28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5. What options are available for PPP on a serial interface? (hint: ppp ?) For<br />

what is each used?<br />

6. Use a protocol inspector to try “stealing” passwords over PAP and CHAP<br />

lines.<br />

7. What the heck is a “magic number?” Go and find out.<br />

8. What are those acronyms in our debug ppp negotiation? What do they mean?<br />

What is a IPCP and CDPCP?<br />

9. When would you use Microsoft-chap?<br />

10. Does our username/passwords set up under our interface have to match those<br />

put on our router?<br />

So what have I learned here?<br />

In this lab you have learned some of the options available with PPP authentication. You<br />

have seen the five steps in PPP negotiation. You should now be able to define and<br />

differentiate between PAP and CHAP and when you would want to use each. You have<br />

seen that CHAP is better, from a security perspective, because the username and<br />

passwords are encrypted. This means they cannot as easily be “stolen” with a protocol<br />

inspector and used illegally. Do you remember what PAP and CHAP stand for? I would<br />

want to know if I was taking a test on it…hint, hint, wink, wink. In the next lab you will<br />

learn how to use another serial line encapsulation: frame relay.<br />

Guest Router Name Derivation<br />

Terminus, Leftist, and Urvile were three hackers from the Legion of Doom, who lived in<br />

Georgia, that were busted in 1990 <strong>by</strong> the U.S. Secret Service in connection with the<br />

Martin Luther King Day AT&T long distance network crash. They were known as<br />

“switching gurus” and as “heavy hitters” within the LoD because they frequently<br />

accessed BellSouth’s network. Apparently BellSouth, at that time, did not have very<br />

strict security in place.<br />

386

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!