CH 03
CH 03
Point-to-Point Connections
Objectives
Upon completion of this chapter
■ What are the fundamentals of point-to-point ■ How is a PPP session established?
serial communications across a WAN?
■ How do you configure PPP encapsulation on
■ How do you configure HDLC encapsulation a point-to-point serial link?
on a point-to-point serial link?
■ How do you configure PPP authentication
■ What are the benefits of using PPP over protocols?
HDLC in a WAN?
■ How are the show and debug commands
■ What is the PPP layered architecture and the used to troubleshoot PPP?
functions of LCP and NCP?
Key Terms
This chapter uses the following key terms. You can find the definitions in the glossary.
Introduction (3.0.1.1)
One of the most common types of WAN connections, especially in long-distance
communications, is a point-to-point connection, also called a serial or leased line
connection. Because these connections are typically provided by a carrier, such as a
telephone company, boundaries between what is managed by the carrier and what is
managed by the customer must be clearly established.
This chapter covers the terms, technology, and protocols used in serial connections.
The High-Level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) are
introduced. PPP is a protocol that is able to handle authentication, compression, error
detection, monitor link quality, and logically bundles multiple serial connections
together to share the load.
wires, especially as the wire length increases. Clock skew is also an issue with paral-
lel communications. Clock skew occurs when data across the various wires does not
arrive at the same time, creating synchronization issues. Finally, most parallel com-
munications support only one-direction, outbound-only communication from the
hard drive.
At one time, most PCs included both serial and parallel ports. Parallel ports were used to
connect printers, computers, and other devices that required relatively high bandwidth.
Parallel ports were also used between interior components. For external communica-
tions, a serial bus was primarily used for signal conversion. Because of their bidirectional
ability, serial communications are considerably less expensive to implement. Serial com-
munications use fewer wires, cheaper cables, and fewer connector pins.
On most PCs, parallel ports and RS-232 serial ports have been replaced by the higher
speed serial Universal Serial Bus (USB) interfaces. However, for long-distance commu-
nication, many WANs use still serial transmission.
There are many different serial communication standards, each one using a different
signaling method. There are three important serial communication standards affecting
LAN-to-WAN connections:
■ RS-232: Most serial ports on personal computers conform to the RS-232C or
newer RS-422 and RS-423 standards. Both 9-pin and 25-pin connectors are used.
A serial port is a general-purpose interface that can be used for almost any type
of device, including modems, mice, and printers. These types of peripheral devic-
es for computers have been replaced by new and faster standards such as USB but
many network devices use RJ-45 connectors that conform to the original RS-232
standard.
■ V.35: Typically used for modem-to-multiplexer communication, this ITU standard
for high-speed, synchronous data exchange combines the bandwidth of several
telephone circuits. In the U.S., V.35 is the interface standard used by most routers
and DSUs that connect to T1 carriers. V.35 cables are high-speed serial assemblies
designed to support higher data rates and connectivity between DTEs and DCEs
over digital lines. There is more on DTEs and DCEs later in this section.
A point-to-point link can connect two geographically distant sites, such as a corpo-
rate office in New York and a regional office in London. For a point-to-point line, the
carrier dedicates specific resources for a line that is leased by the customer (leased
line).
Note
Point-to-point connections are not limited to connections that cross land. There are hundreds
of thousands of miles of undersea fiber-optic cables that connect countries and continents
worldwide. An Internet search of “undersea Internet cable map” produces several cable maps
of these undersea connections.
Point-to-point links are usually more expensive than shared services. The cost of
leased line solutions can become significant when used to connect many sites over
increasing distances. However, there are times when the benefits outweigh the cost
of the leased line. The dedicated capacity removes latency or jitter between the end-
points. Constant availability is essential for some applications such as VoIP or video
over IP.
TDM
Bell Laboratories originally invented TDM to maximize the amount of voice traf-
fic carried over a medium. Before multiplexing, each telephone call required its own
physical link. This was an expensive and unscalable solution. TDM divides the band-
width of a single link into separate time slots. TDM transmits two or more channels
(data stream) over the same link by allocating a different time slot for the transmis-
sion of each channel. In effect, the channels take turns using the link.
TDM is a physical layer concept. It has no regard for the nature of the information
that is multiplexed on to the output channel. TDM is independent of the Layer 2 pro-
tocol that has been used by the input channels.
TDM can be explained by an analogy to highway traffic. To transport traffic from
four roads to another city, all traffic can be sent on one lane if the roads are equally
serviced and the traffic is synchronized. If each of the four roads puts a car on to the
main highway every four seconds, the highway gets a car at the rate of one each sec-
ond. As long as the speed of all the cars is synchronized, there is no collision. At the
destination, the reverse happens and the cars are taken off the highway and fed to the
local roads by the same synchronous mechanism.
This is the principle used in synchronous TDM when sending data over a link. TDM
increases the capacity of the transmission link by dividing transmission time into
smaller, equal intervals so that the link carries the bits from multiple input sources.
