Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it???s important to know you have this option.
Regarding both PAP and CHAP, it???s a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It???s more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you???ll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we???ll see why in tomorrow???s article.
Under the BRI interface, you???ll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what???s going on ???behind the command???, and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we???ll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
About The Author:
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of http://www.thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP Courses, Flash Card Books, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at http://www.thebryantadvantage.com.
shuttle to Midway Beardstown .. Lockport Chicago limo O’HareAdware is a type of Spyware program that displays some... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
As we could imagine, if you are reading this article... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
Now that spyware is the single most dangerous threat to... Read More
1. With mapping software you can create a report that... Read More
Have you ever noticed that when you look at your... Read More
We all already got used to computer monitoring both at... Read More
So, why should you use any O/R mapping tool? I... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Program Flow is what you think it is. How the... Read More
Great Plains Integration Manager scripting and translation - overview for... Read More
Not every software testing project can or should be automated.... Read More
Professional services firm cuts costs and improves productivity with integrated... Read More
When Windows fails to boot it is normally caused by... Read More
Microsoft Business Solutions Navision is main ERP application for European,... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
If you feel intimidated when someone tries to teach you... Read More
Whether you are a small consultancy firm, a medium sized... Read More
The software giants don't do everything and don't always produce... Read More
Trying to figure out a stream in banning one email... Read More
Remember back in the days where screensavers were the coolest... Read More
Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More
Green Bay Hummer H2 SUV rentals ..Homeland security, airport security, Internet security ??" these days we???re... Read More
Microsoft Business Solutions Great Plains has many years of successful... Read More
Collaboration SoftwareCollaboration Software, also known as group collaboration software or... Read More
The intentions of this short tutorial are not to teach... Read More
How do you run a program on a remote server... Read More
In a previous article, I wrote about OpenOffice... Read More
#5 All your hardware components like Printers, PCs etc come... Read More
GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More
We were recently faced with a decision: either to let... Read More
Considering whether or not your software company should hire a... Read More
Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More
Intro This concise article will tell you in plain English... Read More
For those who are unclear on the differences between the... Read More
When you first think about multicurrency ? you probably have... Read More
If you have Microsoft Great Plains and support it for... Read More
The Windows Indexing Service provides you with the ability to... Read More
There are certain pluses and minuses in both cases and... Read More
Manufacturing in the USA is far away down from mid... Read More
TikiWiki is open source software - it is written in... Read More
GroupwareThe internet is full of 1.5 million to 7 million... Read More
Program Flow is what you think it is. How the... Read More
Pirated software is on the increase and now accounts for... Read More
Microsoft-Outlook is a pretty amazing program. So much more than... Read More
Buying accounting software is a major investment. It's an important... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
Software |