Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it???s important to know you have this option.
Regarding both PAP and CHAP, it???s a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It???s more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you???ll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we???ll see why in tomorrow???s article.
Under the BRI interface, you???ll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what???s going on ???behind the command???, and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we???ll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
About The Author:
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of http://www.thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP Courses, Flash Card Books, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at http://www.thebryantadvantage.com.
Culver prom limo ..Looks like Microsoft Great Plains becomes more and more popular,... Read More
Crystal Reports is the most flexible tool on the market... Read More
Spyware is like the new technological nuclear weapon on the... Read More
What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More
#5 All your hardware components like Printers, PCs etc come... Read More
Homeland security, airport security, Internet security ??" these days we???re... Read More
Are you lost in the mess of documents that get... Read More
Your computer cost you from hundreds to thousands of dollars,... Read More
CD and DVD replication is a process that works by... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
What is Spyware?Spyware monitors your surfing habits and sends the... Read More
The title of "software engineer" has got to be among... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
I suggest that you do not spend a lot of... Read More
Today's business world is fast-paced. No matter what it is... Read More
Spyware is software or hardware installed on a computer without... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
When it comes to running an office, the SOHO entrepreneur... Read More
When it comes to screenplay software each screenwriter needs to... Read More
Just the thought of a duel-boot scares many people away,... Read More
COMMAND LINE FUNCTIONA powerful command line script processor has been... Read More
Remember back in the days where screensavers were the coolest... Read More
You've finally created databases that you can actually use to... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Wood Dale limo ..If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More
This is the tutorial where we really get into programming.... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More
Microsoft Retail Management System serves retail single store as well... Read More
Considering whether or not your software company should hire a... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
The US House of Representatives has recently passed the "Spy... Read More
If you are to buy a HelpDesk & Asset Management... Read More
Is your PC is slow and wimpy? Then you need... Read More
Software Engineering is the Systematic Approach for analysis design implementation... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
With any good luck and a good amount of hard... Read More
Adobe Photoshop is one of the world's leading graphics editing... Read More
XML Server can be a Web Server that stores the... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
So let's begin crunching down these 300 images using Adobe... Read More
In this small article we will show you the possible... Read More
Microsoft CRM is CRM answer from Microsoft Business Solutions.The whole... Read More
Introduction to C++Why Learn C++?C++ may at first seem like... Read More
Microsoft Great Plains is now standard mid-market ERP application, serving... Read More
Introduction: The creating of a computer program involves a number... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Software |