In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
[name of experiment]
PPP PAP certification
[purpose of the experiment]
Master the process and configuration of PPP PAP authentication
[background description]
You are the network administrator of the company. in order to meet the growing business needs, the company has applied for special line access, your customers.
The user router should verify the identity when negotiating the link with ISP, configure the router to ensure that the link is established, and consider its security.
Sex.
[demand Analysis]
Ensure security verification when the link is negotiated. When the link is negotiated, the user name and password are transmitted in clear text.
[preliminary knowledge]
Basic router configuration knowledge, PPP PAP knowledge
[experimental equipment]
2 routers (with serial port)
V.35 cable (DTE/DCE) 1 pair
[experimental principle]
PPP protocol is located in the data link layer of OSI seven-layer model. PPP protocol is divided into two sublayers according to its function: LCP,
NCP . LCP is mainly responsible for link negotiation, establishment, callback, authentication, data compression, multi-link bundling and other functions.
NCP is mainly responsible for negotiating with the upper layer protocols and providing services for the network layer protocols.
The authentication function of PPP refers to the authentication of passwords in the process of establishing a PPP link.
Verify that the link is not removed.
PPP protocol supports two authentication methods: PAP and CHAP. PAP (Password Authentication Protocol
Password authentication protocol (password authentication protocol) means that the authentication parties complete the authentication process through two handshakes, which is used to attempt to log in to the peer pair.
The method of authenticating a user on a point protocol server. The verified party initiates the verification request, including the verified
User name and password. Reply after verification by the verifying party, pass the verification or fail the verification. User name and secret during authentication
The code is transmitted over the link in clear text.
Step 1: basic router configuration
Step 2: configure PAP authentication
Step 3: verify PAP authentication
[notes]
When encapsulating the WAN protocol, the two ports of the V.35 cable are required to have the same encapsulation protocol, otherwise the link cannot be established.
[reference configuration]
Router A#show running-config
Building configuration...
Current configuration: 593 bytes
!
Version RGNOS 10.1.00 (4), Release (18443) (Tue Jul 17 21:16:17 CST 2007
-ubu1server)
Hostname Router A
!
Interface serial 4/0
Encapsulation PPP
Ppp pap sent-username RouterA password 7 001b7210
Ip address 172.16.2.1 255.255.255.0
Clock rate 64000
!
Interface serial 4/1
Clock rate 64000
!
Interface GigabitEthernet 0/0
Duplex auto
Speed auto
!
Interface GigabitEthernet 0/1
Duplex auto
Speed auto
!
Line con 0
Line aux 0
Line vty 0 4
Login
!
End
Router B#show running-config
Building configuration...
Current configuration: 580 bytes
!
Version RGNOS 10.1.00 (4), Release (18443) (Tue Jul 17 21:16:17 CST 2007
-ubu1server)
Hostname Router B
!
Username RouterA password 0 123
!
Interface serial 4/0
Encapsulation PPP
Ppp authentication pap
Ip address 172.16.2.2 255.255.255.0
!
Interface serial 4/1
Clock rate 64000
!
Interface GigabitEthernet 0/0
Duplex auto
Speed auto
!
Interface GigabitEthernet 0/1
Duplex auto
Speed auto
!
Line con 0
Line aux 0
Line vty 0 4
Login
!
End
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.