In Figure 3-5, a multiplexer (MUX) at the transmitter accepts three separate signals.
The MUX breaks each signal into segments. The MUX puts each segment into a
single channel by inserting each segment into a time slot.
A MUX at the receiving end reassembles the TDM stream into the three separate
data streams based only on the timing of the arrival of each bit. A technique called
bit interleaving keeps track of the number and sequence of the bits from each spe-
cific transmission so that they can be quickly and efficiently reassembled into their
original form upon receipt. Byte interleaving performs the same functions, but
because there are eight bits in each byte, the process needs a bigger or longer time
slot.
The operations of TDM are summarized as follows:
■ TDM shares available transmission time on a medium by assigning a time slot to
users.
■ The MUX accepts input from attached devices in an alternating sequence (round-
robin) and transmits the data in a recurrent pattern.
■ T1/E1 and ISDN telephone lines are common examples of synchronous TDM.
STDM
STDM was developed to overcome this inefficiency. As shown in Figure 3-6, STDM
uses a variable time slot length allowing channels to compete for any free slot space.
It employs a buffer memory that temporarily stores the data during periods of peak
traffic. STDM does not waste high-speed line time with inactive channels using this
scheme. STDM requires each transmission to carry identification information or a
channel identifier.
is provided and managed by the service provider. This allows the service provider to
actively manage and troubleshoot the local loop with the demarcation point occurring
after the NTU. The customer connects a CPE device, such as a router or Frame Relay
access device, to the NTU using a V.35 or RS-232 serial interface.
A router serial port is required for each leased line connection. If the underlying
network is based on the T-carrier or E-carrier technologies, the leased line connects
to the network of the carrier through a CSU/DSU. The purpose of the CSU/DSU is
to provide a clocking signal to the customer equipment interface from the DSU and
terminate the channelized transport media of the carrier on the CSU. The CSU also
provides diagnostic functions such as a loopback test.
As shown in Figure 3-9, most T1 or E1 TDM interfaces on current routers include
CSU/DSU capabilities. A separate CSU/DSU is not required because this functional-
ity is embedded in the interface. IOS commands are used to configure the CSU/DSU
operations.
DTE-DCE (3.1.1.8)
From the point of view of connecting to the WAN, a serial connection has a data
terminal equipment (DTE) device at one end of the connection and a data circuit-
terminating equipment or data communications equipment (DCE) device at the other
end. The connection between the two DCE devices is the WAN service provider
transmission network, as shown in Figure 3-10. In this example
■ The CPE, which is generally a router, is the DTE. The DTE could also be a ter-
minal, computer, printer, or fax machine if they connect directly to the service
provider network.
■ The DCE, commonly a modem or CSU/DSU, is the device used to convert the
user data from the DTE into a form acceptable to the WAN service provider
transmission link. This signal is received at the remote DCE, which decodes the
signal back into a sequence of bits. The remote DCE then signals this sequence to
the remote DTE.
The original RS-232 standard only defined the connection of DTEs with DCEs,
which were modems. However, to connect two DTEs, such as two computers or two
routers in a lab, a special cable called a null modem eliminates the need for a DCE. In
other words, the two devices can be connected without a modem. A null modem is
a communication method to directly connect two DTEs using an RS-232 serial cable.
With a null modem connection, the transmit (Tx) and receive (Rx) lines are cross-
linked, as shown in Figure 3-11.
The cable for the DTE to DCE connection is a shielded serial transition cable. The
router end of the shielded serial transition cable may be a DB-60 connector, which
connects to the DB-60 port on a serial WAN interface card, as shown in Figure 3-12.
The other end of the serial transition cable is available with the connector appropri-
ate for the standard that is to be used. The WAN provider or the CSU/DSU usually
dictates this cable type. Cisco devices support the EIA/TIA-232, EIA/TIA-449, V.35,
X.21, and EIA/TIA-530 serial standards, as shown in Figure 3-13.
To support higher port densities in a smaller form factor, Cisco has introduced a Smart
Serial cable, as shown in Figure 3-14. The router interface end of the Smart Serial cable
is a 26-pin connector that is significantly more compact than the DB-60 connector.
When using a null modem, synchronous connections require a clock signal. An exter-
nal device can generate the signal, or one of the DTEs can generate the clock signal.
When a DTE and DCE are connected, the serial port on a router is the DTE end of
the connection, by default, and the clock signal is typically provided by a CSU/DSU,
or similar DCE device. However, when using a null modem cable in a router-to-router
connection, one of the serial interfaces must be configured as the DCE end to pro-
vide the clock signal for the connection, as shown in Figure 3-15.
56 56 Kbps
64 64 Kbps
T1 1.544 Mbps
E1 2.048 Mbps
J1 2.048 Mbps
E3 34.064 Mbps
T3 44.736 Mbps
Note
E1 (2.048 Mbps) and E3 (34.368 Mbps) are European standards like T1 and T3, but with
different bandwidths and frame structures.
