CCNA--LAB-5:配置PPP(点到点)

简介:
拓补如上
 
PAPPassword Authentication Protocol,口令认证协议)实例配置:
 
R1
Router>en
Router#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#HOstname R1
R1(config)#interface s1/0
R1(config-if)#ip address 12.1.1.1 255.255.255.0
R1(config-if)#encapsulation ppp     --封装协议PPP
R1(config-if)#no sh
R1(config-if)#ppp authentication pap     --PPP认证类型PAP
R1(config-if)#exit
R1(config)#username cisco password cisco     --建立本地用户作为对端的身份认证用户
R1(config)#end
R1#
 
 
 
 
R2
 
Router>
Router>en
Router#conf t
Router(config)#hostname R2
R2(config)#interface s1/0
R2(config-if)#encapsulation ppp
R2(config-if)#ip address 12.1.1.2 255.255.255.0
R2(config-if)#no sh
 
R2(config-if)#ppp pap sent-username cisco password cisco    --设置对端用户密码
R2(config-if)#end
 
验证:
r1(config-if)#
6d00h: Se1 PPP: Treating connection as a dedicated line
6d00h: Se1 LCP: O CONFREQ [Closed] id 87 len 14
6d00h: Se1 LCP:    AuthProto PAP (0x0304C023)
6d00h: Se1 LCP:    MagicNumber 0x1F1A390F (0x05061F1A390F)
6d00h: Se1 PPP: I pkt type 0xC021, datagramsize 14
6d00h: Se1 PPP: I pkt type 0xC021, datagramsize 18
6d00h: Se1 LCP: I CONFREQ [REQsent] id 34 len 10
6d00h: Se1 LCP:    MagicNumber 0xFFBD6ADC (0x0506FFBD6ADC)
6d00h: Se1 LCP: O CONFACK [REQsent] id 34 len 10
6d00h: Se1 LCP:    MagicNumber 0xFFBD6ADC (0x0506FFBD6ADC)
6d00h: Se1 LCP: I CONFACK [ACKsent] id 87 len 14
6d00h: Se1 LCP:    AuthProto PAP (0x0304C023)
6d00h: Se1 LCP:    MagicNumber 0x1F1A390F (0x05061F1A390F)
6d00h: Se1 PPP: I pkt type 0xC023, datagramsize 20
6d00h: Se1 PAP: I AUTH-REQ id 3 len 16 from "cisco"
d00h: Se1 PAP: Authenticating peer cisco 6
6d00h: Se1 PAP: O AUTH-ACK id 3 len 5
6d00h: Se1 IPCP: O CONFREQ [Closed] id 3 len 10
6d00h: Se1 PPP: I pkt type 0x8021, datagramsize 14
6d00h: Se1 PPP: I pkt type 0x8207, datagramsize 8
6d00h: Se1 IPCP:    Address 12.1.1.1 (0x03060C010101)
6d00h: Se1 CDPCP: O CONFREQ [Closed] id 3 len 4
6d00h: Se1 PPP: I pkt type 0x8021, datagramsize 14
6d00h: Se1 PPP: I pkt type 0x8207, datagramsize 8
6d00h: Se1 IPCP: I CONFREQ [REQsent] id 3 len 10
6d00h: Se1 IPCP:    Address 12.1.1.2 (0x03060C010102)
6d00h: Se1 IPCP: O CONFACK [REQsent] id 3 len 10
6d00h: Se1 IPCP:    Address 12.1.1.2 (0x03060C010102)
6d00h: Se1 CDPCP: I CONFREQ [REQsent] id 3 len 4
6d00h: Se1 CDPCP: O CONFACK [REQsent] id 3 len 4
6d00h: Se1 IPCP: I CONFACK [ACKsent] id 3 len 10
6d00h: Se1 IPCP:    Address 12.1.1.1 (0x03060C010101)
6d00h: Se1 CDPCP: I CONFACK [ACKsent] id 3 len 4
6d00h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
6d00h: Se1 PPP: I pkt type 0x0207, datagramsize 279
6d00h: Se1 PPP: I pkt type 0x0207, datagramsize 279
6d00h: Se1 PPP: I pkt type 0x0207, datagramsize 279
 
 
 
CHAPChallenge Handshake Authentication Protocol,质询握手认证协议)实例配置:
R1
 
r1(config)#
r1(config)#interface s1/0
r1(config-if)#ip address 12.1.1.1 255.255.255.0
r1(config-if)#encapsulation ppp
r1(config-if)#ppp authentication chap     --PPP认证CHAP
r1(config-if)#ppp chap hostname r1      --hostname指对方所要建立的用户名
r1(config-if)#no sh
r1(config-if)#exit
r1(config)#username r2 password cisco    --建立对方指定用户帐户
r1(config)#
 
 
R2
 
r2(config)#interface s1/0
r2(config-if)#ip address 12.1.1.2 255.255.255.0
r2(config-if)#no sh
r2(config-if)#encapsulation ppp
r2(config-if)#ppp authentication chap
r2(config-if)#ppp chap hostname r2       
r2(config-if)#exit
r2(config)#username r1 password cisco
r2(config)#
 
