Figure 3: The GRQ message can be used to establish a hash algorithm. Once this algorithm is established, the RRQ/RCF messages are used to validate a client's identity.

Back to Article