Introduction To ISDN, Part III: Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it's important to know you have this option.
Regarding both PAP and CHAP, it's a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication; that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It's more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you'll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username; remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we'll see why in tomorrow's article.
Under the BRI interface, you'll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what's going on "behind the command", and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we'll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
Chris Bryant
CCIE ? #12933
About The Author
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of chris@thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP courses and study aids, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at chris@thebryantadvantage.com
experienced cleaning professionals Northbrook ..Remember nice and prosperous Clinton era? When you implemented innovative... Read More
In the real world a "fire wall" is a fireproof... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
The stakes are high when considering security, privacy, and savings,... Read More
Microsoft Business Solutions Great Plains has Project Accounting module where... Read More
Need help making sense of algebra? Have algebra lectures in... Read More
No matter how much you enjoy your favorite screensavers, sometimes... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Customer Relationship Management or CRM is a combination of enterprise... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
Adware is a type of Spyware program that displays some... Read More
If you are in the market for new staffing software,... Read More
The Internet is reshaping every form of communications medium, and... Read More
XML Server can be a Web Server that stores the... Read More
For a windows user like me, just can watch with... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
This is a short article, written in question/answer/FAQ style to... Read More
First we had the original Google search that evolved into... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More
The vast majority of us will have, at some point,... Read More
In part III of this ISDN primer, we learned that... Read More
Let's say that you have a software project that's under... Read More
Did you ever give a thought to the number of... Read More
best value cleaning service Northbrook ..The purpose of Project Management Software is to provide an... Read More
2005 ? Back to the Future.What does the future hold?... Read More
GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
Are you a database professional? Do you work with a... Read More
Current Microsoft Business Solutions Great Plains has more that 10... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
With thousands of web pages added to the Net every... Read More
OEComplete is a utility for managing the personal information of... Read More
Learning how to program software seems like a daunting task... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Many Webmasters have never bothered to view their website's server... Read More
So, you've bought a new Macintosh, and now you may... Read More
Which Type of Shop Can Rely On A Home Built... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
You probably didn't casually invite, or extend a formal attendance... Read More
If you company is small or mid-size special products or... Read More
Whether you are an experienced web programmer or a complete... Read More
If you have been running Windows XP for a couple... Read More
After almost two decades of existence, Quark has become the... Read More
Research bears that less than 70 percent of development projects... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
| Software |