Introduction To ISDN, Part III: Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it's important to know you have this option.
Regarding both PAP and CHAP, it's a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication; that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It's more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you'll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username; remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we'll see why in tomorrow's article.
Under the BRI interface, you'll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what's going on "behind the command", and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we'll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
Chris Bryant
CCIE ? #12933
About The Author
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of chris@thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP courses and study aids, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at chris@thebryantadvantage.com
cleaning service near Deerfield ...Usually workflow & messaging is realized in CRM and then... Read More
Let's first look at your ERP system selection (without Retail... Read More
Microsoft Business Solutions Great Plains, Navision, Axapta, Solomon and CRM... Read More
The term "document management" and "paperless office" is the subject... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
If you have Microsoft Great Plains as main accounting and... Read More
TikiWiki is open source software - it is written in... Read More
With any good luck and a good amount of hard... Read More
It could just be me, but my experiences with document... Read More
In this small article we will be looking at the... Read More
Sometimes your PC will start acting strange for no apparent... Read More
While Adobe is the most known maker of PDF tools,... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
If you company is small or mid-size special products or... Read More
In a previous article, I wrote about OpenOffice... Read More
Navision Software was purchased by Microsoft and now it is... Read More
Microsoft Business Solutions ? Navision is an integrated solution for... Read More
I have yet to see a business that, sometimes in... Read More
Having from five to ten and more favorite screensavers is... Read More
Logistics automation is often considered as barcoding extension to Sales... Read More
An operating system (abbreviated OS) is essentially the path through... Read More
Usually, the easiest way to tell you have spyware is... Read More
For those who are unclear on the differences between the... Read More
Almost all new and major brand of PCs come with... Read More
high-end home cleaning Glencoe ...Spyware, what it is and what it does. Basically, spyware... Read More
The software giants don't do everything and don't always produce... Read More
During the years of our consulting practice, which comes back... Read More
The Microsoft system preparation utility for Windows 2000 is a... Read More
Follow the steps below to quickly design, generate, and deploy... Read More
Spyware and malware are large problems for Internet users today... Read More
Microsoft Business Solutions Great Plains might be considered as ERP... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
We all take the computer for granted. I mean, all... Read More
Now that spyware is the single most dangerous threat to... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
Not every software testing project can or should be automated.... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
If there still are few unprotected computers left, I haven't... Read More
Learning how to program software seems like a daunting task... Read More
There are so many different programs that clutter up your... Read More
Great Plains Integration Manager scripting and translation - overview for... Read More
Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More
Best Software Act! is very popular CRM for small and... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Microsoft CRM is winning market share step-by-step from such the... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
Do you remember that frustrating feeling when you find an... Read More
MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Software |