Home
Configuration - Hardware.com
Contents
1.
2. 5 Internet yO x bust Ase RANER u e A a 1 PC A Primary DSL interface 2 Cisco 3900 series ISR B Dial backup and remote management through the ISDN 3 DSLAM interface ISDN S T port serves as a failover link when the primary line goes down 4 Aggregator 5 ISDN switch c Provides administrator with remote management capability 6 Webserver through the ISDN interface when the primary DSL link is down serves as dial in access to allow changes or updates to Cisco IOS 7 Administrator configuration Configuring ISDN Settings amp Note Traffic of interest must be present in order to activate the backup ISDN line by means of the backup interface and floating static routes methods Traffic of interest is not needed in order for the dialer watch to activate the backup ISDN line To configure your router ISDN interface for use as a backup interface follow these steps beginning in global configuration mode SUMMARY STEPS 1 isdn switch type switch type interface type number encapsulation encapsulation type dialer pool member number isdn switch type switch type a F wN exit Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E7 Chapter Configuring Backup Data Lines and Remote Management W Configuring Data Line Backup and Remote Management Through the ISDN S T Port DETAILED ST
3. Table 1 Modules that Support the Power Efficiency Management Feature Type of Module Module Name SM SM ES2 16 P SM SRE NM NM 16 ESW NME NME 16ES 1G P HWIC HWIC 4ES W POE HWIC 1G SFP HWIC 2FE ISM ISM SRE 300 K9 PVDM3 PVDM3 256 SRE SM SRE 700 K9 1 NM 16ESW is not supported on Cisco 3945E and Cisco 3925E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 nes Chapter Configuring Power Efficiency Management HZ Restrictions for Power Efficiency Management and OIR Restrictions for Power Efficiency Management and OIR The following restrictions apply when using the power efficiency management feature e The online insertion and removal OIR commands cannot be used when a module is in power save mode e When the OIR commands are executed power efficiency management cannot be configured on a service module Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 86 OL 20696 04 Configuring Security Features Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs provide the following security features e Configuring the Cryptographic Engine Accelerator page 87 e Configuring SSL VPN page 87 e Authentication Authorization and Accounting page 88 e Configuring AutoSecure page 88
4. Note Aironet extensions must be enabled to limit the power level on associated client devices Aironet extensions are enabled by default Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Radio Settings Configuring Radio Channel Settings W Configuring Radio Channel Settings A The default channel setting for the wireless device radios is least congested At startup the wireless device scans for and selects the least congested channel For the most consistent performance after a site survey however we recommend that you assign a static channel setting for each access point The channel settings on the wireless device correspond to the frequencies available in your regulatory domain See the hardware installation guide for the access point for the frequencies allowed in your domain Each 2 4 GHz channel covers 22 MHz Because the bands for channels 1 6 and 11 do not overlap you can set up multiple access points in the same vicinity without causing interference The 802 11b and 802 11g 2 4 GHz radios use the same channels and frequencies The 5 GHz radio operates on 8 channels from 5180 to 5320 MHz up to 27 channels from 5170 to 5850 MHz depending on regulatory domain Each channel covers 20 MHz and the bands for the channels overlap slightly For best performance use channels that are not adjacent
5. I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Radio Settings W Configuring Radio Channel Settings Blocking Channels from DFS Selection If your regulatory domain limits the channels that you can use in specific locations for example indoors or outdoors you can block groups of channels to prevent the access point from selecting them when DFS is enabled Use this configuration interface command to block groups of channels from DFS selection no dfs band 1 2 3 4 block The 1 2 3 and 4 options designate blocks of channels e 1 Specifies frequencies 5 150 to 5 250 GHz This group of frequencies is also known as the UNII 1 band e 2 Specifies frequencies 5 250 to 5 350 GHz This group of frequencies is also known as the UNII 2 band e 3 Specifies frequencies 5 470 to 5 725 GHz e 4 Specifies frequencies 5 725 to 5 825 GHz This group of frequencies is also known as the UNII 3 band This example shows how to prevent the access point from selecting frequencies 5 150 to 5 350 GHz during DFS ap config if dfs band 1 2 block This example shows how to unblock frequencies 5 150 to 5 350 for DFS ap config if no dfs band 1 2 block This example shows how to unblock all frequencies for DFS ap config if no dfs band block Simulating Radar Detection You can simu
6. Monitoring and Maintaining the DHCP Server Access Point The following sections describe commands you can use to monitor and maintain the DHCP server access point e show Commands page 294 e clear Commands page 295 e debug Command page 295 show Commands To display information about the wireless device as DHCP server enter the commands in Table 4 in privileged EXEC mode Table 4 Show Commands for DHCP Server Command Purpose show ip dhcp conflict address Displays a list of all address conflicts recorded by a specific DHCP Server Enter the wireless device IP address to show conflicts recorded by the wireless device show ip dhcp database url Displays recent activity on the DHCP database Note Use this command in privileged EXEC mode show ip dhcp server statistics Displays count information about server statistics and messages sent and received Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device clear Commands debug Command Configuring the Access Point for Secure Shell W To clear DHCP server variables use the commands in Table 5 in privileged EXEC mode Table 5 Clear Commands for DHCP Server Command Purpose clear ip dhcp binding Deletes an automatic address binding from the address DHCP database Specifying the ad
7. OL 20696 04 Chapter Configuring Radio Settings Configuring VoIP Packet Handling W Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 SEN Chapter Configuring Radio Settings W Configuring VoIP Packet Handling Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 254 OL 20696 04 Administering the Wireless Device The following sections describe administration tasks for the wireless device Security on the Wireless Device Disabling the Mode Button Function page 255 Preventing Unauthorized Access to Your Access Point page 257 Protecting Access to Privileged EXEC Commands page 257 Controlling Access Point Access with RADIUS page 265 Controlling Access Point Access with TACACS page 270 Administering the Wireless Device Administering the Wireless Hardware and Software page 274 Resetting the Wireless Device to the Factory Default Configuration page 274 Monitoring the Wireless Device page 275 Managing the System Time and Date page 275 Configuring a System Name and Prompt page 281 Creating a Banner page 284 Configuring Wireless Device Communication Configuring Ethernet Speed and Duplex Settings page 287 Configuring the Access Point for Wireless Network Management page 288 Configuring the Access Point for Local Aut
8. crypto ipsec profile profile name Example Router config crypto ipsec profile prol Router config Configures an IPSec profile to apply protection on the tunnel for encryption crypto ipsec transform set transform set name transform transform2 transform3 transform4 Example Router config crypto ipsec transform set vpnl esp 3des esp sha hmac Router config Defines a transform set an acceptable combination of IPSec security protocols and algorithms See Cisco IOS Security Command Reference for detail about the valid transforms and combinations crypto ipsec security association lifetime seconds seconds kilobytes kilobytes Example Router config crypto ipsec security association lifetime seconds 86400 Router config Specifies global lifetime values used when IPSec security associations are negotiated See Cisco IOS Security Command Reference for details Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Security Features Configuring VPN W Configure the IPSec Crypto Method and Parameters A dynamic crypto map policy processes negotiation requests for new security associations from remote IPSec peers even if the router does not know all the crypto map parameters for example IP address To configure the IPSec crypto method follow the
9. Chapter Configuring Radio Settings Configuring the Role in the Radio Network W Configuring the Role in the Radio Network The radio performs the following roles in the wireless network e Access point e Access point fallback to radio shutdown e Root bridge e Non root bridge e Root bridge with wireless clients e Non root bridge without wireless clients You can also configure a fallback role for root access points The wireless device automatically assumes the fallback role when its Ethernet port is disabled or disconnected from the wired LAN The default fallback role for Cisco ISR wireless devices is as follows Shutdown the wireless device shuts down its radio and disassociates all client devices To set the wireless device s radio network role and fallback role follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal interface dotllradio 0 1 station role e 2 N non root bridge wireless clients root access point ap only bridge wireless clients fallback repeater shutdown 5 workgroup bridge multicast mode lt client infrastructure gt universal lt Ethernet client MAC address gt 6 end 7 copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E 223 Chapter Configuring Radio Settings HZ Configuring the Rol
10. Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Basic Router Configuration Configuring Global Parameters W no ip http server control plane line con 0 line aux 0 line vty 0 3 login exception data corruption buffer truncate scheduler allocate 20000 1000 end Configuring Global Parameters SUMMARY STEPS DETAILED STEPS Step 1 Step 2 To configure the global parameters for your router follow these steps 1 configure terminal 2 hostname name 3 enable secret password 4 no ip domain lookup Command Purpose configure terminal Enters global configuration mode when using the console port Example Use the following to connect to the router with a Router gt enable remote terminal Router configure terminal Router config telnet router name or address Login login id Password Router gt enable hostname name Specifies the name for the router Example Router config hostname Router Router config I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide is Chapter Basic Router Configuration E Configuring 1 0 Memory Allocation Step 3 Step 4 Command Purpose enable secret password Specifies an encrypted password to
11. Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide B 8 OL 20696 04 _ Appendix B Using CompactFlash Memory Cards Removing a Directory Directory Operations on a CompactFlash Memory Card W To remove a directory in flash memory enter the rmdir flash0 command in privileged EXEC mode Before you can remove a directory you must remove all files and subdirectories from the directory amp Note Use flash1 in the command syntax to access CF in slot 1 Use flasho in the command syntax to access CF in slot 0 Example Removing a Directory In the following example the subdirectory test config is removed Router dir Directory of flash0 config 1581 drw 0 Mar 01 2004 23 50 08 128094208 bytes total 121626624 bytes free Router rmdir flash0 config test config Remove directory filename config test config Delete flash0 config test config confirm Removed dir flash0 config test config Router dir Directory of flash0 config No files in directory 128094208 bytes total 121630720 bytes free test config I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Appendix B Using CompactFlash Memory Cards HI Directory Operations on a CompactFlash Memory Card Cisco 3900 Series Cisco 2900 Series and Cisco 1
12. Chapter Configuring Security Features HZ Configuring VPN Apply Mode Configuration to the Crypto Map To apply mode configuration to the crypto map follow these steps beginning in global configuration mode SUMMARY STEPS 1 crypto map map name isakmp authorization list list name 2 crypto map fag client configuration address initiate respond DETAILED STEPS Command or Action Purpose Step 1 crypto map map name isakmp authorization list Applies mode configuration to the crypto map and list name enables key lookup IKE queries for the group policy from an AAA server Example Router config crypto map dynmap isakmp authorization list rtr remote Router config Step 2 crypto map fag client configuration address Configures the router to reply to mode initiate respond configuration requests from remote clients Example Router config crypto map dynmap client configuration address respond Router config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 98 OL 20696 04 _ Chapter Configuring Security Features Enable Policy Lookup SUMMARY STEPS DETAILED STEPS Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 1 Step 2 Step 3 Step 4 Configuring VPN W To enable policy lookup through AAA foll
13. Example Router gt enable Enables privileged EXEC mode Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode interface gigabitethernet slot port Example Router config interface gigabitethernet 0 0 Enters interface configuration mode authentication open Example Router config if authentication open Enables open access on a port end Example Router config if end Router Returns to privileged EXEC mode Control Direction Wake on LAN When the router uses IEEE 802 1X authentication with Wake on LAN WoL the router forwards traffic to the unauthorized IEEE 802 1X ports including the magic packets While the port is unauthorized the switch continues to block ingress traffic other than EAPol packets The host can receive packets but Configuring Control Direction Wake on LAN SUMMARY STEPS cannot send packets to other devices in the network Perform these steps to configure Control Direction Wake on LAN 1 enable 2 configure terminal 3 interface gigabitethernet slot port 4 authentication control direction inlboth I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Identity Features on Layer 3 Interface Hs Control Direction Wake on LAN DETAILED STEPS S
14. Prerequisites e Download the new Cisco IOS Software image to the PC See the Where Do I Download the System Image section on page 179 e Locate the compact flash memory card slot on the router chassis For help with locating the slot and instructions for removing and inserting the card see the hardware installation guide for your router A Caution Removing the compact flash memory card may disrupt the network because some software features use the compact flash memory card to store tables and other important data Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image DETAILED STEPS Step 1 Remove the compact flash memory card from the router Step2 Insert the card into the compact flash card reader on a PC Step3 Use the PC to copy the system image file to the compact flash memory card Step4 Remove the card from the compact flash card reader Step5 Insert the compact flash memory card into the router What to Do Next Proceed to the Loading the New System Image section on page 192 Loading the New System Image This section describes how to load the new system image that you copied into flash memory First determine whether you are in ROM monitor mode or in the Cisco IOS CLI then choose one of the following methods of loa
15. Returns to global configuration mode crypto isakmp keepalive seconds Example Router config crypto ezvpn crypto isakmp keepalive 10 Router config Enables dead peer detection messages Time between messages is given in seconds with a range of 10 to 3600 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ioa OL 20696 04 Chapter Configuring Security Features Configuring VPN W Command or Action Purpose Step 7 interface type number Enters the interface configuration mode for the interface to which you are applying the Cisco Easy VPN remote configuration Example l Router config interface fastethernet 4 Note For routers with an ATM WAN interface Router config if this command would be interface atm 0 Step 8 crypto ipsec client ezvpn name outside inside Assigns the Cisco Easy VPN remote configuration to the WAN interface which causes the router to automatically create the NAT or PAT and the Example le f access list configuration needed for the VPN Router config if crypto ipsec client i connection ezvpn ezvpnclient outside Router config if Step 9 exit Returns to global configuration mode Example Router config crypto ezvpn exit Router config 1 PAT port address translation Configuration Example The following configuration example shows a portion of the confi
16. Step 15 Step 16 What to Do Next How to Upgrade the Ciscol0S Image W When prompted to confirm the reload enter y Proceed with reload confirm y show version Use this command to verify that the router loaded the proper system image Router show version 00 22 25 SYS 5 CONFIG_I Configured from console by console Cisco Internetwork Operating System Software System returned to ROM by reload System image file is flash0 c2900 universalk9 mz bin Proceed to the Saving Backup Copies of Your New System Image and Configuration section on page 197 Loading the New System Image from ROM Monitor Mode SUMMARY STEPS To load the new system image from ROM monitor mode follow these steps 1 dir flash0 partition number confreg 0x2102 boot flash0 partition number filename e N After the system loads the new system image press Return a few times to display the Cisco IOS command line interface CLI prompt enable configure terminal no boot system boot system flash0 new system image filename o Nn og Optional Repeat to specify the order in which the router should attempt to load any backup system images 10 exit 11 copy run start I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image DETAILED STE
17. Use Cisco Feature Navigator to find information about platform support and software image support Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release feature set or platform To access Cisco Feature Navigator go to http www cisco com go cfn An account at Cisco com is not required amp Note Table 3 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train Unless noted otherwise subsequent releases of that Cisco IOS software release train also support that feature Table 3 Feature Information for Configuring the PVDM3 Module on Cisco Voice Gateway Routers Feature Name Releases Feature Information Configuring the PVDM3 Module on Cisco 15 0 1 M The PVDM3 DSP modules support high density audio Voice Gateway Routers 15 1 1 T applications on the Cisco voice gateways These DSP 15 1 4 M modules provide resources for voice termination voice compression algorithms echo cancellation conferencing and transcoding and support for modems and fax calls In Release 15 0 1 M this feature is supported only on the Cisco 2901 Cisco 2911 Cisco 2921 Cisco 2951 Cisco 3925 and Cisco 3945 In Release 15 1 1 T this feature is supported only on the Cisco 3925E and Cisco 3945E ISRs In Release 15 1 4 M support was added for video conference and transcoding 1 DSP di
18. You may need to update the speed and duplex settings for this interface Enables Auto Detect If a 1 GigE SFP is plugged in set the speed as 1000 and duplex as full An RJ45 connection only works with speed as 1000 and duplex as full If a SFP is not plugged in all speeds and duplexes are available for the RJ45 media Note Do not set speed as 100 or 10 and duplex as half if a 1 GigE SFP is plugged in SFP behavior is unpredictable at these settings Configuring Cellular Dial on Demand Routing Backup Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide To monitor the primary connection and initiate the backup connection over the cellular interface when needed the router can use one of the following methods e Backup Interface Backup interface stays in standby mode until the primary interface line protocol is detected as down then the backup interface is brought up See the Configuring Backup Interfaces section on page 57 e Dialer Watch Dialer watch is a backup feature that integrates dial backup with routing capabilities See the Configuring DDR Backup Using Dialer Watch section on page 62 e Floating Static Route Route through the backup interface has an administrative distance that is greater than the administrative distance of the primary connection route and therefore is not in the routing table until the primary interfa
19. clock summer time zone date date month year hh mm date month year hh mm offset 2 end 3 show running config 4 copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 SEN Chapter Administering the Wireless Device W Managing the System Time and Date DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 clock summer time zone date month Configures summer time to start on the first date and end on the second date year hh mm month date year hh mm date offset or Summer time is disabled by default e For zone specify the name of the time zone for example PDT to be clock summer time zone date date displayed when summer time is in effect MONIN ILAT TAs ATG OURAN VEAN e Optional For week specify the week of the month 1 to 5 or last hh mm offset e Optional For day specify the day of the week for example Sunday e Optional For month specify the month for example January e Optional For hh mm specify the time 24 hour format in hours and minutes e Optional For offset specify the number of minutes to add during summer time The default is 60 Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves yo
20. section on page 192 Using the ROM Monitor to Copy the System Image over a Network A This section describes how to download a Cisco IOS software image from a remote TFTP server to the router flash memory by using the tftpdnld ROM monitor command Caution Prerequisites Restrictions amp Using the tftpdnld ROM monitor command may erase the system image configuration and data files System image configuration and data files must be present on USB CF in slot0 for the router to boot and perform normal file operations Before you can enter the tftpdnld ROM monitor command you must set the ROM monitor environment variables Connect the TFTP server to a fixed network port on your router The LAN ports on network modules or interface cards are not active in ROM monitor mode Therefore only a fixed port on your router can be used for TFTP download This can be either a fixed Ethernet port on the router or one of the Gigabit Ethernet ports on routers equipped with them Note SUMMARY STEPS You can use this command only to download files to the router You cannot use tftpdnld to get files from the router 1 Enter ROM monitor mode 2 Set the IP_ADDRESS ip_address configuration variable 3 Set the IP_LSUBNET_MASK ip_address configuration variable 4 Set the DEFAULT_GATEWAY ip_address configuration variable 5 Set the TFTP_SERVER ip_address configuration variable 6 Set the TFTP_FILE directory path fi
21. A My access point failed to upgrade from autonomous software to Unified software and it appears to be stuck in the recovery mode What is my next step Check the following items Is the IP address on the BVI interface on the same subnet as the WLC Can you ping the WLC from the router access point to confirm connectivity Is the access point set to the current date and time Use the show clock command to confirm this information My access point is attempting to boot but it keeps failing Why My access point is stuck in the recovery image and will not upgrade to the Unified software Why The access point is stuck in recovery mode and you must use the service module wlan ap0 reset bootloader command to return the access point back to bootloader for manual image recovery Downgrading the Software on the Access Point Use the service module wlan ap0 bootimage autonomous command to reset the access point BOOT back to the last autonomous image Use the service module wlan ap 0 reload command to reload the access point with the autonomous software image Recovering Software on the Access Point To recover the image on the access point use the service module wlan ap0 reset bootloader command This command returns the access point to the bootloader for manual image recovery A Caution Use this command with caution Use this command only to recover from a shutdown or failed state OL 20696 04 Cisco 3900 Seri
22. Authorized By Vlan Group AAA Policies Session timeout Idle timeout Common Session ID Acct Session ID Handle Runnable methods list Method dot1x State c1921 GigabitEthernet0 1 0201 0201 0201 Unknown testUserl Authz Success DATA single host both Authentication Server N A N A N A 03030303000000000000BA04 0x00000001 0x6D000001 Authc Success Configuring the MAC Authentication Bypass MAB Perform these steps to configure the MAB SUMMARY STEPS 1 enable 2 configure terminal 3 4 5 mab 6 end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide interface gigabitethernet slot port authentication port control auto Authentication Methods Session ID 03030303000000000000BA04 I OL 20696 04 E Chapter HI Authentication Methods DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode interface gigabitethernet slot port Example Router config interface gigabitethernet 0 0 Enters interface configuration mode authentication port control auto Example Router config if authentication port control auto Enabl
23. This section describes how to control administrator access to the wireless device using Terminal Access Controller Access Control System Plus TACACS For complete instructions on configuring the wireless device to support TACACS see the Configuring Radius and TACACS Servers chapter in Cisco IOS Software Configuration Guide for Cisco Aironet Access Points TACACS provides detailed accounting information and flexible administrative control over authentication and authorization processes TACACS is facilitated through AAA and can be enabled only through AAA commands Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 270 OL 20696 04 Chapter Administering the Wireless Device amp Controlling Access Point Access with TACACS W Note For complete syntax and usage information for the commands used in this section see Cisco IOS Security Command Reference These sections describe TACACS configuration e Default TACACS Configuration page 271 e Configuring TACACS Login Authentication page 271 e Configuring TACACS Authorization for Privileged EXEC Access and Network Services page 273 e Displaying the TACACS Configuration page 274 Default TACACS Configuration TACACS and AAA are disabled by default To prevent a lapse in security you cannot configure TACACS through a network management application When enabled TACA
24. clock set hh mm ss month day year and seconds The time specified is relative to the configured time zone e For day specify the day by date in the month e For month specify the month by its full name e For year specify the year in four digits no abbreviation Step2 show running config Verifies your entries Step3 copy running config startup config Optional Saves your entries in the configuration file This example shows how to manually set the system clock to 1 32 p m on July 23 2001 AP clock set 13 32 00 23 July 2001 Displaying the Time and Date Configuration To display the time and date configuration use the show clock detail command in privileged EXEC mode The system clock keeps an authoritative flag that shows whether the time is authoritative believed to be accurate If the system clock has been set by a timing source such as NTP the flag is set If the time is not authoritative it is used only for display purposes Until the clock is authoritative and the authoritative flag is set the flag prevents peers from synchronizing to the clock when the peers time is invalid The symbol that precedes the show clock display has this meaning e Time is not authoritative e blank Time is authoritative e Time is authoritative but NTP is not synchronized Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Gui
25. e DSP Farms e DSP Farm Profiles e Conferencing e Broadcast Fast Busy Tone for DSP Oversubscription Video Conference and Transcoding Beginning in Cisco IOS Release 15 1 4 M support is added for video conference and transcoding on the PVDMs3 cards For more information see the Cisco Voice and Video Conferencing for ISR Routers document DSP Resource Manager Enhancement and DSP Numbering amp Each PVDM3 DSP card can hold up to two devices and each device can hold up to three DSP cores The host recognizes each DSP card as one individual DSP and each physical DSP as a device This virtual DSP concept provides a maximum of six DSPs per PVDM3 For backward compatibility for 5510 DSPs the existing numbering scheme is maintained see Table 1 and for PVDM3 DSPs a new numbering scheme is applied see Table 2 Note The numbering schemes shown in Table 1 and Table 2 are examples only and the DSP cards must be installed in the PVDM slots as shown for these sample numbering schemes to be correct For more information about DSP and device numbering see the documents listed in the Additional References section on page 166 Table 1 Example of a DSP Numbering Scheme for 5510 Installation Only Existing PVDM slot 0 PVDM slot 1 PVDM slot 2 PVDM slot 3 5510 Only PVDM2 16 PVDM2 32 PVDM2 48 PVDM2 64 DSP ID 1 5 6 9 10 11 13 14 15 16 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers
26. enable break abort has effect y n n y I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ra AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks enable ignore system config info y n n y change console baud rate y n n y enter rate 0 9600 1 4800 2 1200 3 2400 0 0 change the boot characteristics y n n Yy enter to boot 0 ROM Monitor 1 the boot helper image 2 15 boot system 0 0 Configuration Summary enabled are diagnostic mode console baud 9600 boot the ROM Monitor rommon 8 gt Obtaining Information on USB Flash Devices This section describes how to obtain information on USB devices that are installed in the router For instructions on booting from a USB flash device see the Loading a System Image boot section on page C 8 SUMMARY STEPS 1 dir usbflash x 2 dev DETAILED STEPS Command or Action Purpose Step1 dir usbflash x Displays the contents of the USB flash device including directories files permissions and sizes Example e Q USB flash device inserted in port 0 commen gt dit usbflaskhos e 1 USB flash device inserted in port 1 Step2 dev Shows the targeted USB flash devices that are inserted in the router and the valid device names that may or may not be currently inserted Example ROMMON gt dev Example
27. http help path http www cisco com warp public 779 smbiz prodconfig help eag radius source interface BVI1 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 m Chapter Administering the Wireless Device HZ Configuring the Access Point to Provide DHCP Service I tacacs server host 192 168 133 231 key 7 105E080A16001D1908 tacacs server directed request radius server attribute 32 include in access req format h radius server host 192 168 134 229 auth port 1645 acct port 1646 key 7 111918160405041E00 radius server vsa send accounting I control plane bridge 1 route ip line con 0 transport preferred all transport output all line vty 0 4 transport preferred all transport input all transport output all line vty 5 15 transport preferred all transport input all transport output all I end Configuring the Access Point to Provide DHCP Service The following sections describe how to configure the wireless device to act as a DHCP server e Setting up the DHCP Server page 292 e Monitoring and Maintaining the DHCP Server Access Point page 294 Setting up the DHCP Server amp By default access points are configured to receive IP settings from a DHCP server on your network You can also configure an access point to act as a DHCP server to assign IP settings to devices on both wired and wire
28. it does one of the following e Sends an alarm in syslog format or logs an alarm in Secure Device Event Exchange SDEE format e Drops suspicious packets e Resets the connection e Denies traffic from the source IP address of the attacker for a specified amount of time e Denies traffic on the connection for which the signature was seen for a specified amount of time For additional information about configuring Cisco IOS IPS see the Cisco IOS IPS 5 x Signature Format Support and Usability Enhancements section of Cisco IOS Security Configuration Guide Securing the Data Plane Release 12 4T at http www cisco com en US docs ios sec_data_plane configuration guide 12_4t sec_data_plane_12_4t_book html Content Filtering Cisco 3900 series 2900 series and 1900 series ISRs provide category based URL filtering The user provisions URL filtering on the ISR by selecting categories of websites to be permitted or blocked An external server maintained by a third party is used to check for URLs in each category Permit and deny policies are maintained on the ISR The service is subscription based and the URLs in each category are maintained by the third party vendor For additional information about configuring URL filtering see Subscription based Cisco IOS Content Filtering at http www cisco com en US docs ios security configuration guide sec_url_filtering html Configuring VPN A Virtual Private Network VPN connection p
29. station role root access point fallback track fa 0 MAC Address Tracking You can configure the radio whose role is root access point to come up or go down by tracking a client access point and using its MAC address on another radio If the client disassociates from the access point the root access point radio goes down If the client reassociates with the access point the root access point radio comes back up MAC address tracking is most useful when the client is a non root bridge access point connected to an upstream wired network For example to track a client whose MAC address is 12 12 12 12 12 12 enter the following command station role root access point fallback track mac address 12 12 12 12 12 12 shutdown Configuring Radio Data Rates You use the data rate settings to choose the data rates that the wireless device uses for data transmission The rates are expressed in megabits per second Mb s The wireless device always attempts to transmit at the highest data rate set to basic also known as required on the browser based interface If there are obstacles or interference the wireless device steps down to the highest rate that allows data transmission You can set each data rate to one of three states e Basic the GUI labels Basic rates as Required Allows transmission at this rate for all packets both unicast and multicast At least one of the wireless device s data rates must be set to basic e Enabled The wire
30. universal serial bus CF CompactFlash MGF multi gigabit fabric OE Oo oe HIMI High Speed Intrachassis Module Interconnect Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 a Chapter Overview of the Hardware and Software HZ New Features by Platform New Features by Platform Table 2 shows new feature support by platform Table 2 New Features in this Release by Platform Features 1941 1941W 2901 2911 2921 2951 3925 3925E 3945 3945E Services Performance Engine N N N N N N Y Y Y Y Cryptographic Engine N N N N N N yY Y y Y Acceleration USB Serial Console Y Y Y Y Y Y Y Y Y Y Power Management Y Y Y Y Y Y Y Y Y Y New Module and Interface Card Y Y Y Y Y Y Y Y Y Y Features Advanced Capability Y Y Y Y Y Y Y Y Y Y CompactFlash SFP Gigabit Ethernet Port N N N N Y Y Y Y Y Y Multi Gigabit Fabric Y Y Y Y Y Y Y Y Y Y Communication Integrated Application Services y y Y Y Y Y Y Y Y Y Eupe A New Slots Does not support Voice application services Must have Services Performance Engine 200 installed in the router Must have Services Performance Engine 250 installed in the router Does not support Voice application services Includes embedded wireless access point that supports Cisco Unified Wireless Architecture Cisco 3900 series 2900 series and 1900 series I
31. 0 1 1 2400 0 0 1 1200 Changing the Configuration Register Settings Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step7 Step 8 You can change the configuration register settings from either the ROM monitor or the Cisco IOS CLI This section describes how to modify the configuration register settings from the Cisco IOS CLI To change the configuration register using the ROM monitor see Appendix C Using ROM Monitor in this guide To change the configuration register settings from the Cisco IOS CLI complete the following steps Connect a terminal or PC to the router console port If you need help see the hardware installation guide for your router Configure your terminal or terminal emulation software for 9600 baud default 8 data bits no parity and 2 stop bits Power on the router If you are asked whether you would like to enter the initial dialog answer no Would you like to enter the initial dialog yes no After a few seconds the user EXEC prompt Router gt appears Enter privileged EXEC mode by typing enable and if prompted enter your password Router gt enable Password password Router Enter global configuration mode Router configure terminal Enter configuration commands one per line Edit with DELETE CTRL W and CTRL U end with CTRL Z To change the configuration register settings enter the config register value command where value is a
32. 1 to 5 or last e Optional For day specify the day of the week for example Sunday e Optional For month specify the month for example January e Optional For hh mm specify the time 24 hour format in hours and minutes e Optional For offset specify the number of minutes to add during summer time The default is 60 Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file The first part of the clock summer time global configuration command specifies when summer time begins and the second part specifies when it ends All times are relative to the local time zone The start time is relative to standard time The end time is relative to summer time If the starting month is after the ending month the system assumes that you are in the southern hemisphere This example shows how to specify that summer time starts on the first Sunday in April at 02 00 and ends on the last Sunday in October at 02 00 AP config clock summer time PDT recurring 1 Sunday April 2 00 last Sunday October 2 00 If summer time in your area does not follow a recurring pattern configure the exact date and time of the next summer time events follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 clock summer time zone date month date year hh mm month date year hh mm offset or
33. 1340665 864167346 3591 3591 1340665 864091056 1340724 927961044 0 244128 KKK KKK KKK KKK KKK KK KK KKK KK KKK KK KK KK KK KKK KK KK KKK KK KKK KK KK KKK KKK KKK KKK KK KKK KEKEKE 3591 3591 1340725 927671142 1340666 864213120 3591 3591 1340666 864121572 1340725 928006818 0 244128 KKK KKK KKK KKK KKK KK KKK KKK KKK KKK KKK KKK KKK KK KK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKKEKKKE 3591 3591 1340726 927655884 1340667 864197862 3591 3591 1340667 864106314 1340726 927991560 0 244128 KKK KKK KKK KKK KKK KK KKK KKK KKK KKK KKK KKK KKK KK KK KKK KK KKK KKK KKK KKK KK KK KKK KK KKK EKER EK 3591 3591 1340727 927732174 1340668 864533538 3591 3591 1340668 864167346 1340727 928327236 0 228870 KKK KKK KK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KK KKK KK KK KKK KKK KKK KKK KKK KKK KKK KKK KEKKEKE 3591 3591 1340728 927655884 1340669 864197862 3591 3591 1340669 864121572 1340728 928006818 0 274644 KR KKK KKK KK KKK KKK KKK KKK KK KKK KK KKK KKK KKK KK KK KKK KK KKK KKK KKK KKK KK KKK KKK KKK KKK KKK 3591 3591 1340729 927671142 1340670 864197862 3591 3591 1340670 864121572 1340729 927991560 0 244128 KKK KKK KK KK KK KKK KK KKK KEK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKK KKEKKEKE Troubleshooting Two Way Delay Measurement Configuration A Table 4 lists the debug commands to troubleshoot issues pertaining to
34. 60 seconds e If there are no radar signals on the new channel enables beacons and accepts client associations e If participating in WDS sends a DFS notification of its new operating frequency to the active WDS device amp Note You cannot manually select a channel for DFS enabled 5 GHz radios in Europe and Singapore The access points randomly selects a channel However in Japan you can manually select a channel if a radar has not been detected on it for the previous 30 minutes If you attempt to select a channel that is unavailable due to radar detection the CLI displays a message stating the channel is unavailable The full list of channels that require DFS is shown in Table 2 Table 2 DFS Channel List Channel Frequency Channel Frequency Channel Frequency 56 5280 MHz 108 5520 MHz 128 5640 MHz 60 5300 MHz 112 5560 MHz 132 5660 MHz 64 5320 MHz 116 5580 MHz 136 5680 MHz 100 5500 MHz 120 5600 MHz 140 5700 MHz 104 5500 MHz 124 5620 MHz For autonomous operation DFS requires random channel selection among the channels listed in Table 2 The user interface prevents you from manually configuring these channels The channels that are not listed in Table 2 do not require random selection and may be manually configured Prior to transmitting on any channels listed in Table 2 the access point radio performs a Channel Availability Check CAC The CAC is a 60 second scan for the presence of r
35. Cisco 1900 Series ISRs Table 6 lists the slots and ports available on Cisco 1900 series routers To view the installation guide see the following URL http www cisco com en US docs routers access 1900 hardware installation guide 1900_HIG html Table 6 Cisco 1900 Series ISR Routers Dbl Wide Dbl Wide GE RJ 45 Router EHWIC EHWIC SM SM ISM PVDM3 WLAN CF ports Cisco 1941 2 1 0 0 1 0 0 2 12 Cisco 1941W 2 1 0 0 0 0 1 2 12 1 One of the two EWHIC slots is adouble wide EWHIC slot giving the appearance of three EWHIC slots Common Ports The following ports are common among Cisco 3900 series Cisco 2900 series and Cisco 1900 series routers e Gigabit Ethernet RJ45 Ports available through an RJ45 connector e Gigabit Ethernet RJ45 SFP Ports available through RJ45 SFP connectors Connection supports fail over if the secondary connection goes down e RS232 Aux Supports modem control lines and remote administration for box to box redundancy applications e RS232 Serial Console Supports modem control lines and remote administration of the router with the proprietary cable shipped in the box e Type A USB 2 0 Supports USB based flash memory sticks security tokens and USB compliant devices e Type B mini port USB Serial Console Supports modem control lines and remote administration of the router using a type B USB compliant cable Licensing Cisco 3900 series Cisco 2900 series an
36. Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Example Router config sla y1731 delay aggregate interval 30 aggregate interval refers to the interval at which the packets are sent seconds Specifies the length of time in seconds I OL 20696 04 i Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Command Purpose Step6 exit Exits the router configuration mode Example Router config sla y1731 delay exit Step7 ip sla schedule operation number life Schedules the two way delay measurement value forever start time value she e life Specifies a period of time in seconds to execute The value can also be set as forever Example Start Specifies the ti hich h Router tcontioitip sla schedule 1001 start time sSpecifies the time at which to start the lite forever stare time mow entry The options available are after hh mm hh mm ss now and pending Step8 end Exits the router configuration mode and returns to the privileged EXEC mode Example Router config end Configuration Examples for Two Way Delay Measurement This example shows how to configure two way delay measurement using single tagging router gt enable router configure terminal router conf
37. Gi 0 2 1101 ka Gi 0 2 1101 Gi 0 0 1101 Provider Carrier Gi 0 0 1101 customer 1101 vlan 100 vlan 10 vlan 100 customer 1101 vlan 1101 vlan 1101 Gi 0 0 1102 Gi 0 2 1102 Gi 0 2 1102 Gi 0 0 1102 customer 1102 customer 1102 8 vlan 1102 vlan 1102 2 The following steps show how to configure external Ethernet data plane loopback on a subinterface using single and double tagging The procedure to configure external Ethernet data plane loopback on the main interface is similar to this procedure enable configure terminal interface gigabitethernet slot port sub port encapsulation dotlq vian id I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces W Ethernet Data Plane Loopback or encapsulation dotlq v an id second dotlq inner vlan id Step5 ethernet loopback permit external Step6 end DETAILED STEPS Command Purpose Step1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global configuration mode Example Router configure terminal Step3 interface gigabitethernet Specifies the subinterface and enters the subinterface slot port sub port configuration mode Example Router config interface gigabitethernet 0 2 1101 Step4 enca
