CCNA Packet Tracer WAN Lab1: Configuring HDLC and PAP
CCNA Packet Tracer WAN Lab1: Configuring HDLC and PAP
CCNA Packet Tracer WAN Lab1: Configuring HDLC and PAP
Contents
Overview: ...................................................................................................................................................... 1
Learning Objectives:...................................................................................................................................... 2
WAN Technologies: ....................................................................................................................................... 2
HDLC Encapsulation: ................................................................................................................................. 2
PPP Encapsulation:.................................................................................................................................... 2
PAP: ....................................................................................................................................................... 2
CHAP: .................................................................................................................................................... 3
Tasks:............................................................................................................................................................. 3
Basic Configuration: .................................................................................................................................. 3
LAN Configuration: .................................................................................................................................... 3
WAN Configuration: .................................................................................................................................. 3
Connecting Routers Using Serial: .......................................................................................................... 3
HDLC: ..................................................................................................................................................... 3
PPP Encapsulation: ................................................................................................................................ 5
PPP Authentication: .................................................................................................................................. 6
PAP: ....................................................................................................................................................... 6
CHAP: .................................................................................................................................................... 7
CHAP Method 1:.................................................................................................................................... 7
The purpose of this lab is to provide a better understanding of WAN technologies, how to configure and
troubleshoot them on Cisco routers. In this lab will explore several types of WAN including HDLC, PPP,
and Frame-Relay. This knowledge is essential to passing the CCNA exam and will be used in daily in your
position as a Cisco network engineer.
Overview:
A wide area network (WAN) is a network that covers a broad area such as metropolitan, regional, or
national and international boundaries. Wide area network may be privately owned or rented but
typically computers connected to a wide-area network are frequently connected through public
networks, such as the telephone system. They can also be connected through leased lines or satellites.
The largest WAN in existence is the Internet.
Learning Objectives:
• Review basic router and switch configuration.
• Configure back-to-back serial connections.
• HDLC Encapsulation.
• PPP Encapsulation.
• PPP Authentication using PAP.
• PPP Authentication using CHAP.
WAN Technologies:
HDLC Encapsulation:
The HDLC protocol is a general purpose protocol which operates at the data link layer of the OSI
reference model. The protocol uses the services of a physical layer, and provides either a best effort or
reliable communications path between the transmitter and receiver (i.e. with acknowledged data
transfer). The type of service provided depends upon the HDLC mode which is used.
Each piece of data is encapsulated in an HDLC frame by adding a trailer and a header. The header
contains an HDLC address and an HDLC control field. The trailer is found at the end of the frame, and
contains a Cyclic Redundancy Check (CRC) which detects any errors which may occur during
transmission. The frames are separated by HDLC flag sequences which are transmitted between each
frame and whenever there is no data to be transmitted.
PPP Encapsulation:
PPP (Point-to-Point Protocol) is a protocol for communication between two routers using a serial
interface. PPP uses the Internet protocol (IP) (and is designed to handle others). It is sometimes
considered a member of the TCP/IP suite of protocols. Relative to the Open Systems Interconnection
(OSI) reference model, PPP provides layer 2 (data-link layer) services. Essentially, it packages your TCP/IP
packets and forwards them to an upstream router where they can actually be put on the Internet.
PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber
optic lines or satellite transmission. It uses a variation of High Speed Data Link Control (HDLC) for packet
encapsulation.
Point-to-Point Protocol (PPP) currently supports two authentication protocols: Password Authentication
Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP). Both are specified in RFC 1334
and are supported on synchronous and asynchronous interfaces.
PAP:
PAP provides a simple method for a remote node to establish its identity using a two-way handshake.
After the PPP link establishment phase is complete, a username and password pair is repeatedly sent by
the remote node across the link (in clear text) until authentication is acknowledged, or until the
connection is terminated.
PAP transmits unencrypted ASCII passwords over the network and is therefore considered unsecure. It is
used as a last resort when the remote server does not support a stronger authentication protocol, like
CHAP or EAP (the latter is actually a framework).
CHAP:
CHAP (Challenge-Handshake Authentication Protocol) is a more secure procedure for connecting to a
system than the Password Authentication Procedure (PAP). Here's how CHAP works:
1. After the link is made, the server sends a challenge message to the connection requestor. The
requestor responds with a value obtained by using a one-way hash function.
2. The server checks the response by comparing it its own calculation of the expected hash value.
3. If the values match, the authentication is acknowledged; otherwise the connection is usually
terminated.
At any time, the server can request the connected party to send a new challenge message. Because
CHAP identifiers are changed frequently and because authentication can be requested by the server at
any time, CHAP provides more security than PAP. RFC1334 defines both CHAP and PAP.
Tasks:
Basic Configuration:
1. Configure the hostnames on all routers as illustrated in the topology.
2. Configure the hostnames on all switches as illustrated in the topology.
3. Configure no domain-lookup on all routers and switches.
LAN Configuration:
1. Assign IP address and subnet to GigabitEthernet interfaces of R1 and R3 as shown in the
network drawing.
2. Insure GigabitEthernet interfaces are not administratively down.
WAN Configuration:
Connecting Routers Using Serial:
In this first part of this lab we will configure two routers back to back using serial connections and verify
the HDLC encapsulation. Because routers normally receive clocking from an external device such as a
CSU/DSU, it is important to understand how to configure the serial clocks on the correct serial interface
when setting up back-to-back Serial connection between two routers.
HDLC:
1. On routers R3 and R4 assign an IP address as shown in the network diagram.
2. Insure serial interfaces S0/0/1 are not administratively down.
3. On R4 display the controller for interface S0/0/1.
7. On R3 ping 10.1.1.2
R3#ping 10.1.1.2
Note: that the encapsulation on serial interface S0/0/1 is HDLC This is the default encapsulation
method for serial connection on Cisco routers.
PPP Encapsulation:
PPP encapsulation is one of the most popular Layer 2 protocols used on WANs, and in the second part of
our lab we will learn to configure and verify PPP encapsulation on two routers connected back to back
using a serial connection.
3. On R3 ping 10.1.1.2.
R3#ping 10.1.1.2
PPP Authentication:
One of the main reasons that PPP is so popular is because it has the capability to be secured and devices
communicating using PPP can be authenticated. In this part of our lab we will learn to configure two
forms of PPP authentication PAP and CHAP.
PAP:
PAP authentication is the least preferred method to secure PPP as it sends usernames and passwords in
clear text.
CHAP:
The recommended and most common means to secure and authenticate via PPP is to use Challenge
Handshake Authentication Protocol, or CHAP. There are two methods used when configuring CHAP
authentication, but do to the limitations of Packet Tracer we will only demonstrate the first method
here.
CHAP Method 1:
By default, there is no need to configure a hostname to be used for CHAP authentication on Cisco IOS
routers as they will use the hostname configured on the router. There is also no need to define a
password to be used for authentication since CHAP does not send the passwords across the link like
PAP. Therefore, a hash will be created using the configured passwords in the username command.
These passwords must be identical on both routers, otherwise authentication will fail!
R3#config t
R3(config)#interface s0/0/1
R3(config-if)#no ppp authentication pap
R3(config-if)#no ppp pap sent-username R3
R4#config t
R4(config)#interface s0/0/1
R4(config-if)#no ppp authentication pap
R4(config-if)#no ppp pap sent-username R4
This concludes this free CCNA lab I hope you found it hepful.