Interactive
Activity 3.1.1.11: Identify the Serial Communications Terminology
Graphic Go to the course online to perform this practice activity.
Flag
The Flag field initiates and terminates error checking. The frame always starts and
ends with an 8-bit Flag field. The bit pattern is 01111110. Because there is a likeli-
hood that this pattern occurs in the actual data, the sending HDLC system always
inserts a 0 bit after every five consecutive 1s in the data field, so in practice the flag
sequence can only occur at the frame ends. The receiving system strips out the insert-
ed bits. When frames are transmitted consecutively, the end flag of the first frame is
used as the start flag of the next frame.
Address
The Address field contains the HDLC address of the secondary station. This address
can contain a specific address, a group address, or a broadcast address. A primary
address is either a communication source or a destination, which eliminates the need
to include the address of the primary.
Control
The Control field, shown in Figure 3-18, uses three different formats, depending on
the type of HDLC frame used:
■ Information (I) frame: I-frames carry upper layer information and some control
information. This frame sends and receives sequence numbers, and the poll final
(P/F) bit performs flow and error control. The send sequence number refers to
the number of the frame to be sent next. The receive sequence number provides
the number of the frame to be received next. Both sender and receiver maintain
send and receive sequence numbers. A primary station uses the P/F bit to tell the
secondary whether it requires an immediate response. A secondary station uses
the P/F bit to tell the primary whether the current frame is the last in its current
response.
■ Supervisory (S) frame: S-frames provide control information. An S-frame can
request and suspend transmission, report on status, and acknowledge receipt of
I-frames. S-frames do not have an information field.
■ Unnumbered (U) frame: U-frames support control purposes and are not
sequenced. Depending on the function of the U-frame, its Control field is 1 or 2
bytes. Some U-frames have an Information field.
Protocol
Only used in Cisco HDLC. This field specifies the protocol type encapsulated within
the frame (e.g., 0x0800 for IP).
Data
The Data field contains a path information unit (PIU) or exchange identification
(XID) information.
The show interfaces serial command returns one of six possible states:
■ Serial x is up, line protocol is up.
■ Serial x is down, line protocol is down.
■ Serial x is up, line protocol is down.
■ Serial x is up, line protocol is up (looped).
■ Serial x is up, line protocol is down (disabled).
■ Serial x is administratively down, line protocol is down.
Of the six possible states, there are five problem states. Table 3-2 lists the five prob-
lem states, the issues associated with that state, and how to troubleshoot the issue.
Serial x is The router is not 1. Check the CD LEDs on the CSU/DSU to see
down, line sensing a carrier whether the CD is active, or insert a breakout box
protocol is detect (CD) signal on the line to check for the CD signal.
down. (that is, the CD is
not active). 2. Verify that the proper cable and interface are
being used by looking at the hardware installation
The line is down or documentation.
is not connected on
the far end. 3. Insert a breakout box and check all control leads.
Serial x is up, The clock 1. Add the clockrate interface configuration com-
line protocol rate interface mand on the serial interface.
is down (DCE configuration
mode). command is missing. Syntax:
The DTE device clock rate bps
does not support Syntax Description:
or is not set up
for SCTE mode ■ bps: Desired clock rate in bits per second:
(terminal timing). 1200, 2400, 4800, 9600, 19200, 38400, 56000,
64000, 72000, 125000, 148000, 250000, 500000,
The remote CSU or 800000, 1000000, 1300000, 2000000, 4000000,
DSU has failed. or 8000000.
2. If the problem appears to be on the remote end,
repeat Step 1 on the remote modem, CSU or DSU.
3. Verify that the correct cable is being used.
4. If the line protocol is still down, there is a pos-
sible hardware failure or cabling problem. Insert a
breakout box and observe leads.
5. Replace faulty parts as necessary.
Serial x is up, A loop exists in 1. Use the show running-config privileged exec
line protocol is the circuit. The command to look for any loopback interface con-
up (looped). sequence number in figuration command entries.
the keepalive packet
changes to a random 2. If you find a loopback interface configuration
number when a loop command entry, use the no loopback interface
is initially detected. configuration command to remove the loop.
If the same random 3. If you do not find the loopback interface con-
number is returned figuration command, examine the CSU/DSU to
over the link, a loop determine whether they are configured in manual
exists. loopback mode. If they are, disable manual loop-
back.
Serial x is up, A high error rate 1. Troubleshoot the line with a serial analyzer and
line protocol is has occurred due breakout box. Look for toggling CTS and DSR
down (disabled) . to a remote device signals.
problem.
2. Loop CSU/DSU (DTE loop). If the problem con-
A CSU or DSU tinues, it is likely that there is a hardware problem.
hardware problem If the problem does not continue, it is likely that
has occurred. there is a telephone company problem.
Router hardware 3. Swap out bad hardware, as required (CSU, DSU,
(interface) is bad. switch, local or remote router).
