[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

PPP/IPSEC Interoperability Workshop



[ NOTICE!  This list will be hosted at lists.tislabs.com as of March 26.
There is no need to resubscribe, if you are on the list, you will remain
on it.  Just begin sending posts, and any administrative requests to
lists.tislabs.com as of now.  List mail to tis.com will cease to be
delivered as of March 26, 1999.  ]

Here is the application for the next PPP/IPSEC Interoperability Workshop.

Please return completed applications to me by email.

We will have this application up on our web site in a few days at
http://www.ciug.org. We are sending the full application to the email lists
in advance of that to give you a chance to register early.

Bob Larribeau
bob@larribeau.com


-----------------------------------------------------------------------
Return your application via email and reserve your hotel rooms before May 3,
1999!

To Networking Product Developers:

Ericsson Datacom Access Products invites you to participate in the VPN
Interoperability Workshop featuring IPSec/IKE, L2TP, and PPP features at
Fess Parker's DoubleTree Resort in Santa Barbara, California.  The VPN
Workshop combines the ninth CalBUG (formerly CIUG) PPP Interoperability
Workshop and the seventh IPSec Interoperability Workshop.

The Workshop will be open to companies with products that implement any of
the following protocols:

IP Security (IPSec)
Internet Key Exchange (IKE)
IP Payload Compression (IPComp)
PPP L2TP over Transport-Mode IPSec
PPP Layer 2 Tunneling Protocol (PPP L2TP) without Flow Control
Compression Control Protocol (CCP) with MPPC and MPPE
MS Challenge Handshake Authentication Protocol (MS CHAP) Version 2
Extensible Authentication Protocol (EAP)
Point to Point Tunneling Protocol (PPTP)
PPP over Ethernet (PPPoE)

The Workshop will provide an opportunity to test the interoperability of
your products with products from all of the other companies attending.

The participating companies are asked to bring products that are released,
at beta or near beta level for the protocols being tested.

Participants are engineering staff intimately familiar with the software and
hardware that implements the capabilities being tested and are expected to
have a thorough understanding of the protocols.

This Workshop will be open to only the participants. This is not a spectator
event; it is not open to observers. Some participants will be working with
unreleased products and the other attendees are expected to respect their
privacy.

SPONSORSHIP:

Ericsson is the host for the VPN Interoperability Workshop.  MCI Worldcom
Advanced Networks will provide the Backbone Test Ethernet and access to the
real Internet.  Madge will provide ISDN lines and CalBUG (formerly CIUG)
will provide infrastructure equipment for the workshop test network.

SCHEDULE:

Sunday, May 23

12:00 Noon to 6:00 PM 	Arrival and Set Up Equipment
5:00 PM - 6:30 PM		Reception

Monday, May 24

7:00 AM to 8:30 AM 	Buffet Breakfast
8:00 AM 			Testing Begins
12:00 Noon 			Lunch
1:00 PM to 8:00 PM 	Testing

Tuesday, May 25

7:00 AM to 8:30 AM 	Buffet Breakfast
8:00 AM to 8:00 PM 	Testing
12:00 Noon 			Lunch

Wednesday, May 26

7:00 AM to 8:30 AM 	Buffet Breakfast
8:00 AM to 8:00 PM 	Testing
12:00 Noon 			Lunch
3:00 PM to 5:00 PM 	Group Meeting
6:00 PM 			Pizza

Thursday, May 27

7:00 AM to 8:30 AM 	Buffet Breakfast
8:00 AM to 8:00 PM 	Testing
12:00 Noon 			Lunch

Friday, May 28

7:00 AM to 8:30 AM 	Buffet Breakfast
8:00 AM to 5:00 PM 	Testing
12:00 Noon 			Box Lunch
3:00 PM 			Break Down Facility

FEES:

The charge for the Workshop is $300 per person.  The fee is for the entire
week and covers the cost of the meals and hotel facility. Each person
attending must pay the full amount. There will be no provision for a daily
rate for those not attending the entire week. Checks, wire transfers, or
credit cards will be accepted. Cash payments are not available. Payment must
be received in advance.   Refunds will not be made for cancellations after
May 10, 1999.  Please fill out and return the payment form with your
payment.

FACILITIES:

Tables and Power:

Each participating company will be provided one table, 5 Amps of power, and
one power strip. Bring additional power strips if you need them. If you know
your test setup will require more than 5 Amps please provide that
information in advance on the application form and it will be available.

