Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 860, 880 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							CH A P T E R
     
    4-1
    Book Title
    OL-xxxxx-xx
    4
    Basic Wireless Device Configuration
    This chapter describes how to configure the wireless device for the first time. The wireless device is 
    embedded on the Cisco 800 series router and runs a separate Cisco
     IOS from the router. 
    The wireless device does not have an external console port for connections. To configure the wireless 
    device, use a console cable to connect a PC to the host router’s console port, and then follow these 
    procedures to establish connectivity and configure the wireless settings: 
     Establishing a Wireless Configuration Session, page 4-1
     Configuring Basic Settings, page 4-4
     Configuring Wireless Security Settings, page 4-9
     Configuring Wireless Quality of Service, page 4-10
    Establishing a Wireless Configuration Session
    Important  Before you configure the wireless settings in the router’s setup, you must open a session to 
    initiate an internal communication link between the wireless device and the router.  
    						
    							 
    4-2
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Establishing a Wireless Configuration Session
    Enter the following commands in global configuration mode on the router’s Cisco IOS CLI. 
    CommandPurpose
    Step 1interface wlan-ap0 
     
     
     
    Example:
    router(config)#interface wlan-ap0
    router(config-if)#
    Defines the router’s console interface to the wireless 
    device. It is used for reverse Telnet communication 
    between the router’s Console and the wireless device.
    Always use port 0.
    The following message appears: 
     
    The wlan-ap 0 interface is used for managing the 
    embedded AP. Please use the service-module 
    wlan-ap 0 session command to console into the 
    embedded AP.
    Step 2ip address subnet mask
    Example:
    router(config-if)#ip address 
    10.21.0.20 255.255.255.0
    orrouter(config-if)#ip unnumbered vlan1 
    10.21.0.20 255.255.255.0
    Specifies the interface IP address and subnet mask. 
     
     
     
    NoteThe IP address can be shared with the IP 
    address assigned to the Cisco Integrated 
    Services Router by using the ip unnumbered 
    vlan1 command.
    Step 3no shut
    Example:
    router(config-if)#no shut
    Specifies the internal interface connection will remain 
    open.
    Step 4interface vlan1
    Example:
    router(config-if)#interface vlan1
    Specifies the virtual LAN interface for data 
    communication on the internal Gigabit Ethernet 0 
    (GE0) port to other interfaces.
     
     
    NoteAll the switch ports inherit the default vlan1 
    interface.
    Step 5ip address subnet mask
    Example:
    router(config-if)#ip address 
    10.21.0.30 255.255.255.0
    Specifies the interface IP address and subnet mask.
    Step 6exit
    Example:
    router(config-if)#exitrouter(config)#
    Exits the mode. 
    						
    							 
    4-3
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Establishing a Wireless Configuration Session
    TipTo create an IOS software alias for the Console session to the wireless device, enter the alias exec 
    dot11radio service-module wlan-ap 0 session command at the router prompt. Now, when you want to 
    open a session, just enter the command dot11 radio.
    Closing the Session
    To close a session between the wireless device and the router’s console, perform both of the following 
    procedures.
    Wireless Device
    1.Control-Shift-6 x 
    Router
    2.disconnect 
    or 
    service-module wlan-ap 0 session clear
    3.Press Enter twice.
    NoteIf you do not use the disconnect command to close the session to the wireless device, you can 
    resume the session by pressing Enter on the keyboard.
    Step 7exit
    Example:
    router(config)#exit
    router#
    Exits the mode.
    Step 8service-module wlan-ap 0 session 
    Example:
    router#service-module wlan-ap0 sessionTrying 10.21.0.20, 2002 ... Open
    ap>
    Opens the reverse Telnet connection between the 
    wireless device and the router’s console.
    Command Purpose 
    						
    							 
    4-4
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Basic Settings
    Configuring Basic Settings
    NoteYou must establish an internal link between the wireless device and the router before you configure 
    settings on the wireless device. See the 
    “Establishing a Wireless Configuration Session” section on 
    page 4-1.
    After the internal link is established, use one of the following methods to configure basic settings:
     Express Setup (GUI)—See the “Cisco Express Setup” section on page 4-4
     Cisco IOS Setup (CLI)—See the “Cisco IOS Setup” section on page 4-4
    Cisco Express Setup
    To use the web-browser:
    Step 1Establish a Console connection to the wireless device and get the BVI IP address by entering the show 
    interface bvi1 IOS command.
    Step 2Open a browser window and enter the BVI IP address in the browser-window address line. Press enter 
    and an Enter Network Password window appears.
    Step 3Enter your username. Cisco is the default User Name.
    Step 4Enter the wireless device password. Cisco is the default password. The Summary Status page appears. 
    See the following URL for details about using the web-browser configuration page:
     
