Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 860, 880 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    Americas Headquarters
    Cisco Systems, Inc.
    170 West Tasman Drive
    San Jose, CA 95134-1706 
    USA
    http://www.cisco.com
    Tel: 408 526-4000
    800 553-NETS (6387)
    Fax: 408 527-0883
    Cisco 860 and Cisco 880 Series Integrated 
    Services Routers Software Configuration 
    Guide
    Customer Order Number: Text Part Number: 78-xxxxx-xx 
    						
    							 
    THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL 
    STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT 
    WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT 
    SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE 
    OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public 
    domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. 
    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH 
    ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT 
    LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF 
    DEALING, USAGE, OR TRADE PRACTICE.
    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, 
    WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO 
    OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the 
    document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
    Cisco 860 and Cisco 880 Series Integrated Services Routers Software Configuration Guide © 2008 Cisco Systems, Inc. All rights reserved.
    CCVP, the Cisco logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, 
    Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, 
    FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, 
    MeetingPlace, MGX, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and 
    TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. 
    All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship 
    between Cisco and any other company. (0709R) 
    						
    							 
    iii
    Book Title
    78-xxxxx-xx
    CONTENTS
    78-xxxxx-xx i
    Preface     xv
    Objective     xv
    Audience     xv
    Organization     xvi
    Conventions     xvii
    Related Documentation     xviii
    Searching Cisco Documents     xix
    Obtaining Documentation and Submitting a Service Request     xix
    Overview/Getting Started
    CHAPTER 1Product Overview     1-1
    General Description     1-1
    Cisco 860 Series ISRs     1-1
    4-port 10/100 FE LAN Switch     1-1
    Security Features     1-2
    802.11n Wireless LAN Option     1-2
    Cisco 880 Series ISRs     1-2
    Models of the Cisco 880 Series ISRs     1-2
    Common Features     1-3
    Voice Features     1-4
    Licensing     1-4
    Selecting Feature Sets     1-5
    CHAPTER 2Wireless Device Overview     2-1
    Management Options     2-1
    Network Configuration Examples     2-2
    Root Access Point     2-2
    Central Unit in an All-Wireless Network     2-3
    CHAPTER 3Basic Router Configuration     3-1
    Interface Ports     3-2 
    						
    							 
    Contents
    iv
    Book Title
    78-xxxxx-xx
    Default Configuration     3-2
    Information Needed for Configuration     3-4
    Configuring Basic Parameters     3-5
    Configuring Global Parameters     3-6
    Configuring the Fast Ethernet LAN Interfaces     3-6
    Configuring WAN Interfaces     3-6
    Configuring a Wireless Interface     3-10
    Configuring a Loopback Interface     3-10
    Configuring Command-Line Access     3-12
    Configuring Static Routes     3-14
    Example     3-15
    Verifying Configuration     3-15
    Configuring Dynamic Routes     3-15
    Configuring Routing Information Protocol     3-16
    Configuring Enhanced Interior Gateway Routing Protocol     3-17
    Example     3-18
    Verifying Configuration     3-18
    CHAPTER 4Basic Wireless Device Configuration     4-1
    Establishing a Wireless Configuration Session     4-1
    Closing the Session     4-3
    Configuring Basic Settings     4-4
    Cisco Express Setup     4-4
    Cisco IOS Setup     4-4
    Configuring Wireless Security Settings     4-9
    Using VLANs     4-9
    Configuring Wireless Quality of Service     4-10
    Configuring the Router
    CHAPTER 5Configuring Backup Data Lines and Remote Management     5-1
    Configuring Backup Interfaces     5-2
    Configuring Dial Backup and Remote Management Through the Console or Auxiliary Port     5-2
    Example     5-6
    Configuring Data Line Backup and Remote Management Through the ISDN S/T Port     5-8
    Configuring ISDN Settings     5-10
    Configuring Aggregator and ISDN Peer Router     5-13
    Configuring the Cellular Wireless Interface     5-15 
    						
    							 
    Contents
    v
    Book Title
    78-xxxxx-xx
    Restrictions for Configuring Cellular Wireless Interface     5-15
    Configuring Data Account Provisioning     5-15
    Configuring DDR     5-21
    Configuring DDR Backup     5-23
    Examples for Configuring Cellular Wireless Interfaces     5-26
    Basic Cellular Interface Configuration     5-26
    Tunnel over Cellular Interface Configuration     5-27
    Cellular Wireless Modem as Backup with NAT and IPsec Configuration     5-27
    Configuring Cellular Wireless Interface Data Line Backup     5-31
    CHAPTER 6Configuring Security Features     6-1
    Authentication, Authorization, and Accounting     6-1
    Configuring AutoSecure     6-2
    Configuring Access Lists     6-2
    Access Groups     6-3
    Configuring Cisco IOS Firewall     6-3
    Configuring Cisco IOS IPS     6-4
    URL Filtering     6-4
    Cisco Adaptive Control Technology     6-4
    Configuring VPN     6-5
    Configure a VPN over an IPSec Tunnel     6-7
    Create a Cisco Easy VPN Remote Configuration     6-14
    Configure a Site-to-Site GRE Tunnel     6-16
    CHAPTER 7Configuring the Ethernet Switches     7-1
    Switch Port Numbering and Naming     7-1
    Restrictions for the FE Switch     7-1
    Information About Ethernet Switches     7-2
    VLANs and VLAN Trunk Protocol     7-2
    Inline Power     7-2
    Layer 2 Ethernet Switching     7-2
    802.1x Authentication     7-3
    Spanning Tree Protocol     7-3
    Cisco Discovery Protocol     7-3
    Switched Port Analyzer     7-3
    IGMP Snooping     7-3
    Storm Control     7-4
    Fallback Bridging     7-4 
    						
