PPP Configuration.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.
S4C4 PPP. Protocols Point to Point Protocol Link Control Protocol Network Control Program Password Authentication Protocol Challenge Handshake Authentication.
Point-to-Point Protocol
Gursharan Singh Tatla SLIP and PPP 27-Mar
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—5-1 Establishing Serial Point-To-Point Connections Configuring Serial Point-To-Point Encapsulation.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 4 Point to Point Protocol (PPP)
1 Data Communications Point-to-Point Protocol (PPP)
Serial Connections Connections over a WAN rather than a LAN This chapter describes the Cisco proprietary HDLC protocol and the PPP protocol.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
Point to Point Protocol Operation. Point to Point Protocol Protocol Layers of PPP –Physical Layer –Data Link Layer – HDLC derivative –Other protocols.
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
K. Salah 1 Chapter 12 Point-to-Point Access: PPP.
1 CCNA 4 v3.1 Module 3. 2 CCNA 4 v3.0 Module 3 PPP.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Remote Networking Architectures
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Point-to-Point Access: PPP. In a network, two devices can be connected by a dedicated link or a shared link. In the first case, the link can be used by.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
Ch. 3 - PPP CCNA 4 version 3.0. PPP PPP layered architecture PPP contains two sub-protocols: –Link Control Protocol – Used for establishing the point-to-point.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
CCNA Cisco Certified Network Associate. Point-to-point Protocol (PPP)
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 4, v Chapter.
Troubleshooting WAN Implementation Issues
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Point-to-Point Protocol (PPP) Accessing the WAN – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Wide Area Networks(WANs) Lecture Week 2. Point-to-Point Protocol (PPP) Accessing the WAN.
Copyright Kenneth M. Chipps Ph.D. PPP Last Update
Point to Point Protocol
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Prepared by They Yu Shu Lee Ern Yu.  Motivation  Previous Work  Remaining Issues  Improvement.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
1 Point-to-Point Protocol Cisco Networking Academy Semester 4.
Point-to-Point Tunneling Protocol [PPTP] Team: Invincibles Deepak Tripathi Habibeh Deyhim Karthikeyan Gopal Satish Madiraju Tusshar RakeshNLN.
Chap 1 – Point-to-Point Protocol (PPP) Learning Objectives
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Prepared By: Dr. Mohamed Abdeldayem Reference: Chapter 24 Wade Edwards, CCNP Complete Study Guide, Experiment 12 Configuring PPP on a serial link.
4 Semester 4 CHAPTER 4 REVIEW JEOPARDY S2C04 Jeopardy Review.
Chapter 11 Data Link Control
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Services in a Converged WAN Accessing the WAN – Chapter 1.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 3 PPP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 3 PPP.
Point-Point Protocol (PPP) by William F. Widulski.
© 2002, Cisco Systems, Inc. All rights reserved.
Point-to-Point Protocol (PPP)
Instructor Materials Chapter 2: Point-to-Point Connections
PPP Protocol.
PPP Protocol.
PPP Protocol.
Lesson 6 Point to Point Protocol
Instructor Materials Chapter 2: Point-to-Point Connections
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
ZyXEL Communications Corporation
Chapter 2: Point-to-Point Connections
Chapter 2: Point-to-Point Connections
Point-to-Point Protocol (PPP)
CCNA 4 Chapter 2 PPP.
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP)
© 2002, Cisco Systems, Inc. All rights reserved.
Point-to-Point Protocol (PPP)
PPP Protocol.
Data Link Control (DLC) Services
Presentation transcript:

PPP Configuration

Configuring HDLC Encapsulation

Configuring PPP Router#configure terminal Router(config)#interface serial 0/0 Router(config-if)#encapsulation ppp Enables PPP encapsulation on serial interface 0/0 interface Serial0 ip address 172.25.3.2 255.255.255.0 encapsulation ppp interface Serial0 ip address 172.25.3.1 255.255.255.0 encapsulation ppp

Verifying PPP LCP NCP

Authentication Authentication is a mechanism used to verify the identity of another device. This identity verification is needed to confirm that the other device is legitimate and not some one only appearing to be an authentic device in order to cause damage or steal information. For example, if R1 and R2 are to form a serial link using PPP, R1 may want R2 to somewhow prove that it really is R2. This scenario is where R1 is authenticating R2, or in other words, asking R2 to prove its identity.

Authentication PPP defines two authentication protocols: Password Authentication Protocol (PAP) Channel Handshake Authentication Protocol (CHAP). Both protocols involve exchanges of messages between the two PPP speaking devices, but there are differences in detail.

It involves a three-way exchange of a shared secret. PAP Is a very basic two-way process. There is no encryption the username and password are sent in plain text. If it is accepted, the connection is allowed. CHAP Is more secure than PAP. It involves a three-way exchange of a shared secret.

PAP

PAP With PAP, the device to be authenticated starts the message exchange by sending a clear text password, claiming to be legitimate. The device at the other end of PPP link compares the password with its own password and if the password is correct, sends back an acknowledgement. The authentication process is one way and one or both devices can authenticate each other separately. PAP is simple in operation as well as configuration but it is insecure because the password is sent in clear text and can be sniffed.

CHAP CHAP is a one-way authentication method, which means it involves an authenticator authenticating its peer. In practice, both peers are configured to authenticate each other and two separate three- way handshakes take place. CHAP uses a one-way hash algorithm, known as MD5, with input to the algorithm being a password that is used locally to compute the hash and never crosses the link and a shared random number.

Encrypted password Repeated challenges

CHAP CHAP is used at the startup of a link and periodically verifies the identity of the remote node using a three-way handshake. After the PPP link establishment phase is complete, the local router sends a "challenge" message to the remote node. The remote node responds with a value calculated using a one-way hash function, which is typically Message Digest 5 (MD5). This response is based on the password and challenge message. The local router checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged, otherwise the connection is immediately terminated.

CHAP CHAP provides protection against playback attack through the use of a variable challenge value that is unique and unpredictable. Since the challenge is unique and random, the resulting hash value will also be unique and random. The use of repeated challenges is intended to limit the time of exposure to any single attack.

Configuring PPP Authentication Checklist