ISP широкополосная аутентификация пользователя

469
Chandula U

Как провайдер аутентифицирует широкополосного пользователя через свой радиус-сервер или любым другим способом. Смогу ли я найти этот сервер, например, захват пакетов, в режиме полумоста, ip tracert?

Является ли этот сервер моим Широкополосным шлюзом (отображается на странице WAN маршрутизатора)

Спасибо за ваше время

-2

1 ответ на вопрос

0
mikaloyd

I only know how AT&T communicates privately and securely with the coumtless thousands of UVerse gateways(hopefully just to update bios and do connection quality checks, but who knows) in customers homes without undo worries that their clients will be able to hack bug or force their way back upstream to do naughty things . At&T's technique is to own every Gateway that will ever connect to Uverse and to alter it before it connects or is sold to an AT&T customer. All the gateways have individual addesses and individuallly encrypted purpose built channels to AT&Ts two big DNS server complexes. The encryption and coding and secert handshake between the gateways and DNS servers that do the automatic gateway maintenance might be the most secure from outside intrusion network since since wequit talking over two tin cans and a length of string. Its got the keys and encryption and identities and scope of conversation predetermined while the parties involved are still in close contact and identities are not in question, the parties involved are all digital and will never become drunk enough reveal their corporate secrets . Exen if you intercepted their stream you would stoll have a major long term project of decoding the encrtption before it could help you accomplish whatever it is you are considering when you brought up the line tapping. There has to be a nicer way to accomplish your goals than that/