1,289
16
Essay, 6 pages (1500 words)

The point-to-point tunneling protocol (pptp)

Our Research paper provides details on point-to-point tunneling protocol (PPTP). PPTP is used in remote connections and VPN connections. Organizations can use internet securely with PPTP and this type of connection is VPN. PPTP is very simple for implementation from end users perspective. PPTP needs basic encryption and so it is faster. PPTP supports multiprocessor communication.

PPTP is very simple for implementation from end users perspective. It satisfies users from cost perspective along with technical satisfaction. How does It comfort remote users to achieve their goal? Focuses on history of PPTP and how Microsoft implemented the protocol in Windows NT 4. 0 Structure and message format of PPTP is detailed like PPTP as an extension of APP is not similar to it. PPTP is the layer of OSI model.

PPTP secures APP through encryption and enclosing. PPTP server interfaces on internet and intranet. How PPTP is used as a protection device for data and is safe to transmit sensitive data in an encrypted format (Yates, 1997). Message format and types of messages.

All the services which PPTP provides and its working style. Types of deployment in PPTP are discussed. PPTP supports client server del. Technical specification of PPTP is detailed in RFC 2637.

The goal of this paper is to detail all the important aspects of PPTP including history, structure, working and services provided by PPTP. History: PPTP protocol came into existence through Microsoft organization (Coffee, 2003). PPTP protocol was inserted in Windows NT 4. 0 and now it is available in Windows. In the protocol stack of data link layer there is a window IT which encapsulated the IP packets which are previously encrypted IP packets. These encrypted packets are in Point-to-point Protocol.

The resultant IP jackets which are encrypted and encapsulated are again encapsulated by ISP server and now output is routed to the destination. The last mentioned process in which encapsulating IP packets of other protocols and is sent for destination is called tunneling. In order for PPTP protocol to be implemented Microsoft uses the entire password which is clear, passwords which are hashed and CHAP for authentication. Data encryption length varies from 40 or 128 bit in Microsoft Point-to-Point Encryption. PPTP protocol is used in remote access due to increase in demand. PPTP protocol is widely used in large numbers. For machines with operating system windows, PPTP protocol is zero cost (Coffee, 2003).

Mostly used for secure intranets. Initially after dialing a local ISP then build a APP session to connect for remote access. Now the other dial-up session is originated with a destination specified by an IP address. IP address through which connection established is the address of PPTP server in your organization. Now the data which is moving in the connection will be encrypted.

Protocol Definition: Point-to-Point Tunneling Protocol (PPTP) is a neuron protocol that enables the secure transfer of data from a remote client to a private enterprise server y creating a virtual private network (VPN) across TCP/lap-based data networks, usually using an ISP. The PPTP supports on-demand multi-protocol and virtual private networking over public networks such as the Internet. The PPTP is an extension of the remote access Point-to-Point protocol defined by the Internet Engineering Task Force (IETF), that is entitled The Point-to-Point Protocol for the Transmission of Mufti-protocol Datagram’s over Point-to-point Links. The PPTP is a network protocol that encapsulates APP packets into IP datagram’s for transmission over the Internet or other public TCP/lap-based outworks. The PPTP can also be used in private LANA-to- LANA networking. PPTP structure and message format: Encrypted IP header GREG header app header APP payload ( IP datagram ) app Frame PPTP is an addition of app. The foremost chore of PPTP is that is first encrypts and then encloses in an IP header. Now the resultant is send over the internet.

PPTP is used by organizations for remote access connections and VPN connections in order to save the cost. PPTP plays two major roles when using the internet, PPTP server is a VPN server with interfaces on internet and intranet (Salmon, 1999). PPTP protocol encapsulates APP payload in IP datagram’s and will send over the internet. PPTP uses tunnel management and Generic routing encapsulation for encapsulating APP payload.

APP payload is encrypted or else compressed. APP frame is now encrypted with keys. Facts regarding encryption and tunnel protocol are in GREG header. PPTP message format is defined in RFC 2637.

PPTP messages are directed as TCP data maintaining a control connection between PENS and PACT. TCP connection is established by initiating a connection with port 1723. Magic cookie is maintained a constant Sol BABCOCK.

Length Message Type Magic cookie Data PPTP message starts with fixed header of length 8 octet. The length of PPTP header is 16 bits. Message type Indicator of PPTP header is 16 bits which contains control message and management message.

Management message is not defined. Magic cookie is of 32 bit length. Magic cookie is a constant “ Sol BABCOCK” eternally. Its main task is to make sure that the receiver and TCP data stream are perfectly synchronized. If the message format is not perfect then same should not be used for resynchronization instead TCP connection should be closed if there is a resynchronization. Data is 32 bits in length. Services: Point-To-Point was the first VPN protocol that was supported by Microsoft Dial-up Invoking. Releases of Microsoft Windows since Windows 95 SORT are bundled with a PPTP client, even though they are limited to only 2 concurrent outbound connections.