38. HZ How to Upgrade the Cisco 10S Image Step7 Step 8 Step 9 Step 10 Step 11 Step 12 What to Do Next copy flash0 tftp rep Optional Copy a file to a server before deleting the file from flash memory When prompted enter the filename and the server s hostname or IP address Router copy flash0O tftp Optional Repeat Step 7 for each file that you identified in Step 6 delete flash0 directory path filename Use this command to delete a file in flash memory Router delete flash0 c39xx tmp Delete filename c39xx tmp lt er gt Delete flash0 c39xx tmp confirm lt er gt Repeat Step 9 for each file that you identified in Step 6 dir flash0 Use this command to display the layout and contents of flash memory Router dir flash0 Flash CompactFlash directory File Length Name status 1 6458208 c39xx tmp deleted 2 6458208 c3xx mz 12916544 bytes used 3139776 available 16056320 total 15680K bytes of ATA CompactFlash Read Write From the displayed output of the dir flash0 command compare the number of bytes available to the size of the system image to which you want to upgrade e Ifthe available memory is less than the new system image s minimum flash requirements you must upgrade your compact flash memory card to a size that can accommodate both the existing files and the new system image See the hardware installation guide for your router e Ifthe available memory is equal to or greater than the new
39. Manager Express and Cisco Unified Communications Manager clusters An H 323 Gatekeeper provides these endpoints with call routing and call admission control functions The endpoints communicate with the Gatekeeper using the H 323 Registration Admission Status RAS protocol The H 323 Gatekeeper is a special Cisco IOS software image that runs on the Cisco ISR platforms and the AS5350XM and AS5400XM Universal Gateway platforms The Cisco IOS H 323 Gatekeeper is an application that acts as the point of control for a variety of voice and video components that can be attached to an IP network such as IP telephony devices IP PSTN gateways H 323 video conferencing endpoints and H 323 multipoint control units while facilitating buildout of large scale multimedia service networks To configure Gatekeeper features see Configuring H 323 Gatekeepers and Proxies at http www cisco com en US docs ios 12_3 vvf_c cisco_ios_h323_configuration_guide old_archives_h323 5gkconf html Call Control Protocols The Cisco 3900 series and Cisco 2900 series ISRs support the following type of call control protocols e Trunk side Protocols page 132 e Line side Protocols page 133 Trunk side Protocols The Cisco 3900 series and Cisco 2900 series ISRs support the following trunk side call control protocols e Session Initiation Protocol SIP page 133 e Media Gateway Control Protocol MGCP page 133 e H 323 page 133 Cisco 3900 Series Cisco 2900 S
40. R RIP M mobile B BGP D EIGRP EX EIGRP external O OSPF IA OSPF inter area N1 OSPF NSSA external type 1 N2 OSPF NSSA external type 2 El OSPF external type 1 E2 OSPF external type 2 i IS IS su IS IS summary L1 IS IS level 1 L2 IS IS level 2 ia IS IS inter area candidate default U per user static route o ODR P periodic downloaded static route Gateway of last resort is not set 10 0 0 0 24 is subnetted 1 subnets a 10 108 1 0 is directly connected Loopback0O S 0 0 0 0 0 is directly connected FastEthernet0 Configuring Dynamic Routes In dynamic routing the network protocol adjusts the path automatically based on network traffic or topology Changes in dynamic routes are shared with other routers in the network The Cisco routers can use IP routing protocols such as Routing Information Protocol RIP or Enhanced Interior Gateway Routing Protocol EIGRP to learn routes dynamically You can configure either of these routing protocols on your router e Configuring Routing Information Protocol section on page 21 e Configuring Enhanced Interior Gateway Routing Protocol section on page 23 Configuring Routing Information Protocol SUMMARY STEPS To configure the RIP routing protocol on the router follow these steps beginning in global configuration mode 1 router rip version 1 2 network ip address no auto summary oF YS N end I OL 2
41. Statistics reports for each slot show packet performance and packet failures The following example displays output from the show platform mgf statistics command when entered on a Cisco 1941 ISR Router show platform mgf statistics Interface statistics for slot ISM port 1 30 second input rate 0 packets sec 30 second output rate 0 packets sec 0 packets input 0 bytes 0 overruns Received 0 broadcasts 0 multicast 0 unicast 0 runts 0 giants 0 jabbers 0 input errors 0 CRC 0 fragments 0 pause input 0 packets output 0 bytes 0 underruns 0 broadcast 0 multicast 0 unicast 0 late collisions 0 collisions 0 deferred 0 bad bytes received 0 multiple 0 pause output Interface statistics for slot EHWIC 0 port 2 30 second input rate 13844 packets sec 30 second output rate 13844 packets sec 3955600345 packets input 1596845471340 bytes 26682 overruns Received 0 broadcasts 0 multicast 3955600345 unicast 0 runts 0 giants 0 jabbers 0 input errors 0 CRC 0 fragments 0 pause input 3955738564 packets output 1596886171288 bytes 0 underruns 0 broadcast 0 multicast 3955738564 unicast 0 late collisions 0 collisions 0 deferred 0 bad bytes received 0 multiple 94883 pause output Interface statistics for slot EHWIC 1 port 3 30 second input rate 13844 packets sec 30 second output rate 13844 packets sec 3955973016 packets input 1598763291608 bytes 26684 overruns Received 0 broadcasts 0 multicast 3955973016 unicast 0
42. The password is encrypted in the configuration file Setting or Changing a Static Enable Password The enable password controls access to the privileged EXEC mode A Caution The no enable password command in global configuration mode removes the enable password but you should use extreme care when using this command If you remove the enable password you are locked out of the privileged EXEC mode To set or change a static enable password follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal enable password password end show running config a ae wN copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 258 OL 20696 04 _ Chapter Administering the Wireless Device Protecting Access to Privileged EXEC Commands DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Ste p2 enable password password Defines a new password or changes an existing password for access to privileged EXEC mode The default password is Cisco For password specify a string from to 25 alphanumeric characters The string cannot start with a number is case sensitive and allows spaces but ignores leading spaces It can contain the question mark character if you precede the question mark with the key combination Crtl V w
43. To configure dial backup and remote management on Cisco 3900 series Cisco 2900 series and Cisco 1900 series ISRs follow these steps beginning in global configuration mode 1 ip name server server address 2 ip dhcp pool name 3 exit 4 chat script script name expect send 5 interface type number 6 exit 7 interface type number 8 dialer watch group group number 9 exit 10 ip nat inside source list access list number interface type number pool name overload 11 ip route prefix mask ip address interface type interface number ip address 12 access list access list number deny permit source source wildcard 13 dialerwatch list group number ip ip address address mask delay route check initial seconds 14 line aux console tty vty line number ending line number 15 modem enable 16 exit 17 line aux console tty vty line number ending line number 18 flowcontrol none software lock in out hardware in out Command Purpose ip name server server address Enters your ISP DNS IP address Tip You may add multiple server Example addresses if available Router config ip name server 192 168 28 12 Router config ip dhcp pool name Creates a DHCP address pool on the router Example Router config ip dhcp pool 1 and enters DHCP pool configuration mode The name argument can be a string or an integer Router config dhcp Configure the DHCP address pool For sample commands
44. and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 a iss Chapter Configuring Next Generation High Density PVDM3 Modules HZ How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways TDM Sharing Pooling Configuration Time division multiplexing TDM sharing pooling is only allowed among the same type of PVDMs For example if the motherboard has PVDM3 modules and other voice cards have PVDM2 modules the motherboard cannot share or pool DSP resources with other voice cards If the motherboard has PVDM2 modules and other voice cards also have PVDM2 modules the existing CLI command will enable TDM sharing pooling voice card 0 dsp tdm pooling In the case of mixed types of PVDMs existing in the router for example the motherboard has PVDM3 another voice card has PVDM2 and a third voice card has no PVDM there is a new CLI command under the voice card CLI that allows the voice card to choose which type of PVDM to use for TDM sharing pooling voice card 2 dsp tdm pooling type PVDM2 PVDM3 For more information about TDM sharing pooling see the documents listed in the Additional References section on page 166 How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways Use the following commands in global configuration mode to verify and troubleshoot the functionality of the PVDM2 and PVDM3 modules in
45. boot This section describes how to load a system image by using the boot ROM monitor command Prerequisites Determine the filename and location of the system image that you want to load Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 8 OL 20696 04 Appendix Using ROM Monitor SUMMARY STEPS 1 boot or boot flash0 filename or boot filename tftpserver or boot filename or boot usbflash0 filename DETAILED STEPS Step 1 1 Cisco 3925E and Cisco 3945E do not support this boot option Command or Action How to Use the ROM Monitor Typical Tasks Tl Purpose boot or boot flash0 filename or boot filename tftpserver or boot filename or boot usbflash0 filename Example ROMMON gt boot Example ROMMON gt boot flash0 Example ROMMON gt boot someimage 172 16 30 40 Example ROMMON gt boot someimage Example ROMMON gt boot usbflash0 someimage In order the examples here direct the router to e Boot the first image in flash memory e Boot the first image or a specified image in flash memory Note In IOS flashO will be aliased onto flash e Boot the specified image over the network from the specified TFTP server hostname or IP address e Boot from the boothelper image because it does not recognize the device ID This form of the command is used to boot a specif
46. dir flash0 Step4 copy flash0 ftp rep tftp Copies a file from flash memory to a server e Copy the system image file to a server to serve as a Example backup copy ROP SEH copy S1agnt ss SEs e Enter the flash memory partition number if prompted e Enter the filename and destination URL when prompted Examples 198 E Copying the Startup Configuration to a TFTP Server Example The following example shows the startup configuration being copied to a TFTP server Router copy nvram startup config tftp Remote host 172 16 101 101 Name of configuration file to write rtr2 confg lt er gt Write file rtr2 confg on host 172 16 101 101 confirm lt er gt OK Copying from Flash Memory to a TFTP Server Example The following example uses the dir flash0 privileged EXEC command to obtain the name of the system image file and the copy flash0 tftp privileged EXEC command to copy the system image to a TFTP server The router uses the default username and password Router dir flash0 System flash directory File Length Name status 1 4137888 c2900 mz 4137952 bytes used 12639264 available 16777216 total 16384K bytes of processor board System flash Read Write Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco 10S Software Router copy flash0O tftp How to Upgrade the
47. http www cisco com en US docs ios 12_3 vvf_c interop intcnf2 html The RSVP Agent feature implements a Resource Reservation Protocol RSVP agent on Cisco IOS voice gateways that support Cisco Unified Communications Manager Version 5 0 1 The RSVP agent enables Cisco Unified Communications Manager to provide resource reservation for voice and video media to ensure QoS and call admission control CAC Cisco Unified Communications Manager controls the RSVP agent through Skinny Client Control Protocol SCCP This signaling is independent of the signaling protocol used for the call so SCCP SIP H 323 and MGCP calls can all use the RSVP agent Benefits of this feature include the following e Improves flexibility and scalability of bandwidth management in a meshed network by decentralizing call admission control e Provides method of managing unpredictable bandwidth requirements of video media e Enables RSVP across WAN for Cisco IP phones and other devices that do not support RSVP See Configuring the RSVP Agent at Cisco com for information http www cisco com en US docs ios 12_3 vvf_c interop int_rsvp html Trusted Relay Point TRP The Cisco Unified Communications system can be deployed in a network virtualization environment Cisco Unified Communications Manager enables the insertion of trusted relay points TRPs The insertion of TRPs into the media path constitutes a first step toward VoIP deployment within a virtual network See Me
48. i ip dhcp pool miercom network 10 1 0 0 255 255 0 0 default router 10 1 0 254 dns server 10 1 0 254 ip dhcp pool wlan clients network 10 9 0 0 255 255 0 0 default router 10 9 0 254 dns server 10 9 0 254 multilink bundle name authenticated chat script gsm atdt 99 TIMEOUT 180 CONNECT chat script cdma atdt 777 TIMEOUT 180 CONNECT license udi pid CISCO1941W A K9 sn FHH1249P016 archive log config hidekeys redundancy track 234 ip sla 1 reachability interface Loopback0O ip address 1 1 1 1 255 255 255 255 I interface Wlan GigabitEthernet0 0 description Internal switch interface connecting to the embedded AP I interface GigabitEthernet0 0 ip address dhcp ip virtual reassembly load interval 30 shutdown duplex auto speed auto l interface wlan ap0 description Service module interface to manage the embedded AP ip address 192 168 1 1 255 255 255 0 arp timeout 0 no mop enabled no mop sysid l interface GigabitEthernet0 1 ip address 10 1 0 254 255 255 0 0 ip nat inside ip virtual reassembly shutdown Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 nos Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces duplex auto speed auto crypto ipsec client ezvpn hw client
49. see Cisco IOS Security Command Reference for Release 12 4 This section describes how to control access to the configuration file and privileged EXEC commands It contains this configuration information e Configuring Default Password and Privilege Level page 258 e Setting or Changing a Static Enable Password page 258 e Protecting Enable and Enable Secret Passwords with Encryption page 259 e Configuring Username and Password Pairs page 261 e Configuring Multiple Privilege Levels page 262 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device HZ Protecting Access to Privileged EXEC Commands Configuring Default Password and Privilege Level Table 1 shows the default password and privilege level configuration Table 1 Default Passwords and Privilege Levels Privilege Level Default Setting Username and password Default username is Cisco and the default password is Cisco Enable password and privilege level Default password is Cisco The default is level 15 privileged EXEC level The password is encrypted in the configuration file Enable secret password and privilege level Default enable password is Cisco The default is level 15 privileged EXEC level The password is encrypted before it is written to the configuration file Line password Default password is Cisco
50. 0 0 0 0 3 1 0 0 0 0 00fa ce25 0000 51645919 37972871 29875 29875 0 0 0 1 4 1 0 0 0 0 00fa ce25 0001 28355309 20859980 29875 29875 0 0 0 1 5 1 0 0 0 0 00fa ce25 0001 28355309 20859980 29875 29875 0 0 0 1 6 1 0 0 0 0 00fa ce25 0001 28355309 20859980 29875 29875 0 Step8 show voice dsp statistics tx rx Use this command to display transmitted and received packet counts for the device Router show voice dsp statistics tx rx Device and Port Statistics PVDM 0 8903 input packets at port 15374 output packets at port Device 0 6853 packets from device 11793 packets to device 0 Ctrl amp 0 Media out of sequence packets 0 packets drop 0 input error packets 0 output error packets 0 resource errors packets 0 gaints vlan id 2 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 160 OL 20696 04 _ Chapter Configuring Next Generation High Density PVDM3 Modules Step 9 Step 10 Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers il Device 1 2048 packets from device 3579 packets to device 0 Ctrl amp 0 Media out of sequence packets 0 packets drop 0 input error packets 0 output error packets 0 resource errors packets 0 gaints vlan id 2 29083 input packets at port 32627 output packets at port Device 2 29081 packets from device 32627 packets to device 0 Ctrl amp 0 Media out of sequence pack
51. 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz and 5 GHz radios are radio 0 The 802 1 1n 5 GHz radio is radio 1 fragment threshold value Sets the fragmentation threshold Enter a setting from 256 to 2346 bytes for the 2 4 GHz radio Enter a setting from 256 to 2346 bytes for the 5 GHz radio end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Use the no form of the fragment threshold command to reset the setting to the default Enabling Short Slot Time for 802 119 Radios You can increase throughput on the 802 11g 2 4 GHz radio by enabling short slot time Reducing the slot time from the standard 20 microseconds to the 9 microsecond short slot time decreases the overall backoff which increases throughput Backoff which is a multiple of the slot time is the random length of time that a station waits before sending a packet on the LAN Many 802 11g radios support short slot time but some do not When you enable short slot time the wireless device uses the short slot time only when all clients associated to the 802 11g 2 4 GHz radio support short slot time Short slot time is supported only on the 802 11g 2 4 GHz radio Short slot time is disabled by default In radio interface mode enter the short slot time command to enable short slot time ap config if short slot time Enter no short slot time
52. 10 10 2 Router config end Exits router configuration mode and enters privileged EXEC mode Example Router config end Router I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Basic Router Configuration W Configuring Static Routes Example In the following configuration example the static route sends out all IP packets with a destination IP address of 192 168 1 0 and a subnet mask of 255 255 255 0 on the Gigabit Ethernet interface to another device with an IP address of 10 10 10 2 Specifically the packets are sent to the configured PVC You do not need to enter the command marked default This command appears automatically in the configuration file generated when you use the show running config command ip classless default ip route 192 168 1 0 255 255 255 0 10 10 10 2 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 20 OL 20696 04 Chapter Basic Router Configuration Configuring Dynamic Routes W Verifying Configuration To verify that you have properly configured static routing enter the show ip route command and look for static routes signified by the S You should see verification output similar to the following Router show ip route Codes C connected S static
53. 10S CLI for Initial Configuration Using the Cisco IOS CLI to Perform Initial Configuration W DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action Purpose enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable configure terminal Enters global configuration mode Example Router configure terminal hostname name Specifies or modifies the hostname for the network server Example Router config hostname myrouter Verify that the router prompt displays your new hostname Example myrouter config end Optional Returns to privileged EXEC mode Example myrouter end Configuring the Enable and Enable Secret Passwords To provide an additional layer of security particularly for passwords that cross the network or are stored on a TFTP server you can use either the enable password command or enable secret command Both commands accomplish the same thing they allow you to establish an encrypted password that users must enter to access privileged EXEC enable mode We recommend that you use the enable secret command because it uses an improved encryption algorithm Use the enable password command only if you boot an older image of the Cisco IOS software or if you boot older boot ROMs that do not recognize the enable secret command For more information see the Configuring Passwords and Privileges chap
54. 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 220 OL 20696 04 Configuring Radio Settings The following sections describe how to configure radio settings for the wireless device Enabling the Radio Interface page 221 Configuring the Role in the Radio Network page 223 Configuring Dual Radio Fallback page 225 Configuring Radio Data Rates page 226 Configuring MCS Rates page 229 Configuring Radio Transmit Power page 231 Configuring Radio Channel Settings page 233 Enabling and Disabling World Mode page 239 Disabling and Enabling Short Radio Preambles page 241 Configuring Transmit and Receive Antennas page 242 Enabling and Disabling Gratuitous Probe Response page 243 Configuring the Ethernet Encapsulation Transformation Method page 245 Enabling and Disabling Public Secure Packet Forwarding page 246 Configuring the Beacon Period and the DTIM page 248 Configure RTS Threshold and Retries page 249 Configuring the Maximum Data Retries page 250 Configuring the Fragmentation Threshold page 250 Enabling Short Slot Time for 802 11g Radios page 251 Performing a Carrier Busy Test page 251 Configuring VoIP Packet Handling page 252 Enabling the Radio Interface The wireless device radios are disabled by default amp Note You must create a service set identifier SSID before you can enable the radio interface Cisco 3900 Serie
55. 3925 and Cisco 3925E routers Applies only to Cisco 3945 and Cisco 3945E routers Applies only to Cisco 2951 Cisco 3925 and Cisco 3925E routers Applies only to Cisco 3945 and Cisco 3945E routers Applies only to Cisco 2951 Cisco 3925 and Cisco 3925E routers Applies only to Cisco 3945 and Cisco 3945E routers O05 Soh OY ORS 8 oS Configuring Gigabit Ethernet Interfaces To manually define onboard Gigabit Ethernet GE interfaces follow these steps beginning in global configuration mode SUMMARY STEPS 1 interface gigabitethernet slot port ip address ip address mask no shutdown PF N exit DETAILED STEPS Command Purpose Step 1 interface gigabitethernet slot port Enters the configuration mode for a Gigabit Ethernet interface on the router Example Router config interface gigabitethernet 0 1 Router config if Step 2 Sets the IP address and subnet mask for the specified GE interface ip address ip address mask Example Router config if ip address 192 168 12 2 255 255 255 0 Router config if Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Basic Router Configuration Command Configuring Wireless LAN Interfaces W Purpose Step 3 no shutdown Example Router config if no shutdown Router config if Enables the GE interface changing its
56. 43 for the controller IP address in the DHCP pool configuration The following is a sample configuration ip dhcp pool embedded ap pool network 60 0 0 0 255 255 255 0 dns server 171 70 168 183 default router 60 0 0 1 option 43 hex 104 0a0a 0a0f single WLC IP address 10 10 10 15 in hex format int vlanl ip address 60 0 0 1 255 255 255 0 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring the Wireless Device HI Upgrading to Cisco Unified Software For more information about the WLC discovery process see Cisco Wireless LAN Configuration Guide at Cisco com http www cisco com en US docs wireless controller 4 0 configuration guide ccfig40 html Prior to the Upgrade Perform the following steps 1 Ping the WLC from the router to confirm IP connectivity Enter the service module wlan ap 0 session command to establish a session with the access point Confirm that the access point is running an autonomous boot image gt 2S N Enter the show boot command on the access point to confirm the mode setting is enabled The following is sample output for the command Autonomous AP show boot BOOT path list flash ap801 k9w7 mx 124 10b JA3 ap801 k9w7 mx 124 10b JA3 Config file flash config txt Private Config file flash private config Enable Break yes Manual Boot yes HELPER path list NVRAM
57. 8 9 60 4 39 81 43 1 3 90 5 52 109 57 5 9 120 6 58 5 121 5 65 135 7 65 135 72 2 9 152 5 8 13 27 14 4 9 30 9 26 54 28 8 9 60 10 39 81 43 1 3 90 11 52 108 57 7 9 120 12 78 162 86 2 3 180 13 104 216 115 5 9 240 14 117 243 130 270 15 130 270 144 4 9 300 The legacy rates are as follows 5 GHz 6 9 12 18 24 36 48 and 54 Mb s 2 4 GHz 1 2 5 5 6 9 11 12 18 24 36 48 and 54 Mb s MCS rates are configured using the speed command The following example shows a speed setting for an 802 11g n 2 4 GHz radio interface Dot11Radio0 no ip address no ip route cache ssid 800test speed basic 1 0 2 0 5 5 11 0 6 0 9 0 12 0 18 0 24 0 36 0 48 0 54 0 mO m1 m2 m3 m4 m8 m9 m10 m11 m12 m13 m14 m15 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 230 OL 20696 04 Chapter Configuring Radio Settings Configuring Radio Transmit Power W Configuring Radio Transmit Power SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Radio transmit power is based on the type of radio or radios installed in your access point and the regulatory domain in which it operates To set the transmit power on access point radios follow these steps beginning in privileged EXEC mode 1 configure terminal 2 interface dotllradio 0 1 3 power local level 4 end 5 copy running
58. 802 11d world mode operation Limiting the power level on associated client devices When a client device associates to the wireless device the wireless device sends the maximum allowed power level setting to the client Disabling Aironet extensions disables the features listed above but it sometimes improves the ability of non Cisco client devices to associate to the wireless device Aironet extensions are enabled by default To disable Aironet extensions follow these steps beginning in privileged EXEC mode SUMMARY STEPS oF N configure terminal interface dotllradio 0 1 no doti1 extension aironet end copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Radio Settings Configuring the Ethernet Encapsulation Transformation Method W DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface dotilradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 1 1n 5 GHz radio is radio 1 Step3 no dot11 extension aironet Disables Aironet extensions Step4 end Returns to privileged EXEC mode Step5 copy running config startup config Optional Saves your entries in the configuration file Use the dot11 extension aironet command to enable
59. Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EN Chapter Configuring Next Generation High Density PVDM3 Modules HZ Prerequisites for Configuring the PVDM3 Module on Cisco Voice Gateway Routers e How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways page 154 e Configuration Examples for Configuring the PYDM3 Module on Cisco Voice Gateway Routers page 161 e Additional References page 166 e Glossary page 168 Prerequisites for Configuring the PVDM3 Module on Cisco Voice Gateway Routers To configure the PVDM3 Module on your Cisco 2900 or Cisco 3900 series voice gateway router you must have Cisco IOS Release 15 0 1 M or a later release installed The image must provide a voice capable feature set To configure the PVDM3 Module on your Cisco 3925E or Cisco 3945E voice gateway router you must have Cisco IOS Release 15 1 1 T or later release installed The image must provide a voice capable feature set If you have installed the PVDM3 cards in your Cisco gateway make certain that you have complied with the hardware installation instructions in Cisco 2900 Series and 3900 Series Integrated Services Routers Hardware Installation Guide Restrictions for Configuring the PVDM3 Module on Cisco Voice Gateway Routers The PVDM3 card can only be installed and used on the following Cisco voice gateway router
60. Clients ie W Access point i A i 146930 l amp Note This feature does not affect the fallback feature for single radio access points You can configure dual radio fallback in three ways e Radio tracking e Fast Ethernet tracking e MAC address tracking Radio Tracking You can configure the access point to track or monitor the status of one of its radios If the tracked radio goes down or is disabled the access point shuts down the other radio If the tracked radio comes up the access point enables the other radio e To track radio 0 enter the following command station role root access point fallback track d0 shutdown e To track radio 1 enter the following command station role root access point fallback track d1 shutdown Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 g 225 Chapter Configuring Radio Settings W Configuring Radio Data Rates Fast Ethernet Tracking You can configure the access point for fallback when its Ethernet port is disabled or disconnected from the wired LAN You configure the access point for Fast Ethernet tracking as described in the Configuring the Role in the Radio Network section on page 223 Note Fast Ethernet tracking does not support the repeater mode e To configure the access point for Fast Ethernet tracking enter the following command
61. Command or Action Configuring VPN W Purpose Step 2 crypto map map name Applies the crypto map to the interface See Cisco IOS Security Command Reference for Example more detail about this command Router config if crypto map static map Router config if Step 3 exit Returns to global configuration mode Example Router config crypto map exit Router config Where to Go Next Create a Cisco Easy VPN Remote Configuration SUMMARY STEPS If you are creating a Cisco Easy VPN remote configuration go to the Create a Cisco Easy VPN Remote Configuration section on page 103 If you are creating a site to site VPN using IPSec tunnels and GRE go to the Configure a Site to Site GRE Tunnel section on page 106 The router that is acting as the Cisco Easy VPN client must create a Cisco Easy VPN remote configuration and assign it to the outgoing interface To create the remote configuration follow these steps beginning in global configuration mode crypto ipsec client ezvpn name group group name key group key peer ipaddress hostname exit crypto isakmp keepalive seconds interface type number o o N Fo fF FPF YS DN exit mode client network extension network extension plus crypto ipsec client ezvpn name outside inside I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Gu
62. Device HZ Configuring Wireless Settings Table 1 Security Type Types of SSID Security continued Description Security Features Enabled EAP Authentication This option enables 802 1X authentication such as LEAP PEAP EAP TLS EAP FAST EAP TTLS EAP GTC EAP SIM and other 802 1X EAP based products This setting uses mandatory encryption WEP open authentication EAP network EAP authentication no key management RADIUS server authentication port 1645 You are required to enter the IP address and shared secret for an authentication server on your network server authentication port 1645 Because 802 1X authentication provides dynamic encryption keys you do not need to enter a WEP key Mandatory 802 1X authentication Client devices that associate using this SSID must perform 802 1X authentication If radio clients are configured to authenticate using EAP FAST open authentication with EAP should also be configured If you do not configure open authentication with EAP the following warning message appears SSID CONFIG WARNING SSID If radio clients are using EAP FAST AUTH OPEN with EAP should also be configured WPA This option permits wireless access to users Mandatory WPA authentication authenticated against a database through the services of Client devices that associate using an authentication server then encrypts their IP traffic this SSID must be
63. Guide for more information ISRs are configured primarily as residential gateways RGWs under MGCP For residential gateway configuration information see the Configuring an RGW section of the Basic MGCP Configuration chapter of Cisco IOS MGCP and Related Protocols Configuration Guide H 323 is an umbrella recommendation from the International Telecommunication Union ITU that defines the protocols to provide voice and video communication sessions on a packet network The H 323 standard addresses call signaling and control multimedia transport and control and bandwidth control for point to point and multi point sessions See Cisco IOS H 323 Configuration Guide for more information about H 323 For router configuration information see the Configuring H 323 Gateways chapter of Cisco IOS H 323 Configuration Guide Line side Protocols The Cisco 3900 series and Cisco 2900 series ISRs support the following line side call control protocols e SCCP Controlled Analog Ports with Supplementary Features page 134 e Session Initiation Protocol SIP page 134 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Unified Communications on Cisco Integrated Services Routers W Unified Communications Gateways SCCP Controlled Analog Ports with Supplementary Features Voice gateway ISRs support the Cisco Skinny Client Control Protocol SCCP
64. Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces W Ethernet Data Plane Loopback This is an intrusive loopback and the packets matched with the service will not be able to pass through Continue yes no Enter yes to continue This example shows how to stop an Ethernet data plane loopback Router ethernet loopback stop local interface gigabitethernet 0 2 1101 id 1 Router Oct 21 10 16 17 887 E_DLB 6 DATAPLANE_LOOPBACK_STOP Ethernet Dataplane Loopback Stop on interface GigabitEthernet0 2 with session id 1 Router show ethernet loopback active Total Active Session s 0 Total Internal Session s 0 Total External Session s 0 Verifying the Ethernet Data Plane Loopback Configuration Use the following commands to verify the Ethernet data plane loopback configuration e show ethernet loopback permitted e show ethernet loopback active Use the show ethernet loopback permitted command to view the loopback capabilities per interface Router show ethernet loopback permitted Interface SrvcInst Direction Dot1lq Dotlad s Second Dot1q s Gi0 2 1101 N A External 100 1101 Use the show ethernet loopback active command to display the summary of the active loopback sessions on a subinterface Router show ethernet loopback active Loopback Session ID seid Interface GigabitEthernet0 2 1101 Service Inst
65. OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks W Accessibility This product can be configured using the Cisco command line interface CLI The CLI conforms to accessibility code 508 because it is text based and it relies on a keyboard for navigation All functions of the router can be configured and monitored through the CLI For a complete list of guidelines and Cisco products adherence to accessibility see the Cisco Accessibility Products document at http www cisco com web about responsibility accessibility products How to Use the ROM Monitor Typical Tasks This section provides the following procedures e Entering ROM Monitor Mode page C 3 e Displaying Commands and Command Syntax in ROM Monitor Mode help page C 7 e Displaying Files in a File System dir page C 8 e Loading a System Image boot page C 8 e Modifying the Configuration Register confreg page C 13 e Obtaining Information on USB Flash Devices page C 14 e Modifying the I O Memory iomemset page C 15 e Recovering the System Image tftpdnld page C 16 e Troubleshooting Crashes and Hangs stack context frame sysret meminfo page C 20 e Exiting ROM Monitor Mode page C 25 amp Note This section does not describe how to perform all possible ROM monitor tasks Use the command help to perform any tasks that are not described in this document See the Displaying Commands and Command Syntax in ROM Mon
66. PPP number of packets and number of bytes AAA uses protocols such as Remote Authentication Dial In User Service RADIUS Terminal Access Controller Access Control System Plus TACACS or Kerberos to administer its security functions If your router is acting as a network access server AAA is the means through which you establish communication between your network access server and your RADIUS TACACS or Kerberos security server For information about configuring AAA services and supported security protocols authentication authorization accounting RADIUS TACACS or Kerberos see the following sections of Cisco IOS Security Configuration Guide Securing User Services Release 12 4T at http www cisco com en US docs ios sec_user_services configuration guide 12_4T sec_securing_user_services_12 4t_book html e Configuring Authentication e Configuring Authorization e Configuring Accounting e Configuring RADIUS e Configuring TACACS e Configuring Kerberos Configuring AutoSecure The AutoSecure feature disables common IP services that can be exploited for network attacks and enables IP services and features that can aid in the defense of a network when under attack These IP services are all disabled and enabled simultaneously with a single command greatly simplifying security configuration on your router For a complete description of the AutoSecure feature see the AutoSecure feature document at http www cisco com unive
67. Size 256 MB Start Addr 0x00000000 ee Bank 0 128 MB Bank 1 128 MB Main memory size 384 MB in 64 bit mode Available main memory starts at 0xa0015000 size 393132KB IO packet memory size 10 percent of main memory NVRAM size 191KB Recovering the System Image tftpdnid A This section describes how to download a Cisco IOS software image from a remote TFTP server to the router flash memory by using the tftpdnld command in ROM monitor mode Caution Prerequisites Restrictions Use the tftpdnld command only for disaster recovery because it can erase all existing data in flash memory before it downloads a new software image to the router Before you can enter the tftpdnld command you must set the ROM monitor environment variables Connect the TFTP server to a fixed network port on your router e LAN ports on network modules or interface cards are not active in ROM monitor mode Therefore only a fixed port on your router can be used for TFTP download This can be a fixed Ethernet port on the router that is either of the two Gigabit Ethernet ports on Cisco routers with those ports e You can only download files to the router You cannot use the tftpdnld command to retrieve files from the router Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor
68. Size Used Free Bank Size State Copy Mode T 125184K 20390K 104793K OK Read Write Direct System Compact Flash directory File Length Name status addr fcksum ccksum 1 6658376 c29xx i mz 0x40 OxEOFF OxEOFF 2 14221136 c2900 telcoent mz 0x6599C8 O0x5C3D 0x5C3D 20879640 bytes used 107308776 available 128188416 total 125184K bytes of ATA System Compact Flash Read Write Chip information NOT available External Card with Class C Flash File System Example The geometry and format information is displayed in this format Router show flash all length date time path 1 6658376 Mar 01 2004 04 27 46 c28xx i mz 25268224 bytes available 6664192 bytes used xx x x x x ATA Flash Card Geometry Format Info ATA CARD GEOMETRY Number of Heads Number of Cylinders 490 Sectors per Cylinder 32 Sector Size 512 Total Sectors 62720 ATA CARD FORMAT Number of FAT Sectors 31 Sectors Per Cluster 8 Number of Clusters 7796 Number of Data Sectors 62560 Base Root Sector 155 Base FAT Sector 93 Base Data Sector 187 Formatting CompactFlash Memory as a Class C File System Use the format flash0 command in privileged EXEC mode to e Format CF memory cards with a Class C flash file system e Remove the files from a CF memory card previously formatted with a Class C flash file system I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services R
69. Typical Tasks W SUMMARY STEPS 1 IP_ADDRESS ip_address 2 IP_SUBNET_MASK ip_address 3 DEFAULT_GATEWAY ip_address 4 TFTP_SERVER ip_address 5 TFTP_FILE directory path filename 6 GE_PORT 01 11 2 7 GE_SPEED_MODE 01112131415 8 TFTP_MEDIA_TYPE 0 1 9 TFTP_CHECKSUM 0 1 10 TFTP_DESTINATION flash0 flash1 usbflash0 usbflash1 11 TFTP_MACADDR MAC _address 12 TFTP_RETRY_COUNT retry_times 13 TFTP_TIMEOUT time 14 TFTP_VERBOSE setting 15 set 16 tftpdnid h r 17 y DETAILED STEPS Command or Action Purpose Step 1 IP_ADDRESS ip_address Sets the IP address of the router Example rommon gt IP_ADDRESS 172 16 23 32 Step2 IP_SUBNET_MASK ip_address Sets the subnet mask of the router Example rommon gt IP_SUBNET_MASK 255 255 255 224 Step3 DEFAULT_GATEWAY ip_address Sets the default gateway of the router Example rommon gt DEFAULT_GATEWAY 172 16 23 40 Step4 TFTP_SERVER ip_address Sets the TFTP server from which the software is downloaded Example rommon gt TFTP_SERVER 172 16 23 33 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 EA AppendixC Using ROM Monitor HI Howto Use the ROM Monitor Typical Tasks Command or Action Purpose Step5 TFTP_FILE directory path filename Example rommon gt TFTP_FILE archive rel22 c2801 i mz Sets the
70. US docs ios 12_2 ibm configuration guide bcftb_ps1835_TSD_Products_Configuration_Guide_Chapter html PSPF is disabled by default To enable PSPF follow these steps beginning in privileged EXEC mode 1 configure terminal interface dotl1radio 0 1 bridge group group port protected end oF YS N copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Radio Settings DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Enabling and Disabling Public Secure Packet Forwarding W Command Purpose configure terminal Enters global configuration mode interface dotllradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 bridge group group port protected Enables PSPF end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Use the no form of the bridge group command to disable PSPF Configuring Protected Ports SUMMARY STEPS DETAILED STEPS Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 1 Step 2 Step 3 Step 4 Step5 Step 6 To prevent communication between cl
71. WPA capable with stronger algorithms than those used in WEP If radio clients are configured to This setting uses encryption ciphers TKIP open authenticate using EAP FAST open authentication EAP network EAP authentication key authentication with EAP should also management WPA mandatory and RADIUS server be configured If you don t configure authentication port 1645 open authentication with EAP the As with EAP authentication you must enter the IP following message appears address and shared secret for an authentication server on SSID CONFIG WARNING SSID If your network server authentication port 1645 Zadio Sen gre using EAP FAST AUTH OPEN with EAP should also be configured 1 EAP Extensible Authentication Protocol 2 LEAP Lightweight Extensible Authentication Protocol 3 PEAP Protected Extensible Authentication Protocol 4 EAP TLS Extensible Authentication Protocol Transport Layer Security 5 EAP FAST Extensible Authentication Protocol Flexible Authentication via Secure Tunneling 6 EAP TTLS Extensible Authentication Protocol Tunneled Transport Layer Security 7 EAP GTC Extensible Authentication Protocol Generic Token Card 8 EAP SIM Extensible Authentication Protocol Subscriber Identity Module 9 WA Wi Fi Protected Access gt TKIP Temporal Key Integrity Protocol Configuring Wireless Quality of Service Configuring Quality of Service QoS can provide preferential treatment
72. You can upgrade the software on the device to Cisco Unified software See the Upgrading to Cisco Unified Software section on page 215 Note The wireless device is embedded on the router and does not have an external console port for connections To configure the wireless device use a console cable to connect a personal computer to the host router s Console serial port and follow the instruction to establish a configuration session Starting a Wireless Configuration Session Enter the following commands in global configuration mode on the router s Cisco IOS command line interface CLI SUMMARY STEPS 1 interface wlan ap0 ip address subnet mask no shut interface vlan1 ip address subnet mask exit exit o N os FF Y DN service module wlan ap 0 session Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ms 207 Chapter Configuring the Wireless Device HZ Starting a Wireless Configuration Session DETAILED STEPS Command Purpose Step 1 interface wlan ap0 Example router config interface wlan ap0 router config if Defines the router s console interface to the wireless device It is used for communication between the router s Console and the wireless device Always use port 0 The following message appears The wlan ap 0 interface is used for managing the embedded AP Please use