Backbone Ethernet Network:

Each participating company will be provided a single RJ-45 cable attached to
the backbone Ethernet network. The backbone Ethernet network will be a
public class C network that is connected to the Internet via a router with
all routes configured statically (no dynamic routing).

In the application you will be asked to specify which of the following
configurations you will need and the quantity. You may request multiple host
or routed network addresses but you must bring your own switches/hubs to
attach more than a single device to the backbone Ethernet network.
Configurations 2 and 3 require you to bring your own router.

Configuration 1:

Host address; a single IP address assigned from the backbone Ethernet
network (a public class C network).

Configuration 2:

Routed private network address; a single IP address assigned from the
backbone Ethernet network (a public class C network) and a private class C
network (to be assigned) with a static route configured in the backbone
router to the single IP address.

Configuration 3:

Routed private and public network addresses; a single IP address assigned
from the backbone Ethernet network (a public class C network) and a private
class C network (to be assigned) and a public subnetwork (/29 subnet address
to be assigned) with a static route for both networks configured in the
backbone router to the single IP address.

Note: you can not reach the Internet with private network addresses. If
these configurations do not satisfy your requirements, please contact James
Matheke at 614-723-1525 or jmatheke@wcom.net.

File Transfer Servers: Servers will be available for file transfers as
defined in the test procedures.

CA Certificates: To arrange certificates with CA providers prior to the
workshop, please go to www.vpnc.org for details.

ISDN Lines: BRI and PRI lines will be provided for testing from a Madge
switch.  The BRI lines will be provisioned as NI-1 with CSV/D on each B
channel.  The BRI lines may be either a U or S/T interface.  There will be a
limited number of PRI lines available. The PRI lines will be assigned to
those companies with products that do not support BRI. If you request a PRI
line, please bring a CSU and the crossover cable to terminate the T1
interface. The PRI lines will be NI-2.

Telephone Service: There will be a telephone on each table in the workshop
for voice service provided by a networked PBX.

SHIPPING EQUIPMENT TO FESS PARKER'S DOUBLETREE RESORT IN SANTA BARBARA,
CALIFORNIA

Participants will be responsible for bringing workstations and network
equipment. You may ship your equipment to:

Attention:  Laurie Nathanson
Your Name, Guest, Ericsson VPN Workshop
Fess Parker's DoubleTree Resort
633 East Cabrillo Boulevard
Santa Barbara, California 93103
805-564-4333

Schedule your equipment to arrive at Fess Parker's DoubleTree Resort between
May 15-22, 1999. Please provide shipping information, such as date shipped,
tracking number, and number of boxes to Fess Parker's DoubleTree Resort so
receipt of your shipment may be confirmed and accepted.

IMPORTANT: Please bring the shipping documents for the return of your
equipment back to your company. These documents include the carrier form.
International shipments must include all appropriate documents, including
carrier forms and invoices.

Additionally, please make arrangements with your carrier in advance for
pickup of the equipment at Fess Parker's DoubleTree Resort on Friday, May
28, 1999.

These two points are very important. Neither Ericsson nor Fess Parker's
DoubleTree Resort will be able to provide shipping forms or customs forms to
you. You have to bring your own. Also neither Ericsson nor Fess Parker's
DoubleTree Resort will be able to store your equipment past May 28, 1999.

ACCOMMODATIONS:

Be sure to register by May 3, 1999, to insure that rooms will be available
for you and your group.  The block of rooms is available at:

Fess Parker's DoubleTree Resort
633 East Cabrillo Boulevard
Santa Barbara, California 93103
805-564-4333

Register under "Ericsson VPN Workshop" to get the Workshop rate of $135.00
plus tax per night.

Rooms are available for check in May 23, 1999 through check out May 28,
1999.  Check in time is 4:00 PM and check out time is 12:00 Noon.

About Fess Parker's DoubleTree Resort: www.fessparkersdoubletree.com

Fess Parker's DoubleTree Resort has many athletic adventures including an
outdoor heated pool and whirlpool, tennis and basketball courts and an
exercise room. There are waterfront running trails and bike and skate paths.
Be sure to bring proper attire to take advantage of these features.