    http://cisco.com/en/US/docs/wireless/access_point/12.4_10b_JA/configuration/guide/scg12410b-chap
    4-first.html#wp1103336
    Cisco IOS Setup
    Cisco IOS Setup starts automatically when you boot up the embedded-wireless device with no saved 
    configuration present in NVRAM; no saved configuration is present in the NVRAM when the device is 
    not preconfigured at the factory. You can also invoke the setup dialog by issuing the setup command in 
    enable mode.
     
    When setup is initiated, it presents the System Configuration Dialog. When you complete all the steps 
    in the dialog, the device displays the modified configuration file and asks if you want to use that file. 
    You must answer yes or no; there is no default for this prompt. 
     Yes—saves the file to NVRAM as the starting configuration. 
     No—the file is not saved, and you must start at the beginning of the dialog to build another initial 
    configuration.
    Configuring SSIDs, Authentication, and Encryption
    The System Configuration Dialog guides you through an initial configuration for the interface, SSIDs, 
    authentication mode, and encryption type. The dialog then creates an initial configuration file.  
    						
    							 
    4-5
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Basic Settings
    Step 1Ty p e  setup in privileged EXEC mode on the router to initiate the configuration dialog.
    Step 2Choose Ye s to continue with the configuration dialog.
    Step 3Select the type of setup by answering the following question:
    Would you like to enter basic management setup? [yes/no]
    Yes—Basic setupNo—Secure setup
    Step 4Configure and save the settings to NVRAM.
    NoteEnsure your previous setup selections for the dot11radio interface(s) do not have SSIDs associated with 
    them, and they do not have encryption commands configured. The configuration selections you make in 
    the setup should not conflict with a previous configuration on the embedded-wireless device. 
     
     
    You may also configure these settings using the web interface. See the following link for configuration   
    details using the web interface:
     
     
    http://cisco.com/en/US/docs/wireless/access_point/12.4_10b_JA/configuration/guide/scg12410b-chap
    4-first.html#wp1103336
    Example of: Basic Setup
    Enter host name [ap]:
    The enable secret is a password used to protect access to privileged EXEC and 
    configuration modes. This password, after entered, becomes encrypted in the configuration. 
    Enter enable secret: ******
    The enable password is used when you do not specify an enable secret password, with some 
    older software version, and some boot images.
    Enter enable password: ***********
    The virtual terminal password is used to protect access to the router over a network 
    interface. Enter virtual terminal password: *******
    Configure SNMP Network Management? [yes]:
    Community string [public]:
    Current interface summary
    Any interface listed with OK? value “NO” does not have a valid configuration
    Interface     IP-Address  OK? Method Status     ProtocolBVI1 unassigned  YES unset up   up
    SettingsBasic SetupSecure Setup
    HostnameXX
    PasswordsXX
    IP address for Bridged Virtual Interface (BVI)XX
    SSIDs for radio(s)-X
    Authentication mode for SSIDs-X
    Encryption ([WEP] and [WPA2])-X 
    						
    							 
    4-6
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Basic Settings
    Enter interface name used to connect to the management network from the above interface 
    summary [BVI1]:
    Configuring interface BVI1:Configure IP on this interface?[no]: yes
    IP address for this interface: x.xx.xx.xx
    Subnet mask for this interface [255.0.0.0]: 255.255.0.0Class A network is 2.0.0.0, 16 subnet bits;mask is/16
    NoteAfter the wireless device BVI interface is configured with an IP address, you can use the web interface 
    to perform additional configuration tasks. Connect to the web interface with a browser directed to the 
    wireless device BVI IP address from a personal computer or laptop connected to the host router’s 
    switch-port. See the following link for details on how to establish connection to the web interface:
     
