On Tue, 2002-07-23 at 22:38, David A. Bandel wrote: > OK, the answer will depend on whether you're talking about protocol 1 or > 2. They are different. However, both have similar way to authenticate a > system: I assume protocol 2 is better and I should use only that if possible, right? No prob since the boxes on both ends are identical and support it. Thanks, David. Michael