The show controllers command is another important diagnostic tool when trouble-
shooting serial lines, as shown in Example 3-2. The output indicates the state of the
interface channels and whether a cable is attached to the interface. In example 3-2,
interface serial 0/0/0 has a V.35 DCE cable attached. The command syntax varies
depending on the platform. Cisco 7000 series routers use a cBus controller card for
connecting serial links. With these routers, use the show controllers cbus command.
If the electrical interface output displays as UNKNOWN instead of V.35,
EIA/TIA-449, or some other electrical interface type, the likely problem is an
improperly connected cable. A problem with the internal wiring of the card is also
possible. If the electrical interface is unknown, the corresponding display for the
show interfaces serial command shows that the interface and line protocol are down.
PPP encapsulation has been carefully designed to retain compatibility with most
commonly used supporting hardware. PPP encapsulates data frames for transmission
over Layer 2 physical links. PPP establishes a direct connection using serial cables,
phone lines, trunk lines, cellular telephones, specialized radio links, or fiber-optic
links.
PPP contains three main components:
■ HDLC-like framing for transporting multiprotocol packets over point-to-point
links.
■ Extensible Link Control Protocol (LCP) for establishing, configuring, and test-
ing the data-link connection.
■ Family of Network Control Protocols (NCPs) for establishing and configuring
different network layer protocols. PPP allows the simultaneous use of multiple
network layer protocols. Some of the more common NCPs are Internet Protocol
(IPv4) Control Protocol, IPv6 Control Protocol, AppleTalk Control Protocol,
Novell IPX Control Protocol, Cisco Systems Control Protocol, SNA Control
Protocol, and Compression Control Protocol.
PPP operates across any DTE/DCE interface (RS-232-C, RS-422, RS-423, or V.35).
The only absolute requirement imposed by PPP is a full-duplex circuit, either dedi-
cated or switched, that can operate in either an asynchronous or synchronous bit-
serial mode, transparent to PPP link layer frames. PPP does not impose any restric-
tions regarding transmission rate other than those imposed by the particular DTE/
DCE interface in use.
Most of the work done by PPP is at the data link and network layers by the LCP
and NCPs. The LCP sets up the PPP connection and its parameters, the NCPs handle
higher layer protocol configurations, and the LCP terminates the PPP connection.
After the link is established, PPP also uses the LCP to agree automatically on encap-
sulation formats such as authentication, compression, and error detection. Figure
3-21 shows the relationship of LCP to the physical layer and NCP.
be addressed. Therefore, for PPP, the Address field is set to 0xFF, the broadcast
address. If both PPP peers agree to perform Address and Control field compres-
sion during the LCP negotiation, the Address field is not included.
■ Protocol: Two bytes that identify the protocol encapsulated in the information
field of the frame. The 2-byte Protocol field identifies the protocol of the PPP
payload. If both PPP peers agree to perform Protocol field compression during
LCP negotiation, the Protocol field is 1 byte for the protocol identification in the
range 0x00-00 to 0x00-FF. The most up-to-date values of the Protocol field are
specified in the most recent Assigned Numbers Request For Comments (RFC).
■ Data: Zero or more bytes that contain the datagram for the protocol specified in
the Protocol field. The end of the Information field is found by locating the clos-
ing flag sequence and allowing 2 bytes for the FCS field. The default maximum
length of the Information field is 1500 bytes. By prior agreement, consenting
PPP implementations can use other values for the maximum Information field
length.
■ Frame Check Sequence (FCS): Normally 16 bits (2 bytes). By prior agreement,
consenting PPP implementations can use a 32-bit (4-byte) FCS for improved
error detection. If the receiver’s calculation of the FCS does not match the FCS
in the PPP frame, the PPP frame is silently discarded.
LCPs can negotiate modifications to the standard PPP frame structure. Modified
frames, however, are always distinguishable from standard frames.
The link remains configured for communications until explicit LCP or NCP frames
close the link, or until some external event occurs such as an inactivity timer expir-
ing, or an administrator intervening.
The LCP can terminate the link at any time. This is usually done when one of the
routers requests termination, but can happen because of a physical event, such as the
loss of a carrier or the expiration of an idle-period timer.
Link Establishment
Link establishment is the first phase of LCP operation, as seen in Figure 3-24.
This phase must complete successfully, before any network layer packets can be
exchanged. During link establishment, the LCP opens the connection and negotiates
the configuration parameters. The link establishment process starts with the initiating
device sending a Configure-Request frame to the responder. The Configure-Request
frame includes a variable number of configuration options needed to set up on the
link.
The initiator includes the options for how it wants the link created, including proto-
col or authentication parameters. The responder processes the request:
■ If the options are not acceptable or not recognized, the responder sends a
Configure-Nak or Configure-Reject message. If this occurs and the negotiation
fails, the initiator must restart the process with new options.
■ If the options are acceptable, the responder responds with a Configure-Ack mes-
sage and the process moves on to the authentication stage. The operation of the
link is handed over to the NCP.
