The two PPP authentication protocols (PAP and CHAP) for vroppp setting networking have just completed a test of Dual-router plug-in to the serial port module today, it is used to gain a deeper understanding of the differences between the two PPP authentication protocols PAP and CHAP. 1. First, build a network environment. There are two routers in total, plug in the serial port module respectively, and connect them using s0/0. 2. Configure an IP address, 192.168.1.1 and 192.168.1.2. Enable these two interfaces and use show to view the default Encapsulation Format. HDLC format is found, which is also the Cisco default Encapsulation Format. Router # show interfac e s0/0Serial0/0 is up, line protocol is up Hardware is M4T Internet address is 192.168.1.1/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation HDLC, crc 16, loopback not set Keepalive set (10 sec) www.2cto.com 3. Then ping the system to test whether the connection can be established because it is based on the hdlc protocol, therefore, it can be connected, and then the s0/0 port of R1 is changed to ppp encapsulation, and ping again to find that it cannot be passed. Normally, because the Encapsulation Format is different, the encapsulation of one end and the other end cannot be unencapsulated, so communication will naturally fail. 4. Configure R2 as a PPP encapsulation, and the two routers can be pinged again. 5. Next, we will conduct the authentication experiment. First, we will perform PAP authentication and create a user name and password on R1. Username xiaojuan password 201177. Enable PAP authentication on R1 and ppp authentication pap. At this time, the link between R1 and R2 will be disconnected because R1 needs to authenticate the identity to connect, but R2 is not configured yet. 6. Enter R2 and configure the user name and password. the user name and password are the user name and password set on R1. After the configuration, the link is re-configured! 7. Disable all the preceding configurations and start the chap authentication experiment. First, create a user name and password on R1 and create a user name and password on R2. The two passwords must be the same. 8. Configure chap authentication for the primary authenticated party. It is configured on R1. Then, send the username created on R2. then, send the username created on R1. Serial0/0 is up, line protocol is up Hardware is M4T Internet address is 192.168.1.1/24 MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, crc 16, loopback not set Keepalive set (10 sec) www.2cto.com Restart-Delay is 0 secs LCP Open: IPCP, CDPCP this article comes from the fat shark Network