    http://cisco.com/en/US/docs/wireless/access_point/12.4_10b_JA/configuration/guide/scg12410b-chap
    2-gui.html#wp1034703
    Example of: Secure Setup
    These parameters are used in the following example: 
    ssid—abcd
    encryption mode—Wep
    encryption key—4085364000 
    --- System Configuration Dialog ---
    Would you like to enter the initial configuration dialog? [yes/no]: yes
    At any point you may enter a question mark ? for help.Use ctrl-c to abort configuration dialog at any prompt.
    Default settings are in square brackets [].
    Basic management setup configures only enough connectivity
    for management of the system, extended setup will ask you
    to configure each interface on the system
    Would you like to enter basic management setup? [yes/no]: no
    First, would you like to see the current interface summary? [yes]: n
    Configuring global parameters:
      Enter host name [ap]: 
      The enable secret is a password used to protect access to
      privileged EXEC and configuration modes. This password, after
      entered, becomes encrypted in the configuration.  Enter enable secret: abc
      The enable password is used when you do not specify an  enable secret password, with some older software versions, and
      some boot images.
      Enter enable password: Cisco
      The virtual terminal password is used to protect
      access to the router over a network interface.  Enter virtual terminal password: lab
      Configure SNMP Network Management? [yes]: 
        Community string [public]: Configuring interface parameters: 
    						
    							 
    4-7
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Basic Settings
    Do you want to configure BVI1  interface? [yes]: 
      Configure IP on this interface? [no]: yes
        IP address for this interface:     IP address for this interface: 
        IP address for this interface: 2.12.56.121
        Subnet mask for this interface [255.0.0.0] : 255.255.0.0    Class A network is 2.0.0.0, 16 subnet bits; mask is /16
      Configure SSID on Dot11Radio0(2.4GHz) interface? [yes]: 
      Enter SSID (Up to 32 characters): abcd    Configure security for this SSID? [yes]: 
      Enter security type [wpa2|wep]: wep
      Enter WEP encryption key length [40|128]: 40  Enter the unencrypted WEP key (HEX): 4085264000
    The following configuration command script was created:
    hostname ap
    enable secret 5 $1$eTFk$akYCxufCW4tzIqDWCIStm0enable password Cisco
    line vty 0 4
    password abcsnmp-server community public
    !
    !
    interface BVI1ip address 2.12.56.121 255.255.0.0
    !
    interface BVI1no shut
    !
    dot11 ssid abcdauthentication open
    !
    interface Dot11Radio0encryption mode wep mandatory
    encryption key 1 size 40bit 0 4085264000
    ssid abcd!
    End
    [0] Go to the IOS command prompt without saving this config.[1] Return back to the setup without saving this config.
    [2] Save this configuration to nvram and exit.
    Enter your selection [2]: 
    Building configuration...
    Use the enabled mode configure command to modify this configuration.
    Press RETURN to get started!
    Example of: WEP with Key Length 40 - Running Configuration
    ap#show running
    Building configuration...
    Current configuration : 1344 bytes
    !
    ! No configuration change since last restart!
    version 12.4
    no service padservice timestamps debug datetime msec
    service timestamps log datetime msec 
    						
    							 
    4-8
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Basic Settings
    no service password-encryption!
    hostname ap
    !enable secret 5 $1$eTFk$akYCxufCW4tzIqDWCIStm0
    enable password Cisco
    !no aaa new-model
    !
    !dot11 ssid abcd
       authentication open 
    !!
    bridge irb
    !!
    interface Dot11Radio0
     no ip address no ip route-cache
     !
     encryption key 1 size 40bit 0 4085264000 transmit-key encryption mode wep mandatory 
     !
     ssid abcd
     ! station-role root
     bridge-group 1
     bridge-group 1 subscriber-loop-control bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled
    !
    interface GigabitEthernet0 description  the embedded AP GigabitEthernet 0 is an internal interface connecting AP 
    with the host router
     no ip address no ip route-cache
     bridge-group 1
     no bridge-group 1 source-learning bridge-group 1 spanning-disabled
    !
    interface BVI1 ip address 2.12.56.121 255.255.0.0
     no ip route-cache
    !ip http server
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eagsnmp-server community public RO
    bridge 1 protocol ieee
    bridge 1 route ip!
    !
    line con 0 no activation-character
    line vty 0 4 
    password abc login
    !
    end
    ap# 
    						