When NCP has completed all necessary configurations, including validating authen-
tication if configured, the line is available for data transfer. During the exchange of
data, LCP transitions into link maintenance.
Link Maintenance
During link maintenance, LCP can use messages to provide feedback and test the
link, as shown in Figure 3-25.
■ Echo-Request, Echo-Reply, and Discard-Request: These frames can be used for
testing the link.
■ Code-Reject and Protocol-Reject: These frame types provide feedback when
one device receives an invalid frame due to either an unrecognized LCP code
(LCP frame type) or a bad protocol identifier. For example, if an uninterpretable
packet is received from the peer, a Code-Reject packet is sent in response. The
sending device will resend the packet.
Link Termination
After the transfer of data at the network layer completes, the LCP terminates the link,
as shown in Figure 3-26. NCP only terminates the network layer and NCP link. The
link remains open until the LCP terminates it. If the LCP terminates the link before
NCP, the NCP session is also terminated.
PPP can terminate the link at any time. This might happen because of the loss of the
carrier, authentication failure, link quality failure, the expiration of an idle-period
timer, or the administrative closing of the link. The LCP closes the link by exchang-
ing Terminate packets. The device initiating the shutdown sends a Terminate-Request
message. The other device replies with a Terminate-Ack. A termination request indi-
cates that the device sending it needs to close the link. When the link is closing, PPP
informs the network layer protocols so that they may take appropriate action.
■ Length: The Length field is 2 bytes in length and indicates the total length
(including all fields) of the LCP packet.
■ Data: The Data field is 0 or more bytes as indicated by the length field. The for-
mat of this field is determined by the code.
Each LCP packet is a single LCP message consisting of an LCP Code field identify-
ing the type of LCP packet, an identifier field so that requests and replies can be
matched, and a Length field indicating the size of the LCP packet and LCP packet
type-specific data.
Each LCP packet has a specific function in the exchange of configuration informa-
tion depending on its packet type. The Code field of the LCP packet identifies the
packet type according to Table 3-4.
2 Configure-Ack Sent when all of the values of all of the LCP options
in the last Configure-Request received are recognized
and acceptable. When both PPP peers send and receive
Configure-Acks, the LCP negotiation is complete.
3 Configure-Nak Sent when all the LCP options are recognized, but the
values of some options are not acceptable. Configure-Nak
includes the mismatching options and their acceptable
values.
To negotiate the use of these PPP options, the LCP link-establishment frames contain
option information in the data field of the LCP frame, as shown in Figure 3-29. If a
configuration option is not included in an LCP frame, the default value for that con-
figuration option is assumed.
This phase is complete when a configuration acknowledgment frame has been sent
and received.
NCP Process
Although initially designed for IP packets, PPP can carry data from multiple network
layer protocols by using a modular approach in its implementation. PPP’s modular
model allows LCP to set up the link and then transfer the details of a network pro-
tocol to a specific NCP. Each network protocol has a corresponding NCP and each
NCP has a corresponding RFC.
There are NCPs for IPv4, IPv6, IPX, AppleTalk, and many others. NCPs use the same
packet format as the LCPs.
After the LCP has configured and authenticated the basic link, the appropriate NCP
is invoked to complete the specific configuration of the network layer protocol being
used. When the NCP has successfully configured the network layer protocol, the
network protocol is in the open state on the established LCP link. At this point, PPP
can carry the corresponding network layer protocol packets.
IPCP Example
As an example of how the NCP layer works, the NCP configuration of IPv4, which
is the most common Layer 3 protocol, is shown in Figure 3-30. After LCP has estab-
lished the link, the routers exchange IPCP messages, negotiating options specific to
the IPv4 protocol. IPCP is responsible for configuring, enabling, and disabling the
IPv4 modules on both ends of the link. IPv6CP is an NCP with the same responsibili-
ties for IPv6.
IPCP negotiates two options:
■ Compression: Allows devices to negotiate an algorithm to compress TCP and
IP headers and save bandwidth. The Van Jacobson TCP/IP header compression
reduces the size of the TCP/IP headers to as few as 3 bytes. This can be a signifi-
cant improvement on slow serial lines, particularly for interactive traffic.
■ IPv4-Address: Allows the initiating device to specify an IPv4 address to use
for routing IP over the PPP link, or to request an IPv4 address for the responder.
Prior to the advent of broadband technologies such as DSL and cable modem
services, dialup network links commonly used the IPv4 address option.
After the NCP process is complete, the link goes into the open state, and LCP takes
over again in a link maintenance phase. Link traffic consists of any possible combina-
tion of LCP, NCP, and network layer protocol packets. When data transfer is com-
plete, NCP terminates the protocol link; LCP terminates the PPP connection.
Interactive Activity 3.2.3.6: Identify the Steps in the LCP Link Negotiation Process
Graphic Go to the course online to perform this practice activity.