73. all incoming Ethernet packets conform to the configured rate Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 298 OL 20696 04 APPENDIX A Cisco IOS CLI for Initial Configuration The following sections describe how to perform the initial configuration using the Cisco Internet Operating System IOS command line interface CLI e Prerequisites for Initial Software Configuration Using the Cisco IOS CLI page A 1 e Using the Cisco IOS CLI to Perform Initial Configuration page A 2 amp Note We recommend using Cisco Configuration Professional Express web based application to configure the initial router settings See Cisco Configuration Professional Express User Guide at Cisco com for detailed instructions http www cisco com en US docs net_mgmt cisco_configuration_professional_express v1_4 olh ccp_ express html Initial Configuration of the Wireless Access Point on Cisco 1941W Router The embedded wireless access point AP runs its own version of Cisco Internet Operating System IOS software Use Cisco Configuration Professional Express to perform the initial configuration of the access point software For information on how to configure additional wireless parameters see the Configuring the Wireless Device module in this guide Prerequisites for Initial Software Configuration Using the Cisco IOS CLI Follow the instructions in th
74. allows most VPN parameters such as internal IP addresses internal subnet masks DHCP server addresses Windows Internet Naming Service WINS server addresses and split tunneling flags to be defined at a VPN server such as a Cisco VPN 3000 series concentrator that is acting as an IPSec server A Cisco Easy VPN server enabled device can terminate VPN tunnels initiated by mobile and remote workers who are running Cisco Easy VPN Remote software on PCs Cisco Easy VPN server enabled devices allow remote routers to act as Cisco Easy VPN Remote nodes The Cisco Easy VPN client feature can be configured in one of two modes client mode or network extension mode Client mode is the default configuration and allows only devices at the client site to access resources at the central site Resources at the client site are unavailable to the central site Network extension mode allows users at the central site where the Cisco VPN 3000 series concentrator is located to access network resources on the client site After the IPSec server has been configured a VPN connection can be created with minimal configuration on an IPSec client When the IPSec client initiates the VPN tunnel connection the IPSec server pushes the IPSec policies to the IPSec client and creates the corresponding VPN tunnel connection Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 92 OL 20696 0
75. allows the access point to extend the coverage area by compromising on the data rate Therefore if you have a client that cannot connect to the access point while other clients can the client might not be within the coverage area of the access point In such a case using the range option will help extend the coverage area and the client may be able to connect to the access point Typically the trade off is between throughput and range When the signal degrades possibly due to distance from the access point the rates renegotiate in order to maintain the link but at a lower data rate A link that is configured for a higher throughput simply drops when the signal degrades enough that it no longer sustains a configured high data rate or the link roams to another access point with sufficient coverage if one is available The balance between the two throughput vs range is a design decision that must be made based on resources available to the wireless project the type of traffic the users will be passing the service level desired and as always the quality of the RF environment When you enter throughput for the data rate setting the wireless device sets all four data rates to basic Note When a wireless network has a mixed environment of 802 11b clients and 802 11g clients make sure that data rates 1 2 5 5 and 11 Mb s are set to required basic and that all other data rates are set to enable The 802 11b adapters do not reco
76. associated client devices Maintaining an ARP cache on the wireless device reduces the traffic load on your wireless LAN ARP caching is disabled by default This section contains this information e Understanding Client ARP Caching page 296 e Configuring ARP Caching page 297 Understanding Client ARP Caching ARP caching on the wireless device reduces the traffic on your wireless LAN by stopping ARP requests for client devices at the wireless device Instead of forwarding ARP requests to client devices the wireless device responds to requests on behalf of associated client devices When ARP caching is disabled the wireless device forwards all ARP requests through the radio port to associated clients The client that receives the ARP request responds When ARP caching is enabled the wireless device responds to ARP requests for associated clients and does not forward requests to clients When the wireless device receives an ARP request for an IP address not in the cache the wireless device drops the request and does not forward it In its beacon the wireless device includes an information element to alert client devices that they can safely ignore broadcast messages to increase battery life Optional ARP Caching When a non Cisco client device is associated to an access point and is not passing data the wireless device might not know the client IP address If this situation occurs frequently on your wireless LAN you can enable optional ARP
77. character of your choice such as a pound sign and press the Return key The delimiting character signifies the beginning and end of the banner text Characters after the ending delimiter are discarded For message enter a banner message up to 255 characters You cannot use the delimiting character in the message Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file To delete the MOTD banner use the no banner motd command in global configuration mode The following is example shows how to configure a MOTD banner for the wireless device The pound sign is used as the beginning and ending delimiter AP config banner motd Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 mw 285 Chapter Administering the Wireless Device W Creating a Banner This is a secure site Only authorized users are allowed For access contact technical support AP config This example shows the banner that results from the previous configuration Unix gt telnet 172 2 5 4 Trying 172 2 5 4 Connected to 172 2 5 4 Escape character is This is a secure site Only authorized users are allowed For access contact technical support User Access Verification Password Configuring a Log
78. client dial pool number 1 I OL 20696 04 E Chapter Configuring Backup Data Lines and Remote Management W Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port I dsl operating mode auto I Primary WAN link interface Dialer1 ip address negotiated ip nat outside encapsulation ppp dialer pool 1 ppp authentication pap callin ppp pap sent username account password 7 pass ppp ipcp dns request ppp ipcp wins request ppp ipcp mask request Dialer backup logical interface interface Dialer3 ip address negotiated ip nat outside encapsulation ppp no ip route cache no ip mroute cache dialer pool 3 dialer idle timeout 60 dialer string 5555102 modem script Dialout dialer watch group 1 I Remote management PC IP address peer default ip address 192 168 2 2 no cdp enable Need to use your own ISP account and password ppp pap sent username account password 7 pass ppp ipcp dns request ppp ipcp wins request ppp ipcp mask request IP NAT over Dialer interface using route map ip nat inside source route map main interface Dialerl overload ip nat inside source route map secondary interface Dialer3 overload ip classless When primary link is up again distance 50 will override 80 if dial backup has not timed out Use multiple routes because peer IP addresses are alternated among them when the CPE is connected ip route 0 0 0 0 0 0 0 0 64 161 31 254 50 ip route 0 0 0 0 0 0
79. com c en us products collateral ios nx os software identity based networking servic e application_note_c27 573287 html Only single host mode is supported for the Identity features on the Onboard Gigabit Ethernet Layer 3 ports In single host mode only one client can be connected to the IEEE 802 1X enabled router port The router detects the client by sending an EAPol frame when the port link state changes to up state If a Client leaves or is replaced with another client the router changes the port link state to down and the port returns to the unauthorized state Open Access The Open Access feature allows clients or devices to gain network access before authentication is performed This is primarily required for the Preboot eXecution Environment PXE scenario where a device is required to access the network before PXE times out and downloads a bootable image which contains a supplicant Configuring Open Access SUMMARY STEPS Perform these steps to configure Open Access 1 enable 2 configure terminal 3 interface gigabitethernet slot port 4 authentication open 5 end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Identity Features on Layer 3 Interface DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Command or Action Control Direction Wake on LAN W Purpose enable
80. command in line configuration mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Controlling Access Point Access with TACACS W Configuring TACACS Authorization for Privileged EXEC Access and Network Services AAA authorization limits the services available to a user When AAA authorization is enabled the wireless device uses information retrieved from the user profile which is located either in the local user database or on the security server to configure the user session The user is granted access to a requested service only if the information in the user profile allows it You can use the aaa authorization command in global configuration mode with the tacacs keyword to set parameters that restrict a user network access to privileged EXEC mode The aaa authorization exec tacacs local command sets these authorization parameters e Use TACACS for privileged EXEC access authorization if authentication was performed by using TACACS e Use the local database if authentication was not performed by using TACACS Note SUMMARY STEPS Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured To specify TACACS authorization for privileged EXEC access and network services follow these steps beginning in pr
81. command to disable short slot time Performing a Carrier Busy Test You can perform a carrier busy test to check the radio activity on wireless channels During the carrier busy test the wireless device drops all associations with wireless networking devices for 4 seconds while it conducts the carrier test and then displays the test results In privileged EXEC mode enter this command to perform a carrier busy test dot11 interface number carrier busy For interface number enter dot11radio 0 to run the test on the 2 4 GHz radio or enter dot11radio 1 to run the test on the 5 GHz radio Use the show dot11 carrier busy command to redisplay the carrier busy test results I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide i Chapter Configuring Radio Settings W Configuring VoIP Packet Handling Configuring VolP Packet Handling Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 You can improve the quality of VoIP packet handling per radio on access points by enhancing 802 11 MAC behavior for lower latency for the class of service CoS 5 Video and CoS 6 Voice user priorities To configure VoIP packet handling on an access point follow these steps Using a browser log in to the access point Click Services in the task menu on the left side of the web browser interface When the list of Services expands click Stream The St
82. configuration file amp Note When you enable the role of a device in the radio network as a bridge workgroup bridge and enable the interface using the no shut command the physical status and the software status of the interface will be up ready only if the device on the other end access point or bridge is up Otherwise only the physical status of the device will be up The software status will be up when the device on the other end is configured and ready Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 22a E OL 20696 04 Chapter Configuring Radio Settings Configuring Dual Radio Fallback W Configuring Dual Radio Fallback The dual radio fallback feature see Figure 1 allows you to configure access points so that if the non root bridge link connecting the access point to the network infrastructure goes down the root access point link through which a client connects to the access point shut down Shutting down the root access point link causes the client to roam to another access point Without this feature the client remains connected to the access point but won t be able to send or receive data from the network Figure 1 Dual Radio Fallback Access point 44 a Root bridge iss OR a o point Fast Ethernet p mone bridge mode p ToS Emene aa w 11 a Root 11 b g root bridge mode access point mode ili i o
83. configured locally on a router The following is a sample output of the show ethernet cfm maintenance points local command Router show ethernet cfm maintenance points local Local MEPs MPID Domain Name Lvl MacAddress Type CC Ofld Domain Id Dir Port Id MA Name SrvciInst Source EVC name 44 carrier 2 5657 a844 04fa Port Y No carrier Down Gi0 2 none carrier N A Static N A Total Local MEPs 1 Local MIPs None Use the show ethernet cfm maintenance points remote command to display information about remote maintenance point domains or levels In the following example carrier Provider and customer are the maintenance point domains that are configured On router 1 Routerl show ethernet cfm maintenance points remote MPID Domain Name MacAddress TfSt PtSt Lvl Domain ID Ingress RDI MA Name Type Id SrvcInst EVC Name Age Local MEP Info 43 carrier 5657 a86c fa92 Up N A 2 carrier Gi0 2 carrier Port none N A N A 0s MPID 44 Domain carrier MA carrier 33 Provider 5657 a86c fa92 Up Up 5 Provider Gi0 2 100 Provider Vlan 100 N A N A Os MPID 34 Domain Provider MA Provider 3101 customer 5657 a86c fa92 Up Up 7 customer Gi0 2 1101 customer1101 S C 100 1101 N A N A Os MPID 4101 Domain customer MA customer1101 3102 customer 5657 a86c fa92 Up Up 7 customer Gi0 2 1102 customer1102 S C 100 1102 N A N A Os MPID 4102 Domain customer MA customer1102 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series
84. customer1101 Type escape sequence to abort TTL 64 Linktrace Timeout is 5 seconds Tracing the route to 8843 e154 6f01 on Domain customer Level 7 service customer1101 vlan 100 inner vlan 30 Traceroute sent via Gi0 2 1101 B Intermediary Bridge Target Destination Per hop Timeout MAC Ingress Ingr Action Relay Action Hops Host Forwarded Egress Egr Action Previous Hop 1 8843 e154 6f01 Gi0 2 1101 IngOk RlyHit MEP Not Forwarded 5657 a86c fa92 Use the show ethernet cfm error configuration command to view Ethernet CFM configuration errors if any The following is a sample output of the show ethernet cfm error configuration command Router show ethernet cfm error configuration CFM Interface Type Id Level Error type Gi0 2 S 100 30 5 CFMLeak Gi0 2 SRE 100 30 1 CFMLeak Troubleshooting Ethernet CFM Configuration Table 3 lists the debug commands to troubleshoot issues pertaining to the Ethernet CFM configuration The Cisco IOS Master Command List at Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 48 OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces A CFM Support on Routed Port and Port MEP W http www cisco com en US docs ios mcl allreleasemcl all_book html provides more information about these commands Caution amp Because debugging output is assigned
85. db session id The following are the sample outputs of the commands listed above Router show run sec ip sla ip sla auto discovery ip sla 1101 ethernet y1731 delay DMM domain customer vlan 100 inner vlan 1101 mpid 3101 cos 1 source mpid 4101 ip sla schedule 1101 life forever start time now Router show ip sla summary IPSLAs Latest Operation Summary Codes active inactive pending ID Type Destination Stats Return Last ms Code Run 1104 y1731 delay Domain customer V OK 27 seconds ag lan 100 CVlan 110 o 1 Mpid 3101 Router show ip sla statistics IPSLAs Latest Operation Statistics IPSLA operation id 1101 Delay Statistics for Y1731 Operation 1101 Type of operation Y1731 Delay Measurement Latest operation start time 10 43 12 930 UTC Mon Oct 21 2013 Latest operation return code OK Distribution Statistics Interval Start time 10 43 12 930 UTC Mon Oct 21 2013 Elapsed time 15 seconds Number of measurements initiated 7 Number of measurements completed 7 Flag OK Router show ip sla configuration 1101 IP SLAs Infrastructure Engine III Entry number 1101 Owner Tag Operation timeout milliseconds 5000 Ethernet Y1731 Delay Operation Frame Type DMM Domain customer Vlan 100 CVlan 1101 Target Mpid 3101 Source Mpid 4101 Cos 1 Max Delay 5000 Request size Padding portion 64 Frame Interval 1000 Clock Not In Sync Threshold milliseconds 5000 Schedule Operation frequency seconds 30 not c
86. e Configuring Access Lists page 89 e Configuring Cisco IOS Firewall page 90 e Zone Based Policy Firewall page 90 e Configuring Cisco IOS IPS page 91 e Content Filtering page 91 e Configuring VPN page 91 e Configuring Dynamic Multipoint VPN page 109 e Configuring Group Encrypted Transport VPN page 110 Configuring the Cryptographic Engine Accelerator Services Performance Engine 200 and Services Performance Engine 250 have an onboard cryptographic engine accelerator that is shared between SSLVPN and IPSec protocols By default acceleration of SSL is disabled so IPSec performance is maximized To set up a router as an SSLVPN gateway enable hardware acceleration for SSLVPN with the crypto engine accelerator bandwidth allocation ssl fair command from global configuration mode Issue the reload command Configuring SSL VPN The Secure Socket Layer Virtual Private Network SSL VPN feature also known as WebVPN provides support in Cisco IOS software for remote user access to enterprise networks from anywhere on the Internet Remote access is provided through a SSL enabled SSL VPN gateway The SSL VPN gateway allows remote users to establish a secure VPN tunnel using a web browser This feature provides a Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 s 87 Chapter Configuring Security Features W Authentication Authorizati
87. ecm sccp local GigabitEthernet0 0 sccp ccm 10 1 32 147 identifier 1 priority 1 version 5 0 1 sccp sccp ccm group 1 associate ccm 1 priority 1 associate profile 3 register CONFERENCE associate profile 2 register UNIVERSAL associate profile 1 register G711_ANY I dspfarm profile 1 transcode codec g71lulaw codec g711lalaw codec g722 64 maximum sessions 40 associate application SCCP dspfarm profile 2 transcode universal codec g723r63 codec ilbc codec g729r8 codec g729br8 codec g723r53 maximum sessions 10 associate application SCCP dspfarm profile 3 conference codec g71lulaw codec g71llalaw codec g7 729ar8 codec g729abr8 codec g729r8 codec g729br8 maximum conference participants 32 maximum sessions 2 associate application SCCP shutdown Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ECH OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers W dial peer voice 201 voip session protocol sipv2 incoming called number 408555 codec g71lulaw no vad dial peer voice 202 voip destination pattern 408555 0 4 session protocol sipv2 session target ipv4 10 1 32
88. efficiency management is configured on the module the EnergyWise level must be set to 10 or online insertion and removal is not allowed Perform the following tasks for managed online insertion and removal on the Cisco 3900 Series ISRs 1 Shut down the controller and voice ports 2 Perform online insertion and removal 3 Restart the controller and voice ports Shut down the controller and voice ports Perform the steps detailed in this section to shut down the controller and voice ports SUMMARY STEPS 1 enable configure terminal controller el slot port shutdown exit 9 oo FF BY DN voice port slot number port Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 150 OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules 7 shutdown Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers 8 exit DETAILED STEPS Command or Action Purpose Step1 enable Enable privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 configure terminal Enter global configuration mode Example Router configure terminal Step3 controller e1 slot port Enter config controller mode Example Router config controller e1 0 0 0 Step4 shutdown Administratively shuts down the controller port Example Router config controller shutdo
89. for the virtual terminal lines vty for remote console access e Make sure that you configure all vty lines on your router Note To verify the number of vty lines on your router use the line vty command password password Example Router config line password guessagain Specifies a password on a line login Example Router config line login Enables password checking at login end Example Router config line end Returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix A Cisco 10S CLI for Initial Configuration Using the Cisco 10S CLI to Perform Initial Configuration W Command or Action Purpose Step7 show running config Displays the running configuration file e Verify that you properly configured the virtual terminal Example lines for remote access Router show running config Step8 From another network device attempt to open a Telnet Verifies that you can remotely access the router and that the session to the router virtual terminal line password is correctly configured Example Router 172 16 74 3 Password Examples The following example shows how to configure virtual terminal lines with a password line vty 0 4 password guessagain login What to Do Next After you configure the vty lines follow these
90. for Initial Configuration DETAILED STEPS Command or Action Using the Cisco 10S CLI to Perform Initial Configuration W Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 copy nvram startup config ftp rep tftp Copies the startup configuration file to a server e The configuration file copy can serve as a backup copy Example e Enter the destination URL when prompted Router copy nvram startup config ftp Step3 show flash0 flash1 Displays the layout and contents of a flash memory file system Example e Learn the name of the system image file Router show flash0 flash1 Step4 copy flash0 flash1 ftp rep tftp Copies a file from flash memory to a server e Copy the system image file to a server to serve as a Example backup copy Router copy flash0 flash1 ftp e Enter the filename and destination URL when prompted Examples Copying the Startup Configuration to a TFTP Server Example The following example shows the startup configuration being copied to a TFTP server Router copy nvram startup config tftp Remote host 172 16 101 101 Name of configuration file to write rtr2 confg lt er gt Write file rtr2 confg on host 172 16 101 101 confirm lt er gt OK Copying from Flash Memory to a TFTP Server Example The following example shows the use of the show flashOlflash1 command in privileged EXEC to le
91. for the router to boot and perform normal file operations Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide oL 20696 04 EN Appendix B Using CompactFlash Memory Cards W Online Insertion and Removal Table B 1 Compact Flash Slot Numbering and Naming Slot Number CF Filenames Size Slot02 flash0 256MB Slot1 flash1 0 1 The maximum storage capacity for the CF in SlotO and Slot1 is 4GB 2 Slot 0 is the default CF slot CF in slot0 can store system image configuration and data files CF must be present in this slot for the router to boot and perform normal file operations Online Insertion and Removal Online insertion and removal OIR is a feature that allows you to replace CF memory cards without turning off the router and without affecting the operation of other interfaces OIR of CF memory cards provides uninterrupted operation to network users maintains routing information and ensures session preservation A Caution The external CF memory card should not be removed if the flash memory busy CF LED on the router is blinking because this indicates that the software is accessing the CF memory card Removing the CF memory card may disrupt the network because some software features use the CF memory card to store tables and other important data For instructions on inserting removing and replacing the external C
92. for this For details see Cisco IOS Security Configuration Guide Securing User Services Release 2 4T and Cisco IOS Security Command Reference username name nopassword password password password encryption type encrypted password Example Router config username usernamel password 0 passwordl Router config Establishes a username based authentication system This example implements a username of username with an encrypted password of password I OL 20696 04 Chapter Configuring Security Features WE Configuring VPN Configure IPSec Transforms and Protocols SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 A transform set represents a certain combination of security protocols and algorithms During IKE negotiation the peers agree to use a particular transform set for protecting data flow During IKE negotiations the peers search multiple transform sets for a transform that is the same at both peers When a transform set is found that contains such a transform it is selected and applied to the protected traffic as a part of both peers configurations To specify the IPSec transform set and protocols follow these steps beginning in global configuration mode 1 crypto ipsec profile profile name 2 crypto ipsec transform set transform set name 3 crypto ipsec security association lifetime seconds seconds kilobytes kilobytes Command or Action Purpose
93. from the digital signal processor DSP farm See Media and Signaling Encryption SRTP TLS on DSP Conferencing Farm at Cisco com for configuration information http www cisco com en US docs ios 12_4t 12_4t15 itsdsp html See SIP SIP Support for SRTP at Cisco com for configuration information http www cisco com en US docs ios 12_4t 12_4t15 srtpstub html wp1008975 Virtual Route Forward Virtual Route Forward VRF is the technique to create multiple virtual networks within a single network entity In a single network component we can create multiple VRFs to create the isolation among each other In our regular deployment of Unified Communication we create different VLANs for voice and data to separate traffics This is Layer 2 virtualization In conjunction with VAN support Cisco UC also supports Layer 3 virtualization through VRF for both voice and data In a typical UC deployment hard phones are typically in Voice Segments and PCs are in Data Segments PCs are inherently un trusted devices in the network Mechanisms based on s rely on port numbers and there is no way to ensure only trusted media enters UC Segment VRF implementations in ISR can create single voice network and multiple data networks which consolidate voice communication into one logically partitioned network to separate voice and data communication on a converged multi media network To configure Virtual Route Forward features see Virtual Route Forwarding Des
94. group server radius dummy authentication login default local cache tac_admin group tac_admin authentication login eap_methods group rad_eap authentication login mac_methods local authorization exec default local cache tac_admin group tac_admin accounting network acct_methods start stop group rad_acct cache profile admin_cache session id common dge irb erface Dot11Radio0 ip address ip route cache tdown speed basic 1 0 basic 2 0 basic 5 5 6 0 9 0 basic 11 0 12 0 18 0 24 0 36 0 48 0 54 0 sta bri bri bri no no bri int no no shu spe sta bri bri bri no no bri int no no dup spe bri no bri int ip no ip ip no ip ip tion role root dge group 1 dge group 1 subscriber loop control dge group 1 block unknown source bridge group 1 source learning bridge group 1 unicast flooding dge group 1 spanning disabled erface Dot11Radiol ip address ip route cache tdown ed basic 6 0 9 0 basic 12 0 18 0 basic 24 0 36 0 48 0 54 0 tion role root dge group 1 dge group 1 subscriber loop control dge group 1 block unknown source bridge group 1 source learning bridge group 1 unicast flooding dge group 1 spanning disabled erface FastEthernet0 ip address ip route cache lex auto ed auto dge group 1 bridge group 1 source learning dge group 1 spanning disabled erface BVI1 address 192 168 133 207 255 255 255 0 ip route cache http server http authentication aaa ip http secure server
95. hexadecimal number preceded by Ox Router config config register Oxvalue amp Note The Cisco IOS software does not allow you to change the console speed bits directly with the config register command To change the console speed from the Cisco IOS CLI see the Configuring the Console Line Speed Cisco IOS CLI section on page D 5 Exit global configuration mode Router config end Router mi Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix D Changing the Configuration Register Settings Displaying the Configuration Register Settings W Step9 Save the configuration changes to NVRAM Router copy run start The new configuration register settings are saved to NVRAM but they do not take effect until the next router reload or power cycle Displaying the Configuration Register Settings To display the configuration register settings that are currently in effect and the settings that will be used at the next router reload enter the show version command in privileged EXEC mode The configuration register settings are displayed in the last line of the show version command output Configuration register is 0x142 will be 0x142 at next reload Configuring the Console Line Speed Cisco 10S CLI The combined setting of bits 5 11 and 12 determines the console line speed You can modify these particular c
96. icmp any any access list 103 deny ip any any Prevents Internet initiated traffic inbound acl 105 matches addresses for the IPsec tunnel to or from the corporate network access list 105 permit ip 10 1 1 0 0 0 0 255 192 168 0 0 0 0 255 255 no cdp run Configuring Dynamic Multipoint VPN The Dynamic Multipoint VPN DMVPN feature allows users to better scale large and small IP Security IPsec VPNs by combining GRE tunnels IPsec encryption and Next Hop Resolution Protocol NHRP For additional information about configuring DMVPN see the Dynamic Multipoint VPN section of Cisco IOS Security Configuration Guide Secure Connectivity Release 12 4T at http www cisco com en US docs ios sec_secure_connectivity configuration guide 12_4t sec_secure_connectivity_12_4t_book html I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Security Features WE Configuring Group Encrypted Transport VPN Configuring Group Encrypted Transport VPN Group Encrypted Transport GET VPN is a set of features that are necessary to secure IP multicast group traffic or unicast traffic over a private WAN that originates on or flows through a Cisco IOS device GET VPN combines the keying protocol Group Domain of Interpretation GDOI with IPsec encryption to provide users with an efficient method of securing IP multicast traffic o
97. in the dir flash0 command output this step is not required boot system flash0 new system image filename Use this command to load the new system image after the next system reload or power cycle Router config boot system flash0O c2900 universalk9 mz bin Optional Repeat to specify the order in which the router should attempt to load any backup system images Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco 10S Software Step 10 Step 11 What to Do Next How to Upgrade the Cisco IOS Image W exit Use this command to exit global configuration mode Router config exit Router copy run start Use this command to copy the running configuration to the startup configuration Router copy run start Proceed to the Saving Backup Copies of Your New System Image and Configuration section on page 197 Saving Backup Copies of Your New System Image and Configuration To aid file recovery and to minimize downtime in the event of file corruption we recommend that you save backup copies of the startup configuration file and the Cisco IOS software system image file on a server Tip SUMMARY STEPS Do not erase any existing backup copies of your configuration and system image that you saved before upgrading your system image If you encounter serious problems using your new sys
98. in the system name If it is important for client users to distinguish between devices make sure that a unique portion of the system name appears in the first 15 characters Step 3 Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file When you set the system name the name is also used as the system prompt To return to the default hostname use the no hostname command in global configuration mode Understanding DNS 282 E The DNS protocol controls the Domain Name System DNS a distributed database with which you can map hostnames to IP addresses When you configure DNS on the wireless device you can substitute the hostname for the IP address with all IP commands such as ping telnet connect and related Telnet support operations IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain Domain names are pieced together with periods as the delimiting characters For example Cisco Systems is a commercial organization that IP identifies by a com domain name so its domain name is cisco com A specific device in this domain such as the File Transfer Protocol FTP system is identified as ftp cisco com To keep track of domain names IP has defined the concept of a domain name server which holds a cache or database of names mapped to IP addresses To map d
99. interface administrative distance mame name configured administrative distance through the specified interface Example A higher administrative distance should be Router config ip route 0 0 0 0 Dialer 2 track 234 configured for the route through the backup interface so that the backup interface is used only when the primary interface is down Cellular Wireless Modem as Backup with NAT and IPSec Configuration The following example shows how to configure the 3G wireless modem as backup with NAT and IPsec on either GSM or CDMA networks amp Note The receive and transmit speeds cannot be configured The actual throughput depends on the cellular network service Router sh run Building configuration Current configuration 5833 bytes Last configuration change at 18 26 15 UTC Wed Sep 30 2009 version 12 4 service timestamps debug datetime msec service timestamps log datetime msec no service password encryption service internal hostname Router boot start marker boot end marker no aaa new model service module wlan ap 0 bootimage autonomous no ipv6 cef ip source route ip cef ip multicast routing Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 64 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Backup Interfaces
100. introduced for embedded wireless LAN access points on Integrated Services Routers Managing the System Time and Date You can manage the system time and date on the wireless device automatically by using the Simple Network Time Protocol SNTP or manually by setting the time and date on the wireless device amp Note For complete syntax and usage information for the commands used in this section see Cisco IOS Configuration Fundamentals Command Reference for Release 12 4 This section provides the following configuration information e Understanding Simple Network Time Protocol page 276 e Configuring SNTP page 276 e Configuring Time and Date Manually page 276 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 a 275 Chapter Administering the Wireless Device HE Managing the System Time and Date Understanding Simple Network Time Protocol Simple Network Time Protocol SNTP is a simplified client only version of NTP SNTP can only receive the time from NTP servers it cannot provide time services to other systems SNTP typically provides time within 100 milliseconds of the accurate time but it does not provide the complex filtering and statistical mechanisms of NTP You can configure SNTP to request and accept packets from configured servers or to accept NTP broadcast packets from any source When multiple sources are send
101. is an implicit deny all at the end of all sequences Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ao Chapter Configuring Security Features WE Configuring Cisco 10S Firewall For information on configuring and managing access groups see the Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values section of the Access Control Lists section of Cisco IOS Security Configuration Guide Securing the Data Plane Release 12 4T at http www cisco com en US docs ios sec_data_plane configuration guide 12_4t sec_data_plane_12_4t_book html Configuring Cisco IOS Firewall The Cisco IOS Firewall lets you configure a stateful firewall where packets are inspected internally and the state of network connections is monitored Stateful firewall is superior to static access lists because access lists can only permit or deny traffic based on individual packets not based on streams of packets Also because the Cisco IOS Firewall inspects the packets decisions to permit or deny traffic can be made by examining application layer data which static access lists cannot examine To configure a Cisco IOS Firewall specify which protocols to examine by using the following command in interface configuration mode ip inspect name inspection name protocol timeout seconds When inspection detects that th
102. level 14 and how to define SecretPswd14 as the password users must enter to use level 14 commands AP config privilege exec level 14 configure AP config enable password level 14 SecretPswd14 Logging Into and Exiting a Privilege Level SUMMARY STEPS DETAILED STEPS Step 1 Step 2 To log in to a specified privilege level or to exit to a specified privilege level follow these steps beginning in privileged EXEC mode 1 enable level 2 disable level Command Purpose enable level Logs in to a specified privilege level For level the range is 0 to 15 disable level Exits to a specified privilege level For level the range is 0 to 15 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Controlling Access Point Access with RADIUS W Controlling Access Point Access with RADIUS This section describes how to control administrator access to the wireless device by using Remote Authentication Dial In User Service RADIUS For complete instructions on configuring the wireless device to support RADIUS see the Configuring Radius and TACACS Servers chapter in Cisco IOS Software Configuration Guide for Cisco Aironet Access Points RADIUS provides detailed accounting information and flexible administrative control over authentication and authorization processes RAD
103. line End with CNTL Z Router config memory size iomem 5 IO memory size too small minimum IO memory size is 201M Router config Router config memory size iomem lt 5 50 gt percentage of DRAM to use for I O memory 5 10 15 20 25 30 40 50 Router config memory size iomem 25 Smart init will be disabled and new I O memory size will take effect upon reload Router config end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 2 g OL 20696 04 Chapter Basic Router Configuration Verifying IOMEM Setting Router show run Current configuration 6590 bytes Last configuration change at 16 48 41 UTC Tue Feb 23 2010 version 15 1 service timestamps debug datetime msec service timestamps log datetime msec no service password encryption service internal hostname Routerl no aaa new model Interface Ports Table 1 lists the interfaces that are supported on Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers Table 1 Slots Ports Logical Interface Interfaces 1941 memory size iomem 25 Interfaces by Cisco Router 2901 2911 amp 2921 2951 amp 3925 amp 3945 Interface Ports W 3925E amp 3945E Onboard GE ports Gi0 0 Gi0 1 Gi0 0 Gi0 1 Gi0 0 Gi0 1 G10 2 Gi0 0 Gi0 1 GI10 2 Gi0 0 Gi0 1 GI1
104. member value is 1 dialer string dial string isdn subaddress Example Router config if dialer string 384040 Router config if Specifies the telephone number to be dialed dialer group group number Example Router config if dialer group 1 Router config if Assigns the dialer interface to a dialer group 1 10 exit Example Router config if exit Router config Exits dialer interface configuration mode and enters global configuration mode dialer list dialer group protocol protocol name permit deny list access list number access group Example Router config dialer list 1 protocol ip permit Router config Creates a dialer list for packets of interest to be forwarded through the specified interface dialer group In the example dialer list 1 corresponds to dialer group 1 For details about this command and additional parameters that can be set see Cisco IOS Dial Technologies Command Reference I OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management W Configuring Data Line Backup and Remote Management Through the ISDN S T Port Example The following configuration example configures an aggregated and ISDN peer router The aggregator is typically a concentrator router where your Cisco router Asynchronous Transfer Mode ATM permanent virtual connection PVC terminates In the following configuration example the a
105. mode 1 configure terminal 2 interface dotllradio 3 probe response gratuitous period speed 4 period Kusec 5 speed 6 0 9 0 12 0 18 0 24 0 36 0 48 0 54 0 6 end 7 copy running config startup config Command Purpose configure terminal Enters global configuration mode interface dot11lradio Enters interface configuration mode for the 5 GHz radio interface probe response gratuitous Enables the Gratuitous Probe Response feature using default period speed period 10 Kusec and speed 6 0 Mbps period Kusec Optional Accepts a value from 10 to 255 The default value is 10 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Chapter Configuring Radio Settings W Disabling and Enabling Aironet Extensions Command Purpose Step5 speed Optional Sets the response speed in Mbps The default value 6 0 9 0 12 0 18 0 24 0 is 6 0 36 0 48 0 54 0 Step6 end Returns to privileged EXEC mode Step7 copy running config startup config Optional Saves your entries in the configuration file The optional parameters can be configured independently or combined when you do not want to use the defaults as shown in the following examples config if probe response gratuitous period 30 config if probe response gratuitous speed 12 0 config if pro
106. module PVDM3 e Service module SM e Enhanced high speed WAN interface card EHWIC Note The PVDM3 slot and the SM slot are not backwards compatible with legacy modules Legacy modules require an adapter for installation in these slots For a list of supported UC modules and interface cards see Module Support on Cisco Integrated Services Routers Generation 2 Call Control The Cisco 3900 series and Cisco 2900 series ISRs support the following types of call control applications and Cisco Voice solutions e Cisco Unified Communications Manager Express page 130 e Unified Survivable Remote Site Telephony page 131 e Cisco Unified SIP Proxy CUSP page 132 e Gatekeeper page 132 Cisco Unified Communications Manager Express Cisco Unified Communications Manager Express CME is a feature rich entry level IP telephony solution that is integrated directly into Cisco IOS software Cisco Unified CME allows small business customers and autonomous small enterprise branch offices to deploy voice data and IP telephony on a single platform for small offices thereby streamlining operations and lowering network costs Cisco Unified CME is ideal for customers who have data connectivity requirements and also have a need for a telephony solution in the same office Whether offered through a service provider s managed services offering or purchased directly by a corporation Cisco Unified CME offers most of the core telephony features required i
