Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it???s important to know you have this option.
Regarding both PAP and CHAP, it???s a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It???s more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you???ll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we???ll see why in tomorrow???s article.
Under the BRI interface, you???ll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what???s going on ???behind the command???, and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we???ll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
About The Author:
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of http://www.thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP Courses, Flash Card Books, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at http://www.thebryantadvantage.com.
detailed home cleaning Park Ridge ..If you have Microsoft Great Plains as main accounting and... Read More
Microsoft Business Solutions ? Navision is an integrated solution for... Read More
The major reason I recommend getting your hands on real... Read More
Blue Cross and Blue Shield of Hawaii (HMSA) found itself... Read More
All of us know that Microsoft bought former Great Plains... Read More
One day, you suddenly realize that your computer started to... Read More
Which Type of Shop Can Rely On A Home Built... Read More
People often ask me: What image file formats will Photoshop... Read More
All your software is stored on a hard-drive. But how... Read More
For a long time now Microsoft's Internet Explorer has ruled... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
If you company is small or mid-size special products or... Read More
Microsoft Business Solutions Great Plains has I'd say end user... Read More
The cornerstone of successful automated office systems is the ability... Read More
Sometimes your PC will start acting strange for no apparent... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
Great Plains Fixed Assets Management module is a robust tool... Read More
It won't matter how effective your WinRunner Team is if... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
How would you like to prevent spyware and adware from... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Program Flow is what you think it is. How the... Read More
express cleaning service Des Plaines ..Fortunately one of the most common reasons cited for the... Read More
Bar charts, bar graphs, and any other chart or graph... Read More
First we had the original Google search that evolved into... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
This is the tutorial where we really get into programming.... Read More
With so many Microsoft Windows related viruses, errors, and other... Read More
Whether you are an experienced web programmer or a complete... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
We were recently faced with a decision: either to let... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
Anti-virus software is used to find, remove or fix files... Read More
Let us give you - developer some hints in the... Read More
Great Plains Fixed Assets Management module is a robust tool... Read More
If you would like to pick something from Microsoft, or... Read More
There are many commands that are used in linux on... Read More
Once upon a time not so long ago, there was... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Think of this, first we had the HAM Radio, then... Read More
If you've been using MySQL database to store your important... Read More
According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric... Read More
Traditionally we were considering functionally rich systems, such as SAP,... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
I suggest that you do not spend a lot of... Read More
Software |