<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PAP Authentication Protocol in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/3914797#M38721</link>
    <description>&lt;P&gt;Hi Clark,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added a comment on this post about your question =&amp;gt; &lt;A href="https://community.cisco.com/t5/routing/does-cisco-support-strong-remote-network-authentication/m-p/2767297/highlight/false#M257295" target="_blank"&gt;https://community.cisco.com/t5/routing/does-cisco-support-strong-remote-network-authentication/m-p/2767297/highlight/false#M257295&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I think I reply to your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Aug 2019 15:52:58 GMT</pubDate>
    <dc:creator>jeremytetart</dc:creator>
    <dc:date>2019-08-27T15:52:58Z</dc:date>
    <item>
      <title>PAP Authentication Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988903#M38716</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;when&amp;nbsp;I do&amp;nbsp;ssh&amp;nbsp;&amp;nbsp;to switches the authentication protocol and in authentication details in the attached snapshot&amp;nbsp;I see the protocol as a PAP_ASCII which is been used.&lt;/P&gt;
&lt;P&gt;As I know the PAP is clear text password authentication protocol, so how I can justify to anybody the connection to my switch is secure.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 07:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988903#M38716</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2019-03-11T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Enabling PAP as an</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988904#M38717</link>
      <description>&lt;P&gt;Enabling PAP as an authentication protocol with Radius+ means that &lt;STRONG&gt;user passwords are sent from a client to a NAS in plaintext form.&lt;/STRONG&gt; The NAS ( switch / Router / WLC / ASA etc) encrypts the user's password using the shared secret and sends it in an Access-Request packet. &lt;/P&gt;
&lt;P&gt;RADIUS encrypts only the password in the access-request packet, from the client to the server. The remainder of the packet is unencrypted. Other information, such as username, authorized services, and accounting, can be captured by a third party &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;...so yes it's less secure when we compare against TACACS because TACACS+ encrypts the entire body of the packet but leaves a standard TACACS+ header.&lt;/P&gt;
&lt;P&gt;https://technet.microsoft.com/en-us/library/cc958013.aspx&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rgds,&lt;/P&gt;
&lt;P&gt;Jatin&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;~ Do rate helpful posts.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 16:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988904#M38717</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-08-16T16:45:25Z</dc:date>
    </item>
    <item>
      <title>Dear Jatin,</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988905#M38718</link>
      <description>&lt;P&gt;Dear Jatin,&lt;/P&gt;
&lt;P&gt;thanks for the reply, In such situation how I can avoid PAP, whenever I do ssh or telnet the connection details shows me PAP_ASCII protocol if I don't allow PAP the connection will not be established.??&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 19:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988905#M38718</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-08-16T19:53:32Z</dc:date>
    </item>
    <item>
      <title>So the only way to access the</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988906#M38719</link>
      <description>&lt;P&gt;So the only way to access the managed device securely is to use SSH and avoid TELNET. from NAS to AAA server ( Radius), your password is anyway encrypted.&lt;/P&gt;
&lt;P&gt;You may want to read the detailed discussion here:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/12668396/does-cisco-support-strong-remote-network-authentication-protocols&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rgds,&lt;/P&gt;
&lt;P&gt;Jatin&lt;/P&gt;
&lt;P&gt;~ Do rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 20:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988906#M38719</guid>
      <dc:creator>Jatin Katyal</dc:creator>
      <dc:date>2016-08-16T20:05:27Z</dc:date>
    </item>
    <item>
      <title>+5 to you expert</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988907#M38720</link>
      <description>&lt;P&gt;+5 to you expert&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 20:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/2988907#M38720</guid>
      <dc:creator>clark white</dc:creator>
      <dc:date>2016-08-16T20:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: PAP Authentication Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/3914797#M38721</link>
      <description>&lt;P&gt;Hi Clark,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added a comment on this post about your question =&amp;gt; &lt;A href="https://community.cisco.com/t5/routing/does-cisco-support-strong-remote-network-authentication/m-p/2767297/highlight/false#M257295" target="_blank"&gt;https://community.cisco.com/t5/routing/does-cisco-support-strong-remote-network-authentication/m-p/2767297/highlight/false#M257295&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I think I reply to your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 15:52:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/3914797#M38721</guid>
      <dc:creator>jeremytetart</dc:creator>
      <dc:date>2019-08-27T15:52:58Z</dc:date>
    </item>
    <item>
      <title>Re: PAP Authentication Protocol</title>
      <link>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/5299604#M596784</link>
      <description>&lt;P&gt;Hi As I understood. PAP_ASCII is plain text but when you use from your laptop SSH then all traffic is encrytped and PAP_ASCII not used.&amp;nbsp;Then between NAS and ISE PAP ASCII is running and it's encrypted by TACACS+.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2025 13:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/pap-authentication-protocol/m-p/5299604#M596784</guid>
      <dc:creator>pafcio84</dc:creator>
      <dc:date>2025-06-16T13:16:59Z</dc:date>
    </item>
  </channel>
</rss>