When options are configured, a corresponding field value is inserted into the LCP
option field, shown in Table 3-5.
The encapsulation ppp interface command has no arguments. Remember that if PPP
is not configured on a Cisco router, the default encapsulation for serial interfaces is
HDLC.
Figure 3-31 and the listing that follows, shows that routers R1 and R2 have been con-
figured with both an IPv4 and an IPv6 address on the serial interfaces. PPP is a Layer
2 encapsulation that supports various Layer 3 protocols including IPv4 and IPv6.
The following example shows predictor compression used between R1 and R2:
Partial running-config for R1
hostname R1
!
encapsulation ppp
compress predictor
Use the no ppp quality command to disable LQM. The following example shows link
quality being used between R1 and R2:
load on just inbound traffic, or on just outbound traffic, but not on the combined
load of both inbound and outbound traffic.
Configuring MPPP requires two steps.
Step 1. Create a multilink bundle.
The interface multilink number command creates the multilink interface.
In interface configuration mode, an IP address is assigned to the multilink
interface. In this example, both IPv4 and IPv6 addresses are configured on
routers R3 and R4.
The interface is enabled for multilink PPP.
The interface is assigned a multilink group number.
Step 2. Assign interfaces to the multilink bundle. Each interface that is part of the
multilink group:
Is enabled for PPP encapsulation.
Is enabled for multilink PPP.
Is bound to the multilink bundle using the multilink group number config-
ured in Step 1.
The following example shows multilink PPP configured between R3 and R4:
Partial running-config for R3
hostname R3
!
interface Multilink 1
ip address 10.0.1.1 255.255.255.252
ipv6 address 2001:db8:cafe:1::1/64
ppp multilink
ppp multilink group 1
!
interface Serial 0/1/0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
!
interface Serial 0/1/1
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
When you configure HDLC, the output of the show interfaces serial command
should display encapsulation HDLC. When PPP is configured, the LCP and NCP
states also display. Notice that NCPs IPCP and IPv6CP are open for IPv4 and IPv6
because R1 and R2 were configured with both IPv4 and IPv6 addresses.
Table 3-6 summarizes commands used when verifying PPP.
show interfaces Displays statistics for all interfaces configured on the router.
The show ppp multilink command verifies that PPP multilink is enabled on R3, as
shown in Example 3-4. The output indicates the interface Multilink 1, the hostnames
of both the local and remote endpoints, and the serial interfaces assigned to the mul-
tilink bundle.
PAP is a very basic two-way process. There is no encryption. The username and pass-
word are sent in plaintext. If it is accepted, the connection is allowed. CHAP is more
secure than PAP. It involves a three-way exchange of a shared secret.
The authentication phase of a PPP session is optional. If used, the peer is authenticated
after LCP establishes the link and chooses the authentication protocol. If it is used,
authentication takes place before the network layer protocol configuration phase begins.
The authentication options require that the calling side of the link enter authentica-
tion information. This helps to ensure that the user has the permission of the network
administrator to make the call. Peer routers exchange authentication messages.
Initiating PAP
PAP provides a simple method for a remote node to establish its identity using a two-
way handshake. PAP is not interactive. When the ppp authentication pap command
is used, the username and password are sent as one LCP data package, rather than the
server sending a login prompt and waiting for a response, as shown in Figure 3-34.
After PPP completes the link establishment phase, the remote node repeatedly sends
a username-password pair across the link until the receiving node acknowledges it or
terminates the connection.
Completing PAP
At the receiving node, the username-password is checked by an authentication server
that either allows or denies the connection. An accept or reject message is returned
to the requester, as shown in Figure 3-35.
PAP is not a strong authentication protocol. Using PAP, passwords are sent across
the link in plaintext, and there is no protection from playback or repeated trial-and-
error attacks. The remote node is in control of the frequency and timing of the login
attempts.
Nonetheless, there are times when using PAP can be justified. For example, despite its
shortcomings, PAP may be used in the following environments:
■ A large installed base of client applications that do not support CHAP
■ Incompatibilities between different vendor implementations of CHAP
■ Situations where a plaintext password must be available to simulate a login at the
remote host
The remote node responds with a value calculated using a one-way hash function,
which is typically message digest 5 (MD5) based on the password and challenge
message, as shown in Figure 3-37.
The local router checks the response against its own calculation of the expected hash
value. If the values match, the initiating node acknowledges the authentication, as
shown in Figure 3-38. If the value does not match, the initiating node immediately
terminates the connection.
CHAP provides protection against playback attack by using a variable challenge value
that is unique and unpredictable. Because the challenge is unique and random, the
resulting hash value is also unique and random. The use of repeated challenges limits
the time of exposure to any single attack. The local router or a third-party authenti-
cation server is in control of the frequency and timing of the challenges.
For example, if an incoming PPP request requires no authentication, then PPP pro-
gresses to the next level. If an incoming PPP request requires authentication, then it
can be authenticated using either the local database or a security server. As illustrat-
ed in the flowchart, successful authentication progresses to the next level, while an
authentication failure disconnects and drops the incoming PPP request.