注意:我用颜色注明的,两边是吻合的,因为CHAP是两边互相建立对方的指定的帐户,如果没有手到指定,默认是用HOSTNAME作为用户名。
 
 
验证:
6d01h: Se1 PPP: Outbound cdp packet dropped, line protocol not up
6d01h: Se1 PPP: Outbound cdp packet dropped, line protocol not up
6d01h: Se1 PPP: Outbound cdp packet dropped, line protocol not up
6d01h: Se1 PPP: I pkt type 0xC021, datagramsize 19
6d01h: Se1 LCP: I CONFREQ [Closed] id 13 len 15
6d01h: Se1 LCP:    AuthProto CHAP (0x0305C22305)
6d01h: Se1 LCP:    MagicNumber 0xFFCD7512 (0x0506FFCD7512)
6d01h: Se1 PPP: Treating connection as a dedicated line
6d01h: Se1 LCP: O CONFREQ [Closed] id 38 len 15
6d01h: Se1 LCP:    AuthProto CHAP (0x0305C22305)
6d01h: Se1 LCP:    MagicNumber 0x1F2A4361 (0x05061F2A4361)
6d01h: Se1 LCP: O CONFACK [REQsent] id 13 len 15
6d01h: Se1 LCP:    AuthProto CHAP (0x0305C22305)
6d01h: Se1 PPP: I pkt type 0xC021, datagramsize 19
6d01h: Se1 LCP:    MagicNumber 0xFFCD7512 (0x0506FFCD7512)
6d01h: Se1 LCP: I CONFACK [ACKsent] id 38 len 15
6d01h: Se1 LCP:    AuthProto CHAP (0x0305C22305)
6d01h: Se1 LCP:    MagicNumber 0x1F2A4361 (0x05061F2A4361)
6d01h: Se1 PPP: I pkt type 0xC223, datagramsize 27
6d01h: Se1 CHAP: Using alternate hostname r1
6d01h: Se1 CHAP: O CHALLENGE id 2 len 23 from "r1"
6d01h: Se1 CHAP: I CHALLENGE id 2 len 23 from "r2"
6d01h: %LINK-3-UPDOWN: Interface Serial1, changed state to up
6d01h: Se1 CHAP: Using alternate hostname r1
6d01h: Se1 PPP: I pkt type 0xC223, datagramsize 27
6d01h: Se1 CHAP: O RESPONSE id 2 len 23 from "r1"
6d01h: Se1 CHAP: I RESPONSE id 2 len 23 from "r2"
6d01h: Se1 CHAP: O SUCCESS id 2 len 4
6d01h: Se1 PPP: I pkt type 0xC223, datagramsize 8
6d01h: Se1 CHAP: I SUCCESS id 2 len 4
6d01h: Se1 PPP: I pkt type 0x8021, datagramsize 14
6d01h: Se1 PPP: I pkt type 0x8207, datagramsize 8
6d01h: Se1 IPCP: O CONFREQ [Closed] id 2 len 10
6d01h: Se1 IPCP:    Address 12.1.1.1 (0x03060C010101)
6d01h: Se1 CDPCP: O CONFREQ [Closed] id 2 len 4
6d01h: Se1 PPP: I pkt type 0x8021, datagramsize 14
6d01h: Se1 PPP: I pkt type 0x8207, datagramsize 8
6d01h: Se1 IPCP: I CONFREQ [REQsent] id 2 len 10
6d01h: Se1 IPCP:    Address 12.1.1.2 (0x03060C010102)
6d01h: Se1 IPCP: O CONFACK [REQsent] id 2 len 10
6d01h: Se1 IPCP:    Address 12.1.1.2 (0x03060C010102)
6d01h: Se1 CDPCP: I CONFREQ [REQsent] id 2 len 4
6d01h: Se1 CDPCP: O CONFACK [REQsent] id 2 len 4
6d01h: Se1 IPCP: I CONFACK [ACKsent] id 2 len 10
6d01h: Se1 IPCP:    Address 12.1.1.1 (0x03060C010101)
6d01h: Se1 CDPCP: I CONFACK [ACKsent] id 2 len 4
6d01h: Se1 PPP: I pkt type 0x0207, datagramsize 279
6d01h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed state to up
6d01h: Se1 PPP: I pkt type 0x0207, datagramsize 279
6d01h: Se1 PPP: I pkt type 0x0207, datagramsize 279
 
 
总结:
PPP 的两种认证方式对比 ,   一种是 PAP ,一种是 CHAP 。相对来说 PAP 的认证方式安全性没有 CHAP 高。 PAP 在传输 password 是明文的,而 CHAP 在传输过程中不传输密码,取代密码的是 hash (哈希值)。 PAP 认证是通过两次握手实现的,而 CHAP 则是通过 3 次握手实现的。 PAP 认证是被叫提出连接请求,主叫响应。而 CHAP 则是主叫发出请求,被叫回复一个数据包,这个包里面有主叫发送的随机的哈希值,主叫在数据库中确认无误后发送一个连接成功的数据包连接。









本文转自 meiyanaa 51CTO博客,原文链接:http://blog.51cto.com/justim/235386,如需转载请自行联系原作者
目录
相关文章
|
6月前
|
存储 安全 数据库
ensp中PPP(点对点协议)中的PAP认证 原理和配置命令
ensp中PPP(点对点协议)中的PAP认证 原理和配置命令
222 0
|
6月前
|
存储 安全 数据安全/隐私保护
ensp中PPP(点对点协议)中的CHAP认证 原理和配置命令
ensp中PPP(点对点协议)中的CHAP认证 原理和配置命令
126 0
|
网络架构 数据安全/隐私保护 数据库
|
网络虚拟化