Fess Parker's DoubleTree Resort provides complimentary transportation to and
from the Santa Barbara Airport.  There is an electric bus from the Resort to
downtown Santa Barbara for your local transportation.  The fare is 25 cents.
You may not require a rental car during your stay in Santa Barbara.

Airport Access:

Airline service is available to Santa Barbara (SBA), California.
Alternately, you may fly to Los Angeles (LAX), California and drive
approximately two hours to Santa Barbara.

Directions from Santa Barbara Airport:

-From the airport, turn left onto William Moffet Road (at the curve, the
road becomes Fairview Avenue).
-Stay on Fairview Avenue.  At the overpass, turn right onto the 101 South
onramp.
-Take the 101 freeway south (approximately 13 miles) then exit at Castillo
St, Harbor.
-Stay in the rightmost lane, and turn right at the light onto Castillo.
-Get into the center lane right away and follow is all the way to the end of
Castillo St.
-Turn left onto Cabrillo Bl.
-Follow Cabrillo Bl. along the ocean (about 1 mile) until you get to Calle
Puerto Vallarta. -Turn left on Calle Puerto Vallarta (there is a rainbow
structure in front of the light).
-Your first left is the entrance to the hotel.  It will lead you to the
lobby and parking lot.

Directions from Los Angeles Airport:

-Take Century Boulevard to 405 North, about 2 miles.  Exit in second lane
from right.
-Take 405 North to 101 North, signed to Ventura, about 10 miles.  Exit in
second lane from right.
-Take 101 North through Ventura to Santa Barbara, about 75 miles.
-Exit at Cabrillo Blvd offramp and turn right onto Cabrillo.
-Follow Cabillo Blvd along the ocean (about 1 mile) until you get to Calle
Puerto Vallarta.
 -Turn right on Calle Puerto Vallarta (there is a rainbow structure in front
of the light).
-Your first left is the entrance to the hotel.  It will lead you to the
lobby and parking lot.

PRESS RELEASE:

Ericsson plans to make a press release following the workshop.  There will
be no mention of any specific results of the testing in this release. Please
indicate in the application if you want your company's name included in this
release as a participant. If you include your public relations person in the
application, that contact will be given the opportunity to review the
release in advance.

REGISTRATION:

This will be a "self organizing" event. It will be your responsibility to
develop your own test schedule and to arrange your own testing partners.
This method has worked well in the past and we believe that it provides the
most productive environment for testing. In the application you will be
asked to list the days you will be available for testing. Please be accurate
so everyone has an opportunity to test with you.

Please fill out the Product Section of the application carefully defining
the supported capability list for the protocol options you will test at the
workshop. We will use the information to put together a binder of data to
assist when you are testing with partners.

To register for the VPN Interoperability Workshop fill out the following
application and return it by email immediately to reserve your place. The
email address is <bob@larribeau.com>.

If you have any questions, send email or call

Bob Larribeau, bob@larribeau.com ,  415-241-9920

Based on past workshops, expected attendance is 60 companies.  Get the
reservation in early to assure yourself a place.


------------------------------ PAYMENT FORM----------------------------
PLEASE RETURN THIS APPLICATION VIA EMAIL.

Name: __________________________________

Company: _______________________________

Address: _________________________________

__________________________________________

City, State, Zip ________________________________

Country: _____________________________________

Phone: _________________________________

Fax: ___________________________________

Email: _________________________________

Number of Attendees: _________ x $300.00 = Total Payment $_____________

Refunds will not be made for cancellations after May 3, 1999.

Pay by credit card:

Fill out the form below and fax it to the CalBUG at (415) 753-6942.

Credit Card Type (Circle One):     American Express     Visa

                                   Novus/Discover       Master Charge

                                   JCB

Credit Card Number: ______________________________

Expiration Date: _________________________________

Name: ____________________________________________

Signature: _______________________________________

Pay by check:

Send a check made out to the CalBUG for $300 for each participant to:

California Broadband User's Group, PO Box 27901-391, San Francisco, CA 94127

Wire funds to:

California Broadband Users' Group
Account Number 02882 07752
Bank of America #0288
288 West Portal Avenue
San Francisco, CA 94127 USA
-----------------------------------------------------------------------
APPLICATION

PLEASE RETURN THIS APPLICATION VIA EMAIL.


Please enter the name of the Workshop Coordinator who will coordinate your
registration. We will send emails to this person to give the latest
information on the workshop and to verify your registration.