1 Establish Link
R1 R2
Establish Link
R1 R2
01 ID Random R2 2
Step 3. As shown in Figure 3-42, R1 uses the username of the challenger (R2) and
cross references it with its local database to find its associated password.
R1 then generates a unique MD5 hash number using the R2’s username,
ID, random number and the shared secret password. In this example, the
shared secret password is boardwalk.
Establish Link
R1 R2
User Pass
3 01 ID Random R2
R2 Boardwalk
MD5
Hash
Step 4. As shown in Figure 3-43, Router R1 then sends the challenge ID, the
hashed value, and its username (R1) to R2.
Establish Link
R1 R2
User Pass
01 ID Random R2
R2 Boardwalk
4 02 ID Hash R1
MD5
Hash
Step 5. As shown in Figure 3-44, R2 generates its own hash value using the ID, the
shared secret password, and the random number it originally sent to R1.
Establish Link
R1 R2
User R1 Pass
Boardwalk
User Pass
01 ID Random R2
R2 Boardwalk
02 ID Hash R1
MD5
Hash
=?
MD5
Hash
Step 6. As shown in Figure 3-45, R2 compares its hash value with the hash value
sent by R1. If the values are the same, R2 sends a link established response
to R1.
Establish Link
R1 R2
User R1 Pass
Boardwalk
User Pass
01 ID Random R2
R2 Boardwalk
02 ID Hash R1
MD5
Hash
MD5
If the authentication failed, a CHAP failure packet is built from the following
components:
■ 04 = CHAP failure message type
■ id = copied from the response packet
■ “Authentication failure” or some similar text message, which is meant to be a
user-readable explanation
chap pap Enables both CHAP and PAP on serial interface, and performs
CHAP authentication before PAP.
pap chap Enables both CHAP and PAP on serial interface, and performs PAP
authentication before CHAP.
if-needed (Optional) Used with TACACS and XTACACS. Do not perform CHAP or PAP
authentication if the user has already provided authentication. This
option is available only on asynchronous interfaces.
list-name (Optional) Used with AAA/TACACS+. Specifies the name of a list of TACACS+
methods of authentication to use. If no list name is specified, the
system uses the default. Lists are created with the aaa authentication
ppp command.
default (Optional) Used with AAA/TACACS+. Created with the aaa authentication
ppp command.
After you have enabled CHAP or PAP authentication, or both, the local router
requires the remote device to prove its identity before allowing data traffic to flow.
This is done as follows:
■ PAP authentication requires the remote device to send a name and password to
be checked against a matching entry in the local username database or in the
remote TACACS/TACACS+ database.
■ CHAP authentication sends a challenge to the remote device. The remote device
must encrypt the challenge value with a shared secret and return the encrypted
value and its name to the local router in a response message. The local router
uses the name of the remote device to look up the appropriate secret in the local
username or remote TACACS/TACACS+ database. It uses the looked-up secret
to encrypt the original challenge and verify that the encrypted values match.
Note
Authentication, authorization, and accounting (AAA)/TACACS is a dedicated server used to
authenticate users. TACACS clients send a query to a TACACS authentication server. The serv-
er can authenticate the user, authorize what the user can do, and track what the user has done.
Either PAP or CHAP or both can be enabled. If both methods are enabled, the first
method specified is requested during link negotiation. If the peer suggests using the
second method or simply refuses the first method, the second method should be tried.
Some remote devices support CHAP only and some PAP only. The order in which you
specify the methods is based on your concerns about the ability of the remote device
to correctly negotiate the appropriate method as well as your concern about data line
security. PAP usernames and passwords are sent as plaintext strings and can be inter-
cepted and reused. CHAP has eliminated most of the known security holes.
PAP provides a simple method for a remote node to establish its identity using a
two-way handshake. This is done only on initial link establishment. The hostname
on one router must match the username the other router has configured for PPP. The
passwords must also match. Specify the username and password parameters, use the
following command: ppp pap sent-username name password password.
Interactive
Activity 3.3.2.6: PPP CHAP Authentication
Graphic Go to the course online to use the Syntax Checker to configure CHAP authentica-
tion on router R1’s serial 0/0/1 interface.
Use the debug ppp command to display information about the operation of PPP.
Table 3-8 shows the command syntax. Use the no form of this command to disable
debugging output.
packet Displays PPP packets being sent and received. (This command
displays low-level packet dumps.)
negotiation Displays PPP packets transmitted during PPP startup, where PPP
options are negotiated.
error Displays protocol errors and error statistics associated with PPP
connection negotiation and operation.