    							 
    4-9
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Wireless Security Settings
    Configuring Wireless Security Settings
    After you assign initial settings to the wireless device, you must configure security settings to prevent 
    unauthorized access to your network through your wireless device. Because it has a radio device, the 
    wireless device can communicate beyond the physical boundaries of a building. 
    Using VLANs
    If you use VLANs on your wireless LAN and assign SSIDs to VLANs you can create multiple SSIDs by 
    using any of the four security settings defined in the 
    Security Types section. However, if you do not use 
    VLANs on your wireless LAN, the security options that you can assign to SSIDs are limited because the 
    encryption settings and authentication types are linked on the Express Security page. 
    Without VLANs, encryption settings (WEP and ciphers) apply to an interface, such as the 2.4-GHz 
    radio, and you cannot use more than one encryption setting on an interface. For example, when you 
    create an SSID with static WEP with VLANs disabled, you cannot create additional SSIDs with WPA 
    authentication because the SSIDs use different encryption settings. If you find that the security setting 
    for an SSID conflicts with the settings for another SSID, you can delete one or more SSIDs to eliminate 
    the conflict.
    Security Types
    Ta b l e 4-1 describes the four security types that you can assign to an SSID.
    Ta b l e 4-1Types of SSID Security
    Security TypeDescriptionSecurity Features Enabled
    No SecurityThis is the least secure option. You should use this option 
    only for SSIDs used in a public space and assign it to a 
    VLAN that restricts access to your network.None.
    Static WEP KeyThis option is more secure than no security. However, static 
    WEP keys are vulnerable to attack. If you configure this 
    setting, you should consider limiting association to the 
    wireless device based on MAC address.
    See the Cisco IOS Software Configuration Guide for Cisco 
    Aironet Access Points 
    “Using MAC Address ACLs to Block 
    or Allow Client Association to the Access Point” section in 
    the Configuring Filters chapter.
    Or, if your network does not have a RADIUS server, 
    consider using an access point as a local authentication 
    server (see Chapter 7, 
    “Configuring the Device as the Local 
    Authenticator”).
    Mandatory WEP. Client devices cannot 
    associate using this SSID without a WEP 
    key that matches the wireless device key. 
    						
    							 
    4-10
    Book Title
    OL-xxxxx-xx
    Chapter 4      Basic Wireless Device Configuration
      Configuring Wireless Quality of Service
    Configuring Wireless Quality of Service
    To configure quality of service (QoS) for your wireless device, see the document Quality of Service in 
    a Wireless Environment at the following URL: 
    http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/QualityOfService.html.
    EAP1 
    Authentication
    This option enables 802.1X authentication (such as LEAP2, 
    PEAP3, EAP-TLS4, EAP-FAST5, EAP-TTLS6, EAP-GTC7 
    EAP-SIM8, and other 802.1X/EAP based products)
    This setting uses mandatory encryption, WEP, open 
    authentication + EAP, network EAP authentication, no key 
    management, RADIUS server authentication port 1645.
    You are required to enter the IP address and shared secret 
    for an authentication server on your network (server 
    authentication port 1645). Because 802.1X authentication 
    provides dynamic encryption keys, you do not need to enter 
    a WEP key.
    Mandatory 802.1X authentication. Client 
    devices that associate using this SSID must 
    perform 802.1X authentication.
    If radio clients are configured to 
    authenticate using EAP-FAST, open 
    authentication with EAP should also be 
    configured. If you do not configure open 
    authentication with EAP, the following 
    warning message appears:
    SSID CONFIG WARNING: [SSID]: If radio 
    clients are using EAP-FAST, AUTH OPEN 
    with EAP should also be configured.
    WPA9This option permits wireless access to users authenticated 
    against a database through the services of an authentication 
    server, then encrypts their IP traffic with stronger 
    algorithms than those used in WEP.
    This setting uses encryption ciphers, TKIP10, open 
    authentication + EAP, network EAP authentication, key 
    management WPA mandatory, and RADIUS server 
    authentication port 1645.
    As with EAP authentication, you must enter the IP address 
    and shared secret for an authentication server on your 
    network (server authentication port 1645).
    Mandatory WPA authentication. Client 
    devices that associate using this SSID must 
    be WPA-capable.
    If radio clients are configured to 
    authenticate using EAP-FAST, open 
    authentication with EAP should also be 
    configured. If you don’t configure open 
    authentication with EAP, the following 
    message appears:
    SSID CONFIG WARNING: [SSID]: If radio 
    clients are using EAP-FAST, AUTH OPEN 
    with EAP should also be configured.
    1. Extensible Authentication Protocol (EAP)
    2. Lightweight Extensible Authentication Protocol (LEAP)
    3. Protected Extensible Authentication Protocol (PEAP)
    4. Extensible Authentication Protocol - Transport Layer Security (EAP-TLS)
    5. Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
    6. Extensible Authentication Protocol-Tunneled Transport Layer Security (EAP-TTLS)
    7. Extensible Authentication Protocol--Generic Token Card (EAP- GTC)
    8. Extensible Authentication Protocol--Subscriber Identity Module (EAP-SIM)
    9. Wi-Fi Protected Access (WPA)
    10. Temporal Key Integrity Protocol (TKIP)
    Security Type Description Security Features Enabled 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 860, 880 Series User Manual