Name: __________________________________

Address: _________________________________

__________________________________________

City, State, Zip ________________________________

Country: _____________________________________

Phone: _________________________________

Fax: ___________________________________

Email: _________________________________

Do you want your company's name included in the Ericsson press release as a
participant?  Yes or No

Provide the name, address, phone, fax, and email of your public relations
contact. We will give this person an opportunity to review the release in
advance.


Names of ALL Participants (including the Workshop Coordinator listed above
if they will attend):

Name_____________________

Name_____________________

Name_____________________


Days available for testing: M Tu W Th F

Number of tables:

----------------------------------------------------------------------

IP Addresses-

Number of Host addresses (configuration 1):

Number of Routed private network addresses (configuration 2):

Number of Routed private and public network addresses (configuration 3):

Additional Power Requirements:

Number of BRI lines: 1 2 More than 2 (please specify)

S/T or U interface:

PRI (Yes or No):

Additional Madge Switch Requirements:

----------------------------------------------------------------------

Features you will be TESTING:

IPSec (Y/N)

IKE (Y/N)

IP Payload Compression (Y/N)

L2TP over Transport-Mode IPSec (Y/N)

L2TP without Flow Control (Y/N)

CCP with MPPC (Y/N)

CCP with MPPE (Y/N)

MS CHAP Version 2 (Y/N)

EAP (Y/N)

PPTP (Y/N)

PPP over Ethernet (PPPoE) (Y/N)

----------------------------------------------------------------------

Will you be providing:

CA services (Y/N)

For CA service providers, please contact paul.hoffman@vpnc.org to make
arrangements for the participants to reach you prior to the workshop.

For participants, please go to www.vpnc.org for details to arrange CA
services prior to the workshop.

-----------------------------------------------------------------------

Product Functionality Section:

The purpose of this survey is to identify supported features so that vendors
will know who is implementing what, can know who to discuss the detailed
functionality with, and to identify products for more serious compatibility
testing later.

Fill out a Product Section to describe supported features for each device or
software package you will have at the workshop.  If the version is
unreleased, indicate 'alpha', 'beta', RC (release candidate) or build
number.  Options marked with  * are advanced features.

--- 1---
Product Name:

Software Version and OS compatibility:

Product Type, check all that apply:

Router_____ Firewall_____ IPSec Gateway_____ IPSec Host_____

VPN Client Software_____ End to End (Tunnel/Transport) Client_____

Other________________________

--- 2---
Product Name:

Software Version and OS compatibility:

Product Type, check all that apply:

Router_____ Firewall_____ IPSec Gateway_____ IPSec Host_____

VPN Client Software_____ End to End (Tunnel/Transport) Client_____

Other________________________

--- 3---
Product Name:

Software Version and OS compatibility:

Product Type, check all that apply:

Router_____ Firewall_____ IPSec Gateway_____ IPSec Host_____

VPN Client Software_____ End to End (Tunnel/Transport) Client_____

Other________________________


=====IPSEC=====IPSEC=====IPSEC=====IPSEC=====

IPSec manual keys SA configuration (keys, SPI, algorithms) (Y/N)

Minimum key length (Y/N)

If yes, key length________________

AH tunnel (Y/N)

AH transport (Y/N)

ESP tunnel (Y/N)

ESP transport (Y/N)

Transport adjacency: applying more than one security protocol to the same IP
datagram, without invoking tunneling, eg. [IP][AH][ESP][packet payload]
(Y/N)

Nested tunneling from the same box: "Tunneling IPSec in an IPSec tunnel",
eg. [IP][IPSec][IP][IPSec][packet payload] where "[IPSec]" could be "[ESP]"
or "[AH]" or "[AH][ESP]" and where "[packet payload]" could be a ULP or
another entire IP datagram. (Y/N)

Iterated tunneling on same box: "Terminate a tunnel on one interface and
forward the packets out on a different tunnel on a different interface"
(Y/N)

ESP cipher algorithms-

DES-CBC (Y/N)

3DES (Y/N)

NULL encryption (Y/N)

*RC5 (Y/N)

*CAST (Y/N)

*Blowfish (Y/N)

*IDEA (Y/N)

*DES-X (Y/N)

ESP authenticators-

HMAC-MD-5 (Y/N)

HMAC-SHA-1 (Y/N)

*HMAC RIPEMD-160 (Y/N)

