Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Cisco Press CCNA ICND 2004 - Cisco Press.pdf
Скачиваний:
120
Добавлен:
24.05.2014
Размер:
13.19 Mб
Скачать

Authentication Over WAN Links 313

fact that the link is down. If a router does not notice that the link has been looped, the routing protocol must wait for timeouts—things such as not hearing from the router on the other end of the link for some period of time.

LCP notices looped links quickly using a feature called magic numbers. When using PPP, the router sends PPP LCP messages instead of Cisco-proprietary keepalives across the link; these messages include a magic number, which is different on each router. If a line is looped, the router receives an LCP message with its own magic number instead of getting a message with the other router’s magic number. A router receiving its own magic number knows that the frame it sent has been looped back. If configured to do so, the router can take down the interface, which speeds convergence.

Enhanced Error Detection

Just like many other data-link protocols, PPP uses an FCS field in the PPP trailer to determine if an individual frame has an error. If a frame is received in error, it is discarded. However, PPP monitors the frequency with which frames are received in error, and it can be configured to take down an interface if too many errors occur.

PPP LCP analyzes the error rates on a link using a PPP feature called Link Quality Monitoring (LQM). LCP at each end of the link sends messages describing the number of correctly received packets and bytes. The router that sent the packets compares this number to the number of packets and bytes it sent, and it calculates percentage loss. The router can be configured to take down the link after a configured error rate has been exceeded.

The only time this feature helps is when you have redundant routes in the network. By taking down a link that has many errors, you can cause packets to use an alternative path that might not have as many errors.

Authentication Over WAN Links

Security issues in a WAN can differ compared to security in a LAN. In a LAN, most devices can be under the control of the organization owning the devices. Traffic between devices in the same building might not ever leave the confines of the office space used by that company. However, with WANs, by definition, the traffic leaves one location and travels through some other network owned by the service provider and back into another site.

The term authentication refers to a set of security functions that help one device ensure that it is communicating with the correct other device. For instance, if R1 and R2 are supposed to be communicating over a serial link, R1 might want R2 to somehow prove that it really is R2. Authentication provides a way to prove one’s identity.

314 Chapter 9: Point-to-Point Leased Line Implementation

WAN authentication is most often needed when dial lines are used. However, the configuration of the authentication features remains the same whether a leased line or dial line is used. This section covers the basics of two authentication methods. Chapter 10, which covers ISDN and dial concepts, briefly mentions cases in which authentication should be used.

PAP and CHAP Authentication

Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP) authenticate the endpoints on either end of a point-to-point serial link. CHAP is the preferred method today because the identifying codes flowing over the link are created using a Message Digest 5 (MD5) one-way hash, which is more secure than the clear-text passwords sent by PAP.

Both PAP and CHAP require the exchange of messages between devices. When a dialed line is used, the dialed-to router expects to receive a username and password from the dialing router with both PAP and CHAP. With a leased line, one router starts the process, and the other responds. Whether leased line or dial, with PAP, the username and password are sent in the first message. With CHAP, the protocol begins with a message called a challenge, which asks the other router to send its username and password. Figure 9-4 outlines the different processes in the case where the links are dialed. The process works the same when the link uses a leased line.

PAP flows are much less secure than CHAP because PAP sends the host name and password in clear text in the message. These can be read easily if someone places a tracing tool in the circuit. CHAP instead uses a one-way hash algorithm, with input to the algorithm being a password and a shared random number. The CHAP challenge states the random number; both routers are preconfigured with the password. The challenged router runs the hash algorithm using the just-learned random number and the secret password and sends the results back to the router that sent the challenge. The router that sent the challenge runs the same algorithm using the random number (sent across the link) and the password (not sent across the link). If the results match, the passwords must match.

The most interesting part of the process is that at no time does the password itself ever cross the link. With the random number, the hash value is different every time. So even if someone sees the calculated hash value using a trace tool, the value is meaningless as a way to break in next time. CHAP authentication is difficult to break, even with a tracing tool on the WAN link.

Authentication Over WAN Links 315

Figure 9-4 PAP and CHAP Messages

 

 

PAP

 

Waiting

 

 

Dialing

for Dial

I Am Barney

Router

 

 

 

 

 

 

 

Password = Betty

 

Fred

 

Ack.

Barney

 

 

 

 

 

 

 

 

CHAP

 

 

Waiting

 

Challenge!

 

Dialing

for Dial

 

 

Router

 

 

 

 

 

 

 

I Am #$%#$@

 

 

Fred

 

 

 

Barney

 

Accepted

 

 

 

 

 

 

 

 

 

 

Example 9-3 shows the CHAP configuration for Figure 9-4.

Example 9-3 CHAP Configuration Example

Router Fred

Router Barney

username Barney password Bedrock

username Fred password Bedrock

!

!

interface serial 0

interface serial 0

encapsulation ppp

encapsulation ppp

ppp authentication chap

ppp authentication chap

.

.

 

 

Notice that each router refers to the other router’s host name; each router uses its own host name in CHAP flows unless overridden by configuration. Each side configures the same password. When Router Barney receives a challenge from Router Fred, Router Barney sends the calculated hash value based on the password and the random number. Fred computes the same hash value using the same random number and password, comparing the calculated value with what Barney sends back to perform authentication. CHAP authentication is completed if the two values match.