The Microsoft Windows Mobile 2003 and higher also supports the PPTP. The Routing and Remote Access Service for Microsoft Windows contains a PPTP server (Salmon, 1999). Microsoft implementation uses single DES in the MS-CHAP authentication protocol which many find unsuitable for the needs of data protection. Windows Vista and later support the use of PEEP with PPTP. Authentication mechanisms supported are Pea/EPA-Mishap’s (passwords) and PEEP- TLS (smarted and certificates).

The Windows Vista removed support for using the MISHAP-v protocol to authenticate connections for remote access. Linux server-side support for PPTP is provided by the potty daemon and kernel modules for APP and MOPE. The client-side Linux implementations of PPTP appeared in 1997 but the first widely used server-side Linux PPTP implementation was developed by Matthew Ramsey in 1999 and initially strutted under the GNU GPO by Morton Bay. Linux distributions initially lacked full PPTP support because MOPE was believed to be patent encumbered. Complete MOPE support was added to the Linux kernel in the 2. 6. 14 release on October 28(2005).

The Use Linux 10 was the first Linux distribution to provide a PPTP client with complete working. There is also EXCEL-APP – PPTP/LOTT/EPEE server for Linux , which supports PPTP in kernel-mode. The Opens and Breeds both include Pop Top in their ports trees. SO X and ISO include a built-in PPTP client and SO X Server includes a PPTP service. The Cisco and Efficient Networks sell PPTP clients for older releases Mac SO releases. The Palm PDA devices with Wi-If are bundled with the Merger PPTP client. Android and Windows as the operating system also supports PPTP.

Up-RPR Working: The PPTP protocol is included with Microsoft WindowsServer version 4. 0, the Microsoft Windows NT Workstation version 4. 0 Operating systems, Microsoft Windows 95 and 98. The computers running these operating systems can use the PPTP protocol to securely connect to a private network as a remote access client by using a public data network. PPTP can also be seed by computers connected to a Local Area Network (CAN) to create a virtual private network across the LANA. Usually, there are three computers involved in every PPTP deployment: a PPTP client a network access server a PPTP server For connecting to a PPTP server on a CAN, one does not need the network access server to create a PPTP tunnel if the PPTP client is connected to the same LANA. A typical deployment of PPTP starts with a remote or mobile PPTP client that needs access to a private enterprise LANA by using a local Internet Service Provider.

The clients using computers running Microsoft Windows NT Server or Microsoft Workstation version 4. Or Microsoft Windows 95 or 98 use dial-up Networking and the remote access protocol APP to connect to an ISP. A client connects to a network access server (NAS) at the ISP facility dial- in or point-of- presence (POP) servers. If once connected, the client can send and receive packets over the Internet. Network access server uses the Transport Control Protocol/Lenten Protocol (TCP/IP) protocol for all traffic to the Internet. After the client has made the initial APP connection to the ISP, a second Dial-Up Networking “ call” (the “ call” specifies the IP address of thePPTP Server) is made over the existing APP connection.

The data sent using this second connection is in the form of IP datagram’s that contain APP packets, called as encapsulated APP packets. Second call creates the virtual private networking (VPN) tunnel connection to a PPTP server that resides on the private enterprise I-AN. Usually, users will have two phones icons on their desktops to accomplish these two connections. Conclusions: Even though there are contemporary versions of PPTP still it is used in windows world unequivocally. PPTP creates Van’s through Internet and increases savings for admit (Yates, 1997).

Thank's for Your Vote!
The point-to-point tunneling protocol (pptp). Page 1
The point-to-point tunneling protocol (pptp). Page 2
The point-to-point tunneling protocol (pptp). Page 3
The point-to-point tunneling protocol (pptp). Page 4
The point-to-point tunneling protocol (pptp). Page 5
The point-to-point tunneling protocol (pptp). Page 6
The point-to-point tunneling protocol (pptp). Page 7

This work, titled "The point-to-point tunneling protocol (pptp)" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'The point-to-point tunneling protocol (pptp)'. 17 November.

Reference

AssignBuster. (2021, November 17). The point-to-point tunneling protocol (pptp). Retrieved from https://assignbuster.com/the-point-to-point-tunneling-protocol-pptp/

References

AssignBuster. 2021. "The point-to-point tunneling protocol (pptp)." November 17, 2021. https://assignbuster.com/the-point-to-point-tunneling-protocol-pptp/.

1. AssignBuster. "The point-to-point tunneling protocol (pptp)." November 17, 2021. https://assignbuster.com/the-point-to-point-tunneling-protocol-pptp/.


Bibliography


AssignBuster. "The point-to-point tunneling protocol (pptp)." November 17, 2021. https://assignbuster.com/the-point-to-point-tunneling-protocol-pptp/.

Work Cited

"The point-to-point tunneling protocol (pptp)." AssignBuster, 17 Nov. 2021, assignbuster.com/the-point-to-point-tunneling-protocol-pptp/.

Get in Touch

Please, let us know if you have any ideas on improving The point-to-point tunneling protocol (pptp), or our service. We will be happy to hear what you think: [email protected]