Skip to main content

Hardware Router Need To Know 2006

ISP Authentication - Other Methods

MAC Address

Anything that has an IP address will have a MAC (Media Access Control) address. MAC addresses are unique to each piece of networking equipment (at least they're supposed to be... more below) and are used in the IP address assignment process. The MAC address (also known as an "Adapter" or "Ethernet" address) is composed of twelve hexadecimal characters. To avoid address duplication, ranges of addresses are assigned to network equipment manufacturers, who are charged with setting up the proper systems to ensure that address assignments are not duplicated.

NOTE: MAC addresses are represented in three common ways. Here's how you would write the same MAC address in those three ways:

MAC addresses are not case sensitive, so the letters that are used (A-F) can be either upper or lower case.

MAC address authentication used to be very commonly used. But routers evolved to allow setting the WAN MAC address to whatever you wanted either by automatically "cloning" the MAC address of a computer that's attached to it, or letting you manually enter the MAC address. This greatly reduced the effectiveness of this authentication method.

Host Name

The Host Name method was used primarily by the now defunct BSP @Home. It requires that the Host Name (Windows calls this the "Computer Name") of the connected computer be set to a specific, long name. Many routers continue to include the ability to set the Host Name, even though @Home has long since gone.

PPTP

Known more as Microsoft's VPN protocol, PPTP authentication is used by some ISPs instead of PPPoE. The setup screens and parameters look very similar to PPPoE.

Telstra Bigpond

Another username / password authentication system used by the large Australian BSP.