Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it???s important to know you have this option.
Regarding both PAP and CHAP, it???s a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It???s more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you???ll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we???ll see why in tomorrow???s article.
Under the BRI interface, you???ll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what???s going on ???behind the command???, and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we???ll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
About The Author:
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of http://www.thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP Courses, Flash Card Books, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at http://www.thebryantadvantage.com.
efficient cleaning crew Northbrook ..Microsoft Great Plains might be considered as ERP platform to... Read More
Adware is a type of Spyware program that displays some... Read More
Did you ever want to erase everything on your computer?... Read More
If your company has regional and worldwide operations, you might... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
Manufacturing in the USA is far away down from mid... Read More
In this short FAQ style article we would like to... Read More
When you need a phone number, you do a quick... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
Microsoft Great Plains, designed back in 1990th as database transferable... Read More
NOTE: Please take time to read on - it may... Read More
Customer Relationship Management or CRM is a combination of enterprise... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Spyware, what it is and what it does. Basically, spyware... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More
What is Tripwire?Tripwire is a form intrusion detection system (IDS)... Read More
Considering whether or not your software company should hire a... Read More
No matter how much you enjoy your favorite screensavers, sometimes... Read More
Music downloads are off the charts! We're listening to digital... Read More
Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More
This article is the fourth of a series of articles... Read More
cleaning lady near Wilmette ..It's no secret that software companies operate in a very... Read More
As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into... Read More
Microsoft Outlook is one of the most widely used software... Read More
Customer Relationship Management (CRM) is a strategy and processes used... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
Microsoft Business Solutions ? Navision is an integrated solution for... Read More
Every organization which creates collaborative documents, whether they are budgets,... Read More
It won't matter how effective your WinRunner Team is if... Read More
Many reasons made GBM a unanimous choice for experts, one... Read More
Icons are used everywhere; right from software applications, to internet... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
If you've been using MySQL database to store your important... Read More
Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More
IBM Lotus Notes Domino and Microsoft CRM (Client Relation Management)... Read More
There are many commands that are used in linux on... Read More
All your software is stored on a hard-drive. But how... Read More
I suggest that you do not spend a lot of... Read More
IntroductionSurprised, by the title? well, this is a tour of... Read More
I provide, here clear explanations and a count of function... Read More
In 2004 Oracle, Inc. made its new step toward J2EE... Read More
Introduction to C++Why Learn C++?C++ may at first seem like... Read More
This article will not attempt to advocate the use of... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
Around the same time Microsoft made its move with .Net... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
Software |