107. name and location of the file that is downloaded to the router Step6 GE_PORT 0 11 2 Example rommon gt GE_PORT 0 Optional Sets the input port to use one of the Gigabit Ethernet ports The default is 0 Step GE_SPEED_MODE 01 112131415 Example rommon gt GE_SPEED_MODE 3 Optional Sets the Gigabit Ethernet port speed mode with these options e 0 10 Mbps half duplex e 1 10 Mbps full duplex e 2 100 Mbps half duplex e 3 100 Mbps full duplex e 4 1 Gbps full duplex e 5 Automatic selection default Step8 TFTP_MEDIA_TYPE 0 1 Example rommon gt MEDIA _TYPE 1 Optional Sets the Gigabit Ethernet connection media type RJ 45 0 or SFP 1 Small form factor pluggable SFP mode is applicable only if GE_PORT 0 gig 0 0 RJ 45 mode is available on both gig 0 0 and gig 0 1 GE_PORT O or 1 The default is 0 Step9 TFTP_CHECKSUM 0 1 Example rommon gt TFTP_CHECKSUM 0 Optional Determines whether the router performs a checksum test on the downloaded image e 1 Checksum test is performed default e 0 No checksum test is performed Step10 TETP_DESTINATION flash0 flash1 usbflash0 usbflash1 Example rommon gt TFTP_DESTINATION usbflash0 Optional Designates the targeted flash device as compact flash or USB flash e flash0 Compact flash device in port O default e flash1 Compact flash device in port 1 e usbf
108. other router models VPN configuration information must be configured on both endpoints You must specify parameters such as internal IP addresses internal subnet masks DHCP server addresses and Network Address Translation NAT e Configure a VPN over an IPSec Tunnel section on page 94 e Create a Cisco Easy VPN Remote Configuration section on page 103 e Configure a Site to Site GRE Tunnel section on page 106 Configure a VPN over an IPSec Tunnel Perform the following tasks to configure a VPN over an IPSec tunnel e Configure the IKE Policy page 95 e Configure Group Policy Information page 96 e Apply Mode Configuration to the Crypto Map page 98 e Enable Policy Lookup page 99 e Configure IPSec Transforms and Protocols page 100 e Configure the IPSec Crypto Method and Parameters page 101 e Apply the Crypto Map to the Physical Interface page 102 e Where to Go Next page 103 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 94 OL 20696 04 _ Chapter Configuring Security Features Configure the IKE Policy SUMMARY STEPS DETAILED STEPS Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 1 Step 2 Step 3 Step 4 Step5 Configuring VPN W To configure the Internet Key Exchange IKE policy follow these steps beginning in
109. runts 0 giants 0 jabbers 0 input errors 0 CRC 0 fragments 0 pause input 3955781430 packets output 1598708166660 bytes 0 underruns 0 broadcast 0 multicast 3955781430 unicast 0 late collisions 0 collisions 0 deferred 0 bad bytes received 0 multiple 94987 pause output Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 175 Chapter Configuring Multi Gigabit Fabric Communication W Viewing Platform Information Viewing Multi Gigabit Fabric CPU Port Statistics Multi Gigabit Fabric s CPU port statistics display details about the hardware status data transmission rate line type protocols and packets The following example displays output for the show platform mef statistics cpu command when entered on a Cisco 3945 ISR Router show platform mgf statistics cpu Backplane GigabitEthernet0 3 is up line protocol is up Hardware is PQ3_TSEC address is 001b 5428 d403 bia 001b 5428 d403 MTU 9600 bytes BW 1000000 Kbit sec DLY 10 usec reliability 255 255 txload 1 255 rxload 1 255 Encapsulation ARPA loopback not set Full duplex 1000Mb s media type is internal output flow control is unsupported input flow control is unsupported ARP type ARPA ARP Timeout 04 00 00 Last input never output never output hang never Last clearing of Show interface counters never Input queue 0 75 0 0 size max drops flushes Total output drops 0 Qu
110. scheme MCS is a specification of PHY parameters consisting of modulation order binary phase shift keying BPSK quaternary phase shift keying QPSK 16 quadrature amplitude modulation 16 QAM 64 QAM and forward error correction FEC code rate 1 2 2 3 3 4 5 6 MCS is used in the wireless device 802 1 1n radios which define 32 symmetrical settings 8 per spatial stream e MCS 0 7 e MCS 8 15 e MCS 16 23 e MCS 24 31 The wireless device supports MCS 0 15 High throughput clients support at least MCS 0 7 MCS is an important setting because it provides for potentially greater throughput High throughput data rates are a function of MCS bandwidth and guard interval The 802 1 1a b and g radios use 20 MHz channel widths Table 1 shows potential data rated based on MCS guard interval and channel width I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Radio Settings HZ Configuring MCS Rates Table 1 Data Rates Based on MCS Settings Guard Interval and Channel Width MCS Index Guard Interval 800 ns Guard Interval 400 ns 20 MHz Channel 40 MHz Channel 20 MHz Channel 40 MHz Channel Width Data Rate Width Data Rate Width Data Rate Width Data Rate Mb s Mb s Mb s Mb s 0 6 5 13 5 7 2 9 15 1 13 27 14 4 9 30 2 19 5 40 5 21 2 3 45 3 26 54 28
111. setting both c1921 show authentication sessions interface Gi0 1 Interface MAC Address IP Address User Name Status Domain Oper host mode Oper control dir Authorized By Vlan Group AAA Policies GigabitEthernet0 1 0201 0201 0201 Unknown testUserl1 Authz Success DATA single host both Authentication Server N A Session timeout N A Idle timeout N A Common Session ID 03030303000000000000BA04 Acct Session ID 0x00000001 Handle 0x6D000001 Runnable methods list Method State dot1x Authc Success c1921 c1921 sh dotix int g0 1 Dot1x Info for GigabitEthernet0 1 PAE PortControl ControlDirection HostMode QuietPeriod ServerTimeout SuppTimeout ReAuthMax MaxReq TxPeriod AUTHENTICATOR AUTO Both SINGLE_HOST 60 30 30 I OL 20696 04 Control Direction Wake on LAN EE Chapter Configuring Identity Features on Layer 3 Interface HZ Preauthentication Access Control List Verifying Authentication Control Direction Setting in Use the show authentication sessions and show dot1x commands to verify the authentication control direction setting in c1921 show authentication sessions interface gi0 1 Interface GigabitEthernet0 1 MAC Address 0201 0201 0201 IP Address Unknown User Name testUserl Status Authz Success Domain DATA Oper host mode single host Oper control dir in Authorized By Authentication Server Vlan Group N A AAA P
112. show ethernet cfm domain Domain Name customer Level 7 Total Services 1 Services Type Id Dir CC CC int Static rmep Crosscheck MaxMEP Source MA Name Vlan 100 Dwn Y 10s Disabled Disabled 100 Static customer1101 Domain Name enterprise Level 6 Total Services 1 Services Type Id Dir CC CC int Static rmep Crosscheck MaxMEP Source MA Name Vlan 110 Dwn Y 10s Disabled Disabled 100 Static custservice Domain Name carrier Level 2 Total Services 1 Services Type Id Dir CC CC int Static rmep Crosscheck MaxMEP Source MA Name Vlan 200 Dwn Y 10s Disabled Disabled 100 Static carrier Router Use the show ethernet cfm maintenance points local command to view the local MEPs The following is a sample output of the show ethernet cfm maintenance points local command Router show ethernet cfm maintenance points local MPID Domain Name Lvl MacAddress Type CC Ofld Domain Id Dir Port Id MA Name SrvciInst Source EVC name 100 customer 7 70ca 9b4d a400 Vlan Y E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces CFM Support on Routed Port and Port MEP W No customer Down Gi0 2 100 customer1101 N A Static N A 400 enterprise 6 70ca 9b4d a400 Vlan I No enterprise Down Gi0 1 110 custservice N A Static N A 44 carrier 2 70ca 9b4d a4
113. steps e Optional To encrypt the virtual terminal line password see the Configuring Passwords and Privileges chapter in Cisco IOS Security Configuration Guide Also see the Cisco IOS Password Encryption Facts tech note e Optional To secure the VTY lines with an access list see Part 3 Traffic Filtering and Firewalls in the Cisco IOS Security Configuration Guide Configuring the Auxiliary Line This section describes how to enter line configuration mode for the auxiliary line How you configure the auxiliary line depends on your particular implementation of the auxiliary AUX port See the following documents for information on configuring the auxiliary line Configuring a Modem on the AUX Port for EXEC Dialin Connectivity tech note http www cisco com en US tech tk801 tk36 technologies_tech_note09186a0080094bbc shtml Configuring Dialout Using a Modem on the AUX Port sample configuration http www cisco com en US tech tk801 tk36 technologies_configuration_example09186a0080094579 shtml Configuring AUX to AUX Port Async Backup with Dialer Watch sample configuration http www cisco com en US tech tk801 tk36 technologies_configuration_example09186a0080093d2b shtml Modem Router Connection Guide tech note http www cisco com en US tech tk801 tk36 technologies_tech_note09186a008009428b shtml Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration
114. steps beginning in EXEC mode 1 configure terminal 2 interface gigabitethernet slot port 3 media type sfp 4 media type sfp auto failover 5 end Command Purpose configure terminal Example Router gt enable Router configure terminal Router config Enters global configuration mode when using the console port Use the following commands to connect to the router with a remote terminal telnet router name or address Login login id Password x Router gt enable interface gigabitethernet slot port Example Router config interface gigabitethernet 0 1 Router config if Enters interface configuration mode I OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces Command Purpose Step 3 media type sfp Designates SFP port as the primary media OR Example Designates RJ 45 as the primary media Router config if media type sfp Router config if Example Router config if media type rj45 Router config if Step4 media type sfp auto failover Configures the port with SFP as the primary media for automatic failover from SFP to RJ 45 Example Router config if media type sfp OR auto failover Router config if Configures the port with RJ 45 as the primary media for automatic failover from RJ 45 to SFP Example Router config if media type rj45 auto fai
115. string from 1 to 25 alphanumeric characters The string cannot start with a number is case sensitive and allows spaces but ignores leading spaces By default no password is defined Note The characters TAB and are invalid characters for passwords Step4 end Returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 SEN Chapter Administering the Wireless Device HZ Protecting Access to Privileged EXEC Commands Command Purpose Step5 show running config Verifies your entries or The show running config command displays the password and access show privilege level configuration The show privilege command displays the privilege level configuration Step6 copy running config startup config Optional Saves your entries in the configuration file When you set a command to a privilege level all commands whose syntax is a subset of that command are also set to that level For example if you set the show ip route command to level 15 the show commands and show ip commands are automatically set to privilege level 15 unless you set them individually to different levels To return to the default privilege for a given command use the no privilege mode level level command command in global configuration mode The following example shows how to set the configure command to privilege
116. that you can use in DHCP pool configuration mode see the Example section on page 73 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Backup Data Lines and Remote Management Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 3 Step 4 Step5 Step 6 Step7 Step 8 Step 9 Step 10 Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port W Command Purpose exit Exits DHCP pool configuration mode and enters global configuration mode Example Router config dhcp exit Router config chat script script name expect send Example Router config chat script Dialout ABORT ERROR ABORT BUSY AT OK ATDT 5555102 T TIMEOUT 45 CONNECT c Router config Configures a chat script for use in DDR to give commands for dialing a modem and for logging in to remote systems The defined script is used to place a call over a modem connected to the PSTN interface type number Example Router config interface Async 1 Router config if Creates asynchronous interface and enters configuration mode for the asynchronous interface Configure the asynchronous interface For sample commands that you can use in asynchronous interf
117. the Configuring Security Features section on page 87 to configure security features on the router Follow instructions in the Unified Communications on Cisco Integrated Services Routers section on page 129 to configure Voice features on the router I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Overview of the Hardware and Software HZ Getting Started Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 8 OL 20696 04 Basic Router Configuration This module provides configuration procedures for Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs It also includes configuration examples and verification steps whenever possible amp Note See Appendix A Cisco IOS CLI for Initial Configuration for information on how to perform the initial configuration using the Cisco Internet Operating System IOS command line interface on Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers Basic Configuration Default Configuration page 10 Configuring Global Parameters page 11 Interface Configuration Interface Ports page 13 Configuring Gigabit Ethernet Interfaces page 14 Configuring Wireless LAN Interfaces page 15 Configuring Inter
118. the service module wlan ap 0 session command to console into the embedded AP Step 2 ip address subnet mask Example router config if ip address 10 21 0 20 255 255 255 0 Example router config if ip unnumbered vlanl Specifies the interface IP address and subnet mask Note The IP address can be shared with the IP address assigned to the Cisco Integrated Services Router by using the ip unnumbered vlani command Step 3 no shut Example router config if no shut Specifies the internal interface connection remains open Step 4 interface vlan1 Example router config if interface vlanl Specifies the virtual LAN interface for data communication on the internal GEO port to other interfaces Step5 ip address subnet mask Example router config if ip address 10 10 0 30 255 255 255 0 Specifies the interface IP address and subnet mask Step 6 exit Example router config if exit router config Exits the mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring the Wireless Device Configuring Wireless Settings W Command Purpose Step 7 exit Exits the mode Example router config exit router Step 8 service module wlan ap 0 session Opens the connection between the wireless device and the router s console Exa
119. the baud rate To set the configuration register without affecting the baud rate use the current configuration register setting by entering the show ver inc configuration command and then replacing the last rightmost number with a 0 in the configuration register command Restrictions The modified configuration register value is automatically written into NVRAM but the new value does not take effect until you reset or power cycle the router SUMMARY STEPS 1 confreg value DETAILED STEPS Command or Action Purpose Step1 confreg value Changes the configuration register settings while in ROM monitor mode Example e Optionally enter the new hexadecimal value for the rommon gt confreg 0x2102 configuration register The value range is from 0x0 to OxFFFF e If you do not enter the value the router prompts for each bit of the 16 bit configuration register Examples In the following example the configuration register is set to boot the system image from flash memory rommon 3 gt confreg 0x2102 In the following example no value is entered therefore the system prompts for each bit in the register rommon 7 gt confreg Configuration Summary enabled are console baud 9600 boot the ROM Monitor do you wish to change the configuration y n n y enable diagnostic mode y n n y enable use net in IP bcast address y n n y enable load rom after netboot fails y n n y enable use all zero broadcast y n n y
120. the system image file to a server This file can serve as a backup copy e Enter the flash memory partition number if prompted e Enter the filename and destination URL when prompted Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco IOS Software Examples How to Upgrade the Cisco IOS Image W The following examples show how to copy a startup configuration to a TFTP server and how to copy from flash memory to an FTP server Copying the Startup Configuration to a TFTP Server Example The following example shows the startup configuration being copied to a TFTP server Router copy nvram startup config tftp Remote host 192 0 0 1 Name of configuration file to write rtr2 confg rtr2 config b4upgrade Write file rtr2 confg b4upgrade on host 192 0 0 1 confirm lt er gt OK Copying from Flash Memory to a TFTP Server Example The following example uses the dir flash0 command in privileged EXEC mode to learn the name of the system image file and the copy flash0 tftp command in privileged EXEC mode to copy the system image to a TFTP server The router uses the default username and password Router copy flash0O tftp Source filename running config Address or name of remote host 192 0 0 1 Destination filename router confg running config 983 bytes copied in 0 048 secs 20479 byt
121. to certain traffic at the expense of other traffic Without QoS the device offers best effort service to each packet regardless of the packet contents or size It sends the packets without any assurance of reliability delay bounds or throughput To configure quality of service QoS for your wireless device see Quality of Service in a Wireless Environment at http www cisco com en US docs routers access wireless software guide QualityOfService html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 214 E OL 20696 04 Chapter Configuring the Wireless Device Upgrading to Cisco Unified Software Hi Configuring the Access Point in Hot Standby Mode In hot standby mode an access point is designated as a backup for another access point The standby access point is placed near the access point that it monitors and is configured exactly like the monitored access point The standby access point associates with the monitored access point as a client and sends Internet Access Point Protocol LAPP queries to the monitored access point through the Ethernet and radio ports If the monitored access point fails to respond the standby access point comes online and takes the monitored access point s place in the network Except for the IP address the standby access point s settings should be identical to the settings on the monitored access point If the mo
122. to users who need to have access at this level Use the privilege level command in global configuration mode to specify commands accessible at various levels For more information see the Configuring Multiple Privilege Levels section on page 262 If you enable password encryption it applies to all passwords including username passwords authentication key passwords the privileged command password and console and virtual terminal line passwords To remove a password and level use the no enable password level level command or the no enable secret level Zevel command in global configuration mode To disable password encryption use the no service password encryption command in global configuration mode This example shows how to configure the encrypted password FaDO XytiSRkls3LoyxzS8 for privilege level 2 AP config enable secret level 2 5 1 FaD0 Xyti5Rk1ls3LoyxzS8 Configuring Username and Password Pairs SUMMARY STEPS You can configure username and password pairs which are locally stored on the wireless device These pairs are assigned to lines or interfaces and they authenticate each user before the user can access the wireless device If you have defined privilege levels you can also assign a specific privilege level with associated rights and privileges to each username and password pair To establish a username based authentication system that requests a login username and a password follow these steps beginnin
123. which supplies basic and supplementary features on analog voice ports that are controlled by Cisco Unified Communications Manager or by a Cisco Unified Communications Manager Express system Supported features include e Audible message waiting indication e Call forwarding options e Call park pickup options e Call transfer e Call waiting e Caller ID e 3 party conference calls e Redial e Speed dial options For more information on the features supported and their configuration see SCCP Controlled Analog FXS Ports with Supplementary Features in Cisco IOS Gateways at Cisco com Session Initiation Protocol SIP Session Initiation Protocol SIP is a peer to peer multimedia signaling protocol developed in the IETF IETF RFC 3261 Session Initiation Protocol is ASCII based It resembles HTTP and it reuses existing IP protocols such as DNS and SDP to provide media setup and tear down See Cisco IOS SIP Configuration Guide for more information For router configuration information under SIP see the Basic SIP Configuration chapter of Cisco IOS SIP Configuration Guide Voice gateways provide voice security through SIP enhancements within the Cisco IOS Firewall SIP inspect functionality SIP packet inspection and detection of pin hole openings is provided as well as protocol conformance and application security The user is given more granular control on the policies and security checks applied to SIP traffic and capability to fil
124. wireless software guide wireless_vlans html amp Note If you do not use VLANs on your wireless LAN the security options that you can assign to SSIDs are limited because the encryption settings and authentication types are linked on the Express Security page Assigning SSIDs You can configure up to 16 SSIDs on a wireless device in the role of an access point and configure a unique set of parameters for each SSID For example you might use one SSID to allow guests to have limited access to the network and another SSID to allow authorized users to have access to secure data See Service Set Identifiers at Cisco com for more about creating multiple SSIDs http www cisco com en US docs routers access wireless software guide ServiceSetID html amp Note Without VLANs encryption settings WEP and ciphers apply to an interface such as the 2 4 GHz radio and you cannot use more than one encryption setting on an interface For example when you create an SSID with static WEP with VLANs disabled you cannot create additional SSIDs with Wi Fi Protected Access WPA authentication because the SSIDs use different encryption settings If you find that the security setting for an SSID conflicts with the settings for another SSID you can delete one or more SSIDs to eliminate the conflict Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 212 OL 206
125. 0 Configuring a Network Interface Device on the L3 Interface Configuring a Network Interface Device NID enables support for the NID functionality on the router without including a NID hardware in the network This feature combines the Customer Premises Equipment CPE and the NID functionality into a physical device The following are the advantages of configuring the NID functionality e Eliminates a physical device e Supports both the managed CPE feature set and the NID requirements Note This feature is supported only if you have purchased the DATA technology package functionality datak9 licensing package For more information about managing software activation licenses on the Cisco ISR and Cisco ISR G2 platforms see http www cisco com en US docs routers access sw_activation SA_on_ISR html Configuring the NID SUMMARY STEPS Step 1 The following steps describe how to configure the NID enable I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces HZ Configuring a Network Interface Device on the L3 Interface Step2 configure terminal Step3 interface gigabitethernet slot port Step4 port tagging Step5 encapsulation dotlq vian id Step6 set cos cos value Step7 end DETAILED STEPS Command Purpose St
126. 0 0 66 125 91 254 50 ip route 0 0 0 0 0 0 0 0 64 174 91 254 50 ip route 0 0 0 0 0 0 0 0 63 203 35 136 80 ip route 0 0 0 0 0 0 0 0 63 203 35 137 80 ip route 0 0 0 0 0 0 0 0 63 203 35 138 80 ip route 0 0 0 0 0 0 0 0 63 203 35 139 80 ip route 0 0 0 0 0 0 0 0 63 203 35 140 80 ip route 0 0 0 0 0 0 0 0 63 203 35 141 80 ip route 0 0 0 0 0 0 0 0 Dialer1 150 no ip http server ip pim bidir enable PC IP address behind CPE access list 101 permit ip 192 168 0 0 0 0 255 255 any access list 103 permit ip 192 168 0 0 0 0 255 255 any Watch multiple IP addresses because peers are alternated among them when the CPE is connected Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide a OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port W dialer watch list 1 ip 64 161 31 254 255 255 255 255 dialer watch list 1 ip 64 174 91 254 255 255 255 255 dialer watch list 1 ip 64 125 91 254 255 255 255 255 I Dial backup will kick in if primary link is not available 5 minutes after CPE starts up dialer watch list 1 delay route check initial 300 dialer list 1 protocol ip permit Direct traffic to an interface only if the dialer is assigned an IP address route map main permit 10 match ip address 101 match interface Diale
127. 0 2 GI0 3 Onboard WLAN Wlan ap0 not supported not supported not supported not supported Onboard WLAN GE connection to MGF Wlan Gi0 0 not supported not supported not supported not supported Onboard ISM GE interface on the PCIe service module name ISM 0 0 service module name ISM 0 0 service module name ISM 0 0 service module name ISM 0 0 not supported Onboard ISM GE connection to MGF service module name ISM 0 1 service module name ISM 0 1 service module name ISM 0 1 service module name ISM 0 1 not supported USB usbflash0 usbflash0O usbflash0O usbflash0 usbflash0 usbflash1 usbflash1 usbflash1 usbflash1 usbflash1 usbtoken0 usbtoken0O usbtoken0 usbtoken0 usbtoken0 usbtokenl usbtoken1 usbtoken1 usbtoken1 usbtoken1 Interfaces on HWIC __ interface0 0 interfaceO O port _ interface0 O port interface0 0 port lt int gt 0 0 lt port gt and VWIC port interfaceO port _ interfaceO 1 port interfaceO 1 port lt int gt 0 1 lt port gt interfaceO 1 interfaceO 2 port interfaceO 2 port interfaceO 2 port lt int gt 0 2 lt port gt port interface 0 3 port interface 0 3 port _ interface 0 3 port Interfaces on Double interfaceO 1 interfaceO port interfaceO 1 port interfaceO 1 port lt int gt 0 1 lt port gt WANE Ber interfaceO 3 port _ interface0 3 port interface0 3 port Interfaces on SM not supported not supported interface 1 p
128. 00 E7 00000000 HI EEEEEEEE EPC 00000000 Stat 34018002 00000000 24100000 00000003 00000000 0000002b 00000003 00000000 64219118 00070808 00000000 63e10000 34018001 ffff80fda fffffffe 3401ff02 6408d464 e57fce22 607a0d44 Process Level Context Reg MSW zero 00000000 AT 00000000 vO 00000000 v1 00000000 a0 00000000 al 00000000 a2 00000000 a3 00000000 to 00000000 EL 00000000 E2 00000000 t3 S FErerere t4 00000000 00000000 63e10000 00000000 00000440 00000000 00070804 00000000 00000000 00000000 64928378 00000001 fLffLOOfEL 6079eee0 ErrPC Cause 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 ffffffff 00000000 00000000 00000000 00000000 00000000 00000000 00000000 f LELLLLLE ffffffff 00000020 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 ffffffff 00000000 00000000 00000000 00000000 How to Use the ROM Monitor Typical Tasks Ti 0x61d839 8 I 0x60e36fa8 I 34018001 00000001 00000003 00000000 64219118 62ad0000 63e10000 63e10000 e7400884 00000000 00000000 63ab871 c 63c1c2d8 642190b8 6429274c 61d839f 8 ea545255 bfcO05f2c 6401a6f4 00000000 64049cf0 63360000 63360000 62ad0000 63e10000 63e10000 e7400884 00000000 644822e8 61d86d84 63c1c2d8 I OL 20696 04 lt Appendix C Using ROM Monitor HI Howto Use the ROM Monitor Typical Tasks 5 t6
129. 00 01 24 c2900 universalk9 mz bin 63930368 bytes total 51007488 bytes free Displaying File Content To display the content of a file that is stored in flash memory enter the more flash0 command in privileged EXEC mode S Note Use flashi in the command syntax to access CF in slot 1 Use flasho in the command syntax to access CF in slot 0 Router more flash0 c29xx i mz 00000000 7F454C46 01020100 00000000 00000000 gb A Veneers averas 00000010 00020061 00000001 80008000 00000034 SRARONA RAE E ikte Nee ee 00000020 00000054 20000001 00340020 00010028 sel gau of anaf 00000030 00050008 00000001 0000011C 80008000 Ghevaxe fedkete the Sra 00000040 80008000 00628A44 00650EEC 00000007 sakur lt DYD resl 00000050 0000011C 0000001B 00000001 00000006 Ea dea FRR 00000060 80008000 0000011C 00004000 00000000 Shel iae a Er y e Oal AUS eas 00000070 00000000 00000008 00000000 00000021 Bye SES iai a r Gai aL 00000080 00000001 00000002 8000C000 0000411C Gietse ieee A V Ay 00000090 00000700 00000000 00000000 00000004 bade trees 000000A0 00000000 00000029 00000001 00000003 weeds eee 000000B0 8000C700 0000481C 00000380 00000000 S5GO HY Beles 000000C0 00000000 00000004 00000000 0000002F Bde SG wah Sede S esa 000000D0 00000001 10000003 8000CA80 00004B9C PE PE pint es ones 000000E0 00000020 00000000 00000000 00000008 ce PERPA 000000F0 00000000 0000002F 00000001 10000003 ETE EEE 00000100 8000CAA0 00004BBC 00623FA4 000000
130. 00 58 c38xx tmp 1580 rw 6462268 Mar 06 1993 06 14 02 c38xx ata 63930368 bytes total 51007488 bytes free amp Note Determine whether the new system image is the first file or the only file listed in the dir flash0 command output is not required if it is the first file or only file listed configure terminal Use this command to enter global configuration mode Router configure terminal Router config no boot system Use this command to delete all entries in the bootable image list which specifies the order in which the router attempts to load the system images at the next system reload or power cycle Router config no boot system If the new system image is the first file or the only file displayed in the dir flash0 command output you do not need to perform the following step boot system flash0 system image filename Use this command to load the new system image after the next system reload or power cycle For example Router config boot system flash0O c2900 universalk9 mz bin Optional Repeat to specify the order in which the router should attempt to load any backup system images exit Use this command to exit global configuration mode Router config exit Router I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cis
131. 00 EES E o 45 00000110 00000000 00000008 00000000 3C1C8001 EE E PEREA 00000120 679C4A80 3C018001 AC3DC70C 3C018001 g J lt G lt 00000130 AC3FC710 3C018001 AC24C714 3C018001 G lt FSG lt 4 00000140 AC25C718 3C018001 AC26C71C 3C018001 PEG lt amp G lt 00000150 AC27C720 3C018001 AC30C724 3C018001 LEG RI 0GS lt 00000160 AC31C728 3C018001 AC32C72C 3C018001 1G lt 2G lt More q OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Appendix B Using CompactFlash Memory Cards File Operations on CompactFlash Memory Cards Displaying Geometry and Format Information To display the geometry and format information of a CF flash file system enter the show flash0 filesys command in privileged EXEC mode amp Note Use flash1 in the command syntax to access CF in slot 1 Use 1asho in the command syntax to access CF in slot 0 Router show flashO filesys xkx x ATA Flash Card Geometry Format Info ATA CARD GEOMETRY Number of Heads 4 Number of Cylinders 490 Sectors per Cylinder 32 Sector Size 512 Total Sectors 62720 ATA CARD FORMAT Number of FAT Sectors 31 Sectors Per Cluster 8 Number of Clusters 7796 Number of Data Sectors 62560 Base Root Sector 155 Base FAT Sector 93 Base Data Sector 187 Deleting Files To delete a file from a CF memory card ente
132. 00 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software W How to Upgrade the 10S Image on the Access Point Step 3 Step 4 Command Purpose no shutdown Enables the Gigabit Ethernet interface changing its state from administratively down to administratively up Example Router config if no shutdown Router config if exit Exits configuration mode for the Gigabit Ethernet interface and returns to global configuration mode Example Router config if exit Router config Secure an IP Address on the Access Point Example To secure an IP address on the access point so it can communicate with an external server where a Cisco IOS image is located use the DHCP server functionality on the router The host router provides the access point DHCP server functionality through the DHCP pool The access point communicates with the external server and setup option 43 for the controller IP address in the DHCP pool configuration The following example shows a dhcp pool configuration ip dhcp pool embedded ap pool network 192 168 10 0 255 255 255 0 dns server 171 70 168 183 default router 192 168 10 1 int vlanl ip address 192 168 10 0 255 255 255 0 Confirm Connectivity and Settings Example Perform the following steps to confirm connectivity 1 Ping the external server from the router to conf
133. 00 Vlan N No carrier Down Gi0 2 200 carrier N A Static N A Total Local MEPs 3 Local MIPs None Router Use the show ethernet cfm maintenance points remote command to display information about remote maintenance point domains or levels The following example displays the continuity check messages exchanged between remote MEPs On router 1 Routerl show ethernet cfm maintenance points remote MPID Domain Name MacAddress TESt Ptst Lvl Domain Ingress RDI MA Type Id SrvcInst EVC Name Age Local MEP Info 110 customer 70ca 9b4d a400 Up Up 7 customer Gi0 2 customer1101 Vlan 100 N A N A 12s MPID 100 Domain customer MA customer1101 410 enterprise 70ca 9b4d a400 Up Up 6 enterprise Gid 1 custservice Vlan 110 N A N A 12s MPID 400 Domain enterprise MA custservice 43 carrier 70ca 9b4d a400 Up Up 2 carrier Gi0 2 carrier Vlan 200 N A N A 12s MPID 44 Domain carrier MA carrier Total Remote MEPs 3 Router1 On router 2 Router2 show ethernet cfm maintenance points remote MPID Domain Name MacAddress TES PESE Lvl Domain Ingress RDI MA Type Id SrvcInst EVC Name Age Local MEP Info Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EN Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP 100 customer 7 customer customer1101 N A MPID 400 enterpri
134. 0696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Basic Router Configuration WE Configuring Dynamic Routes DETAILED STEPS Command Task Step 1 router rip Enters router configuration mode and enables RIP on the router Example Router gt configure terminal Router config router rip Router config router Step 2 version 1 2 Specifies use of RIP version 1 or 2 Example Router config router version 2 Router config router Step 3 network ip address Specifies a list of networks on which RIP is to be applied using the address of the network of each Example directly connected network Router config router network 192 168 1 1 Router config router network 10 10 7 1 Router config router Step 4 no auto summary Disables automatic summarization of subnet routes into network level routes This allows subprefix Example routing information to pass across classful network Router config router no auto summary boundaries Router config router Step 5 end Exits router configuration mode and enters privileged EXEC mode Example Router config router end Router Example The following configuration example shows RIP version 2 enabled in IP network 10 0 0 0 and 192 168 1 0 To see this configuration use the show running config command from privileged EXEC mode Router show running confi
135. 11b radios On the 802 11g radio the default option sets rates 1 2 5 5 and 11 to basic and sets rates 6 9 12 18 24 36 48 and 54 to enabled These rate settings allow both 802 11b and 802 11g client devices to associate to the wireless device 802 11 radio On the 5 GHz radio the default option sets rates 6 0 12 0 and 24 0 to basic and sets rates 9 0 18 0 36 0 48 0 and 54 0 to enabled On the 802 11g n 2 4 GHz radio the default option sets rates 1 0 2 0 5 5 and 11 0 to enabled On the 802 11g n 5 GHz radio the default option sets rates to 6 0 12 0 and 24 0 to enabled The modulation coding scheme MCS index range for both 802 11g n radios is 0 to 15 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Radio Settings Step 4 Step 5 Configuring MCS Rates Wl Command Purpose end Returns to privileged EXEC mode copy running config Optional Saves your entries in the configuration file startup config Use the no form of the speed command to remove one or more data rates from the configuration This example shows how to remove data rates basic 2 0 and basic 5 5 from the configuration ap1200 configure terminal ap1200 config interface dotilradio 0 ap1200 config if no speed basic 2 0 basic 5 5 ap1200 config if end Configuring MCS Rates Modulation coding
136. 133 16 16 DSP groups on slot 3 This command is not applicable to slot 3 DSP groups on slot 4 This command is not applicable to slot 4 2 DSP resource allocation failure show voice dsp sorted list Use this command to display the hunt order in which DSPs are utilized for particular services in this example voice conferencing and transcoding are shown for slot 0 Router show voice dsp sorted list slot 0 DSP id selection list for different service for Card 0 Voice 01 02 03 04 05 06 07 Conf 07 06 05 04 03 02 01 Xcode 01 02 03 04 05 06 07 show voice dsp capabilities slot number dsp number Use this command to display capabilities data for a particular DSP on a particular slot in this example DSP 2 on slot 0 Router show voice dsp capabilities slot 0 dsp 2 DSP Type SP2600 43 Card 0 DSP id 2 Capabilities Credits 645 G711Credits 15 HC Credits 32 MC Credits 20 FC Channel 43 HC Channel 20 MC Channel 32 Conference 8 party credits G711 58 G729 107 G722 129 ILBC 215 Secure Credits Sec LC Xcode 24 Sec HC Xcode 64 Sec MC Xcode 35 Sec G729 conf 161 Sec G722 conf 215 Sec ILBC conf 322 Sec G711 conf 92 Max Conference Parties per DSP G711 88 G729 48 G722 40 ILBC 24 Sec G711 56 Sec G722 24 Sec G729 32 Sec ILBC 16 I OL 20696 04 EEE Chapter Configuring Next Generation High Density PVDM3 Modules HZ How to Verify and Troubleshoot the Functionality of the PVDM3 Card
137. 153 codec 9722 64 no vad dial peer voice 203 voip destination pattern 408555 5 9 session protocol sipv2 session target ipv4 10 1 32 153 codec g723r53 gatekeeper shutdown telephony service sdspfarm units 5 sdspfarm transcode sessions 128 sdspfarm tag 1 G711_ANY sdspfarm tag 2 UNIVERAL sdspfarm tag 4 CONFERENCE max ephones 40 max dn 80 ip source address 10 1 32 147 port 2000 max conferences 32 gain 6 transfer system full consult create cnf files version stamp Jan 01 2002 00 00 00 I alias exec dsp show voice dsp group slot 0 line con 0 exec timeout 0 0 line aux 0 line vty 0 4 login exception data corruption buffer truncate scheduler allocate 20000 1000 no process cpu autoprofile hog end I OL 20696 04 m Chapter HE Additional References Additional References The following sections provide references related to the PVDM3 on Cisco Gateway Routers feature Related Documents Related Topic Document Title Comprehensive command reference information for Cisco IOS voice commands Cisco IOS Voice Command Reference Configuration information for Cisco Voice Gateway Routers that are configured for Cisco Unified Communications Manager Cisco Unified Communications Manager and Cisco IOS Interoperability Guide Complete hardware installation instructions for installing the PVDM3 Cisco 2900 Series and 3900 Series Integrated Services Routers Hardwar
138. 2 a If the DRAM is equal to or greater than the new system image s minimum memory requirements proceed to the Ensuring Adequate Flash Memory for the New System Image section on page 183 b If the DRAM is less than the new system image s minimum flash requirements you must upgrade your DRAM See the hardware installation guide for your router Select the system image in the Cisco IOS Upgrade Planner at http www cisco com cgi bin Software Iosplanner Planner tool iosplanner cgi You must have an account at Cisco com If you do not have an account or have forgotten your username or password click Cancel at the login dialog box and follow the instructions that appear Write down the minimum memory requirements for the image as displayed in the File Download Information table Use the show version command to display the router processor and memory Add the memory sizes to calculate the amount of DRAM in your router For example if your memory sizes are 231424 KB and 30720 KB for a total of 262144 KB it would be 256 MB of DRAM P Tip To convert from kilobytes KB to megabytes MB divide the number of kilobytes by 1024 Compare the amount of DRAM in the router to the minimum memory requirements from Step 2 a Ifthe DRAM is equal to or greater than the new system image s minimum memory requirements proceed to the Ensuring Adequate Flash Memory for the New System Image section on page 183 b Ifthe DR
139. 2 State UP firmware 26 0 133 Max signal voice channel 16 16 Max credits 240 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX _GROUP_VOICE complexity FLEX Shared credits 240 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 dsp 3 State UP firmware 26 0 133 Max signal voice channel 16 16 Max credits 240 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX _GROUP_VOICE complexity FLEX Shared credits 240 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 158 OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 4 Step 5 How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways W dsp 4 State UP firmware Max signal voice channel Max credits 240 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 240 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 26 0
140. 23 1 23 1 23 323 1 23 oo you I I I 9 amp E 10 Tis ES 12 a 13 14 Ss es 15 16 a 17 iss 18 19 20 21 2 22 s 23 mU T a e S M a a a a EO S TAN S a A S T show voice dsp group all Use this command to display information for each DSP group for example Router show voice dsp group all DSP groups on slot 0 dsp 1 26 0 135 43 43 State UP firmware Max signal voice channel Max credits 645 num_of_sig_chnls_allocated 35 Transcoding channels allocated Group FLEX _GROUP_VOICE Shared credits 630 Signaling channels allocated Voice channels allocated 1 Credits used rounded up Voice channels Ch01 Slot 0 Device idx 0 PVDM Slot 0 Dsp Type SP2600 15 voice port dsp 2 26 0 135 43 43 State UP firmware Max signal voice channel Max credits 645 num_of_sig_chnls_allocated 0 Transcoding channels allocated Group FLEX _GROUP_VOICE Shared credits 645 Signaling channels allocated Voice channels allocated 0 Credits used rounded up 0 Slot 0 Device idx 0 PVDM Slot 0 Dsp Type SP2600 dsp 3 State UP firmware 26 0 135 Max signal voice channel 42 43 0 1 1 23 2 0 complexity FLEX reserved credits 0 35 codec g7llalaw credits allocated 15 0 complexity FLEX reserved credits 0 0 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Service
141. 4 Chapter Configuring Security Features amp Configuring VPN W Note The Cisco Easy VPN client feature supports configuration of only one destination peer If your application requires creation of multiple VPN tunnels you must manually configure the IPSec VPN and Network Address Translation Peer Address Translation NAT PAT parameters on both the client and the server Cisco 3900 series 2900 series and 1900 series ISRs can be also configured to act as Cisco Easy VPN servers letting authorized Cisco Easy VPN clients establish dynamic VPN tunnels to the connected network For information on configuring Cisco Easy VPN servers see the Easy VPN Server feature at http www cisco com en US docs ios 12_2t 12_2t8 feature guide ftunity html Site to Site VPN Example The configuration of a site to site VPN uses IPSec and the generic routing encapsulation GRE protocol to secure the connection between the branch office and the corporate network Figure 2 shows a typical deployment scenario Figure 2 Site to Site VPN Using an IPSec Tunnel and GRE 121783 Branch office containing multiple LANs and VLANs Fast Ethernet LAN interface With address 192 165 0 0 16 also the inside interface for NAT VPN client Cisco 3900 series 2900 series or 1900 series ISR Fast Ethernet or ATM interface With address 200 1 1 1 also the outside interface for NAT LAN interface Connects to the Internet with outside interface
142. 5134 1706 Cisco IOS Software C2900SM Software C2900 UNIVERSALK9 M Experimental Version 12 4 20090709 004325 ypatel secport2 128 Copyright c 1986 2009 by Cisco Systems Inc Compiled Thu 16 Jul 09 12 55 by ypatel This product contains cryptographic features and is subject to United States and local country laws governing import export transfer and use Delivery of Cisco cryptographic products does not imply third party authority to import export distribute or use encryption Importers exporters distributors and users are responsible for compliance with U S and local country laws By using this product you agree to comply with applicable laws and regulations If you are unable to comply with U S and local laws return this product immediately A summary of U S laws governing Cisco cryptographic products may be found at http www cisco com wwl export crypto tool stqrg html If you require further assistance please contact us by sending email to export cisco com Cisco c2911 revision 1 0 with 987136K 61440K bytes of memory Processor board ID 3 Gigabit Ethernet interfaces 1 terminal line DRAM configuration is 64 bits wide with parity enabled 255K bytes of non volatile configuration memory 62960K bytes of USB Flash usbflashO Read Write 248472K bytes of ATA System CompactFlash 0 Read Write 248472K bytes of ATA CompactFlash 1 Read Write Press RETURN to get started Nov 22 09 20 19 839 LINK 3 UPDO
