A
Glossary of Terms
191
MD5
Message
Digest
5.
A
message
‐
digest
algorithm
developed
by
Ron
Rivest
of
RSA
Security.
It
computes
a
secure,
irreversible,
cryptographically
strong
128
‐
bit
hash
value
for
a
document.
The
algorithm
is
documented
in
RFC
1321.
MS
‐
CHAP
v1
Microsoft
Challenge
Handshake
Authentication
Protocol
version
1.
Authentication
for
PPP
connections
between
a
computer
using
a
Microsoft
Windows
operating
system
and
a
network
access
server
(NAS).
MS
‐
CHAP
v2
See
MS
‐
CHAP
v1.
MPPE
Microsoft
Point
‐
to
‐
Point
Encryption.
Protocol
which
provides
confidentiality
to
the
tunneling.
MPPE
may
be
used
with
PPTP
to
support
an
encrypted
data
tunnel.MPPE
uses
the
RSA
RC4
algorithm
for
encryption
and
supports
40
‐
bit,
56
‐
bit
and
128
‐
bit
session
keys,
which
are
changed
frequently
to
ensure
security.
NAT
‐
T
NAT
‐
Traversal
IPsec
and
NAT
do
not
normally
work
together,
as
IPsec
consider
the
packet
processing
of
NAT
as
a
violation
of
communications
integrity.
NAT
‐
Traversal
works
by
encapsulating
the
IPsec
packets
into
UDP
envelopes
that
contain
information
on
recreating
the
IPsec
packet.
The
UDP
traffic
follows
the
same
route
as
the
IKE
negotiation.
NCP
Network
Control
Protocols.
(NCPs)
can
be
used
to
transport
traffic
for
a
particular
protocol
suite,
so
that
multiple
protocols
can
interoperate
on
the
same
link,
for
example,
both
IP
and
IPX
traffic
can
share
a
PPP
link.
PAP
Password
Authentication
Protocol.
PAP
is
a
plaintext
authentication
scheme
by
requesting
and
sending
user
name
and
password
in
plaintext.
Path
MTU
Path
Maximum
Transfer
Unit.
Different
from
the
MTU
in
the
sense
that
Path
MTU
is
bound
to
the
source
and
destination
addresses
of
the
network.
Path
MTU
discovery
is
discussed
in
RFC
1191.
PBR
Policy
Based
Routing
is
an
extension
to
normal
routing
which
offers
network
administrators
significant
flexibility
to
implement
their
own
defined
policies
on
making
routing
decisions.