Introduction To ISDN, Part III: Configuring PPP PAP Authentication
Now we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP.
Password Authentication Protocol (PAP) sends the username and password over the ISDN link in clear-text. Sending any passwords over any WAN link in clear-text is generally a bad idea, but it's important to know you have this option.
Regarding both PAP and CHAP, it's a common misunderstanding that each side must authenticate the other. PAP and CHAP both support bidirectional and unidirectional authentication; that is, R1 can authenticate R2 without R2 necessarily authenticating R1. It's more common to use unidirectional authentication in a lab environment than a production network, but keep in mind that bidirectional authentication is an option, not a requirement.
The configurations of PAP and CHAP do have their similarities. For both, you'll configure a username/password combination in global configuration mode. Newcomers to ISDN sometimes put the local router name in for the username; remember that the remote router name is the username.
The only real advantage of PAP over CHAP comes in the password configuration. Since PAP actually sends the password as a whole over the link, the two routers can send different passwords during authentication. The operation of CHAP requires that both routers use the same password, and we'll see why in tomorrow's article.
Under the BRI interface, you'll enter encapsulation ppp and ppp authentication pap. So far, your authentication scheme looks like this:
username R2 password CCNA
Int bri0
encapsulation ppp
ppp authentication pap
PAP requires an extra command at this point. The ppp pap sent-username command is required under the interface, indicating the username and password this router will be sending to the remote router.
Int bri0
encapsulation ppp
ppp authentication pap
ppp pap sent-username R1 password CISCO
I always encourage CCNA and CCNP candidates to use as many debugs as possible when working in their lab, since these commands show us how things work. For any PPP authentication, always run debug ppp negotiation before sending interesting traffic to trigger the call. Watching exactly how PAP and CHAP work give you a much better understanding of what's going on "behind the command", and makes you a stronger candidate and a stronger networking engineer.
Tomorrow, we'll take a look at CHAP, and why routers cannot use the same password on both ends of the link.
Keep studying!
Chris Bryant
CCIE ? #12933
About The Author
Chris Bryant, CCIE (TM) #12933, has been active in the Cisco certification community for years. He worked his way up from the CCNA to the CCIE, and knows what CCNA and CCNP candidates need to know to be effective on the job and in the exam room.
He is the owner of chris@thebryantadvantage.com, where he teaches CCNA and CCNP courses to small groups of exam candidates, ensuring they each receive the individual attention they deserve. Classes are offered over the Internet and in person in select cities. Chris has custom-written the Study Guide and Lab Workbook used in each course - no third-party training materials or simulators are used. You're invited to visit our site and check out our CCNA and CCNP courses and study aids, and to sign up for our weekly newsletter written personally by Chris. Chris is always glad to hear from Cisco certification candidates at chris@thebryantadvantage.com
Batchtown Chicago prom limo .. Lockport Chicago limo O’HareMicrosoft Business Solutions CRM proved to be reliable solution in... Read More
The most important benefit of XML is its simplicity. Though... Read More
The term "document management" and "paperless office" is the subject... Read More
Now is the time to look at an alternative to... Read More
You've finally created databases that you can actually use to... Read More
Ok... Where to start?Well, I guess I will start at... Read More
Although we don't know whether Microsoft ever envisioned such a... Read More
Microsoft Office program is a programming tool called Visual Basic... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
Many reasons made GBM a unanimous choice for experts, one... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
Domino server is a buffer between the operation system and... Read More
While I was in college, if you would have asked... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
Programming Help for BeginnersWe write programs to instruct computers. When... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
The vast majority of us will have, at some point,... Read More
Viruses and spyware usually show up on your computer one... Read More
You might think you don't need a firewall... Read More
We would like first emphasize the change in the paradigm.... Read More
This article is the first of a series of articles... Read More
Are Spreadsheets Robbing your Enterprise of Competitive Advantage?'90% of "average"... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
shuttle from Midway Munster are ..Usually, the easiest way to tell you have spyware is... Read More
Microsoft Business Solutions Great Plains might be considered as ERP... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
Ad-Aware and Spybot are probably the two most well known... Read More
This is a short article, written in question/answer/FAQ style to... Read More
Learning how to program software seems like a daunting task... Read More
Mike Dunville* had a decision to make. As the new... Read More
This article illustrates the best practices to improve the performance... Read More
MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More
Microsoft Business Solutions Great Plains fits to majority of horizontal... Read More
So, you've bought a new Macintosh, and now you may... Read More
Microsoft Word is one of the most popular office applications... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
Having from five to ten and more favorite screensavers is... Read More
There are many commands that are used in linux on... Read More
This article is the first of a series of articles... Read More
Microsoft Great Plains is now targeting large and midsize businesses... Read More
Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
Now is the time to look at an alternative to... Read More
Shareware is software that you can try before you buy;... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
The intentions of this short tutorial are not to teach... Read More
Buying accounting software is a major investment. It's an important... Read More
While paper labeling CDs and DVDs may appear to be... Read More
Software |