143. 6 04 Chapter Upgrading the Cisco 10S Software How to Upgrade the Ciscol0S Image W Step12 Optional Configure the print variable Usage is TFTP_VERBOSE 0 1 2 where print O is quiet 1 in progress 2 verbose Step 13 Use the set command to display the ROM monitor environment variables to verify that you have configured them correctly For example rommon gt set Step14 Download the system image as specified by the ROM monitor environmental variables using the tftpdnld r command Without the r option the command downloads the specified image and saves it in flash memory deleting all existing data in all partitions in flash memory Using the r option downloads and boots the new software but does not save the software to flash memory rommon gt tftpdnld r A prompt is displayed Do you wish to continue y n in y Entering y confirms that you want to continue with the TFTP download What to Do Next Proceed to the Loading the New System Image section on page 192 Using a PC with a CompactFlash Card Reader to Copy the System Image into Flash Memory Because the system image is stored on an external CompactFlash memory card you can use a PC with a compact flash card reader to format the card and copy a new system image file onto the card However this upgrade method is not commonly used For more information about using flash memory cards see Appendix B Using CompactFlash Memory Cards
144. 72 10 0 1 auth port 1645 acct port 1646 config aaa group server radius group1 config sg radius server 172 20 0 1 auth port 1000 acct port 1001 config sg radius exit config aaa group server radius group2 config sg radius server 172 20 0 1 auth port 2000 acct port 2001 config sg radius exit pPpppprpprpp rp U W W W a a gt w tg Configuring RADIUS Authorization for User Privileged Access and Network Services AAA authorization limits the services that are available to a user When AAA authorization is enabled the wireless device uses information retrieved from the user s profile which is in the local user database or on the security server to configure the user session The user is granted access to a requested service only if the user profile allows it You can use the aaa authorization command in global configuration mode with the radius keyword to set parameters that restrict a user s network access to privileged EXEC mode The aaa authorization exec radius command sets these authorization parameters e Use RADIUS for privileged EXEC access authorization if authentication was performed by using RADIUS e Use the local database if authentication was not performed by using RADIUS Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrate
145. 8 19 20 21 IP_ADDRESS 171 68 171 0 IP_SUBNET_MASK 255 255 254 0 DEFAULT_GATEWAY 171 68 170 3 TFTP_SERVER 171 69 1 129 TFTP_FILE c2801 is mz 113 2 0 3 Q tfitpdnld VVVVVV IP_ADDRESS 171 68 171 0 IP_SUBNET_MASK 255 255 254 0 DEFAULT_GATEWAY 171 68 170 3 TRIP SERVER 171 69 1 129 TFTP_FILE c2801 is mz 113 2 0 3 Q Receiving c2801 is mz 113 2 0 3 Q from 171 69 1 129 File reception completed Copying file c2801 is mz 113 2 0 3 Q to flash Erasing flash at 0x607c0000 program flash location 0x60440000 rommon 22 gt Sample Output for the set ROM Monitor Command rommon 3 gt set PS1l rommon gt IP_ADDRESS 172 18 16 76 IP_SUBNET_MASK 255 255 255 192 DEFAULT_GATEWAY 172 18 16 65 What to Do Next TFTP_SERVER 172 18 16 2 TFTP_FILE anyname rel22_Jan_16 c2801 i mz Prrrr Prrrr rrr rrr rrr rrr rd I If you want to configure the router to load a specified image at the next system reload or power cycle see the Loading and Managing System Images section in Cisco IOS Configuration Fundamentals Command Reference Troubleshooting Crashes and Hangs stack context frame sysret meminfo This section lists and describes some ROM monitor commands that can be used to troubleshoot router crashes and hangs Most ROM monitor debug commands are functional only when the router crashes or hangs If you enter a debug command when crash information is not ava
146. 8 101 1 Router config if Specifies the destination endpoint of the router for the GRE tunnel crypto map map name Example Router config if crypto map static map Router config if Assigns a crypto map to the tunnel Note Dynamic routing or static routes to the tunnel interface must be configured to establish connectivity between the sites See Cisco IOS Security Configuration Guide Secure Connectivity Release 12 4T for details exit Example Router config if exit Router config Exits interface configuration mode and returns to global configuration mode ip access list standard extended access list name Example Router config ip access list extended vpnstaticl Router config acl Enters ACL configuration mode for the named ACL that the crypto map uses permit protocol source source wildcard destination destination wildcard Example Router config acl permit gre host 192 168 100 1 host 192 168 101 1 Router config acl Specifies that only GRE traffic is permitted on the outbound interface exit Example Router config acl exit Router config 1 ACL access control list Returns to global configuration mode I OL 20696 04 m Chapter Configuring Security Features HZ Configuring VPN Configuration Example The following configuration example shows a portion of the configuration file for a site to site VPN using a
147. 900 Series Integrated Services Routers Generation 2 Software Configuration Guide B 10 OL 20696 04 APPENDIX Using ROM Monitor The ROM monitor is accessed during power up or reload when the router does not find a valid system image the last digit of the boot field in the configuration register is 0 or you enter the Break key sequence during the first 5 seconds after reloading the router The following sections describe how to use the ROM monitor in the Cisco 3900 series 2900 series 1900 series integrated services routers ISRs to manually load a system image or upgrade the system image for disaster or when there are no TFTP servers or network connections e Prerequisites for Using the ROM Monitor page C 1 e Information About the ROM Monitor page C 1 e How to Use the ROM Monitor Typical Tasks page C 3 e Additional References page C 27 Prerequisites for Using the ROM Monitor Connect a terminal or PC to the router console port For help see the hardware installation guide for your router Information About the ROM Monitor Before using the ROM monitor you should understand the following concepts e ROM Monitor Mode Command Prompt page C 1 e Why is the Router in ROM Monitor Mode page C 2 e When do I use ROM Monitor page C 2 e Tips for Using ROM Monitor Commands page C 2 e Accessibility page C 3 ROM Monitor Mode Command Prompt The ROM monitor uses the rommon x gt command prompt The x variable begins at 1 a
148. 96 04 Chapter Configuring the Wireless Device Configuring Wireless Settings W Security Types Table 1 describes the four security types that you can assign to an SSID Table 1 Types of SSID Security Security Type Description Security Features Enabled No Security This is the least secure option You should use this option None only for SSIDs used in a public space and assign it to a VLAN that restricts access to your network Static WEP Key This option is more secure than no security However Mandatory WEP Client devices static WEP keys are vulnerable to attack If you cannot associate using this SSID configure this setting you should consider limiting without a WEP key that matches the association to the wireless device based on MAC wireless device key address See Cipher Suites and WEP at Cisco com for configuration procedures http www cisco com en US docs routers access wireless software guide SecurityCipherSuitesWEP html Or If your network does not have a RADIUS server consider using an access point as a local authentication server See Using the Access Point as a Local Authenticator at Cisco com for instructions http www cisco com en US docs routers access wireless software guide SecurityLocalAuthent html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 TEEN Chapter Configuring the Wireless
149. AM is less than the new system image s minimum memory requirements you must upgrade your DRAM See the hardware installation guide for your router E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco IOS Software How to Upgrade the Cisco IOS Image W Ensuring Adequate Flash Memory for the New System Image This section describes how to check whether your router has enough flash memory to upgrade to the new system image and if necessary how to properly delete files in flash memory to make room for the new system image Cisco 3900 series Cisco 2900 series and Cisco 1900 series ISRs have two external CF slots and two USB slots Use the secondary CF for overflow files if required Table 3 lists CF slot number name and size Table 3 Compact Flash Slot Number Name and Size Slot Number CF Filename Size Slot02 flasho 256MB Slot1 flash1 0 The maximum storage capacity for the CF in Slot0 and Slot is 4GB 2 SlotO is the default CF slot CF in Slot0 stores system image configuration and data files CF must be present in this slot for the router to boot and perform normal file operations Table 4 lists the USB slot number name and size Table 4 USB Slot Number Name and Size Slot Number USB Filename Size SlotO usbflash0o 64MB Slotl usbflash1 0 1 The max
150. Aironet extensions if they are disabled Configuring the Ethernet Encapsulation Transformation Method When the wireless device receives data packets that are not 802 3 packets the wireless device must format the packets to 802 3 by using an encapsulation transformation method These are the two transformation methods e 802 1H This method provides optimum performance for Cisco wireless products e RFC 1042 Use this setting to ensure interoperability with non Cisco wireless equipment RFC1042 does not provide the interoperability advantages of 802 1H but is used by other manufacturers of wireless equipment To configure the encapsulation transformation method follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal interface dotllradio 0 1 payload encapsulation snap dotih end oF wN copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E Chapter Configuring Radio Settings W Enabling and Disabling Public Secure Packet Forwarding DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Command Purpose configure terminal Enters global configuration mode interface dotl1lradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 payload en
151. Apafi CISCO Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide December 23 2014 Cisco Systems Inc www cisco com Cisco has more than 200 offices worldwide Addresses phone numbers and fax numbers are listed on the Cisco website at www cisco com go offices Text Part Number OL 20696 04 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE ALL STATEMENTS INFORMATION AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California Berkeley UCB as part of UCB s public domain version of the UNIX operating system All rights reserved Copyright 1981 Regents of the University of California NOTWITHSTANDING ANY OTHER WARRANTY HEREIN ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS CISCO A
152. C mode Verifying the Controlling Port Authorization State Use the show authentication sessions and show dot1x commands to verify the Controlling Port Authorization state c1921 show authentication sessions Method dot1ix MAC Address unknown Interface Gid 1 Domain DATA Session ID 030303030000000A002CFCBC Status Authz Success c1921 show authentication sessions interface gi0 1 Interface GigabitEthernet0 1 MAC Address Unknown IP Address Unknown Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 120 E OL 20696 04 Configuring Identity Features on Layer 3 Interface _ Chapter Configuring Identity Features on Layer 3 Interface Status Domain Oper host mode Oper control dir Authorized By Vlan Group Session timeout Idle timeout Common Session ID Acct Session ID Handle Runnable methods list Method State dot1x c1921 show dotix inter Authz Success DATA single host both Authentication Server N A N A N A 030303030000000A002CFCBC 0x0000000D 0x7C00000B Authc Success face g0 1 Dot1x Info for GigabitEthernet0 1 PAE PortControl ControlDirection HostMode QuietPeriod ServerTimeout SuppTimeout ReAuthMax MaxReq TxPeriod AUTHENTICATOR FORCE_AUTHORIZED Both SING 60 40 30 2 2 30 1E_HOST c1921 show authenticat
153. C or terminal If Ctrl Break does not work see the Standard Break Key Sequence Combinations During Password Recovery tech note Example Sample Output for the reload Command Use break key sequence to enter rom monitor Router reload Proceed with reload Sep 23 15 54 25 871 command telnet gt send break confirm SSYS 5 R ELOAD Reload requested by console Reload Reason Reload System received an abort due to Break Key signal 0x3 code 0x0 PC 0x4008b5dc Cause 0x20 rommon 1 gt context 0x43laaf40 Status Reg 0x3400c102 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks i Troubleshooting Tips The Break key sequence varies depending on the software on your PC or terminal See the Standard Break Key Sequence Combinations During Password Recovery tech note What to Do Next e Proceed to the Displaying Commands and Command Syntax in ROM Monitor Mode help section on page C 7 e If you use the Break key sequence to enter ROM monitor mode when the router would otherwise have booted the system image you can exit ROM monitor mode by doing one of the following Enter the i or reset command which restarts the booting process and loads the system image Enter the cont command which c
154. CS can authenticate administrators who are accessing the wireless device through the CLI Configuring TACACS Login Authentication SUMMARY STEPS To configure AAA authentication you define a named list of authentication methods and then apply the list to various interfaces The method list defines the types of authentication to be performed and the sequence in which they are performed it must be applied to a specific interface before any defined authentication methods are performed The only exception is the default method list which is named default The default method list is automatically applied to all interfaces except those that have a named method list explicitly defined A method list describes the sequence and authentication methods to be used to authenticate a user You can designate one or more security protocols for authentication thus ensuring a backup system for authentication in case the initial method fails The software uses the first method listed to authenticate users If that method fails to respond the software selects the next authentication method in the method list This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted If authentication fails at any point in this cycle that is the security server or local username database responds by denying the user access the authentication process stops and no other authentication methods ar
155. Cisco 10S CLI for Initial Configuration Examples Using the Cisco 10S CLI to Perform Initial Configuration Tl Specifying a Default Route Example ip routing ip route 192 168 24 0 255 255 255 0 172 28 99 2 ip default network 192 168 24 0 Sample Output for the show ip route Command Router show ip route Codes C connected S static I IGRP R RIP M mobile B BGP D EIGRP EX EIGRP external O OSPF IA OSPF inter area El OSPF external type 1 E2 OSPF external type 2 E EGP i IS IS L1 IS IS level 1 L2 IS IS level 2 candidate default Gateway of last resort is 172 28 99 2 to network 192 168 24 0 172 24 0 0 255 255 255 0 is subnetted 1 subnets C 172 24 192 0 is directly connected GigaEthernet0 S 172 24 0 0 255 255 0 0 1 0 via 172 28 99 0 s 192 168 24 0 1 0 via 172 28 99 2 172 16 0 0 255 255 255 0 is subnetted 1 subnets Cc 172 16 99 0 is directly connected GigaEthernet1 Router Configuring Virtual Terminal Lines for Remote Console Access Virtual terminal vty lines are used to allow remote access to the router This section shows you how to configure the virtual terminal lines with a password so that only authorized users can remotely access the router The router has five virtual terminal lines by default However you can create additional virtual terminal lines as described in the Cisco IOS Terminal Services Configuration Guide Release 12 4 S
156. Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ios E OL 20696 04 Chapter Configuring Security Features Configuring Dynamic Multipoint VPN W VLAN 1 is the internal home network interface vlan 1 ip address 10 1 1 1 255 255 255 0 ip nat inside ip inspect firewall in Inspection examines outbound traffic crypto map static map no cdp enable I FE4 is the outside or Internet exposed interface interface fastethernet 4 ip address 210 110 101 211 255 255 255 0 acl 103 permits IPsec traffic from the corp router as well as denies Internet initiated traffic inbound ip access group 103 in ip nat outside no cdp enable crypto map to_corporate Applies the IPsec tunnel to the outside interface I Utilize NAT overload in order to make best use of the single address provided by the ISP ip nat inside source list 102 interface Ethernet1 overload ip classless ip route 0 0 0 0 0 0 0 0 210 110 101 1 no ip http server I acl 102 associated addresses used for NAT access list 102 permit ip 10 1 1 0 0 0 0 255 any acl 103 defines traffic allowed from the peer for the IPsec tunnel access list 103 permit udp host 200 1 1 1 any eq isakmp access list 103 permit udp host 200 1 1 1 eq isakmp any access list 103 permit esp host 200 1 1 1 any Allow ICMP for debugging but should be disabled because of security implications access list 103 permit
157. Command Purpose Step1 ethernet loopback stop local Stops Ethernet external loopback on a subinterface interface gigabitethernet slot port sub port id session id Enter the value of the loopback session ID to specify the loopback session that you want to stop Example Router ethernet loopback stop local interface gigabitethernet 0 2 1101 id 1 Step2 show ethernet loopback active Displays information to verify if the loopback session has ended Example Router show ethernet loopback active Configuration Examples for Ethernet Data Plane Loopback This example shows how to configure Ethernet data plane loopback using single tagging Router gt enable Router configure terminal Router config interface gigabitethernet 0 2 1101 Router config subif encapsulation dotiq 100 Router config subif ethernet loopback permit external Router config subif end This example shows how to configure Ethernet data plane loopback using double tagging Router gt enable Router configure terminal Router config interface gigabitethernet 0 2 1101 Router config subif encapsulation dotlq 100 second doti1lgq 1101 Router config subif ethernet loopback permit external Router config subif end This example shows how to start an Ethernet data plane loopback Router ethernet loopback start local interface gigabitethernet 0 2 1101 external timeout none I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series
158. Config file buffer size 32768 Mode Button on Performing the Upgrade Step 1 Step 2 To upgrade to Unified software follow these steps Issue the service module wlan ap 0 bootimage unified command to change the access point boot image to the Unified upgrade image which is also known as a recovery image Router conf terminal Router config service module wlan ap 0 bootimage unified Router config end amp Note If the service module wlan ap 0 bootimage unified command does not work successfully check to see whether the software license is still eligible On the access point console use the show boot command to identify the access point s boot image path autonomous AP show boot BOOT path list flash ap801 rcvk9w8 mx ap801 rcevk9w8 mx Issue the service module wlan ap 0 reload command to perform a graceful shutdown and reboot the access point and complete the upgrade process Session into the access point and monitor the upgrade process See the Cisco Express Setup section on page 210 for details about using the Web based configuration page to configure the wireless device settings Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring the Wireless Device Upgrading to Cisco Unified Software Hi Troubleshooting an Upgrade or Reverting the AP to Autonomous Mode Q
159. Console Cisco 3900 series 2900 series and 1900 series ISRs provide an additional mechanism for configuring the system through a USB serial console port The traditional RJ 45 serial console port is also available Power Management Some modules and interface cards that are inserted in new slots provide hardware and software power management features described below e High efficiency AC power supplies e Electrical components with built in power saving features such as RAM select and clock gating e Ability to disable unused clocks to modules and peripherals e Ability to power down unused modules and put peripherals into a reset state put front panel ports and unused internal components in a shutdown or reset state Advanced Capability CompactFlash Cisco 3900 series 2900 series and 1900 series ISRs use Advanced Capability CF memory to store the system image configuration files and some software data files SFP Gigabit Ethernet Port Cisco 2921 Cisco 2951 and Cisco 3900 Series routers have an SFP Gigabit Ethernet port that supports copper and fiber concurrent connections Media can be configured for failover redundancy when the network goes down For more information see the Configuring Backup Data Lines and Remote Management section on page 57 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 C
160. Controllers e Unified Wireless LAN Access Points Voice e Cisco IOS Voice Port Configuration Guide e SCCP Controlled Analog FXS Ports with Supplementary Features in Cisco IOS Gateways Modules e Cisco SRE Internal Service Modules Configuration Guide e Cisco Services Ready Engine Configuration Guide e Cisco SRE Service Modules Configuration Guide e Connecting Cisco EtherSwitch Service Modules to the Network e Cisco EtherSwitch Service Modules Feature Guide Searching Cisco Documents To search a Hyper Text Markup Language HTML document using a web browser press Ctrl F Windows or Cmd F Apple In most browsers the option to search whole words only invoke case sensitivity or search forward and backward is also available To search a PDF document in Adobe Reader use the basic Find toolbar Ctrl F or the Full Reader Search window Shift Ctrl F Use the Find toolbar to find words or phrases within a specific document Use the Full Reader Search window to search multiple PDF files simultaneously and to change case sensitivity and other options Adobe Reader s online help has more information about how to search PDF documents Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 g is Preface W Searching Cisco Documents Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Gene
161. DMMs Transmitted 117 DMRs Revd 117 1DMs Transmitted 0 Revd 0 LMMs Transmitted 0 LMRs Revd 0 VSMs Transmitted 0 VSRSs Revd 0 SLMs Transmitted 0 SLRs Revd 0 Test ID 0 Router1 Last clearing of counters RP monitor Tx active yes RP monitor Rx active yes 148 150 Router config show ethernet cfm pm session detail 0 00 00 00 000 UTC Mon Jan 1 1900 Router show ethernet cfm pm session db 0 TX Time FWD RX Time FWD Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces TX Time BWD Sec nSec Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface RX Time BWD Sec nSec Frame Delay Sec nSec Session ID 0 kkkkkkkkkkxkkxkkxkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk 3591 3591 1340722 930326034 1340663 866898528 3591 3591 1340663 866791722 1340722 930707484 0 274644 KKK KKK KK KK KK KKK KKK KKK KKK KKK KK KK KK KK KKK KK KK KKK KK KK KKK KK KKK KKK KKK KEK KK KKK EKER EK 3591 3591 1340723 927640626 1340664 864182604 3591 3591 1340664 864091056 1340723 927976302 0 244128 KKK KKK KKK KKK KKK KKK KK KEK KK KKK RK KKK KKK KKK KK KKK KK KK KKK KK KKK KK KK KKK KKK KKK KK KKEKKEKE 3591 3591 1340724 927640626
162. Displays a brief status of the interfaces that are configured for IP Example e Verify that the Ethernet interfaces are up and Router show ip interface brief configured correctly Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration Examples Configuring the GigabitEthernet Interface Example interface GigabitEthernet0 0 description GE int to HR group ip address 172 16 3 3 255 255 255 0 duplex auto speed auto no shutdown Sample Output for the show ip interface brief Command Router show ip interface brief Interface IP Address OK Method Status Protocol GigabitEthernet0 0 172516 3 3 YES NVRAM up up GigabitEthernet0 1 unassigned YES NVRAM administratively down down Router Specifying a Default Route or Gateway of Last Resort IP Routing This section describes how to specify a default route with IP routing enabled For alternative methods of specifying a default route see the Configuring a Gateway of Last Resort Using IP Commands tech note The Cisco IOS software uses the gateway router of last resort if it does not have a better route for a packet and if the destination is not a connected network This section describes how to select a network as a default route a candidate route for computing the gat
163. E HE HE HE FE HE HE HE HE HE HE HE HE HE HE FE HE HE FE HE HE FE HE HE HE HE HE HE HE FE HE FE FE HE FE FE HE FE FE HE HE FE HE HE HE HE FE HE HE FE HE HE HE HE HE HE HE HE HE HE E HE FHE HE HE FHE HE HE FHE HE HE HE HE HE FE HE HE HE HE HE HE HE HE HH HEHE HE HE HE HE HE HE HE HE AE HE HE HE HE HE HE HE HE HE HE HE HE HE E HE HE FE FE HE FE FE HE FE HE HE TE HE HE TE FE EE HE FE EE TE FE EE E E E E E E A EERE EEREHREEHEEHH OK Smart Init is enabled smart init is sizing iomem TYPE MEMORY_REQ HWIC Slot 0 0x00200000 HWIC Slot 1 0x00200000 HWIC Slot 2 0x00200000 HWIC Slot 3 0x00200000 PVDM SIMM 0 0x00200000 PVDM SIMM 1 0x00200000 SM Slot 1 0x00600000 ISM Slot 2 0x00600000 Onboard devices amp buffer pools 0x0228F000 TOTAL 0x03A8F000 Rounded IOMEM up to 60Mb Using 5 percent iomem 60Mb 1024Mb Restricted Rights Legend OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks Use duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph c of the Commercial Computer Software Restricted Rights clause at FAR sec 52 227 19 and subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS sec 252 227 7013 cisco Systems Inc 170 West Tasman Drive San Jose California 9
164. E HE HE HE HE FE HE HE HE HE HE HE HE E HE HE FE HE HE FE HE HE FE HE HE HE HE HE HE HE FE HE FE FE HE FE FE HE FE FE HE HE HE HE FE HE HE FE FE HE FHE HE HE HE HE HE HE HE HE HE HE HE HE HE HE HE HE FHE HE HE FHE HE HE HE HE HE HE HE HE HE HE HE HH FE HE HE HE HE HE HE HE HE HE FE HE HE FE HE HE HE HE HE HE HE FE HE HE FE HE HE FE HE HE FE HE HE HE HE E HE FE FE HE FHE FE HE FE FE HE HE FE HE FE FE HE FE HE HE FE HE FE HE HE FHE HE HE HE Ha HE HE HE HE FHE HE HE FHE HE HE FHE HE HE FE HE HE HE HE HE HE HE HE H FE HE HE HE HE HE HE HE HE HE FE HE HE FE HE HE HE HE HE FE HE HE FE HE E HE HE FE HE HE FE HE HE TE HE HE TE HE HE TE FE EE TE FE EE E E E E E E E E EHEER EEHEEHEEREEEREEHEEHEEHH OK Smart Init is enabled smart init is sizing iomem TYPE MEMORY_REQ HWIC Slot 0 0x00200000 HWIC Slot 1 0x00200000 HWIC Slot 2 0x00200000 HWIC Slot 3 0x00200000 PVDM SIMM 0 0x00200000 PVDM SIMM 1 0x00200000 SM Slot 1 0x00600000 ISM Slot 2 0x00600000 Onboard devices amp buffer pools 0x0228F000 TOTAL 0x03A8F000 Rounded IOMEM up to 60Mb Using 5 percent iomem 60Mb 1024Mb Restricted Rights Legend Use duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph c of the Commercial Computer Software Restricted Rights clause at FAR sec 52 227 19 and subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS sec 252 227 7013 cisco Systems Inc 170 West Tasman Dr
165. EPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 7 interface dialer dialer rotary group number 8 ip address negotiated 9 encapsulation encapsulation type 10 dialer pool number 11 dialer string dial string isdn subaddress 12 dialer group group number 13 exit 14 dialer list dialer group protocol protocol name permit deny list access list number access group Command Purpose isdn switch type switch type Example Router config isdn switch type basic net3 Router config Specifies the ISDN switch type The example specifies a switch type used in Australia Europe and the United Kingdom For details on other supported switch types see Cisco IOS Dial Technologies Command Reference interface type number Example Router config interface bri 0 Router config if Enters configuration mode for the ISDN BRI encapsulation encapsulation type Example Router config if encapsulation ppp Router config if Sets the BRIO interface encapsulation type dialer pool member number Example Router config if dialer pool member 1 Router config if Specifies the dialer pool membership isdn switch type switch type Example Router config if isdn switch type basic net3 Router config if Specifies the ISDN switch type exit Example Router config if exit Router config Exits interface configuration mode and enters g
166. Ethernet speed we recommend that you use auto the default setting Step4 duplex auto full half Configures the duplex setting we recommend that you use auto the default setting Step5 end Returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ms 287 Chapter Administering the Wireless Device WE Configuring the Access Point for Wireless Network Management Command Purpose Step6 show running config Verifies your entries Step7 copy running config startup config Optional Saves your entries in the configuration file Configuring the Access Point for Wireless Network Management You can enable the wireless device for wireless network management The wireless network manager WNM manages the devices on your wireless LAN Enter the following command to configure the wireless device to interact with the WNM AP config wlccp wnm ip address ip address Enter the following command to check the authentication status between the WDS access point and the WNM AP show wlccp wnm status Possible statuses are not authenticated authentication in progress authentication fail authenticated and security keys setup Configuring the Access Point for Local Authentication and Authorization You can configure AAA to operate without a server by configuring the wireless device to implement AAA
167. Example Router config end Returns to privileged EXEC mode Step6 show running config Displays the running configuration file Example Router config show running config e Verify that you properly configured the idle privileged EXEC timeout Examples The following example shows how to set the console idle privileged EXEC timeout to 2 minutes 30 seconds line console exec timeout 2 30 The following example shows how to set the console idle privileged EXEC timeout to 10 seconds line console exec timeout 0 10 Configuring Gigabit Ethernet Interfaces SUMMARY STEPS This sections shows how to assign an IP address and interface description to an Ethernet interface on your router For comprehensive configuration information on Gigabit Ethernet interfaces see the Configuring LAN Interfaces chapter of Cisco IOS Interface and Hardware Component Configuration Guide http www cisco com en US docs ios 12_2 interface configuration guide icflanin html For information on interface numbering see Software Configuration Guide for your router enable show ip interface brief configure terminal interface gigabitethernet 0 port description string ip address ip address mask no shutdown end O o N A a SY DN show ip interface brief E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appen
168. Express Setup tool Step 1 Establish a Console connection to the wireless device and get the BVI IP address by entering the show interface bvil IOS command Step2 Open a browser window and enter the BVI IP address in the browser window address line Press enter and an Enter Network Password window appears Step3 Enter your username Cisco is the default User Name Step4 Enter the wireless device password Cisco is the default password The Summary Status page appears See the following URL for details about using the web browser configuration page http cisco com en US docs wireless access_point 12 4_10b_JA configuration guide scg12410b chap4 first html wp 1103336 Cisco IOS CLI To configure the Autonomous wireless device establish a session between the router and the access point then use the Cisco IOS CLI tool e Configuring the Radio page 210 e Configuring Wireless Security Settings page 211 e Configuring Wireless Quality of Service page 214 Optional e Configuring the Access Point in Hot Standby Mode page 215 Optional Configuring the Radio Configure the radio parameters on the wireless device to transmit signals See Chapter 9 Configuring Radio Settings for specific configuration procedures Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 210 OL 20696 04 Chapter Configuring the Wireless Device Configuring Wire
169. F memory card see the hardware installation guide for your router How to Format CompactFlash Memory Cards This section contains the following procedures e Determining the File System on a CompactFlash Memory Card page B 2 e Formatting CompactFlash Memory as a Class C File System page B 3 Determining the File System on a CompactFlash Memory Card To determine the file system of a CF memory card enter the show flash all command in privileged EXEC mode e If geometry and format information does not appear in the output the card is formatted with a Class B flash file system Class B files systems are not supported on CF inserted in Cisco 3900 Series 2900 Series and 1900 Series Integrated Services Routers e If geometry and format information appears in the output the card is formatted with a Class C flash file system The following examples show sample outputs for Class B and Class C flash file systems amp Note Use flash1 in the command syntax to access CF in slot1 Use flasho in the command syntax to access CF in slot0 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide B 2 OL 20696 04 _ Appendix B Using CompactFlash Memory Cards How to Format CompactFlash Memory Cards W External Card with Class B Flash File System Example The geometry and format information does not appear Router show flash all Partition
170. GRE tunnel as described in the preceding sections aaa new model aaa authentication login rtr remote local aaa authorization network rtr remote local aaa session id common username usernamel password 0 password1 interface tunnel 1 ip address 10 62 1 193 255 255 255 252 tunnel source fastethernet 0 tunnel destination interface 192 168 101 1 ip route 20 20 20 0 255 255 255 0 tunnel 1 crypto isakmp policy 1 encryption 3des authentication pre share group 2 crypto isakmp client configuration group rtr remote key secret password dns 10 50 10 1 10 60 10 1 domain company com pool dynpool I crypto ipsec transform set vpn1 esp 3des esp sha hmac 1 crypto ipsec security association lifetime seconds 86400 I crypto dynamic map dynmap 1 set transform set vpn1 reverse route I crypto map static map 1 ipsec isakmp dynamic dynmap crypto map dynmap isakmp authorization list rtr remote crypto map dynmap client configuration address respond I Defines the key association and authentication for IPsec tunnel crypto isakmp policy 1 hash md5 authentication pre share crypto isakmp key cisco123 address 200 1 1 1 I Defines encryption and transform set for the IPsec tunnel crypto ipsec transform set set1 esp 3des esp md5 hmac Associates all crypto values and peering address for the IPsec tunnel crypto map to_corporate 1 ipsec isakmp set peer 200 1 1 1 set transform set setl match address 105 Cisco 3900 Series
171. Generation 2 Software Configuration Guide I OL 20696 04 E Chapter Configuring Next Generation High Density PVDM3 Modules HZ Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers Table 2 Example of a DSP Numbering Scheme for PVDM3 Only PVDM2 Only and Mixed Installation PVDM slot 0 PVDM slot 1 PVDM slot 2 PVDM slot 3 PVDM3 Only PVDM3 256 PVDM3 16 PVDM3 64 PVDM3 192 DSP ID 1 2 3 4 5 6 7 13 14 19 20 21 22 23 Device ID 0 0 0 1 1 1 2 4 4 6 6 6 7 7 PVDM2 Only PVDM2 32 PVDM2 64 PVDM2 16 PVDM2 48 DSP ID 1 2 5 6 7 8 9 13 14 15 Mixed Installation PVDM DM PVDM3 256 PVDM3 32 DSP ID 1 2 23 24 25 26 27 28 29 Device ID 2 2 23 3 3 DSP Image for the PVDM3 The DSP image for the PVDM3 supports all features supported on PVDM2 except Cisco Fax Relay The DSP image provides feature capability to implement the signal processing layer for a TDM to IP gateway TDM to IP gateway for voice telephony including support for multicast conferencing through the mixing of multiple IP streams out a single TDM port Low level processing of CAS from a T1 E1 interface through the use of digital signaling channels Control and low level processing of the signaling for analog telephony interface implemented on Cisco s voice interface card VIC hardware Support for Voice Band Data VBD through the use of upspeeding channels Support of facsimile using
172. Guide I oL 20696 04 ESEN AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration SUMMARY STEPS 1 enable 2 configure terminal 3 line aux 0 4 See the tech notes and sample configurations to configure the line for your particular implementation of the AUX port DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 configure terminal Enters global configuration mode Example Router configure terminal Step3 line aux 0 Starts the line configuration command collection mode for the auxiliary line Example Router config line aux 0 Step4 See the tech notes and sample configurations to configure the line for your particular implementation of the AUX port Verifying Network Connectivity This section describes how to verify network connectivity for your router Prerequisites e Complete all previous configuration tasks in this document e The router must be connected to a properly configured network host SUMMARY STEPS 1 enable 2 ping ip address hostname 3 telnet ip address hostname Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide A 14 OL 20696 04 Appendix A Cisco 10S CLI for Initial Configuration Using the Cisco 10S CLI to Pe
173. IC 3 PVDM 0 PVDM 1 PVDM 2 PVDM 3 SM 1 SM 2 SM 3 SM 4 Viewing Module and Interface Card Status on the Router Multi gigabit Fabric MGF displays module and interface card details To show the details of the MGF use the show platform mgf command in privileged EXEC mode The following example displays the output for the show platform mgf module command when entered on a Cisco 3945 ISR Table 1 on page 175 displays the information code that appears in the output Router show platform mgf module Registered Module Information Code NR Not Registered TM Trust Mode SP Scheduling Profile BL Buffer Level TR Traffic Rate PT Pause Threshold slot vlan type ID TM SP BL TR PT ISM NR EHWIC 0 NR EHWIC 1 NR EHWIC 2 NR EHWIC 3 NR PVDM 0 NR PVDM 1 NR PVDM 2 NR PVDM 3 NR SM 1 T SM 6 UP 1 high 1000 high SM 2 1 SM 6 UP 1 high 1000 high SM 3 NR SM 4 NR Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide EZE OL 20696 04 Chapter Configuring Multi Gigabit Fabric Communication Viewing Platform Information W Table 1 Show Platform MGF Module Information Code Code Description NR Not registered TM Trust mode User Priority UP or Differentiated Service Code DSCP SP Scheduling profile BL Buffer level TR Traffic rate PT Pause threshold level Viewing Multi Gigabit Fabric Statistics
174. IGRP routes indicated by D You should see verification output similar to the following Router show ip route Codes C connected S static R RIP M mobile B BGP D EIGRP EX EIGRP external O OSPF IA OSPF inter area N1 OSPF NSSA external type 1 N2 OSPF NSSA external type 2 El OSPF external type 1 E2 OSPF external type 2 i IS IS su IS IS summary L1 IS IS level 1 L2 IS IS level 2 ia IS IS inter area candidate default U per user static route o ODR P periodic downloaded static route Gateway of last resort is not set 10 0 0 0 24 is subnetted 1 subnets 10 108 1 0 is directly connected Loopback0O D 3 0 0 0 8 90 409600 via 2 2 2 1 00 00 02 Ethernet0 0 Q Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide EN OL 20696 04 Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces This chapter provides procedures for configuring the network interface device functionality Ethernet data plane loopback IEEE connectivity fault management and Y 1731 performance monitoring and contains the following sections e Configuring a Network Interface Device on the L3 Interface page 25 e Ethernet Data Plane Loopback page 28 e CFM Support on Routed Port and Port MEP page 34 e Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface page 5
175. ILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 ip dhcp excluded address ow_address high_address Excludes the wireless device IP address from the range of addresses that the wireless device assigns Enter the IP address in four groups of characters such as 10 91 6 158 The wireless device assumes that all IP addresses in a DHCP address pool subnet are available for assigning to DHCP clients You must specify the IP addresses that the DHCP server should not assign to clients Optional To enter a range of excluded addresses enter the address at the low end of the range followed by the address at the high end of the range Step3 ip dhcp pool pool_name Creates a name for the pool of IP addresses that the wireless device assigns in response to DHCP requests and enters DHCP configuration mode Step4 network subnet_number mask prefix length Assigns the subnet number for the address pool The wireless device assigns IP addresses within this subnet Optional Assigns a subnet mask for the address pool or specifies the number of bits that compose the address prefix The prefix is an alternative way of assigning the network mask The prefix length must be preceded by a forward slash Step5 lease days hours minutes infinite Configures the duration of the lease for IP addresses assigned by the wireless device e days configure the lease dur
176. IOS Image onthe Access Point W IP address of remote host 255 255 255 255 192 0 0 1 filename to write on tftp host 2900 universalk9 mz writing c2900 mz successful ftp write How to Upgrade the IOS Image on the Access Point This section describes how to upgrade the Cisco IOS image on the access point To upgrade the IOS image on the access point establish connectivity between the access point and the download server by following these steps e Define the WAN Interface on the Router page 199 e Secure an IP Address on the Access Point page 200 e Confirm Connectivity and Settings page 200 e Upgrading the IOS Image on the Access Point page 201 Define the WAN Interface on the Router To define a WAN interface to connect to a TFTP network for image download follow these steps beginning in global configuration mode SUMMARY STEPS 1 interface gigabitethernet slot port 2 ip address ip address mask 3 no shutdown 4 exit DETAILED STEPS Command Purpose Step 1 interface gigabitethernet s ot port Example Router config interface gigabitethernet 0 0 Router config if Enters the configuration mode for a Gigabit Ethernet interface on the router Step2 ip address ip address mask Example Router config if ip address 192 168 12 2 255 255 255 0 Router config if Sets the IP address and subnet mask for the specified Gigabit Ethernet interface I OL 20696 04 Cisco 39
177. IUS is facilitated through authentication authorization and accounting AAA and can be enabled only through AAA commands Note For complete syntax and usage information for the commands used in this section see Cisco IOS Security Command Reference These sections describe RADIUS configuration e Default RADIUS Configuration page 265 e Configuring RADIUS Login Authentication page 265 required e Defining AAA Server Groups page 267 optional e Configuring RADIUS Authorization for User Privileged Access and Network Services page 269 optional e Displaying the RADIUS Configuration page 270 Default RADIUS Configuration RADIUS and AAA are disabled by default To prevent a lapse in security you cannot configure RADIUS through a network management application When enabled RADIUS can authenticate users who are accessing the wireless device through the command line interface CLI Configuring RADIUS Login Authentication To configure AAA authentication you define a named list of authentication methods and then apply the list to various interfaces The method list defines the types of authentication to be performed and the sequence in which they are performed it must be applied to a specific interface before any defined authentication methods are performed The only exception is the default method list which is named default The default method list is automatically applied to all interfaces except those that have a name