AH algorithms-

HMAC-MD-5 (Y/N)

HMAC-SHA-1 (Y/N)

*HMAC RIPEMD-160 (Y/N)

*IPP Compression Protocol-

LZS (Y/N)

DEFLATE (Y/N)

=====IKE=====IKE=====IKE=====IKE===== IKE=====

IKE Exchanges-

Main/Quick mode (identity protect) (Y/N)

*Aggressive mode (Y/N)

*IKE Config (Y/N)

*XAUTH (Y/N)

*DHCP Inform for internal tunnel config (Y/N)

*New Group Mode (Y/N)

IKE Authentication methods-

Preshared keys (Y/N)

Minimum length (Y/N)

If yes, length_____________

*RSA signature (Y/N)

*DSS signature (Y/N)

*RSA Encryption (Y/N)

*Revised RSA encryption (Y/N)

*GSSAPI-Kerberos v5 (Y/N)

IKE Key Material-

Groups supported (1,2,3,4,5,others)__________

*Elliptic Curve Groups_____________

*DH-less IKE_________

Main mode PFS (1 MM per quick mode) (Y/N)

Quick mode PFS (Y/N)

Minimum quickmode lifetime (bytes/secs)_________

IKE Encryption algorithms-

DES (Y/N)

3DES (Y/N)

CAST (Y/N)

RC5 (Y/N)

Blowfish (Y/N)

IDEA (Y/N)

Other__________________

IKE Hash algorithms-

MD-5 (Y/N)

SHA-1 (Y/N)

*HMAC RIPEMD-160 optional (Y/N)

IKE Certificates-

*IKE Certificate Validation (Y/N)

Validate subject name against IPSec policy data (Y/N)

Normal operation requires on-line access to CA for enrollment (Y/N)

Certificate Request Payload (Reqd/Optional/Not Used and
Ignored)______________

*Certificate chains in band, means exchanged in IKE (Y/N)

CRL support (Reqd/Optional/ None)___________

CRL retrieval mechanism (http, file, LDAP)______________

Normal operation (Reqd/Optional/ Don't Care and Not Used) on-line access to
CRL distribution point __________________

 IKE Optional payloads----------------

*IKE Cert types -

CERT (Y/N)

CRL (Y/N)

ARL (Y/N)

PKCS7 (Y/N)

Certificate signature algorithms supported (MD5, SHA1, etc)__________

IPSec only certificate key usage (Reqd/Optional/Don't Care)___________

Other certificate restrictions______________

*IKE Cert request types -

CERT (Y/N)

CRL (Y/N)

ARL (Y/N)

PKCS7 (Y/N)

IKE Other Options-

*Vendor-ID (Y/N)

*Commit bit (Y/N)

*Use quick mode lifetime notifies (Y/N)

*Use Initial Contact (Y/N)

*Send delete payload for quickmode SAs (Y/N)

*Send delete payload for main mode SAs (Y/N)

*CA Interoperability Issues-

*RFC2510 (Y/N)

*PKCS 10/7 (Y/N)

*PKCS #12 (Y/N)

Manual certificate enrollment (Y/N)

*Level of CA hierarchies supported (number levels/No)___________

*Support certs issued by a subordinate CA, which is a child of a different
vendor CA (cross certification) (Y/N)

For IPComp (RFC
2393)---------------------------------------------------------

Compression algorithms-

DEFLATE - RFC 2394 (Y/N)

LZS-RFC 2395 (Y/N)

Negotiation mechanism-

IKE (Y/N)

Manually-configured (Y/N)

Negotiated with-

ESP/AH (Y/N)

Standalone (Y/N)

=====PPP=====PPP=====PPP=====PPP===== PPP=====

LCP Options:

Default MRU__________________________

Default MRRU_________________________

Authentication:

CHAP authenticator (Y/N)

CHAP authenticatee (Y/N)

CHAP Re-challenge (Y/N)

MS CHAP (Y/N)

MS CHAP V2 (Y/N)

Compression:

STAC (Y/N)

STAC DCP (Y/N)

STAC Options _________

MPPC (Y/N)

MPPE (Y/N)

WCP (Y/N)

Predictor (Y/N)

Other__________________

IPCP:

Numbered links (Y/N)

Un-numbered links (Y/N)

Tx if Un-numbered____________

Options supported____________

IP assignment (Y/N)

IP Pool (Y/N)