Use the debug ppp command when trying to search the following:
■ NCPs that are supported on either end of a PPP connection
■ Any loops that might exist in a PPP internetwork
■ Nodes that are (or are not) properly negotiating PPP connections
■ Errors that have occurred over the PPP connection
■ Causes for CHAP session failures
■ Causes for PAP session failures
■ Information specific to the exchange of PPP connections using the Callback
Control Protocol (CBCP), used by Microsoft clients
■ Incorrect packet sequence number information where MPPC compression is
enabled
Example 3-6 displays the debug ppp negotiation command in a normal negotia-
tion, where both sides agree on NCP parameters. In this case, protocol types IPv4
and IPv6 are proposed and acknowledged. The debug ppp negotiation command
enables the network administrator to view the PPP negotiation transactions, identify
the problem or stage when the error occurs, and develop a resolution. The output
includes the LCP negotiation, authentication, and NCP negotiation.
The debug ppp error command is used to display protocol errors and error statistics
associated with PPP connection negotiation and operation, as shown in Example 3-7.
These messages might appear when the Quality Protocol option is enabled on an
interface that is already running PPP.
Note
Never assume your authentication configuration works without testing it. Debugging allows
you to confirm your configuration and correct any deficiencies. For debugging PPP authenti-
cation, use the debug ppp authentication command.
Summary (3.5)
Class Activity 3.5.1.1: PPP Validation
Three friends who are enrolled in the Cisco Networking Academy want to check their
knowledge of PPP network configuration.
They set up a contest where each person will be tested on configuring PPP with
defined PPP scenario requirements and varying options. Each person devises a differ-
ent configuration scenario.
The next day they get together and test each other’s configuration using their PPP
scenario requirements.
Serial transmissions sequentially send 1 bit at a time over a single channel. A serial
port is bidirectional. Synchronous serial communications require a clocking signal.
Point-to-Point links are usually more expensive than shared services; however, the
benefits may outweigh the costs. Constant availability is important for some proto-
cols, such as VoIP.
SONET is an optical network standard that uses STDM for efficient use of band-
width. In the United States, OC transmission rates are standardized specifications for
SONET.
The bandwidth hierarchy used by carriers is different in North America (T-carrier)
and Europe (E-carrier). In North America, the fundamental line speed is 64 Kbps, or
DS0. Multiple DS0s are bundled together to provide higher line speeds.
The demarcation point is the point in the network where the responsibility of the ser-
vice provider ends and the responsibility of the customer begins. The CPE, usually a
router, is the DTE device. The DCE is usually a modem or CSU/DSU.
A null modem cable is used to connect two DTE devices together without the need
for a DCE device by crossing the Tx and Rx lines. When using this cable between
routers in a lab, one of the routers must provide the clocking signal.
Practice
The following activities provide practice with the topics introduced in this chap-
ter. The Labs and Class Activities are available in the companion Introduction to
Connecting Networks Lab Manual (978-1-58713-331-2). The Packet Tracer Activity
PKA files are found in the online course.
Class Activities
Class Activity 3.0.1.2: PPP Persuasion
Class Activity 3.5.1.1: PPP Validation
Labs
Lab 3.3.2.8: Configuring Basic PPP with Authentication
Lab 3.4.1.5: Troubleshooting Basic PPP with Authentication
2. Which output from the show interfaces s0/0/0 command indicates that the far
end of a point-to-point link has a different encapsulation set than the local router?
A. Serial 0/0/0 is down, line protocol is down.
B. Serial 0/0/0 is up, line protocol is down.
C. Serial 0/0/0 is up, line protocol is up (looped).
D. Serial 0/0/0 is up, line protocol is down (disabled).
E. Serial 0/0/0 is administratively down, line protocol is down.
Error control:
Authentication protocols:
Allows load balancing:
Compression protocols:
A. Stacker/predictor
B. Magic number
C. Multilink
D. CHAP/PAP
E. Call in
7. Which of the following describes the serial connection between two routers
using the High-level Data Link Control (HDLC) protocol?
A. Synchronous or asynchronous bit-oriented transmissions using a universal
frame format
B. Synchronous bit-oriented transmissions using a frame format that allows flow
control and error detection
C. Asynchronous bit-oriented transmissions using a frame format derived from
the Synchronous Data Link Control (SDLC) protocol
D. Asynchronous bit-oriented transmissions using a V.35 DTE/DCE interface
14. For each characteristic, indicate whether it is associated with PAP or CHAP:
Two-way handshake:
Three-way handshake:
Open to trial-and-error attacks:
Password sent in cleartext:
Periodic verification:
Uses a one-way hash function:
15. For each description, indicate whether it is associated with LCP or NCP:
18. Refer to the following configurations for Router R1 and Router R3:
hostname R1
username R1 password cisco123
!
int serial 0/0
ip address 128.0.1.1 255.255.255.0
encapsulation ppp
ppp authentication pap
-----------------------------
hostname R3
username R1 password cisco
!
int serial 0/0
ip address 128.0.1.2 255.255.255.0
encapsulation ppp
ppp authentication CHAP
Router R1 is unable to connect with Router R3. On the basis of the information
presented, which configuration changes on Router R1 would correct the prob-
lem?