    							 
    Contents
    vi
    Book Title
    78-xxxxx-xx
    How to Configure Ethernet Switches     7-4
    Configuring VLANs     7-4
    Configuring Layer 2 Interfaces     7-6
    Configuring 802.1x Authentication     7-6
    Configuring Spanning Tree Protocol     7-6
    Configuring MAC Table Manipulation     7-7
    Configuring Cisco Discovery Protocol     7-7
    Configuring the Switched Port Analyzer     7-7
    Configuring Power Management on the Interface     7-8
    Configuring IP Multicast Layer 3 Switching     7-8
    Configuring IGMP Snooping     7-8
    Configuring Per-Port Storm Control     7-9
    Configuring Fallback Bridging     7-9
    Configuring Separate Voice and Data Subnets     7-9
    Managing the Switch     7-10
    CHAPTER 8Configuring Voice Functionality     8-1
    Voice Ports     8-1
    Analog and Digital Voice Port Assignments     8-1
    Voice Port Configuration     8-2
    Call Control Protocols     8-2
    Session Initiation Protocol (SIP)     8-2
    Media Gateway Control Protocol (MGCP)     8-2
    H.323     8-3
    Dial Peer Configuration     8-3
    Other Voice Features     8-3
    Real-Time Transport Protocols     8-3
    Dual Tone Multi Frequency Relay     8-4
    CODECs     8-4
    SCCP-Controlled Analog Ports with Supplementary Features     8-4
    Fax Services     8-5
    Fax Pass-Through     8-5
    Cisco Fax Relay     8-5
    T.37 Store-and-Forward Fax     8-5
    T.38 Fax Relay     8-5
    Unified Survival Remote Site Telephony     8-5
    Verification of Voice Configuration     8-6
    Configuring and Administering the Wireless Device 
    						
    							 
    Contents
    vii
    Book Title
    78-xxxxx-xx
    Service Set Identifier (SSID)     9-1
    Understanding SSIDs     9-1
    Multiple SSIDs on Wireless Devices in the Access Point Role     9-1
    SSIDs on Wireless Devices in Other Roles     9-2
    Configuring SSIDs     9-2
    SSID Parameters     9-2
    Using Spaces in SSIDs     9-2
    Creating a Global SSID     9-3
    Guest Mode SSID     9-4
    Including an SSID in an SSIDL IE     9-5
    Assigning IP Redirection for an SSID     9-6
    Guidelines for Using IP Redirection     9-7
    Configuring IP Redirection     9-7
    Multiple Basic SSIDs     9-8
    Configuring Multiple Basic SSIDs     9-8
    Using a RADIUS Server for SSID Authorization     9-11
    NAC Support for MBSSID     9-12
    Configuring NAC     9-14
    CHAPTER 10Configuring Radio Settings     10-1
    Enabling the Radio Interface     10-2
    Configuring the Role in the Radio Network     10-2
    Radio Tracking     10-4
    Fast Ethernet Tracking     10-4
    MAC-Address Tracking     10-4
    Configuring Radio Data Rates     10-4
    Configuring MCS Rates     10-7
    Configuring Radio Transmit Power     10-9
    Limiting the Power Level for Associated Client Devices     10-9
    Configuring Radio Channel Settings     10-10
    802.11n Channel Widths     10-10
    Enabling and Disabling World Mode     10-11
    Disabling and Enabling Short Radio Preambles     10-12
    Configuring Transmit and Receive Antennas     10-13
    Disabling and Enabling Aironet Extensions     10-14
    Configuring the Ethernet Encapsulation Transformation Method     10-15
    Enabling and Disabling Public Secure Packet Forwarding     10-15 
    						
