocol
Point to-point-protocolPoint to-point-protocol
Point to-point-protocol
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
Ali shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1XAli shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1X
 
PPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & CharacteristicsPPP(Point-to-Point Protocol): Components & Characteristics
PPP(Point-to-Point Protocol): Components & Characteristics
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
CCNA (R & S) Module 02 - Connecting Networks - Chapter 3
 
Networking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol FunctionsNetworking- OSI Layer Protocol Functions
Networking- OSI Layer Protocol Functions
 
Vpn protocols
Vpn protocolsVpn protocols
Vpn protocols
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

PPPOE.pptx

  • 1. Security Level: Zeeshan Javaid CS- Access Network PPPOE Packet flow and HSI’ Service Troubleshooting
  • 2. Contents 1. Point to Point protocol 2. Point to Point over Ethernet 3. PPPoE Characteristics 4. PPPOE Packet Flow 5. Operational Description of PPPoE 6. Troubleshooting Discovery part in Access Network 7. Real Time Packet Flow
  • 3. • PPP is a point-to-point protocol, meaning that one node can access only one another specified node. • PPP is located at the second layer of the Open Systems Interconnection (OSI) reference model and the data link layer of the TCP/IP model. • An important function of PPP is identity authentication for both communication parties, it does not provide address information. Because Ethernet is a broadcast multi-access network, PPP cannot be directly applied to Ethernet links. Point-to-Point Protocol
  • 4. Huawei Proprietary - Restricted Distribution 4 • Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol that facilitates communication between network endpoints. • PPPoE encapsulates Point-to-Point Protocol (PPP) frames inside Ethernet frames, offering the same benefits as PPP, while providing connectivity across Ethernet networks. Point-to-Point Protocol over Ethernet (PPPoE)
  • 5. Huawei Proprietary - Restricted Distribution 5 • PPPoE provides the following characteristics: • In terms of functions: • PPPoE integrates the advantages of PPP and implements functions such as identity authentication, encryption, and compression unsupported by traditional Ethernet. • PPPoE uses unique session IDs to ensure user security. • In terms of applications: • PPPoE dial-up is the most common method of enabling terminals to connect to the ISP network for broadband access. • PPPoE can be used on Ethernet cables, such as cable modems and digital subscriber lines (DSLs), to provide access services for users through Ethernet protocols. PPPoE Characteristics
  • 6. Huawei Proprietary - Restricted Distribution 6 • A PPPoE packet is a PPP packet encapsulated in an Ethernet frame PPPoE Packet Flow
  • 7. Huawei Proprietary - Restricted Distribution 7 PPPoE
  • 8. Huawei Proprietary - Restricted Distribution 8 • Discovery • Session • Termination • Discovery • PADI is the initialization message sent by the Client as broadcast to discover if are there any Server. • PADO is the answer of the Servers available as unicast to the requested Client. • PADR is the selection message of Client. This message is sent to the selected Server. • PADS is the set up message sent by Server. Session ID is sent in this last stage and the Session is established. Operational Description of PPPoE
  • 9. Huawei Proprietary - Restricted Distribution 9 Operational Description of PPPoE
  • 10. Huawei Proprietary - Restricted Distribution 10 • Session • LCP Negotiation • The PPPoE client and PPPoE server send LCP Configure-Request packets to each other. • After receiving the Configure-Request packet, the client and server respond based on the negotiation options in the packet. • If both ends reply with a Configure-ACK packet, the LCP link is successfully established. Before this occurs, both ends keep sending LCP Configure- Request packets. Operational Description of PPPoE
  • 11. Huawei Proprietary - Restricted Distribution 11 • LCP Negotiation > If both ends reply with a Configure-ACK packet within the specified LCP negotiation interval and before the timer for LCP negotiation expires, the LCP link is successfully established. > If no Configure-ACK packet is received before the timer for LCP negotiation expires, LCP negotiation is terminated. • After the LCP link is established, the PPPoE server periodically sends LCP Echo-Request packets to the PPPoE client and receives Echo-Reply packets from the PPPoE client to check whether the LCP link is normal. Operational Description of PPPoE
  • 12. Huawei Proprietary - Restricted Distribution 12 Operational Description of PPPoE
  • 13. Huawei Proprietary - Restricted Distribution 13 • PAP authentication • PAP is a two-way handshake protocol that authenticates users based on usernames and passwords. The usernames and passwords are transmitted in cleartext. The PPPoE server (or RADIUS server) checks whether the usernames and passwords are correct based on the local user table. This mode applies to environments with low network security requirements. • CHAP authentication • CHAP authentication is a three-way handshake protocol. It can be used by the PPPoE server (or RADIUS server) to check whether the username and password are correct based on the local user table. In CHAP authentication mode, only the username (and not the user password) is transmitted over the network. As such, CHAP authentication is more secure than PAP authentication. Operational Description of PPPoE
  • 14. Huawei Proprietary - Restricted Distribution 14 • NCP negotiation mainly deals with network-layer parameters, such as IPCP and IPv6CP, in PPP packets. A PPPoE client mainly uses IPCP to obtain the IP address or IP address segment for network access. • The NCP negotiation process is similar to the LCP negotiation process. After NCP negotiation succeeds, the PPPoE client can normally access the network. Operational Description of PPPoE
  • 15. Huawei Proprietary - Restricted Distribution 15 • Customer Reported NO MAC Address learnt from All ports. • Following commands can be used to check the PPPOE statistics • For example the service port index is 0 Troubleshooting Discovery Part
  • 16. Huawei Proprietary - Restricted Distribution 16 • To Verify this we captured the packet on uplink port. Troubleshooting Discovery Part
  • 17. Huawei Proprietary - Restricted Distribution 17 • PPPOE Can be simulated by using following commands at NE Level PPPOE Simulation
  • 18. Copyright©2018 Huawei Technologies Co., Ltd. All Rights Reserved. The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice. Bring digital to every person, home and organization for a fully connected, intelligent world. Thank you.