Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it???s important to know you have this option.
Regarding both PAP and CHAP, it???s a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It???s more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you???ll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we???ll see why in tomorrow???s article.
Under the BRI interface, you???ll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what???s going on ???behind the command???, and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we???ll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
About The Author:
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of http://www.thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP Courses, Flash Card Books, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at http://www.thebryantadvantage.com.
licensed cleaning services Park Ridge ..This article will not attempt to advocate the use of... Read More
GroupwareThe internet is full of 1.5 million to 7 million... Read More
Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
A LOT OF UNWANTED FILES.When you uninstall an item of... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
Adware is a type of Spyware program that displays some... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
Now there are Three Steps To Heaven Just listen and... Read More
In our opinion, traditional approach when you select ERP/MRP system... Read More
We were recently faced with a decision: either to let... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
Some companies that are in need of fleet management may... Read More
It's not very often I get excited about a software... Read More
Are you ready? SQL Server 2005, the next-generation data management... Read More
Did you ever give a thought to the number of... Read More
Microsoft CRM is now on the scene and it is... Read More
The cornerstone of successful automated office systems is the ability... Read More
There are certain pluses and minuses in both cases and... Read More
We all already got used to computer monitoring both at... Read More
Microsoft Great Plains has substantial mid-market share in the USA... Read More
There are several kinds of software piracy. The bottom line... Read More
The US House of Representatives has recently passed the "Spy... Read More
on demand house cleaning Arlington Heights ..Microsoft Business Solutions ? Great Plains is designed to meet... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
There are two major WYSIWYG(What You See Is What You... Read More
It won't matter how effective your WinRunner Team is if... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft Office program is a programming tool called Visual Basic... Read More
Fundraising software lets you connect with donors in a way... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
When reading an article where some term is used often,... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
While paper labeling CDs and DVDs may appear to be... Read More
Pirated software is on the increase and now accounts for... Read More
.NET platform does not support multiple inheritance. Do not confuse... Read More
First we had the original Google search that evolved into... Read More
Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More
How would you like to prevent spyware and adware from... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
With many manufacturing shops heading over seas in favor of... Read More
TikiWiki is open source software - it is written in... Read More
Scrapbooks are very popular these days. I think that almost... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
Following tips help you to learn a software in lesser... Read More
After seeing many people complain about their weak Internet security... Read More
Navision Software was purchased by Microsoft and now it is... Read More
Have you ever noticed that when you look at your... Read More
Software |