    							 
    Contents
    viii
    Book Title
    78-xxxxx-xx
    Configuring Protected Ports     10-16
    Configuring the Beacon Period and the DTIM     10-17
    Configure RTS Threshold and Retries     10-17
    Configuring the Maximum Data Retries     10-18
    Configuring the Fragmentation Threshold     10-19
    Enabling Short Slot Time for 802.11g Radios     10-19
    Performing a Carrier Busy Test     10-19
    Configuring VoIP Packet Handling     10-20
    Cipher Suites and WEP     11-1
    Understanding Cipher Suites and WEP     11-1
    Configuring Cipher Suites and WEP     11-2
    Creating WEP Keys     11-3
    Enabling Cipher Suites and WEP     11-5
    Enabling and Disabling Broadcast Key Rotation     11-6
    Authentication Types for Wireless Devices     12-1
    Understanding Authentication Types     12-1
    Open Authentication to the Access Point     12-2
    Shared Key Authentication to the Access Point     12-2
    EAP Authentication to the Network     12-3
    MAC Address Authentication to the Network     12-5
    Combining MAC-Based, EAP, and Open Authentication     12-6
    Using CCKM for Authenticated Clients     12-6
    Using WPA Key Management     12-7
    Configuring Authentication Types     12-8
    Assigning Authentication Types to an SSID     12-9
    Configuring Authentication Holdoffs, Timeouts, and Intervals     12-15
    Configuring the 802.1X Supplicant     12-16
    Creating a Credentials Profile     12-16
    Applying the Credentials to an Interface or SSID     12-17
    Creating and Applying EAP Method Profiles for the 802.1X Supplicant     12-18
    Matching Access Point and Client Device Authentication Types     12-20
    CHAPTER 13Configuring VLANs     13-1
    Understanding VLANs     13-1
    Related Documents     13-3
    Incorporating Wireless Devices into VLANs     13-3
    Configuring VLANs     13-3 
    						
    							 
    Contents
    ix
    Book Title
    78-xxxxx-xx
    Configuring a VLAN     13-4
    Assigning Names to VLANs     13-6
    Using a RADIUS Server to Assign Users to VLANs     13-7
    Viewing VLANs Configured on the Access Point     13-8
    VLAN Configuration Example     13-8
    Using an Access Point as a Local Authenticator     14-1
    Understanding Local Authentication     14-1
    Configuring a Local Authenticator     14-2
    Guidelines for Local Authenticators     14-2
    Configuration Overview     14-2
    Configuring the Local Authenticator Access Point     14-3
    Configuring Other Access Points to Use the Local Authenticator     14-6
    Configuring EAP-FAST Authentication     14-7
    Limiting the Local Authenticator to One Authentication Type     14-9
    Unblocking Locked Usernames     14-9
    Viewing Local Authenticator Statistics     14-10
    Using Debug Messages     14-11
    Hot Standby Access Points     15-1
    Understanding Hot Standby     15-1
    Configuring a Hot Standby Access Point     15-2
    Verifying Standby Operation     15-5
    Workgroup Bridge Mode     16-1
    Understanding Workgroup Bridge Mode     16-1
    Treating Workgroup Bridges as Infrastructure Devices or as Client Devices     16-3
    Configuring a Workgroup Bridge for Roaming     16-3
    Configuring a Workgroup Bridge for Limited Channel Scanning     16-4
    Configuring a Client VLAN     16-5
    Configuring Workgroup Bridge Mode     16-5
    The Workgroup Bridge in a Lightweight Environment     16-7
    Guidelines for Using Workgroup Bridges in a Lightweight Environment     16-8
    CHAPTER 17Administering the Wireless Device     17-1
    Disabling the Mode Button Function     17-2
    Preventing Unauthorized Access to Your Access Point     17-3
    Protecting Access to Privileged EXEC Commands     17-3
    Default Password and Privilege Level Configuration     17-4
    Setting or Changing a Static Enable Password     17-4 
    						
    							 
    Contents
    x
    Book Title
    78-xxxxx-xx
    Protecting Enable and Enable Secret Passwords with Encryption     17-5
    Configuring Username and Password Pairs     17-7
    Configuring Multiple Privilege Levels     17-7
    Controlling Access Point Access with RADIUS     17-9
    Default RADIUS Configuration     17-9
    Configuring RADIUS Login Authentication     17-10
    Defining AAA Server Groups     17-11
    Configuring RADIUS Authorization for User Privileged Access and  
    Network Services     17-13
    Displaying the RADIUS Configuration     17-14
    Controlling Access Point Access with TACACS+     17-14
    Default TACACS+ Configuration     17-14
    Configuring TACACS+ Login Authentication     17-15
    Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services     17-16
    Displaying the TACACS+ Configuration     17-17
    Administering the Wireless Hardware and Software     17-17
    Resetting the Wireless Device to Factory Default Configuration     17-17
    Rebooting the Wireless Device     17-17
    Upgrading Software on the Access Point     17-18
    Downgrading Software on the Access Point     17-20
    Recovering Software on the Access Point     17-20
    Monitoring the Wireless Device     17-20
    Managing the System Time and Date     17-21
    Understanding Simple Network Time Protocol     17-21
    Configuring SNTP     17-22
    Configuring Time and Date Manually     17-22
    Configuring a System Name and Prompt     17-25
    Default System Name and Prompt Configuration     17-26
    Configuring a System Name     17-26
    Understanding DNS     17-26
    Creating a Banner     17-28
    Default Banner Configuration     17-29
    Configuring a Message-of-the-Day Login Banner     17-29
    Configuring a Login Banner     17-30
    Configuring Ethernet Speed and Duplex Settings     17-30
    Configuring the Access Point for Wireless Network Management     17-31
    Configuring the Access Point for Local Authentication and Authorization     17-31
    Configuring the Authentication Cache and Profile     17-32
    Configuring the Access Point to Provide DHCP Service     17-35 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 860, 880 Series User Manual