DHCP (Y/N)

IPXCP:

Numbered links (Y/N)

Un-numbered links (Y/N)

Tx if Un-numbered____________

Options supported____________


=====L2TP=====L2TP=====L2TP=====L2TP=====L2TP=

Provide LAC (Y/N)

Provide LNS (Y/N)

Provide L2TP Client (Y/N)

L2TP Access Concentrator (LAC) Options:

Proxy LCP (Y/N)

Proxy Authentication PAP (Y/N)

Proxy Authentication CHAP (Y/N)

Proxy Authentication MS-CHAP (Y/N)

Tunnel Authentication (Y/N)

Hidden AVPs (Y/N)

Outgoing Calls (Y/N)

Sequencing (Y/N)

L2TPSEC (Y/N)

L2TP secured by IPSec (Reqd/Optional/No)___________

If yes, IKE authentication using identity protect or aggressive
mode__________

If yes, IKE authentication using (machine/user/other) credential___________

If yes, IKE authentication (pre-shared key only/certs
only/both/other)__________

L2TP Network Server (LNS) Options:

Proxy LCP (Y/N)

Proxy Authentication PAP (Y/N)

Proxy Authentication CHAP (Y/N)

Proxy Authentication MS-CHAP (Y/N)

Tunnel Authentication (Y/N)

Hidden AVPs (Y/N)

Outgoing Calls (Y/N)

Sequencing (Y/N)

MP (bundle tunneled links) (Y/N)

ECP (Y/N)

CCP (Y/N)

Algorithms______________________________

CBCP (Y/N)

L2TPSEC (Y/N)

L2TP secured by IPSec (Reqd/Optional/No)___________

If yes, IKE authentication using identity protect or aggressive
mode__________

If yes, IKE authentication using (machine/user/other) credential___________

If yes, IKE authentication (pre-shared key only/certs
only/both/other)__________

Tunnel Types-

Voluntary (Y/N)

Compulsory (Y/N)

Client L2TP Options:

Tunnel Authentication (Y/N)

Hidden AVPs (Y/N)

Outgoing Calls (Y/N)

Sequencing (Y/N)

L2TPSEC (Y/N)

L2TP secured by IPSec (Reqd/Optional/No)___________

If yes, IKE authentication using identity protect or aggressive
mode__________

If yes, IKE authentication using (machine/user/other) credential___________

If yes, IKE authentication (pre-shared key only/certs
only/both/other)__________

=====PPTP=====PPTP=====PPTP=====PPTP=====PPTP=

PAC (Y/N)

PNS (Y/N)

PPTP Client (Y/N)

PPTP Options - PAC:

Outgoing calls (Y/N)

Incoming calls (Y/N)

PPTP secured by IPSec (Reqd/Optional/No)___________

Ring-time tunnel (Y/N)

Username-based tunnel (Y/N)

PPTP Options - PNS:

Outgoing calls (Y/N)

Incoming calls (Y/N)

MP (bundle tunneled links) (Y/N)

MPPE (Y/N)

CCP (Y/N)

Algorithms______________

PPTP secured by IPSec (Reqd/Optional/No)___________

Tunnel types -

Voluntary (Y/N)

Compulsory (Y/N)

PPTP Options - Client:

MPPE (Y/N)

CCP (Y/N)

Algorithms______________

PPTP secured by IPSec (Reqd/Optional/No)___________

=====EAP=====EAP=====EAP =====EAP ===== EAP==

Identity (Y/N)          Number of retries__________

Notification (Y/N)

Nak (response only) (Y/N)

MD5-Challenge (Y/N)

S/Key (RFC 1760) (Y/N)

Generic Token Card (Y/N)

RADIUS EAP-Proxy (Y/N)

Other________________________

=====PPPoE===== PPPoE ===== PPPoE ===== PPPoE ==

Client:

Can select from multiple services (Y/N)

AC-Cookie Tag (Y/N)

Host-Uniq Tag (Y/N)

Relay-Session-Id (Y/N)

PPPoE Active Discovery Terminate (PADT) packet (Y/N)

Server:

Can offer multiple services (Y/N)

 AC-Cookie Tag (Y/N)

Host-Uniq Tag (Y/N)

Relay-Session-Id (Y/N)

PPPoE Active Discovery Terminate (PADT) packet (Y/N)

----------------------------------------------------------------------------
-----------