178. M configuration If you need to set the router I O memory permanently by using a manual method use the memory size iomem Cisco IOS command If you set the I O memory from the Cisco IOS software you must restart the router for I O memory to be set properly When the configured I O memory exceeds the IOS limit 1G IOS will automatically set an appropriate I O memory size and print this message IOMEM size calculated is greater than maximum allowed during boot up 1 iomemset i o memory percentage Command or Action Purpose Step1 iomemset i o memory percentage Reallocates the percentage of DRAM used for I O memory Example rommon gt iomemset 15 and processor memory OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ra AppendixC Using ROM Monitor HI Howto Use the ROM Monitor Typical Tasks Examples In the following example the percentage of DRAM used for I O memory is set to 15 rommon 2 gt iomemset usage iomemset smartinit 5 10 15 20 25 30 40 50 rommon 3 gt rommon 3 gt iomemset 15 Invoking this command will change the io memory percent XWARNING IOS may not keep this value Do you wish to continue y n n y rommon 4 gt meminfo Current Memory configuration is Onboard SDRAM Size 128 MB Start Addr 0x10000000 eee Bank 0 128 MB Boas Bank 1 0 MB Dimm 0
179. MMARY STEPS 1 configure terminal 2 interface dotilradio 0 1 3 world mode dotl1ld country_code code both indoor outdoor world mode roaming legacy 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface doti1radio 0 1 Enters interface configuration mode for the radio interface Step3 world mode Enables world mode dot11d country code code e Enter the dot11d option to enable 802 11d world mode both indoor outdoor world mode roaming legacy When you enter the dot11d option you must enter a 2 character ISO country code for example the ISO country code for the United States is US You can find a list of ISO country codes at the ISO website After the country code you must enter indoor outdoor or both to indicate the placement of the wireless device e Enter the legacy option to enable Cisco legacy world mode e Enter the world mode roaming option to place the access point in a continuous world mode configuration Note Aironet extensions must be enabled for legacy world mode operation but Aironet extensions are not required for 802 11d world mode Aironet extensions are enabled by default Step4 end Returns to privileged EXEC mode Step5 copy running config startup config Optional Saves your entries in the configuration file Use the no form of the world mode command to disable world mode C
180. ND THE ABOVE NAMED SUPPLIERS DISCLAIM ALL WARRANTIES EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION THOSE OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING USAGE OR TRADE PRACTICE IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and or its affiliates in the U S and other countries To view a list of Cisco trademarks go to this URL www cisco com go trademarks Third party trademarks mentioned are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 1110R Any Internet Protocol IP addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers Any examples command display output network topology diagrams and other figures included in the document are shown for illustrative purposes only Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Software Configurati
181. P failure detection that is ten times faster than existing technology The DSP Resource Manager has been enhanced so that PVDM3 modules can pool DSP resources and share DSP resources across voice service modules when there is a combination of PVDM2 based using 5510 DSP modules and PVDM3 based modules in one router This supports the coexistence of PVDM2 PVDM2 DM and PVDM3 modules on separate boards in the same router However any PVDM2 modules inadvertently deployed on the same voice card as PVDM3 modules are shut down amp Note Different generation PVDM types can exist on different voice cards within the same router but not on the same voice card Each voice card in a router can support only PVDM2 or PVDM3 modules There cannot be a combination of the two different PVDM types on the same voice card There can be only one type of PVDM on the router motherboard either PVDM2 or PVDM3 modules not a combination of the two PVDM2s can reside on a network module within a router that supports PVDM3 modules on the motherboard but PYDM2 and PVDM3 modules cannot be mixed on the network module and PVDM2s and PVDM3s may not be mixed on the router motherboard Contents e Prerequisites for Configuring the PVDM3 Module on Cisco Voice Gateway Routers page 146 e Restrictions for Configuring the PVDM3 Module on Cisco Voice Gateway Routers page 146 e Information About Configuring the PYDM3 Module on Cisco Voice Gateway Routers page 147
182. PS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 dir flash0 partition number Use this command to list files in flash memory rommon gt dir flash0 program load complete entry point 0x4000000 size 0x18fa0 Directory of flash0 2 48296872 rw c3900 universalk9 mz SPA Note whether the new system image is the first file or the only file listed in the dir flash0 command output confreg 0x2102 Use this command to set the configuration register so that after the next system reload or power cycle the router loads a system image from the boot system commands in the startup configuration file rommon gt confreg 0x2102 boot flash0 partition number filename Use this command to force the router to load the new system image rommon gt boot flash0 c2900 universalk9 mz binT After the system loads the new system image press Return a few times to display the Cisco IOS CLI prompt enable Use this command to enable privileged EXEC mode and enter your password if prompted Router gt enable Password lt password gt Router configure terminal Use this command to enter global configuration mode Router configure terminal Router config no boot system Eliminate all entries in the bootable image list which specifies the system image that the router loads at startup Router config no boot system If the new system image is the first file or only the file displayed
183. ROM Monitor Typical Tasks ELOAD Reload requested by console Reload Reason Reload RELEASE SOFTWARE fcl Technical Support http www cisco com techsupport Copyright c 2009 by cisco Systems ine Total memory size 2560 MB On board 512 MB DIMMO 2048 MB C2911 platform with 2621440 Kbytes of main memory Main memory is configured to 72 72 On board DIMM0 bit mode with ECC enabled Readonly ROMMON initialized rommon 1 gt What to Do Next Proceed to the Displaying Commands and Command Syntax in ROM Monitor Mode help section on page C 7 Displaying Commands and Command Syntax in ROM Monitor Mode help This section describes how to display ROM monitor commands and command syntax options SUMMARY STEPS 1 2 or help 2 command DETAILED STEPS Command or Action Purpose Step1 or help Example rommon 1 gt Example rommon 1 gt help Displays a summary of all available ROM monitor commands Step2 command Example rommon 16 gt display Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Displays syntax information for a ROM monitor command I OL 20696 04 lt Appendix C HI Howto Use the ROM Monitor Typical Tasks Examples Sample Output for the help ROM Monitor Command rommon 1 gt help alias set and display aliases command boot boot
184. Router config enable secret greentree Specifies an additional layer of security over the enable password command e Do not use the same password that you entered in Step 3 end Example Router config end Returns to privileged EXEC mode enable Example Router gt enable Enables privileged EXEC mode e Verify that your new enable or enable secret password works end Example Router config end Optional Returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix A Cisco 10S CLI for Initial Configuration Using the Cisco 10S CLI to Perform Initial Configuration W Configuring the Console Idle Privileged EXEC Timeout This section describes how to configure the console line s idle privileged EXEC timeout By default the privileged EXEC command interpreter waits 10 minutes to detect user input before timing out When you configure the console line you can also set communication parameters specify autobaud connections and configure terminal operating parameters for the terminal that you are using For more information on configuring the console line see the Configuring Operating Characteristics for Terminals chapter in Cisco IOS Configuration Fundamentals Configuration Guide and Troubleshooting Fault Management and Logging chapter in the C
185. S Command Purpose Step1 configure terminal Enters global configuration mode Step2 no boot mode button Disables the access point s mode button Step3 end Returns to privileged EXEC mode Note It is not necessary to save the configuration You can check the status of the mode button by executing the show boot or show boot mode button command in privileged EXEC mode The status does not appear in the running configuration The following shows typical responses to the show boot and show boot mode button commands ap show boot BOOT path list flash c1200 k9w7 mx v123_7_ja 20050430 c1200 k9w7 mx v123_7_ja 20050430 Config file flash config txt Private Config file flash private config Enable Break no Manual boot no Mode button on Enable IOS break no HELPER path list NVRAM Config file buffer size 32768 ap show boot mode button on apt Note As long as the privileged EXEC password is known you can use the boot mode button command to restore the mode button to normal operation Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Preventing Unauthorized Access to Your Access Point W Preventing Unauthorized Access to Your Access Point You can prevent unauthorized users from reconfiguring the wireless device and viewing configuration information Typic
186. SRs have introduced new slots on the chassis The first column in Table 3 lists the new slot names The second column lists the corresponding old slot names Modules previously inserted in the old slots now insert in the new slots with the help of an adapter card For instance network modules NMs enhanced network modules NMEs and extension voice modules EVMs use an adapter or carrier card to insert into the SM slot See your router s hardware installation guide for adapter information Table 3 New Slot Names and Old Slot Names New Slot Names Old Slot Names EHWIC HWIC HWIC DW WIC VWIC VIC ISM AIM PVDM3 PVDM SM NM NME EVM SPE 1 AIM is not supported in this release See your hardware installation guide for more information 2 The SPE is available only on the Cisco 3900 series ISRs Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Overview of the Hardware and Software New Slots and Ports by Platform W New Slots and Ports by Platform This section provides the type and number of the slots and ports available in the Cisco 3900 series 2900 series and 1900 series ISRs e Cisco 3900 Series ISRs page 5 e Cisco 2900 Series ISRs page 5 e Cisco 1900 Series ISRs page 6 Cisco 3900 Series ISRs Table 4 lists the slots and ports available on Cisco 3900 series rout
187. Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide This example shows how to configure Ethernet CFM for single tagged packets I OL 20696 04 i Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou Rou ter gt enable ter configure terminal ter config ethernet cfm ieee ter config ethernet cfm global ter config ethernet cfm domain customer level 7 ter config ecfm service customer1101 vlan 100 direction down ter config ecfm srv continuity check ter config interface gigabitethernet 0 2 ter config if ethernet cfm mep domain customer mpid 100 service customer1101 ter config if ecfm mep interface gigabitethernet 0 2 1 ter config subif encapsulation dotiq 100 ter config subif end Verifying the Ethernet CFM Configuration for Single Tagged Packets Use the following commands to verify Ethernet CFM configured for single tagged packets show ethernet cfm domain show ethernet cfm maintenance points local show ethernet cfm maintenance points remote show ethernet cfm error configuration Use the show ethernet cfm domain command to display the maintenance point domains configured in the network In the following example customer enterprise and carrier maintenance point domains are configured Router
188. Step7 interface cellular 0 Specifies the cellular interface Example Router config interface cellular 0 Step8 dialer string string CDMA only dialer string string specifies the or dialer group dialer group number Example Router config if dialer string cdma cdma Example Router config if dialer group 2 wee sm NAR dialer script The dialer script is defined by using the chat script command GSM only dialer group dialer group number maps a dialer list to the dialer interface Configuring DDR Backup Using Floating Static Route To configure a floating static default route on the secondary interface use the following commands beginning in global configuration mode amp Note Make sure you have IP classless enabled on your router SUMMARY STEPS 1 configure terminal 2 ip route network number network mask ip address interface administrative distance name name OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces DETAILED STEPS Command or Action Purpose Step1 configure terminal Enters global configuration mode from the terminal Example Router configure terminal Step2 lip route network number network mask ip address Establishes a floating static route with the
189. Support on Routed Port and Port MEP IEEE Connectivity Fault Management CFM is an end to end per service Ethernet layer Operations Administration and Maintenance OAM protocol CFM includes proactive connectivity monitoring fault verification and fault isolation for large Ethernet metropolitan area networks MANs and WANs amp Note This feature is supported only if you have purchased the DATA technology package functionality datak9 licensing package For more information about managing software activation licenses on the Cisco ISR and Cisco ISR G2 platforms see http www cisco com en US docs routers access sw_activation SA_on_ISR html Restrictions for Configuring Ethernet CFM e A specific domain must be configured If it is not an error message is displayed e Multiple domains different domain names having the same maintenance level can be configured However associating a single domain name with multiple maintenance levels is not permitted Configuring Ethernet CFM Port MEP Complete these steps to configure and enable Ethernet CFM on a port Maintenance End Point MEP SUMMARY STEPS Step 1 enable Step2 configure terminal Step3 ethernet cfm ieee Step4 ethernet cfm global Step5 ethernet cfm domain domain name level value Step6 service service name port Step7 continuity check interval value Step8 end Step9 configure terminal Step10 interface gigabitethernet slot port Step11 ethernet cfm mep domain
190. T 38 Fax Relay technology Support of high speed modems V 32 and V 34 using Modem Relay technology Interface with Secure Telephony STU phones using Secure Telephony over IP standard technology Support for interfacing VoIP channel to Land Mobile Radio LMR networks Support for secure VoIP through the implementation of SRTP for both encryption and authentication of RTP packets Support for text telephony Baudot using Text Relay technology The DSP image for the PVDM3 also provides a complete set of features to implement the signal processing layer of an IP to IP gateway and an IP based conference server Highlights of this functionality include G 711 transcoding for implementing a LAN WAN gateway Universal Transcoding between any two voice codecs narrowband or wideband Trans scripting services for conversion between SRTP configurations or between secured and unsecured networks IP based voice conferencing including narrowband and wideband participants Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules DSP Farms Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers Mi DSP Farm is enhanced to support increased transcoding and conference density For DSPs on PVDM3 modules existing resource allocation and management mechanisms a
191. Under certain mis configuration situations it can be impossible to establish a console connection with the router due to a speed mismatch or other incompatibility The most obvious symptom is erroneous characters in the console display If a ROM monitor failure of this type occurs you may need to change a jumper setting on the motherboard so that the router can boot for troubleshooting Procedures for accessing the motherboard and jumper locations are described in the installation of internal components section of the hardware installation document for your router The jumper to be changed is DUART DFLT which sets the console connection data rate to 9600 regardless of user configuration The jumper forces the data rate to a known good value Do not manually reload or power cycle the router unless reloading or power cycling is required for troubleshooting a router crash The system reload or power cycle can cause important information to be lost that is needed for determining the root cause of the problem 1 stack or k context frame number sysret a a YS N meminfo I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks DETAILED STEPS Command or Action Purpose Step1 stack Optional Obtains a stack trace or e For detailed i
192. WN Interface GigabitEthernet0 0 changed state to up Nov 22 09 20 19 839 LINK 3 UPDOWN Interface GigabitEthernet0 1 changed state to down Nov 22 09 20 19 839 LINK 3 UPDOWN Interface GigabitEthernet0 2 changed state to down Nov 22 09 20 19 839 SLINEPROTO 5 UPDOWN Line protocol on Interface GigabitEthernet0 0 64 changed state to down Nov 22 09 20 19 839 LINEPROTO t5 UPDOWN Line protocol on Interface GigabitEthernet0 1 64 changed state Router gt What to Do Next If you want to configure the router to load a specified image at the next system reload or power cycle see the following documents e Booting Commands chapter of Cisco IOS Configuration Fundamentals Command Reference e Cisco IOS Configuration Fundamentals Configuration Guide Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 12 OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks i Modifying the Configuration Register confreg A This section describes how to modify the configuration register by using the confreg ROM monitor command You can also modify the configuration register setting from the Cisco IOS command line interface CLI by using the config register command in global configuration mode Caution Do not set the configuration register by using the config register 0x0 command after setting
193. a Plane Loopback feature The Cisco IOS Master Command List at http www cisco com en US docs ios mcl allreleasemcl all_book html provides more information about these commands Caution amp Because debugging output is assigned high priority in the CPU process it can diminish the performance of the router or even render it unusable For this reason use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff Note Before you run any of the debug commands listed in the following table ensure that you run the logging buffered debugging command and then turn off console debug logging using the no logging console command Table 2 debug Commands for Ethernet Data Plane Loopback Configuration debug Command Purpose debug elb pal pd all Displays all the debugging information about the Ethernet data plane loopback configuration debug elb pal pd error Displays debugging information about Ethernet data plane loopback configuration errors debug elb pal pd event Displays debugging information about Ethernet data plane loopback configuration changes I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP CFM
194. ace configuration mode see the Example section on page 73 exit Example Router config if exit Router config Exits interface configuration mode and enters global configuration mode interface type number Example Router config interface Dialer 3 Router config if Creates dialer interface and enters configuration mode for the dialer interface dialer watch group group number Example Router config if dialer watch group 1 Router config if Specifies the group number for the dialer watch list exit Example Router config if exit Router config Exits interface configuration mode and enters global configuration mode ip nat inside source list access list number interface type number pool name overload Example Router config ip nat inside source list 101 interface Dialer 3 overload Enables dynamic translation of addresses on the inside interface I OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management W Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port Command Purpose Step11 ip route prefix mask ip address interface type Sets the IP route to point to the dialer interface number ip address interface as a default gateway Example Router config ip route 0 0 0 0 0 0 0 0 22 0 0 2 Router config Step12 access list access list number deny permit source D
195. ace gigabitethernet slot port Specifies an interface and enters the interface Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Example Router config ecfm srv interface gigabitethernet 0 2 configuration mode I OL 20696 04 E Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP Command Purpose Step 9 ethernet cfm mep domain domain name mpid mpid value service service name Example Router config if ethernet cfm mep domain customer mpid 100 service customer1101 Sets a port to a maintenance domain and defines it as an MEP Note The values for domain and service must be the same as the values configured for CFM MPID Specifies the maintenance endpoint identifier Step 10 interface gigabitethernet slot port subinterface Example Router config if ecfm mep interface gigabitethernet 0 2 1101 Specifies a subinterface and enters the subinterface configuration mode Step 11 encapsulation dotlq vlan id second dotiq inner vlan id Example Router config subif encapsulation dotiq 100 second dotiq 30 Defines the encapsulation format as IEEE 802 1Q dotlq and specifies the VLAN identifier Use the second dotlq keyword and the inner vlan id argument to specify the VLAN tag Step 12 end Exa
196. adar signals on the channel The following sample messages are displayed on the access point console showing the beginning and end of the CAC scan Mar 6 07 37 30 423 DOT11 6 DFS_SCAN_START DFS Scanning frequency 5500 MHz for 60 seconds Mar 6 07 37 30 385 DOT11 6 DFS_SCAN_COMPLETE DFS scan complete on frequency 5500 MHz When operating on any of the DFS channels listed in Table 2 in addition to performing the CAC the access point constantly monitors the channel for radar If radar is detected the access point stops forwarding data packets within 200 ms and broadcasts five beacons that include an 802 11h channel switch announcement indicating the channel number that the access point begins using The following example message displays on the access point console when radar is detected Mar 6 12 35 09 750 DOT11 6 DFS_TRIGGERED DFS triggered on frequency 5500 MHz When radar is detected on a channel that channel may not be used for 30 minutes The access point maintains a flag in non volatile storage for each channel that it detects radar on in the last 30 minutes After 30 minutes the flag is cleared for the corresponding channel If the access point is rebooted before a flag is cleared the non occupancy time is reset to 30 minutes when the channel initializes Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 mw 235 Chapter Config
197. address of 210 110 101 1 VPN client Another router which controls access to the corporate network LAN interface Connects to the corporate network with inside interface address of 10 1 1 1 Corporate office network IPSec tunnel with GRE oOo co nn oc on S N For more information about IPSec and GRE configuration see the Configuring Security for VPNs with IPSec chapter of Cisco IOS Security Configuration Guide Secure Connectivity Release 12 4T at http www cisco com en US docs ios sec_secure_connectivity configuration guide 12_4t sec_secure_connectivity_12_4t_book html Configuration Examples Each example configures a VPN over an IPSec tunnel using the procedure given in the Configure a VPN over an IPSec Tunnel section on page 94 Then the specific procedure for a remote access configuration is given followed by the specific procedure for a site to site configuration I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide gy Chapter Configuring Security Features WE Configuring VPN The examples shown in this chapter apply only to the endpoint configuration on the Cisco 3900 series 2900 series and 1900 series ISRs Any VPN connection requires both endpoints to be properly configured in order to function See the software configuration documentation as needed to configure VPN for
198. aining system images http www cisco com en US docs ios fundamentals configuration guide cf_system_images html Removing inserting and upgrading compact flash memory cards Hardware installation guide for your router Connecting your PC to the router console port Technical Assistance Description Hardware installation guide for your router Link Technical Assistance Center TAC home page containing 30 000 pages of searchable technical content including links to products technologies solutions technical tips and tools Registered Cisco com users can log in from this page to access even more content http www cisco com public support tac home shtml 1 You must have an account at Cisco com If you do not have an account or have forgotten your username or password click Cancel at the login dialog box and follow the instructions that appear Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Wireless Device Overview Wireless devices also known as access points provide a secure affordable and easy to use wireless LAN solution that combines mobility and flexibility with the enterprise class features required by networking professionals When configured as an access point the wireless device serves as the connection point between wireless and wired networks or as the center point of a stand alone wire
199. allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 645 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 Slot 0 Device idx 1 PVDM Slot 0 Dsp Type SP2600 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 EEN Chapter Configuring Next Generation High Density PVDM3 Modules HZ How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways dsp 7 State UP firmware 26 0 135 Max signal voice channel 32 32 Max credits 480 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 465 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 1 Credits used rounded up 15 Voice channels Ch01 voice port 0 1 1 23 1 codec g7llalaw credits allocated 15 Slot 0 Device idx 0 PVDM Slot 1 Dsp Type SP2600 DSP groups on slot 1 DSP groups on slot 2 dsp 1 State UP firmware 26 0 133 Max signal voice channel 16 16 Max credits 240 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 240 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 dsp
200. ally the network administrators must have access to the wireless device while restricting access to users who connect through a terminal or workstation from within the local network To prevent unauthorized access to the wireless device configure one of these security features e Username and password pairs which are locally stored on the wireless device These pairs authenticate each user before the user can access the wireless device You can also assign a specific privilege level read only or read write to each username and password pair For more information see the Configuring Username and Password Pairs section on page 261 The default username is Cisco and the default password is Cisco Usernames and passwords are case sensitive amp Note The characters TAB and are invalid characters for passwords e Username and password pairs are stored centrally in a database on a security server For more information see the Controlling Access Point Access with RADIUS section on page 265 Protecting Access to Privileged EXEC Commands amp A simple way of providing terminal access control in your network is to use passwords and assign privilege levels Password protection restricts access to a network or network device Privilege levels define what commands users can issue after they have logged in to a network device Note For complete syntax and usage information for the commands used in this section
201. ance N A Direction External Time out sec none Status on Start time 10 17 46 930 UTC Mon Oct 21 2013 Time left N A Dot1q Dotlad s 100 Second dotiq s 1101 Source Mac Address Any Destination Mac Address Any Ether Type Any Class of service Any Llc oui Any Total Active Session s 1 Total Internal Session s Total External Session s s 0 s 1 Use the show ethernet loopback active command to display the summary of the active loopback sessions on the main interface Router show ethernet loopback permitted Loopback Session ID 1 Interface GigabitEthernet0 2 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 32 OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Ethernet Data Plane Loopback Wi Service Instance N A Direction External Time out sec none Status on Start time 10 14 23 507 UTC Mon Oct 21 2013 Time left N A Dot1iq Dotlad s 1 100 Second dotiq s 1 1101 Source Mac Address Any Destination Mac Address Any Ether Type Any Class of service Any Llc oui Any Total Active Session s 1 Total Internal Session s 0 s Total External Session s 1 Troubleshooting the Ethernet Data Plane Loopback Configuration A Table 2 lists the debug commands to troubleshoot issues pertaining to the Ethernet Dat
202. and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP Total Remote MEPs 4 Use the show ethernet cfm maintenance points remote command to view the details of a remote maintenance point domain On router 1 Routerl show ethernet cfm maintenance points remote domain carrier service carrier MPID Domain Name Lvl Domain ID RDI MA Name EVC Name Local MEP Info 43 carrier 2 carrier carrier N A MPID 44 Domain Total Remote MEPs 1 On router 2 carrier MA MacAddress IfSt Pest Ingress Type Id SrvciInst Age 5657 a86c fa92 Up Up Gi0 2 S C 100 1101 N A Os carrier Router2 show ethernet cfm maintenance points remote domain carrier service carrier MPID Domain Name Lvl Domain ID RDI MA Name EVC Name Local MEP Info 44 carrier 2 carrier carrier N A MPID 43 Domain carrier MA MacAddress IfSt PESE Ingress Type Id SrvcInst Age 5657 9945 04fa Up Up Gi0 2 S C 100 1101 N A 0s carrier Use the ping command to verify if Loopback Messages LBM and Loopback Replies LBR are successfully sent and received between the routers Routerl ping ethernet mpid 44 domain carrier service carrier cos 5 Type escape sequence to abort Ethernet CFM loopback messages to 5657 a86c fa92 5 5 Sending 5 Success rate
203. and in privileged EXEC mode To indicate a file that is stored in a CF memory card precede the filename with flash1 or flash0 amp Note Use flash1 in the command syntax to access CF in slot 1 Use flasho in the command syntax to access CF in slot 0 Examples Copying Files In the following example the file my config1 on the CF memory card is copied into the startup config file in the system memory Router copy flashO my configl startup config Destination filename startup config OK 517 bytes copied in 4 188 secs 129 bytes sec wi Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Appendix B Using CompactFlash Memory Cards File Operations on CompactFlash Memory Cards W In the following example the file my config2 on the CF memory card is copied into the running config file in the system memory Router copy flashO my config2 running config Destination filename running config 709 bytes copied in 0 72 secs Displaying Files To display a list of files on a CF memory card enter the dir flash0 command in privileged EXEC mode amp Note Use flash1 in the command syntax to access CF in slot 1 Use flasho in the command syntax to access CF in slot 0 Router dir flash0 Directory of flash0 1580 rw 6462268 Mar 06 2004 06 14 02 c2900 universalk9 mz data 3 Yw 6458388 Mar 01 2004
204. antenna on the wireless device s left connector you should use this setting for both receive and transmit When you look at the wireless device s back panel the left antenna is on the left To select the antennas that the wireless device uses to receive and transmit data follow these steps beginning in privileged EXEC mode 1 configure terminal 2 interface dotilradio 0 1 3 gain dB 4 antenna receive diversity left right 5 antenna transmit diversity left right 6 end 7 copy running config startup config Command Purpose configure terminal Enters global configuration mode interface dotllradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 gain dB Specifies the resultant gain of the antenna attached to the device Enter a value from 128 to 128 dB If necessary you can use a decimal point in the value such as 1 5 antenna receive diversity left right Sets the receive antenna to diversity left or right Note For best performance with two antennas leave the receive antenna setting at the default setting diversity For one antenna attach the antenna on the right and set the antenna for right Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter C
205. arn the name of the system image file and the use of the copy flashOlflash1 tftp privileged EXEC command to copy the system image c3900 2is mz to a TFTP server The router uses the default username and password Router show flash0 flash1 System flash directory File Length Name status 1 4137888 c3900 c2is mz 4137952 bytes used 12639264 available 16777216 total 16384K bytes of processor board System flash Read Write Router copy flash0 flash1 tftp IP address of remote host 255 255 255 255 172 16 13 110 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ES AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration filename to write on tftp host c3600 c2is mz writing c3900 c2is mz successful ftp write Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide A 18 OL 20696 04 APPENDIX B Using CompactFlash Memory Cards Cisco 3900 Series 2900 Series and 1900 Series Integrated Services Routers ISR use Advanced Capability CompactFlash CF external memory to store the system image configuration files and some software data files CF supports True IDE mode and Multi Word DMA mode The following sections explain how to manage directories and files on the CF e Requirements an
206. as number 2 network ip address 3 end Command Purpose router eigrp as number Example Router config router eigrp 109 Router config Enters router configuration mode and enables EIGRP on the router The autonomous system number identifies the route to other EIGRP routers and is used to tag the EIGRP information network ip address Example Router config network 192 145 1 0 Router config network 10 10 12 115 Router config Specifies a list of networks on which EIGRP is to be applied using the IP address of the network of directly connected networks end Example Router config router end Router Exits router configuration mode and enters privileged EXEC mode I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Basic Router Configuration WE Configuring Dynamic Routes Example The following configuration example shows the EIGRP routing protocol enabled in IP networks 192 145 1 0 and 10 10 12 115 The EIGRP autonomous system number is 109 To see this configuration use the show running config command beginning in privileged EXEC mode Router show running config router eigrp 109 network 192 145 1 0 network 10 10 12 115 Verifying Configuration To verify that you have properly configured IP EIGRP enter the show ip route command and look for E
207. asic on the 802 11b 2 4 GHz radio Enter basic 1 0 basic 2 0 basic 5 5 basic 6 0 basic 9 0 basic 11 0 basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 and basic 54 0 to set these data rates to basic on the 802 11g 2 4 GHz radio Note If the client must support the basic rate that you select it cannot associate to the wireless device If you select 12 Mb s or higher for the basic data rate on the 802 11g radio 802 11b client devices cannot associate to the wireless device 802 11g radio Enter basic 6 0 basic 9 0 basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 and basic 54 0 to set these data rates to basic on the 5 GHz radio e Optional Enter range or throughput or ofdm throughput no ERP protection to automatically optimize radio range or throughput When you enter range the wireless device sets the lowest data rate to basic and sets the other rates to enabled When you enter throughput the wireless device sets all data rates to basic Optional On the 802 11g radio enter speed throughput ofdm to set all OFDM rates 6 9 12 18 24 36 and 48 to basic required and to set all the CCK rates 1 2 5 5 and 11 to disabled This setting disables 802 11b protection mechanisms and provides maximum throughput for 802 11g clients However it prevents 802 11b clients from associating to the access point e Optional Enter default to set the data rates to factory default settings not supported on 802
208. ast messages Unicast messages are addressed to one device on the network Multicast messages are addressed to multiple devices on the network Cipher suites are sets of encryption and integrity algorithms designed to protect radio communication on your wireless LAN You must use a cipher suite to enable Wi Fi Protected Access WPA or Cisco Centralized Key Management CCKM Cipher suites that contain TKIP provide the best security for your wireless LAN Cipher suites that contain only WEP are the least secure See Configuring WEP and Cipher Suites for encryption procedures http www cisco com en US docs routers access wireless software guide SecurityCipherSuitesWEP html Configuring Wireless VLANs If you use VLANs on your wireless LAN and assign SSIDs to VLANs you can create multiple SSIDs by using any of the four security settings defined in the Security Types section on page 213 A VLAN can be thought of as a broadcast domain that exists within a defined set of switches A VLAN consists of a number of end systems either hosts or network equipment such as bridges and routers connected by a single bridging domain The bridging domain is supported on various pieces of network equipment such as LAN switches that operate bridging protocols between them with a separate group of protocols for each VLAN See Configuring Wireless VLANs at Cisco com for more about wireless VLAN architecture http www cisco com en US docs routers access
209. ation http www cisco com en US docs interfaces_modules services_modules ax 1 0 developer guide axpdev html The Cisco 3900 series and Cisco 2900 series ISRs support the following application interfaces e TAPI page 142 e AXL page 142 e Gatekeeper Transaction Message Protocol GKTMP page 142 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Unified Communications on Cisco Integrated Services Routers HZ Online Insertion and Removal TAPI AXL The standard Cisco Unified TAPI provides an unchanging programming interface for different implementations The goal of Cisco in implementing TAPI for the Cisco Unified Communications Manager platform remains to conform as closely as possible to the TAPI specification while providing extensions that enhance TAPI and expose the advanced features of Cisco Unified Communications Manager to applications See Basic TAPI Implementation at Cisco com for information http www cisco com en US docs voice_ip_comm cucm tapi_dev 7_0_1 tpdevch4 html The AXL API provides a mechanism for inserting retrieving updating and removing data from the Cisco Unified Communications Manager database by using an eXtensible Markup Language XML Simple Object Access Protocol SOAP interface This approach allows a programmer to access the database by using XML and receive the data in XML form instead
210. ation in number of days e optional hours configure the lease duration in number of hours e optional minutes configure the lease duration in number of minutes e infinite set the lease duration to infinite I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Chapter Administering the Wireless Device HZ Configuring the Access Point to Provide DHCP Service Step 6 Step 7 Step 8 Step 9 Command Purpose default router address address2 address 8 Specifies the IP address of the default router for DHCP clients on the subnet One IP address is required however you can specify up to eight addresses in one command line end Returns to privileged EXEC mode show running config Verifies your entries copy running config startup config Optional Saves your entries in the configuration file Use the no forms of these commands to return to default settings The following example shows how to configure the wireless device as a DHCP server how to exclude a range of IP address and how to assign a default router AP configure terminal AP config ip dhcp excluded address 172 16 1 1 172 16 1 20 config ip dhcp pool wishbone AP AP dhcp config AP dhcp config AP dhcp config AP dhcp config end network 172 16 1 0 255 255 255 0 lease 10 default router 172 16 1 1
211. ation mode Step2 interface dotilradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 Step3 packet retries value Sets the maximum data retries Enter a setting from 1 to 128 Step4 end Returns to privileged EXEC mode Step5 copy running config startup config Optional Saves your entries in the configuration file Use the no form of the packet retries command to reset the setting to the default Configuring the Fragmentation Threshold The fragmentation threshold determines the size at which packets are fragmented sent as several pieces instead of as one block Use a low setting in areas where communication is poor or where there is a great deal of radio interference The default setting is 2346 bytes To configure the fragmentation threshold follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal interface dotllradio 01 1 fragment threshold value end CrP 0N copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 250 OL 20696 04 Chapter Configuring Radio Settings DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Enabling Short Slot Time for 802 11g Radios W Command Purpose configure terminal Enters global configuration mode interface dot1lradio
212. ator Guide Setting up the Network Setting up Cisco Unified IP Phones Setting up Call Handling Configuring Additional Call Features Setting up Secure SRST Integrating Voice Mail with Cisco Unified SRST For SIP specific SRST information see Cisco Unified SIP SRST System Administrator Guide To configure SIP SRST features see the Cisco Unified SIP SRST 4 1 chapter Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Unified Communications on Cisco Integrated Services Routers HZ Call Control Protocols Cisco Unified SIP Proxy CUSP Gatekeeper The Cisco Unified SIP Proxy CUSP is a high performance highly available Session Initiation Protocol SIP server for centralized routing and SIP signaling normalization By forwarding requests between call control domains the Cisco Unified SIP Proxy provides the means for routing sessions within enterprise and service provider networks To configure CUSP features see Configuring Cisco Unified SIP Proxy Version 1 1 3 for an Enterprise Network at http www cisco com en US docs voice_ip_comm cusp rel1_1_3 configuration guide cuspgd113 html An H 323 Gatekeeper is an optional node in an H 323 network that manages endpoints such as H 323 terminals gateways and Multipoint Control Units MCUs as well as Cisco Unified Communications
213. basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 basic 54 0 range throughput ofdm throughput default 802 11n 2 4 GHz radio 1 0 11 0 12 0 18 0 2 0 24 0 36 0 48 0 5 5 54 0 6 0 9 0 basic 1 0 basic 11 0 basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 basic 5 5 basic 54 0 basic 6 0 basic 9 0 default m0 7 m0 m1 m10 m11 m12 m13 m14 m15 m2 m3 m4 m5 m6 m7 m8 15 m8 m9 ofdm only ofdm range throughput 802 11n 5 GHz radio 12 0 18 0 24 0 36 0 48 0 54 0 6 0 9 0 basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 basic 54 0 basic 6 0 basic 9 0 default m0 7 m0 m1 m10 m11 m12 m13 m14 m15 m2 m3 m4 m5 m6 m7 m8 15 m8 m9 range throughput Sets each data rate to basic or enabled or enters range to optimize range or enters throughput to optimize throughput e Optional Enter 1 0 2 0 5 5 and 11 0 to set these data rates to enabled on the 802 11b 2 4 GHz radio Enter 1 0 2 0 5 5 6 0 9 0 11 0 12 0 18 0 24 0 36 0 48 0 and 54 0 to set these data rates to enabled on the 802 11g 2 4 GHz radio Enter 6 0 9 0 12 0 18 0 24 0 36 0 48 0 and 54 0 to set these data rates to enabled on the 5 GHz radio e Optional Enter basic 1 0 basic 2 0 basic 5 5 and basic 11 0 to set these data rates to b
214. be a dial tone when a telephone is lifted However when DSP oversubscription occurs and a caller goes off hook dead air is received With this feature the caller receives a fast busy tone instead of silence This feature is not supported on application controlled endpoints Foreign Exchange Office FXO signaling endpoints and BRI and Primary Rate Interface PRI endpoints The following lists the maximum number of different fast busy tone specific to country that can be supported by each PVDM type e PVDM3 16 1 e PVDM3 32 1 e PVDM3 64 2 e PVDM3 128 3 e PVDM3 192 3 e PVDM3 256 3 Prior to Cisco IOS Release 15 0 1 M a new call attempt failed and dead silence occurred when DSPs were oversubscribed When the PVDM3 is installed a fast busy tone is broadcast to session application endpoints when DSP oversubscription occurs for both analog ports and digital ports except PRI and BRI FXO signaling and application controlled endpoints are not supported This feature does not apply to insufficient DSP credits due to mid call codec changes while a call is already established Online Insertion and Removal Cisco 3900 Series ISRs support only managed online insertion and removal All voice ports and controllers should be shut down Transcoding conferencing and MTP DSPfarm profiles need to be shut down in addition to the controller and voice port shutdown Also remove the DSP sharing that is DSO group and DSPfarm sharing If the power
215. be response gratuitous period 30 speed 12 0 Use the no form of the command to disable the GPR feature Disabling and Enabling Aironet Extensions By default the wireless device uses Cisco Aironet 802 11 extensions to detect the capabilities of Cisco Aironet client devices and to support features that require specific interaction between the wireless device and associated client devices Aironet extensions must be enabled to support these features Load balancing Wireless device uses Aironet extensions to direct client devices to an access point that provides the best connection to the network on the basis of such factors as number of users bit error rates and signal strength Message Integrity Check MIC MIC is an additional WEP security feature that prevents attacks on encrypted packets called bit flip attacks The MIC implemented on the wireless device and all associated client devices adds a few bytes to each packet to make the packets tamper proof Cisco Key Integrity Protocol CKIP Cisco s WEP key permutation technique is based on an early algorithm presented by the IEEE 802 1 1i security task group The standards based algorithm Temporal Key Integrity Protocol TKIP does not require Aironet extensions to be enabled World mode legacy only Client devices with legacy world mode enabled receive carrier set information from the wireless device and adjust their settings automatically Aironet extensions are not required for
216. caching When ARP caching is optional the wireless device responds on behalf of clients with IP addresses known to the wireless device but forwards out of its radio port any ARP requests addressed to unknown clients When the wireless device learns the IP addresses for all associated clients it drops ARP requests not directed to its associated clients Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 296 OL 20696 04 Chapter Administering the Wireless Device Configuring Multiple VLAN and Rate Limiting for Point to Multipoint Bridging W Configuring ARP Caching To configure the wireless device to maintain an ARP cache for associated clients follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 dotl1 arp cache optional 3 end 4 show running config 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 dotl1l arp cache optional Enables ARP caching on the wireless device e Optional Use the optional keyword to enable ARP caching only for the client devices whose IP addresses are known to the wireless device Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file The
217. capsulation Sets the encapsulation transformation method to RFC 1042 snap dotih snap or 802 1h dotih the default setting end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Enabling and Disabling Public Secure Packet Forwarding amp Public Secure Packet Forwarding PSPF prevents client devices that are associated to an access point from inadvertently sharing files or communicating with other client devices that are associated to the access point PSPF provides Internet access to client devices without providing other capabilities of a LAN This feature is useful for public wireless networks like those installed in airports or on college campuses Note SUMMARY STEPS To prevent communication between clients associated to different access points you must set up protected ports on the switch to which the wireless devices are connected See the Configuring Protected Ports section on page 247 for instructions on setting up protected ports To enable and disable PSPF using command line interface CLI commands on the wireless device you use bridge groups You can find a detailed explanation of bridge groups and instructions for implementing them in this document e Cisco IOS Bridging and IBM Networking Configuration Guide Release 12 2 Click this link to browse to the Configuring Transparent Bridging chapter http www cisco com en
218. ce data module 2 MGF Multi Gigabit Fabric 3 CF CompactFlash Conventions This document uses the following conventions amp Convention bold font Indication Commands and keywords and user entered text appear in bold font italic font values are in italic font Document titles new or emphasized terms and arguments for which you supply Elements in square brackets are optional xlylz Required alternative keywords are grouped in braces and separated by vertical bars xlylz Optional alternative keywords are grouped in brackets and separated by vertical bars string A nonquoted set of characters Do not use quotation marks around the string or the string will include the quotation marks courier font Terminal sessions and information the system displays appear in courier font lt gt Non printing characters such as passwords are in angle brackets Default responses to system prompts are in square brackets eg indicates a comment line An exclamation point or a pound sign at the beginning of a line of code Note P Means reader take note Tip A Means the following information will help you solve a problem Caution Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Means reader be careful In this situation you might perform an a
219. ce goes down When the primary interface goes down the floating static route is used See the Configuring DDR Backup Using Floating Static Route section on page 63 e Cellular Wireless Modem To configure the 3G wireless modem as backup with Network Address Translation NAT and IPSec on either Global System for Mobile Communications GSM or code division multiple access CDMA networks see Cellular Wireless Modem as Backup with NAT and IPSec Configuration section on page 64 amp Note serial interface You cannot configure a backup interface for the cellular interface or any other asynchronous I OL 20696 04 i Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces Configuring DDR Backup Using Dialer Watch To initiate dialer watch you must configure the interface to perform dial on demand routing DDR and backup Use traditional DDR configuration commands such as dialer map for DDR capabilities To enable dialer watch on the backup interface and create a dialer list use the following commands in interface configuration mode SUMMARY STEPS 1 configure terminal 2 interface type number 3 dialer watch group group number 4 dialer watch list group number ip ip address address mask 5 dialer list dialer group protocol protocol name permit deny list access list number access group 6 ip access list access list number permit ip source add
220. cess point or wireless device has no configuration until it associates to a controller The configuration on the wireless device can be modified by the controller only when the networking is up and running The controller manages the wireless device configuration firmware and control transactions such as 802 1x authentication All wireless traffic is tunneled through the controller Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 SEN Chapter Wireless Device Overview W Management Options See Why Migrate to a Cisco Unified Wireless Network at Cisco com for more about this network architecture design http www cisco com en US prod collateral wireless ps5678 ps652 1 product_at_a_glance090 Oaecd805df476 pdf Management Options The wireless device runs its own version of Cisco IOS software that is separate from the Cisco IOS software operating on the router You can configure and monitor the access point with several different tools e Cisco IOS software command line interface CLI e Simple Network Management Protocol SNMP e Web browser interface http cisco com en US docs wireless access_point 12 4_10b_JA configuration guide scg12410b chap2 gui html Note The web browser interface is fully compatible with Microsoft Internet Explorer version 6 0 on Windows 98 2000 and XP platforms and with Netscape version 7 0 on Window
221. cisco com en US docs ios voice h323 configuration guide 12_4t vh_12_4t_book html I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Unified Communications on Cisco Integrated Services Routers W Unified Communications Gateways Cisco Unified Border Element Cisco Unified Border Element Cisco UBE is a session border controller that provides the necessary services for interconnecting independent Unified Communications networks securely flexibly and reliably Media packets can flow either through the gateway thus hiding the networks from each other or around the border element if so configured The Cisco UBE is typically used to connect enterprise networks to service provider SIP trunks or to interconnect different nodes in an enterprise network where protocol or feature incompatibilities exist or where extra secure demarcation between segments of the network is needed The Cisco Unified Border Element provides the following network to network interconnect capabilities e Session Management Real time session setup and tear down services call admission control ensuring QoS routing of calls if an error occurs statistics and billing e Interworking H 323 and SIP protocol conversion SIP normalization DTMF conversion transcoding codec filtering e Demarcation Point of fault isolation topology hiding establishing a
222. co 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration 6 end 7 show ip route DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 configure terminal Enters global configuration mode Example Router configure terminal Step3 ip routing Enables IP routing Example Router config ip routing Step4 ip route dest prefix mask next hop ip address Establishes a static route admin distance permanent Example Router config ip route 192 168 24 0 255 25525507172 728992 Step5 ip default network network number Selects a network as a candidate route for computing the a gateway of last resort ip route dest prefix mask next hop ip address Creates a static route to network 0 0 0 0 0 0 0 0 for computing the gateway of last resort Example Router config ip default network 192 168 24 0 Example Router config ip route 0 0 0 0 0 0 0 0 172 28 99 1 Step6 end Returns to privileged EXEC mode Example Router config end Step7 show ip route Displays the current routing table information e Verify that the gateway of last resort is set Example Router show ip route Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide A 10 OL 20696 04 Appendix A
223. co 10S Image Step7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 show version Use this command to display the configuration register setting Router show version Cisco Internetwork Operating System Software coneigusabion register is 0x0 Router If the last digit in the configuration register is 0 or 1 proceed to Step 9 However if the last digit in the configuration register is between 2 and F proceed to Step 12 configure terminal Use this command to enter global configuration mode Router configure terminal Router config config register 0x2102 Use this command to set the configuration register so that after the next system reload or power cycle the router loads a system image from the boot system commands in the startup configuration file Router config config register 0x2102 exit Use this command to exit global configuration mode Router config exit Router copy run start Use this command to copy the running configuration to the startup configuration Router copy run start reload Use this command to reload the operating system Router reload When prompted to save the system configuration enter no System configuration has been modified Save yes no no Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco IOS Software
224. co 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ES AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration Saving Your Router Configuration This section describes how to avoid losing your configuration at the next system reload or power cycle by saving the running configuration to the startup configuration in NVRAM The NVRAM provides 256KB of storage on the router SUMMARY STEPS 1 enable 2 copy running config startup config DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 copy running config startup config Saves the running configuration to the startup configuration Example Router copy running config startup config Saving Backup Copies of Configuration and System Image To aid file recovery and minimize downtime in case of file corruption we recommend that you save backup copies of the startup configuration file and the Cisco IOS software system image file on a server SUMMARY STEPS 1 enable 2 copy nvram startup config ftp rep tftp 3 show flash0 flash1 4 copy flash0 flash1 ftp rep tftp Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide A 16 OL 20696 04 Appendix A Cisco 10S CLI
225. col source addr source mask destination addr destination mask Named Standard ip access list standard name deny source source wildcard any Extended ip access list extended name permit deny protocol source addr source mask any destination addr destination mask any To create refine and manage access lists see the following sections of the Access Control Lists section of Cisco IOS Security Configuration Guide Securing the Data Plane Release 12 4T at http www cisco com en US docs ios sec_data_plane configuration guide 12_4t sec_data_plane_12_4t_book html e Creating an IP Access List and Applying It to an Interface e Creating an IP Access List to Filter IP Options TCP Flags Noncontiguous Ports or TTL Values e Refining an IP Access List e Displaying and Clearing IP Access List Data Using ACL Manageability Access Groups An access group is a sequence of access list definitions bound together with a common name or number An access group is enabled for an interface during interface configuration Use the following guidelines when creating access groups e The order of access list definitions is significant A packet is compared against the first access list in the sequence If there is no match that is if neither a permit nor a deny occurs the packet is compared with the next access list and so on e All parameters must match the access list before the packet is permitted or denied e There
226. config startup config Command Purpose configure terminal Enters global configuration mode interface dotllradio 0 1 Enters interface configuration mode for the radio interface The 2 4 GHz and the 802 11g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 11n 5 GHz radio is radio 1 power local Sets the transmit power for the radio or the 5 GHz radio so that the power level is allowed in your regulatory domain These options are available for the 2 4 GHz 802 11n radio in dBm 81 9111114115117 maximum end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Use the no form of the power local command to return the power setting to maximum the default setting Limiting the Power Level for Associated Client Devices amp You can also limit the power level on client devices that associate to the wireless device When a client device associates to the wireless device the wireless device sends the maximum power level setting to the client Note Cisco AV VID documentation uses the term Dynamic Power Control DPC to refer to limiting the power level on associated client devices To specify a maximum allowed power setting on all client devices that associate to the wireless device follow these steps beginning in privileged EXEC mode OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated S
227. configured server hosts and use them for a particular service The server group is used with a global server host list which lists the IP addresses of the selected server hosts Server groups can also include multiple host entries for the same server if each entry has a unique identifier the combination of the IP address and UDP port number allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service If you configure two different host entries on the same RADIUS server for the same service such as accounting the second configured host entry acts as a failover backup to the first one You use the server group server configuration command to associate a particular server with a defined group server You can either identify the server by its IP address or identify multiple host instances or entries by using the optional auth port and acct port keywords To define the AAA server group and associate a particular RADIUS server with it follow these steps beginning in privileged EXEC mode 1 configure terminal 2 aaa new model 3 radius server host hostname ip address auth port port number acct port port number timeout seconds retransmit retries key string aaa group Server radius group name server ip address end Sl Se 3Sr S show running config I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Config
228. ction down Example Router config ecfm service customer1101 vlan 100 direction down Enters the CFM service configuration mode vlan Specifies the VLAN Step7 continuity check Example Router config ecfm srv continuity ch eck Enables sending continuity check messages Step 8 interface gigabitethernet slot port Example Router config ecfm srv interface gigabitethernet 0 2 Specifies an interface and enters the interface configuration mode Step 9 ethernet cfm mep domain domain name mpid mpid value service service name Example Router config if ethernet cfm mep domain customer mpid 100 service customer1101 Sets a port to a maintenance domain and defines it as an MEP Note The values for domain and service must be the same as the values that were configured for CFM Step 10 interface gigabitethernet slot port subinterface Example Router config if ecfm mep interface gigabitethernet 0 2 1 Specifies a subinterface and enters the subinterface configuration mode Step 11 encapsulation dotlq vlan id Example Router config subif encapsulation dotliq 100 Defines the encapsulation format as IEEE 802 1Q dotlq and specifies the VLAN identifier Step 12 end Example Router config subif end Returns the router to the privileged EXEC mode Configuration Example for Ethernet CFM Single Tagged Packets Cisco 3900 Series Cisco 2900
229. ction that could result in equipment damage or loss of data I OL 20696 04 E Preface HI Related Documentation Timesaver Means the described action saves time You can save time by performing the action described in the paragraph A Warning Means reader be warned in this situation you might perform an action that could result in bodily injury Related Documentation In addition to the Cisco 1900 series Cisco 2900 series and Cisco 3900 series ISR Software Configuration Guide this document the following reference guides are included Type of Document Links Hardware Read Me First for the Cisco 1900 Series 2900 Series and 3900 Series Integrated Services Routers Regulatory Compliance and Safety Information for Cisco 1900 Series Integrated Services Routers Cisco 2900 Series and 3900 Series Integrated Services Routers Hardware Installation Guide Cisco 1900 Series Integrated Services Routers Hardware Installation Guide Cisco Modular Access Router Cable Specifications Installing Replacing and Upgrading Components in Cisco Modular Access Routers and Integrated Services Routers Overview of Cisco Network Modules for Cisco Access Routers Cisco Interface Cards for Cisco Access Routers Installing Cisco Network Modules in Cisco Access Routers Installing Cisco Interface Cards in Cisco Access Routers Regulatory Compliance Declarations of Conformity and Regulatory Informati
230. d method list explicitly defined A method list describes the sequence and authentication methods to be used to authenticate a user You can designate one or more security protocols for authentication thus ensuring a backup system for authentication in case the initial method fails The software uses the first method listed to authenticate users If that method fails to respond the software selects the next authentication method in the method list This process continues until there is successful communication with a listed authentication method or until all defined methods are exhausted If authentication fails at any point in this cycle that is the security server or local username database responds by denying the user access the authentication process stops and no other authentication methods are attempted I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device HZ Controlling Access Point Access with RADIUS To configure login authentication follow these steps beginning in privileged EXEC mode This procedure is required SUMMARY STEPS 1 configure terminal 2 aaa new model 3 4 5 6 end 7 show running config 8 DETAILED STEPS Command aaa authentication login default ist name method method2 line console tty vty line number ending line number login authe
231. d Cisco 1900 series ISRs support Cisco IOS software entitlement Your router is shipped with the software image and the corresponding permanent licenses for the technology packages and features that you specified preinstalled You do not need to activate or register the software prior to use If you need to upgrade or install a new technology package or feature see Software Activation on Integrated Services Router http www cisco com en US docs routers access sw_activation SA_on_ISR html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 6 OL 20696 04 Chapter Overview of the Hardware and Software Getting Started W Getting Started Step 1 Step 2 Step 3 Step 4 See the router specific hardware installation guide to install the router in an appropriate location Connect the router with the appropriate cables Supply power to the router and perform the initial software configuration using Cisco Configuration Professional Express After the initial configuration is completed perform the following steps Follow instructions in the Basic Router Configuration section on page 9 to perform additional router configurations Optional If you are setting up the Cisco 1941 W ISR follow instructions in the Configuring the Wireless Device section on page 207 to configure the embedded wireless device on the router Follow instructions in
232. d Restrictions page B 1 e Online Insertion and Removal page B 2 e How to Format CompactFlash Memory Cards page B 2 e File Operations on CompactFlash Memory Cards page B 4 e Directory Operations on a CompactFlash Memory Card page B 7 Requirements and Restrictions CompactFlash Support e Only Advanced Capability CF purchased from Cisco operate in Cisco 3900 Series 2900 Series and 1900 Series Integrated Services Routers e Legacy CF will not operate in Cisco 3900 Series 2900 Series and 1900 Series Integrated Services Routers When legacy CF is inserted the following error message appears WARNING Unsupported compact flash detected Use of this card during normal operation can impact and severely degrade performance of the system Please use supported compact flash cards only Formatting CompactFlash e Only Class C file systems are supported on Cisco Compact Flash CF e We recommend that you format new CF to initialize a new flash file system Proper formatting lets ROM monitor recognize and boot the flash memory The CF can be formatted on an ISR and files copied to or from any PC that is equipped with a CF memory reader If you use a PC to format the CF use the Microsoft File Allocation Table FAT32 file system CompactFlash Slots and Files e Cisco 3900 series 2900 series and 1900 series ISRs have 2 external CF slots e CF in Slot0 can store the system image configuration and data files The CF must be present in this slot
233. d Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device W Controlling Access Point Access with TACACS To specify RADIUS authorization for privileged EXEC access and network services follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 aaa authorization network radius 3 aaa authorization exec radius 4 end 5 show running config 6 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Ste p2 aaa authorization network radius Configures the wireless device for user RADIUS authorization for all network related service requests Step3 aaa authorization exec radius Configures the wireless device for user RADIUS authorization to determine whether the user has privileged EXEC access The exec keyword might return user profile information such as autocommand information Step4 end Returns to privileged EXEC mode Step5 show running config Verifies your entries Step6 copy running config startup config Optional Saves your entries in the configuration file To disable authorization use the no aaa authorization network exec method command in global configuration mode Displaying the RADIUS Configuration To display the RADIUS configuration use the show running config command in privileged EXEC mode Controlling Access Point Access with TACACS
234. d integration of firewall policy generation with call control e Provide a solution without compromising on network security To configure UC Trusted Firewall features see Cisco Unified Communications Trusted Firewall Control at http www cisco com en US docs voice_ip_comm cucme feature guide TrustedFirewallControll html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 138 OL 20696 04 Chapter Unified Communications on Cisco Integrated Services Routers Applications and Application Interfaces APIs Hi Signaling and Media Authentication and Encryption The Media and Signaling Authentication and Encryption Feature for Cisco IOS MGCP Gateways feature provides support for Cisco Secure Survivable Remote Site Telephony SRST and voice security features that include authentication integrity and encryption of voice media and related call control signaling See Media and Signaling Authentication and Encryption Feature on Cisco IOS MGCP Gateways at Cisco com for configuration information http www cisco com en US docs ios 12_3t 12_3t11 feature guide gtsecure html The Media and Signaling Encryption SRTP TLS on DSP Farm Conferencing feature provides secure conferencing capability for Cisco Unified Communications Manager Unified CM networks including authentication integrity and encryption of voice media and related call control signaling to and
235. de OL 20696 04 Chapter Administering the Wireless Device W Managing the System Time and Date Configuring the Time Zone To manually configure the time zone follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 clock timezone zone hours offset minutes offset 3 end 4 show running config 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 clock timezone zone hours offset Sets the time zone minutes offset Because the wireless device keeps internal time in UTC this command is used only for display purposes and when the time is manually set e For zone enter the name of the time zone to be displayed when standard time is in effect The default is UTC e For hours offset enter the hours offset from UTC e Optional For minutes offset enter the minutes offset from UTC Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file 1 UTC universal time coordinated The minutes offset variable in the clock timezone command in global configuration mode is available for situations where a local time zone is a percentage of an hour different from UTC For example the time zone for some sections of Atlantic Canada AST is UTC 3 5 where the 3 mean
236. dia Resource Management at Cisco com for more information http www cisco com en US docs voice_ip_comm cucm admin 7_0_1 ccmsys a05media html wp 1056492 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Unified Communications on Cisco Integrated Services Routers W Voice Security Packet Voice Data Module The Next Generation Packet Voice Data Module PVDM3 digital signal processor DSP modules provide up to four times the density per slot of existing audio applications on Cisco voice gateway routers One universal DSP image for these DSP modules provides resources for time division multiplexing to Internet Protocol TDM to IP gateway functionality for digital and analog interfaces audio transcoding and audio conferencing This enhanced DSP architecture accommodates a new packet processing engine for rich media voice applications and supports the TDM voice framework used by the PVDM2 module The PDVM3 has a Gigabit Ethernet interface with a Multi Gigabit Fabric to increase IP throughput and a DSP hardware based health monitor provides DSP failure detection that is ten times faster than existing technology To configure PVDM3 features see the Configuring Next Generation High Density PVDM3 Modules section on page 145 Voice Security The Cisco 3900 series and Cisco 2900 series ISRs support the following voice sec
237. ding the new system image e Loading the New System Image from the Cisco IOS Software page 192 e Loading the New System Image from ROM Monitor Mode page 195 Loading the New System Image from the Cisco IOS Software To load the new system image from the Cisco IOS software follow these steps SUMMARY STEPS 1 dir flash0 configure terminal no boot system Optional boot system flash0 system image filename oF YY N Optional Repeat to specify the order in which the router should attempt to load any backup system images 6 exit 7 show version 8 If the last digit in the configuration register is 0 or 1 proceed to Step 9 However if the last digit in the configuration register is between 2 and F proceed to Step 12 9 configure terminal 10 config register 0x2102 11 exit 12 copy run start 13 reload Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 192 OL 20696 04 Chapter Upgrading the Cisco 10S Software DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 How to Upgrade the Ciscol0S Image W 14 When prompted to save the system configuration enter no 15 When prompted to confirm the reload enter y 16 show version dir flash0 Use this command to display a list of all files and directories in flash memory Router dir flash0 Directory of flash0 3 rw 6458388 Mar 01 1993 00
238. dix A Cisco 10S CLI for Initial Configuration DETAILED STEPS Command or Action Using the Cisco 10S CLI to Perform Initial Configuration W Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 show ip interface brief Displays a brief status of the interfaces that are configured for IP Example e Learn which type of Ethernet interface is on your Router show ip interface brief router Step3 configure terminal Enters global configuration mode Example Router configure terminal Step4 interface gigabitethernet 0 port Specifies the gigabit Ethernet interface and enters interface configuration mode Example Note For information on interface numbering see Router config interface gigabitethernet 0 0 Software Configuration Guide Step5 description string Optional Adds a description to an interface configuration e The description helps you remember what is attached to Example this interface The description can be useful for Router config if description GE int to 2nd troubleshooting floor south wing Step6 ip address ip address mask Sets a primary IP address for an interface Example Router config if ip address 172 16 74 3 255 255 255 0 Step7 no shutdown Enables an interface Example Router config if no shutdown Step8 end Returns to privileged EXEC mode Example Router config end Step9 show ip interface brief
239. domain name mpid mpid value service service name Step12 end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 34 OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces CFM Support on Routed Port and Port MEP W DETAILED STEPS Command Purpose Step1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global configuration mode Example Router configure terminal Step3 ethernet cfm ieee Enables the IEEE version of CFM Example Router config ethernet cfm ieee Step4 ethernet cfm global Enables CFM processing globally on the router Example Router config ethernet cfm global Step5 ethernet cfm domain domain name level Defines a CFM maintenance domain at a specified level Welue and enters the Ethernet CFM configuration mode level can be any value from 0 to 7 Example Router config ecfm ethernet cfm domain carrier level 2 Step6 service service name port Creates a service on the interface and sets the config ecfm srv submode Example Router config ecfm Service carrier port Step7 continuity check interval value Enables sending continuity check messages at the set interval Example Router config ecfm srv continuity ch eck interval 100m Step8 j end Returns the ro
240. dress argument clears the automatic binding for a specific client IP address Specifying an asterisk clears all automatic bindings clear ip dhcp conflict Clears an address conflict from the DHCP address database Specifying the address argument clears the conflict for a specific IP address Specifying an asterisk clears conflicts for all addresses clear ip dhcp server statistics Resets all DHCP server counters to 0 To enable DHCP server debugging use the following command in privileged EXEC mode debug ip dhcp server events packets linkage Use the no form of the command to disable debugging for the wireless device DHCP server Configuring the Access Point for Secure Shell amp This section describes how to configure the Secure Shell SSH feature Note For complete syntax and usage information for the commands used in this section see the Secure Shell Commands section in Cisco IOS Security Command Reference for Release 12 4 Understanding SSH SSH is a protocol that provides a secure remote connection to a Layer 2 or Layer 3 device There are two versions of SSH SSH version 1 and SSH version 2 This software release supports both SSH versions If you do not specify the version number the access point defaults to version 2 SSH provides more security for remote connections than Telnet by providing strong encryption when a device is authenticated The SSH feature has an SSH se
241. ds of authentication are used only if the previous method returns an error not if it fails Select one of these methods e local Use the local username database for authentication You must enter username information into the database Use the username password command in global configuration mode e tacacs Use TACACS authentication You must configure the TACACS server before you can use this authentication method line console tty vty line number ending line number Enters line configuration mode and configure the lines to which you want to apply the authentication list login authentication default list name Applies the authentication list to a line or set of lines e Ifyou specify default use the default list created with the aaa authentication login command e For list name specify the list created with the aaa authentication login command end Returns to privileged EXEC mode show running config Verifies your entries copy running config startup config Optional Saves your entries in the configuration file To disable AAA use the no aaa new model command in global configuration mode To disable AAA authentication use the no aaa authentication login default list name method method2 command in global configuration mode To either disable TACACS authentication for logins or to return to the default value use the no login authentication default list name
242. e Router config crypto map exit Router config Step 5 crypto map map name seq num ipsec isakmp Creates a crypto map profile dynamic dynamic map name discover profile profile name Example Router config crypto map static map 1 ipsec isakmp dynamic dynmap Router config Apply the Crypto Map to the Physical Interface The crypto maps must be applied to each interface through which IPSec traffic flows Applying the crypto map to the physical interface instructs the router to evaluate all the traffic against the security associations database With the default configurations the router provides secure connectivity by encrypting the traffic sent between remote sites However the public interface still allows the rest of the traffic to pass and provides connectivity to the Internet To apply a crypto map to an interface follow these steps beginning in global configuration mode SUMMARY STEPS 1 interface type number 2 crypto map map name 3 exit DETAILED STEPS Command or Action Purpose Step 1 interface type number Enters the interface configuration mode for the interface to which you are applying the crypto map Example Router config interface fastethernet 4 Router config if Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 102 OL 20696 04 Chapter Configuring Security Features
243. e Router show interface loopback 0 LoopbackO is up line protocol is up Hardware is Loopback Internet address is 200 200 100 1 24 MTU 1514 bytes BW 8000000 Kbit DLY 5000 usec reliability 255 255 txload 1 255 rxload 1 255 Encapsulation LOOPBACK loopback not set Last input never output never output hang never Last clearing of Show interface counters never Queueing strategy fifo Output queue 0 0 0 drops input queue 0 75 0 drops Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Basic Router Configuration Configuring Command Line Access W 5 minute input rate 0 bits sec 0 packets sec 5 minute output rate 0 bits sec 0 packets sec 0 packets input 0 bytes 0 no buffer Received 0 broadcasts 0 runts 0 giants 0 throttles 0 input errors 0 CRC 0 frame 0 overrun 0 ignored 0 abort 0 packets output 0 bytes 0 underruns 0 output errors 0 collisions 0 interface resets 0 output buffer failures 0 output buffers swapped out Another way to verify the loopback interface is to ping it Router ping 200 200 100 1 Type escape sequence to abort Sending 5 100 byte ICMP Echos to 200 200 100 1 timeout is 2 seconds Success rate is 100 percent 5 5 round trip min avg max 1 2 4 ms Configuring Command Line Access amp To configure parameters to control access to the router follow these steps begin
244. e 5 end 6 copy running config startup config Command Purpose configure terminal Enters global configuration mode interface dotllradio 01 1 Enters interface configuration mode for the radio interface The 2 4 GHz and the 802 11 g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 1 1n 5 GHz radio is radio 1 rts threshold value Sets the RTS threshold Enter an RTS threshold from 0 to 2347 rts retries value Sets the maximum RTS retries Enter a setting from 1 to 128 end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Use the no form of the rts command to reset the RTS settings to defaults I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Radio Settings W Configuring the Maximum Data Retries Configuring the Maximum Data Retries The maximum data retries setting determines the number of attempts that the wireless device makes to send a packet before it drops the packet The default setting is 32 To configure the maximum data retries follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 interface dotilradio 0 1 3 packet retries value 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configur
245. e Installation Guide Standards Standard Title None MIBs MIB MIBs Link CISCO DSP MGMT MIB To locate and download MIBs for selected platforms Cisco IOS releases and feature sets use Cisco MIB Locator found at http www cisco com go mibs RFCs RFC Title None Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide ice E OL 20696 04 Configuring Next Generation High Density PVDM3 Modules Chapter Configuring Next Generation High Density PVDM3 Modules Feature Information for Configuring the PVDM3 Module on Cisco Voice Gateway Routers W Technical Assistance Description Link The Cisco Support and Documentation website http www cisco com cisco web support index html provides online resources to download documentation software and tools Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies Access to most tools on the Cisco Support and Documentation website requires a Cisco com user ID and password Feature Information for Configuring the PVDM3 Module on Cisco Voice Gateway Routers Table 3 lists the release history for this feature Not all commands may be available in your Cisco IOS software release For release information about a specific command see the command reference documentation
246. e attempted To configure login authentication follow these steps beginning in privileged EXEC mode This procedure is required 1 configure terminal aaa new model aaa authentication login default ist name method method2 line console tty vty line number ending line number login authentication default list name eo a F vN end I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device HZ Controlling Access Point Access with TACACS 7 show running config 8 copy running config startup config DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 n E Command Purpose configure terminal Enters global configuration mode aaa new model Enables AAA aaa authentication login default list name method1 method2 Creates a login authentication method list e To create a default list that is used when a named list is not specified in the login authentication command use the default keyword followed by the methods that are to be used in default situations The default method list is automatically applied to all interfaces e For list name specify a character string to name the list you are creating e For methodl specify the actual method the authentication algorithm tries The additional metho
247. e delay Example Router config if backup delay enable delay Specifies the delay between the physical interface going down and the backup interface being enabled and the delay between the physical interface coming back up and the backup interface being disabled exit Example Router config if exit Router config Exits configuration interface mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Gigabit Ethernet Failover Media Configuring Backup Interfaces i Cisco 2921 Cisco 2951 and Cisco 3900 Series routers provide a Gigabit Ethernet GE small form factor pluggable SFP port that supports copper and fiber concurrent connections Media can be configured for failover redundancy when the network goes down Note Do not connect back to back Cisco 2921 Cisco 2951 or Cisco 3900 Series routers with failover or as auto detect configured This is not a supported configuration and the behavior is unpredictable Assigning Primary and Secondary Failover Media SUMMARY STEPS DETAILED STEPS Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 1 Step 2 To assign primary and secondary failover media on the GE SFP port follow these
248. e hardware installation guide for your router to install the chassis connect cables and supply power to the hardware Timesaver Before supplying power to the router disconnect all WAN cables from the router to keep it from trying to run the AutoInstall process The router may try to run AutoInstall if you power it up while there is a WAN connection on both ends and the router does not have a valid configuration file stored in NVRAM for instance when you add a new interface It can take several minutes for the router to determine that AutoInstall is not connected to a remote TCP IP host Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide oL 20696 04 EN AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration Using the Cisco IOS CLI to Perform Initial Configuration This section contains the following procedures e Configuring the Router Hostname page A 2 Optional e Configuring the Enable and Enable Secret Passwords page A 3 Required e Configuring the Console Idle Privileged EXEC Timeout page A 5 Optional e Configuring Gigabit Ethernet Interfaces page A 6 Required e Specifying a Default Route or Gateway of Last Resort page A 8 Required e Configuring Virtual Terminal Lines for Remote Console Access page A 11 Required e Configuring the Auxiliary Line page A 13 Optional e Ve
249. e in the Radio Network DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface doti11lradio 01 1 Enters interface configuration mode for the radio interface The 2 4 GHz and 802 11g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 11n 5 GHz radio is radio 1 Step3 station role Sets the wireless device role A e Set the role to non root bridge with or without wireless non root bridge wireless clients clients to root access point or bridge or to workgroup bridge root access point ap only Note The bridge mode radio supports point to point bridge wireless clients configuration only fallback repeater shutdown Note The repeater and wireless clients commands are not supported on Cisco 1941 W Integrated Services Routers workgroup bridge multicast mode lt client infrastructure gt Note The scanner command is not supported on 1941 W universal lt Ethernet client MAC Integrated Services Routers address gt e The Ethernet port is shut down when any one of the radios is configured as a repeater Only one radio per access point may be configured as a workgroup bridge or repeater A workgroup bridge can have a maximum of 25 clients presuming that no other wireless clients are associated to the root bridge or access point Step4 end Returns to privileged EXEC mode Step5 copy running config startup config Optional Saves your entries in the
250. e or circumstance where a server fails you can configure an access point to act as a local authentication server The access point can authenticate up to 50 wireless client devices using Light Extensible Authentication Protocol LEAP Extensible Authentication Protocol Flexible Authentication Secure Tunneling EAP FAST or MAC based authentication The access point performs up to five authentications per second You configure the local authenticator access point manually with client user names and passwords because it does not synchronize its database with Remote Authentication Dial In User Service RADIUS servers You can specify a VLAN and a list of SSIDs that a client is allowed to use See Using the Access Point as a Local Authenticator at Cisco com for details about setting up the wireless device in this role http www cisco com en US docs routers access wireless software guide SecurityLocalAuthent html I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring the Wireless Device HZ Configuring Wireless Settings Configuring WEP and Cipher Suites Wired Equivalent Privacy WEP encryption scrambles the data transmitted between wireless devices to keep the communication private Wireless devices and their wireless client devices use the same WEP key to encrypt and decrypt data WEP keys encrypt both unicast and multic
251. e specified protocol is passing through the firewall a dynamic access list is created to allow the passage of return traffic The timeout parameter specifies the length of time that the dynamic access list remains active without return traffic passing through the router When the timeout value is reached the dynamic access list is removed and subsequent packets possibly valid ones are not permitted Use the same inspection name in multiple statements to group them into one set of rules This set of rules can be activated elsewhere in the configuration by using the ip inspect inspection name in out command when you configure an interface at the firewall For additional information about configuring a Cisco IOS Firewall see Cisco IOS Firewall Overview at http www cisco com en US docs ios security configuration guide sec_ios_firewall_ov html The Cisco IOS Firewall may also be configured to provide voice security in Session Initiated Protocol SIP applications SIP inspection provides basic inspection functionality SIP packet inspection and detection of pinhole openings as well protocol conformance and application security For more information see Cisco IOS Firewall SIP Enhancements ALG and AIC at http www cisco com en US docs ios security configuration guide sec_sip_alg_aic html Zone Based Policy Firewall The Cisco IOS Zone Based Policy Firewall can be used to deploy security policies by assigning interfaces to d
252. e the console line speed Table D 1 describes the configuration register bits Table D 1 Bit Number Configuration Register Bit Descriptions Hexadecimal 00 03 0x0000 0x00 OF Boot field The boot field setting determines whether the router loads an operating system and where it obtains the system image See Table D 2 for details 06 0x0040 Causes the system software to ignore the contents of NVRAM 07 0x0080 OEM bit enabled I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Appendix D Changing the Configuration Register Settings HI About the Configuration Register Table D 1 Bit Number Configuration Register Bit Descriptions continued Hexadecimal 08 0x0100 Controls the console Break key e Factory default Setting bit 8 causes the processor to ignore the console Break key e Clearing bit 8 causes the processor to interpret Break as a command to force the router into the ROM monitor mode halting normal operation Break can always be sent in the first 60 seconds while the router is rebooting regardless of the configuration register settings 09 0x0200 This bit controls the system boot e Setting bit 9 causes the system to use the secondary bootstrap e Factory default Clearing bit 9 causes the system to boot from flash memory e This bit i
253. ee the Configuring Terminal Operating Characteristics for Dial In Sessions section Line passwords and password encryption is described in the Cisco IOS Security Configuration Guide Release 12 4 See the Security with Passwords Privilege Levels and Login Usernames for CLI Sessions on Networking Devices section If you want to secure the vty lines with an access list see Access Control Lists Overview and Guidelines Also see the Cisco IOS Password Encryption Facts tech note I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration SUMMARY STEPS 1 enable configure terminal password password login end show running config o N oO os FF Y DN DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action line vty line number ending line number From another network device attempt to open a Telnet session to the router Purpose enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode line vty line number ending line number Example Router config line vty 0 4 Starts the line configuration command collection mode
254. eed to 1000 Mbps only Step7 shutdown Example Router config if shutdown Disables the interface changing its state from administratively UP to administratively DOWN Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Examples Command or Action Configuring Third Party SFPs W Purpose Step 8 no shutdown Example Router config if no shutdown Enables the interface changing its state from administratively DOWN to administratively UP Step 9 exit Example Router config if exit Router config Exits the configuration mode and returns the global configuration mode This example shows how to configure a third party SFP on a Cisco ISR G2 Series Router Router con Router con Router con Router con Router con Router con Router con Router con fig if fig if fig if fig if fig if fig if Router configure terminal service unsupported transceiver fig interface ethernet 0 3 0 media type sfp speed 100 shutdown no shutdown exit fig exit OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Backup Data Lines and Remote Management WE C
255. efines an extended access list that source wildcard indicates which addresses need translation Example Router config access list 1 permit 192 168 0 0 0 0 255 255 any Step13 dialerwatch list group number ip ip address Evaluates the status of the primary link address mask delay route check initial seconds based on the existence of routes to the peer The address 22 0 0 2 is the peer IP address of the ISP Example Router config dialer watch list 1 ip 22 0 0 2 255 255 255 255 Router config Step 14 line aux console tty vty line number Enters configuration mode for the line ending line number interface Example Router config line console 0 Router config line Step15 modem enable Switches the port from console port to auxiliary port function Example Router config line modem enable Router config line Step16 exit Exits interface configuration mode Example Router config line exit Router config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 72 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 17 Step 18 Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port W Co
256. eload the router sequentially processes each boot 0x02 OxF system command in global configuration mode that is stored in the configuration file until the system boots successfully If no boot system commands are stored in the configuration file or if executing those commands is unsuccessful then the router attempts to boot the first image file in flash memory Table D 3 shows how each setting combination of bits 10 and 14 affects the IP broadcast address Table D 3 Broadcast Address Configuration Register Bit Combinations Bit 10 Bit 14 Broadcast Address lt net gt lt host gt 0 0 lt ones gt lt ones gt 1 0 lt ones gt lt zeros gt 1 1 lt zeros gt lt zeros gt 0 1 lt zeros gt lt ones gt Table D 4 shows the console line speed for each setting combination of bits 5 11 and 12 Table D 4 Console Line Speed Configuration Register Bit Combinations Console Line Speed Bit 5 Bit 11 Bit 12 baud 1 1 1 115200 1 0 1 57600 1 1 0 38400 1 0 0 19200 0 0 0 9600 0 1 0 4800 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Appendix D Changing the Configuration Register Settings W Changing the Configuration Register Settings Table D 4 Console Line Speed Configuration Register Bit Combinations continued Console Line Speed Bit5 Bit 11 Bit 12 baud
257. ement board in the same slot or in an empty slot Step4 hw module sm slot oir start Restores power to the module Example Router hw module sm 1 oir start Restart the controller and voice ports SUMMARY STEPS 1 configure terminal controller el slot port no shutdown exit voice port slot number port no shutdown Pe Od a a a exit Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 152 OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers Mi DETAILED STEPS Command or Action Purpose Step1 configure terminal Enters global configuration mode Example Router configure terminal Step2 controller e1 slot port Enters config controller mode Example Router config controller e1 0 0 0 Step3 no shutdown Restarts the controller port Example Router config controller no shutdown Step4 exit Exits config controller mode Example Router config controller exit Step5 voice port slot number port Enters config voiceport mode Example Router config voice port 0 0 0 1 Step6 no shutdown Restarts the voice port Example Router config voiceport no shutdown Step7 exit Exits config voiceport mode Example Router config voiceport exit Cisco 3900 Series Cisco 2900 Series
258. emory size IO packet NVRAM size memory size 191KB Start Addr Start Addr 0x00 384 MB in 64 bit mode Available main memory starts at 0xa0015000 10 percent of main memory 00000000 64049cb0 00000000 6429274c 00000000 60e36fa8 ffrffffff ea545255 fffffffFt fffffffFt f fffffFt bytes 0x10000000 000000 size 393132KB You can also use the meminfo l command to show the supported DRAM configurations for the router The following is sample output for the command Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks i rommon 4 gt meminfo 1 The following 64 bit memory configs are supported Onboard SDRAM DIMM SOCKET 0 TOTAL MEMORY Bank 0 Bank1 Bank 0 Bank 1 128 MB 0 MB 0 MB 0 MB 128 MB 128 MB 0 MB 64 MB 0 MB 192 MB 128 MB 0 MB 64 MB 64 MB 256 MB 128 MB 0 MB 128 MB 0 MB 256 MB 128 MB 0 MB 128 MB 128 MB 384 MB 128 MB 0 MB 256 MB 0 MB 384 MB Troubleshooting Tips See the following tech notes e Troubleshooting Router Crashes e Understanding Software forced Crashes e Troubleshooting Router Hangs Exiting ROM Monitor Mode This section describes how to exit ROM monitor mode and enter the Cisco IOS command line interface CLI The method that you use to exit ROM monitor mode depends on how your router entered ROM mo
259. en your username or password click Cancel at the login dialog box and follow the instructions that appear Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 lt AppendixC Using ROM Monitor Hs Additional References Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 28 OL 20696 04 APPENDIX D Changing the Configuration Register Settings The following sections describe the 16 bit configuration register in NVRAM in the Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs e About the Configuration Register page D 1 e Changing the Configuration Register Settings page D 4 e Displaying the Configuration Register Settings page D 5 e Configuring the Console Line Speed Cisco IOS CLI page D 5 About the Configuration Register The router has a 16 bit configuration register in NVRAM Each bit has value 1 on or set or value 0 off or clear and each bit setting affects the router behavior upon the next reload power cycle You can use the configuration register to e Force the router to boot into the ROM monitor bootstrap program e Select a boot source and default boot filename e Enable or disable the Break function e Control broadcast addresses e Recover a lost password e Chang
260. ep1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global configuration mode Example Router configure terminal Step3 interface gigabitethernet slot port Specifies an interface and enters the interface configuration mode Example Router config interface gigabitethernet 0 2 Step4 port tagging Inserts the VLAN ID into a packet header to identify which Virtual Local Area Network VLAN the packet Example belongs to Router config if port tagging Step5 encapsulation dotiq vlan id Defines the encapsulation format as IEEE 802 1Q dotlq and specifies the VLAN identifier Example Router config if port tagging encaps ulation dotlq 10 Step6 set cos cos value Sets the Layer 2 class of service CoS value to an outgoing packet end Example Router config if port tagging set cos 6 Step7 en Exits the interface configuration mode Example Router config if port tagging end Configuration Example This configuration example shows how to configure the NID Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide EN OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Configuring a Network Interface Device on the L3 Interface Router gt enable Router configure terminal Router confi
261. er Enters line configuration mode and configures the lines for which to apply the authentication list Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Controlling Access Point Access with RADIUS W Command Purpose Step5 login authentication default Applies the authentication list to a line or set of lines lsrname e Ifyou specify default use the default list that you created with the aaa authentication login command e For list name specify the list that you created with the aaa authentication login command Step6 end Returns to privileged EXEC mode Step7 show running config Verifies your entries Step8 copy running config startup config Optional Saves your entries in the configuration file To disable AAA use the no aaa new model command in global command mode To disable AAA authentication use the no aaa authentication login default Jist name method1 method2 command in global command mode To either disable RADIUS authentication for logins or to return to the default value use the no login authentication default Jist name command in line configuration mode Defining AAA Server Groups SUMMARY STEPS You can configure the wireless device to use AAA server groups to group existing server hosts for authentication You select a subset of the
262. er ISR This chapter contains the following sections e Authentication Methods page 115 e Controlling Port Authorization State page 119 e Flexible Authentication page 122 e Host mode page 122 e Open Access page 122 e Control Direction Wake on LAN page 123 e Preauthentication Access Control List page 126 e Downloadable Access Control List page 127 e Filter ID or Named Access Control List page 127 e IP Device Tracking page 127 amp Note Critical authentication which is also known as Inaccessible Authentication Bypass or AAA Fail Policy does not support the Identity features on the Onboard Gigabit Ethernet Layer 3 ports Authentication Methods Identity features support various types of authentication methods that are suitable for different kinds of end hosts and users The two methods that are mainly used are e IEFE 802 1X e MAC Authentication Bypass MAB Configuring the IEEE 802 1X Perform these steps to configure the IEEE 802 1X on the Cisco 1921 ISR Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 g s Chapter Configuring Identity Features on Layer 3 Interface HI Authentication Methods SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 1 enable configure terminal interface gigabitethernet slot port authentication port control auto dot1x pae authe
263. eries Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Unified Communications on Cisco Integrated Services Routers Online Insertion and Removal W Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EN Chapter Unified Communications on Cisco Integrated Services Routers HZ Online Insertion and Removal Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 144 OL 20696 04 Configuring Next Generation High Density PVDM3 Modules The next generation packet voice data module PVDM3 digital signal processor DSP modules provide up to four times the density per slot of existing audio applications on Cisco voice gateway routers One universal DSP image for these DSP modules provides resources for time division multiplexing to Internet Protocol TDM to IP gateway functionality for digital and analog interfaces audio transcoding and audio conferencing This enhanced DSP architecture accommodates a new packet processing engine for rich media voice applications and supports the TDM voice framework used by the PVDM2 module The PVDM3 has a Gigabit Ethernet interface with a MultiGigabit Fabric to increase IP throughput and a DSP hardware based health monitor provides DS
264. eries and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Unified Communications on Cisco Integrated Services Routers Call Control Protocols W Session Initiation Protocol SIP Session Initiation Protocol SIP is a peer to peer multimedia signaling protocol developed in the IETF IETF RFC 3261 Session Initiation Protocol is ASCII based It resembles HTTP and it reuses existing IP protocols such as DNS and SDP to provide media setup and tear down See Cisco IOS SIP Configuration Guide for more information For router configuration information under SIP see Basic SIP Configuration chapter of the Cisco IOS SIP Configuration Guide Voice gateways provide voice security through SIP enhancements within the Cisco IOS Firewall SIP inspect functionality SIP packet inspection and detection of pin hole openings is provided as well as protocol conformance and application security The user is given more granular control on the policies and security checks applied to SIP traffic and capability to filter out unwanted messages For more information see Cisco IOS Firewall SIP Enhancements ALG and AIC at Cisco com Media Gateway Control Protocol MGCP H 323 Media Gateway Control Protocol MGCP RFC 2705 defines a centralized architecture for creating multimedia applications including Voice over IP VoIP See Cisco IOS MGCP and Related Protocols Configuration
265. ers To view the installation guide see the following URL http www cisco com en US docs routers access 2900 hardware installation guide Hardware_Installati on_Guide html Table 4 Cisco 3900 Series Routers Dbl Wide GE RJ 45 Router EHWIC SM SM ISM PVDM3 CF SFP ports SPE Cisco 3945 4 4 1 1 4 2 3 1 Cisco 3945E 3 4 1 0 3 2 4 1 Cisco 3925 4 2 1 1 4 2 33 1 Cisco 3925E 3 2 1 0 3 2 44 1 1 One RJ 45 GE two combo GE SFPs 2 Four RJ 45 GE or three RJ 45 GE one combo GE SFP or two RJ 45 GE two combo GE SFP 3 One RJ 45 GE two combo GE SFPs or three RJ 45 GEs 4 Four RJ 45 GE or three RJ 45 GE one combo GE SFP or two RJ 45 GE two combo GE SFP Cisco 2900 Series ISRs Table 5 lists the slots and ports available on Cisco 2900 series routers To view the installation guide see the following URL http www cisco com en US docs routers access 2900 hardware installation guide Hardware_Installati on_Guide html Table 5 Cisco 2900 Series Routers Dbl Wide GE RJ 45 GE RJ 45 Router EHWIC SM SM ISM PVDM3 CF ports SFP ports Cisco 2951 4 2 2 1 3 2 2 1 Cisco 2921 4 1 1 1 3 2 2 1 Cisco 2911 4 1 1 1 2 2 3 0 Cisco 2901 4 0 0 1 2 2 3 0 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Overview of the Hardware and Software E Common Ports
266. ervice Module SRTP Secure Real time Transport Protocol Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 168 E OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide TDM Time Division Multiplexing UHPI Universal Host Port Interface VIC Voice Interface Card VLAN Virtual LAN VNM Voice Network Module VWIC Voice WAN Interface Card Glossary I OL 20696 04 lt Chapter Configuring Next Generation High Density PVDM3 Modules WE Glossary Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 170 OL 20696 04 Configuring Multi Gigabit Fabric Communication Cisco 3900 series Cisco 2900 series and Cisco 1900 series ISRs use a multi gigabit fabric MGF for the new modules and interface cards to inter communicate on the router Legacy modules that support Cisco High Speed Intrachassis Module Interconnect HIMI also support the MGF Next generation module drivers integrate with the MGF to perform port configurations configure packet flow and control traffic buffering On the router side there are no user configurable features on the MGF All configurations are performed from
267. ervices Routers Generation 2 Software Configuration Guide Chapter Configuring Radio Settings W Configuring Radio Transmit Power SUMMARY STEPS 1 configure terminal 2 interface dotilradio 0 1 3 power client level 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface dot11radio 01 1 Enters interface configuration mode for the radio interface The 2 4 GHz and 802 11g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 11n 5 GHz radio is radio 1 Step3 power client These options are available for 802 1 1n 2 4 GHz clients in dBm local 819111114115117 maximum These options are available for 802 11n 5 GHz clients in dBm local 8111113114115 maximum Sets the maximum power level allowed on client devices that associate to the wireless device Setting the power level to local sets the client power level to that of the access point Setting the power level to maximum sets the client power to the allowed maximum Note The settings allowed in your regulatory domain might differ from the settings listed here Step 4 end Returns to privileged EXEC mode Step5 copy running config startup config Optional Saves your entries in the configuration file Use the no form of the power client command to disable the maximum power level for associated clients
268. es Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring the Wireless Device HI Related Documentation Related Documentation See the following documentation for additional autonomous and unified configuration information Autonomous Documentation Table 2 Unified Documentation Table 3 Table 2 Autonomous Documentation Network Design Links Description Wireless Overview Wireless Device Overview Describes the roles of the wireless device on the network Configuration Links Configuring the Radio Configuring Radio Settings Describes how to configure the wireless radio Security Links Authentication Types for Wireless Devices http www cisco com en US docs routers access wireless software guide Security AuthenticationTypes html Describes the authentication types that are configured on the access point RADIUS and TACACS 4 Servers ina Wireless Environment http www cisco com en US docs routers access wireless software guide SecurityRadiusTacacs_1 html Describes how to enable and configure the RADIUS and TACACS and provides detailed accounting information and flexible administrative control over authentication and authorization processes RADIUS and TACACS are facilitated through AAA and can be enabled only through AAA commands Using the Access Point as a Local Authenticator http ww
269. es sec Router Router dir flash0 Directory of flash0 1 rw 48311224 Mar 2 1901 11 32 50 00 00 c3900 universalk9 mz SSA XFR_20090407 2 rw 185667 Jan 27 2021 09 03 54 00 00 crashinfo_20210127 090354 3 rw 983 Feb 14 2021 12 41 52 00 00 running config 260173824 bytes total 211668992 bytes free Router Ensuring Adequate DRAM for the New System Image Prerequisites This section describes how to check whether your router has enough DRAM for upgrading to the new system image Choose the Cisco IOS release and system image to which you want to upgrade See the Information About Upgrading the System Image section on page 178 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 1 Select the system image in the Cisco IOS Upgrade Planner at http www cisco com cgi bin Software Iosplanner Planner tool iosplanner cgi 2 Write down the minimum memory requirements for the image as displayed in the File Download Information table 3 show version 4 Add the memory sizes that are displayed in the show version command output to calculate your router s DRAM size 5 Compare the calculated DRAM size with the minimum memory requirements from Step
270. es the manual control of the port authorization state mab Example Router config if mab Enables MAC based authentication on a port end Example Router config if end Router Returns to privileged EXEC mode Verifying the MAB Use the show authentication sessions command to verify the configuration c1921 show authentication sessions MAC Address Method 0201 0201 0201 mab Interface Gid 1 Domain DATA Session ID 0303030300000004002500A8 Status Authz Success c1921 show authentication sessions interface Gi0 1 Interface GigabitEthernet0 1 MAC Address 0201 0201 0201 IP Address Unknown 02 01 02 01 02 01 Authz Success User Name Status Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide os OL 20696 04 Configuring Identity Features on Layer 3 Interface _ Chapter Configuring Identity Features on Layer 3 Interface Domain DATA Oper host mode single host Oper control dir both Authorized By Vlan Group AAA Policies Authentication Server N A Controlling Port Authorization State Session timeout N A Idle timeout N A Common Session ID 0303030300000004002500A8 Acct Session ID 0x00000007 Handle 0x3D000005 Runnable methods list Method State mab Authc Success c1921 Controlling Port Authorization State You can control the port authorization by using the foll
271. escribe the Cisco 3900 series 2900 series and 1900 series ISRs e Feature Information page 2 e New Features by Platform page 4 e New Slots page 4 e New Slots and Ports by Platform page 5 e Common Ports page 6 e Licensing page 6 e Getting Started page 7 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Overview of the Hardware and Software WE Feature Information Feature Information Table 1 Feature Information Feature Description Services Performance Engine SPEs are modular motherboards on Cisco 3900 series ISRs The SPE houses PVDM3 slots system memory slots and the ISM slot The SPE provides a modular approach to system upgrades You simply slide out the SPE from the router to replace internal modules or upgrade the SPE to improve router performance See Cisco 2900 series and 3900 series Integrated Services Routers Hardware Installation Guide for instructions Cryptographic Engine Accelerator Cisco 3900 series routers with either Services Performance Engine 200 or Services Performance Engine 250 have an onboard cryptographic accelerator that is shared between SSLVPN and IPSec By default acceleration of SSL is disabled so IPSec performance is maximized See the Configuring Security Features section on page 87 in this guide for information about enabling the SSLVPN feature USB
272. ets 0 packets drop 0 input error packets 0 output error packets 0 resource errors packets 0 gaints vlan id 2 BP throttle change count 0 Current throttle flag 0 TX messages at congestion count 0 show voice dsp statistics ack Use this command to display ACK statistics for the device Router show voice dsp statistics ack DSP ACK RETRY TOTAL WAITING ID DEPTH COUNT RETRANSMITTION FOR ACK ACK is enabled debug voice dsp crash dump Use this command to display debugging information for the crash dump feature for detailed information about this see the section Voice DSP Crash Dump File Analysis in Cisco IOS Voice Troubleshooting and Monitoring Guide Router debug voice dsp crash dump keepalives Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers This section provides an example of a running configuration This example is for reference purposes only and contains IP addresses and telephone numbers that are not actual valid addresses and telephone numbers they are provided for illustrative purposes only Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ECN Chapter Configuring Next Generation High Density PVDM3 Modules W Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers show running config Example Router show running config Building con
273. ettings W Configuring Radio Channel Settings DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Command Purpose configure terminal Enters global configuration mode interface dotllradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 channel frequency least congested width 20 40 above 40 below dfs Sets the default channel for the wireless device radio To search for the least congested channel on startup enter least congested Use the width option to specify a bandwidth to use This option is available for the Cisco 800 series ISR wireless devices and consists of three available settings 20 40 above and 40 below e Choosing 20 sets the channel width to 20 MHz e Choosing 40 above sets the channel width to 40 MHz with the extension channel above the control channel e Choosing 40 below sets the channel width to 40 MHz with the extension channel below the control channel Note The channel command is disabled for 5 GHz radios that comply with European Union regulations on dynamic frequency selection DFS See the Enabling and Disabling World Mode section on page 239 for more information end Returns to privileged EXEC mode copy running config startup config Dynamic Frequency Selection Optional Saves your entries in the configuration file Access
274. eueing strategy fifo Output queue 0 40 size max 5 minute input rate 0 bits sec 0 packets sec 5 minute output rate 0 bits sec 0 packets sec 0 packets input 0 bytes 0 no buffer Received 0 broadcasts 0 runts 0 giants 0 throttles 0 input errors 0 CRC 0 frame 0 overrun 0 ignored 0 watchdog 0 multicast 0 pause input 0 input packets with dribble condition detected 0 packets output 0 bytes 0 underruns 0 output errors 0 collisions 0 interface resets 0 0 0 0 unknown protocol drops babbles 0 late collision 0 deferred lost carrier 0 no carrier 0 pause output output buffer failures 0 output buffers swapped out Interface statistics for CPU 30 second input rate 0 packets sec 30 second output rate 0 packets sec 0 packets input 0 bytes 0 overruns Received 0 broadcasts 0 multicast 0 unicast 0 runts 0 giants 0 jabbers 0 input errors 0 CRC 0 fragments 0 pause input 0 packets output 0 bytes 0 underruns 0 broadcast 0 multicast 0 unicast 0 late collisions 0 collisions 0 deferred 0 bad bytes received 0 multiple 0 pause output Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 176 OL 20696 04 Upgrading the Cisco IOS Software This module describes how to upgrade the Cisco Internet Operating System IOS software image on the following hardware e Cisco 3900 series ISRs e Cisco 2900 series ISRs e Cisco 1900 ser
275. eway of last resort The way in which routing protocols propagate the default route information varies for each protocol For comprehensive configuration information about IP routing and IP routing protocols see Cisco IOS IP Configuration Guide In particular see the Configuring IP Addressing chapter and all Part 2 IP Routing Protocols chapters You can configure integrated routing and bridging IRB so the router can route and bridge simultaneously The router will act as an IP host on the network whether routing is enabled or not To read more about IRB see the following URL at Cisco com http www cisco com en US tech tk389 tk8 15 tk855 tsd_technology_support_sub protocol_home html IP routing is automatically enabled in the Cisco IOS software When IP routing is configured the system will use a configured or learned route to forward packets including a configured default route Note This task section does not apply when IP routing is disabled To specify a default route when IP routing is disabled see the Configuring a Gateway of Last Resort Using IP Commands tech note at Cisco com Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix A Cisco 10S CLI for Initial Configuration Default Routes Default Network Using the Cisco 10S CLI to Perform Initial Configuration W A router might not be able t
276. f the available memory is less than the new system image s minimum flash requirements proceed to Step 4 From the displayed output of the dir flash0 command compare the number of bytes total to the size of the system image to which you want to upgrade a Ifthe total memory is less than the new system image s minimum flash requirements you must upgrade your compact flash memory card See the hardware installation guide for your router b If the total memory is equal to or greater than the new system image s minimum flash requirements proceed to Step 5 dir all flash0 From the displayed output of the dir all flash0 command write down the names and directory locations of the files that you can delete Optional copy flash0 tftp rep Optional Repeat Step 7 for each file that you identified in Step 6 delete flash0 directory path filename Repeat Step 9 for each file that you identified in Step 6 dir flash0 partition number From the displayed output of the dir flash0 command compare the number of bytes available to the size of the system image to which you want to upgrade a If the available memory is less than the new system image s minimum flash requirements then you must upgrade your compact flash memory card to a size that can accommodate both the existing files and the new system image See the hardware installation guide for your router b If the available memory is equal to or greater than the new
277. face Card and Module Interfaces page 15 Configuring a Loopback Interface page 15 Routing Configuration Configuring Command Line Access page 17 Configuring Static Routes page 19 Configuring Dynamic Routes page 21 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 Chapter Basic Router Configuration HZ Default Configuration Default Configuration When you boot up your Cisco router for the first time you notice some basic configuration has already been performed Use the show running config command to view the initial configuration as shown in the following example Router show running config Building configuration Current configuration 723 bytes version 12 4 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password encryption hostname Router boot start marker boot end marker logging message counter syslog I no aaa new model no ipv6 cef ip source route ip cef multilink bundle name authenticated archive log config hidekeys interface GigabitEthernet0 0 no ip address shutdown duplex auto speed auto interface GigabitEthernet0 1 no ip address shutdown duplex auto speed auto interface GigabitEthernet0 2 no ip address shutdown duplex auto speed auto ip forward protocol nd
278. figuration voice card 0 Mixed PVDM3 and PVDM2 C5510 DSP cards detected Mixed DSP types in this slot is an unsupported configuration PVDM2 C5510 DSP cards have been disabled Current configuration 3726 bytes version 12 4 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password encryption hostname Router boot start marker boot end marker card type t1 0 0 card type t1 2 0 card type t1 2 1 logging message counter syslog logging buffered 10000000 no aaa new model clock timezone PST 8 no network clock participate slot 2 network clock participate wic 0 network clock select 1 T1 0 0 1 no ipv6 cef ip source route ip cef ip host hostname 223 255 254 254 255 255 255 255 ntp update calendar ntp server 10 1 32 153 ntp peer 10 1 32 153 multilink bundle name authenticated isdn switch type primary ni voice card 0 dsp services dspfarm voice card 2 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers W voice service voip al
279. figuration Guide OL 20696 04 EIN Chapter Configuring Security Features HZ SGT over Ethernet Tagging DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Step7 Command or Action Purpose enable Example Router config enable Enables the privileged EXEC mode Enter your password if prompted configure terminal Example Router config configure terminal Enters the global configuration mode interface gigabitethernet slot port Example Router config interface gigabitethernet 0 0 Enters the interface configuration mode cts manual Example Router config if cts manual Enables the interface for CTS SGT authorization and forwarding and enters the CTS manual interface configuration mode propagate sgt Example Router config if cts manual propagate sgt Enables L2 SGT imposition for egress traffic on the interface Note If you configure cts manual command CTS SGT propagation is enabled by default To disable CTS SGT propagation use no propagate sgt command policy static sgt tag trusted Example Router config if cts manual policy static sgt 77 trusted Configures a static SGT ingress policy on the interface and defines the trustworthiness of an SGT received on the interface Note The trusted keyword indicates that the interface is trustworthy for CTS The SGT value received via the ethernet packet on this interface is tru
280. following example shows how to configure ARP caching on an access point AP configure terminal AP config dot11 arp cache AP config end Configuring Multiple VLAN and Rate Limiting for Point to Multipoint Bridging This feature modifies the way that point to multipoint bridging can be configured to operate on multiple VLANs with the ability to control traffic rates on each VLAN amp Note A rate limiting policy can be applied only to Fast Ethernet ingress ports on non root bridges In a typical scenario multiple VLAN support permits users to set up point to multipoint bridge links with remote sites with each remote site on a separate VLAN This configuration provides the capability for separating and controlling traffic to each site Rate limiting ensures that no remote site consumes more than a specified amount of the entire link bandwidth Only uplink traffic can be controlled by using the Fast Ethernet ingress ports of non root bridges Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 nE Chapter Administering the Wireless Device W Configuring Multiple VLAN and Rate Limiting for Point to Multipoint Bridging Using the class based policing feature you can specify the rate limit and apply it to the ingress of the Ethernet interface of a non root bridge Applying the rate at the ingress of the Ethernet interface ensures that
281. g interface gigabitethernet 0 2 Router config if port tagging Router config if port tagging encapsulation dotiq 10 Router config if port tagging set cos 6 Router config if port tagging end Verifying the NID Configuration Use the following commands to verify the port tagging sessions e show run int ping Use the show run int command to display the port tagging sessions Router show run int gi0 2 Building configuration Current configuration 10585 bytes interface GigabitEthernet0 2 no ip address duplex auto speed auto port tagging encapsulation dotliq 10 set cos 6 exit end interface GigabitEthernet0 2 1101 encapsulation dot1Q 100 ip address 132 1 101 4 255 255 255 0 I interface GigabitEthernet0 2 1102 encapsulation dot1Q 100 ip address 132 1 102 4 255 255 255 0 Use the ping command to verify the connectivity with port tagging configured Router ping 132 1 101 3 Type escape sequence to abort Sending 5 100 byte ICMP Echos to 132 1 101 3 timeout is 2 seconds Success rate is 100 percent 5 5 round trip min avg max 1 1 4 ms router Troubleshooting the NID Configuration Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Table 1 lists the debug commands to troubleshoot the issues pertaining to the NID functionality The Cisco IOS Master Command List at http www cisco com en US docs ios mc
282. g router rip version 2 network 10 0 0 0 network 192 168 1 0 no auto summary Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 22 OL 20696 04 Chapter Basic Router Configuration Verifying Configuration Configuring Dynamic Routes W To verify that you have properly configured RIP enter the show ip route command and look for RIP routes signified by R You should see a verification output like the example shown below Router show ip route Codes C connected S static R RIP M mobile B BGP D EIGRP EX EIGRP external N1 OSPF NSSA external type 1 El OSPF external type 1 E2 OSPF external type 2 i IS IS su IS IS summary O OSPF IA OSPF inter area N2 OSPF NSSA external type 2 L1 IS IS level 1 L2 IS IS level 2 ia IS IS inter area candidate default U per user static route o ODR P periodic downloaded static route Gateway of last resort is not set 10 0 0 0 24 is subnetted 1 subnets C 10 108 1 0 is directly connected Loopback0 R 3 0 0 0 8 120 1 via 2 2 2 1 00 00 02 Ethernet0 0 Configuring Enhanced Interior Gateway Routing Protocol SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 To configure Enhanced Interior Gateway Routing Protocol GRP EGRP follow these steps beginning in global configuration mode 1 router eigrp
283. g Verifies your entries Step7 copy running config Optional Saves your entries in the configuration file startup config If you use the wireless device IP address as its hostname the IP address is used and no DNS query occurs If you configure a hostname that contains no periods a period followed by the default domain name is appended to the hostname before the DNS query is made to map the name to an IP address The default domain name is the value set by the ip domain name command in global configuration mode If there is a period in the hostname Cisco IOS software looks up the IP address without appending any default domain name to the hostname To remove a domain name use the no ip domain name name command in global configuration mode To remove a name server address use the no ip name server server address command in global configuration mode To disable DNS on the wireless device use the no ip domain lookup command in global configuration mode Displaying the DNS Configuration To display the DNS configuration information use the show running config command in privileged EXEC mode amp Note When DNS is configured on the wireless device the show running config command sometimes displays a server IP address instead of its name Creating a Banner You can configure a message of the day MOTD and a login banner The MOTD banner appears on all connected terminals at login and is useful for sending messages
284. g in privileged EXEC mode 1 configure terminal username name privilege level password encryption type password login local end show running config eo 0 FF WY DN copy running config startup config I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device HZ Protecting Access to Privileged EXEC Commands DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 username name privilege level Enters the username privilege level and password for each user password encryption type password e For name specify the user ID as one word Spaces and quotation marks are not allowed e Optional For level specify the privilege level the user has after gaining access The range is 0 to 15 Level 15 gives privileged EXEC mode access Level gives user EXEC mode access e For encryption type enter 0 to specify that an unencrypted password will follow Enter 7 to specify that a hidden password will follow e For password specify the password the user must enter to gain access to the wireless device The password must be from to 25 characters can contain embedded spaces and must be the last option specified in the username command Step3 login local Enables local password checking at login time Authentication is based on the u
285. ggregator is configured as a PPP over Ethernet PPPoE server The ISDN peer router is any router that has an ISDN interface and can communicate through a public ISDN network to reach your Cisco router ISDN interface The ISDN peer router provides Internet access for your Cisco router during the ATM network downtime This portion of the example configures the aggregator vpdn enable no vpdn logging vpdn group 1 accept dialin protocol pppoe virtual template 1 interface Ethernet3 description 4700ref 1 ip address 40 1 1 1 255 255 255 0 media type 10BaseT interface Ethernet4 ip address 30 1 1 1 255 255 255 0 media type 10BaseT interface Virtual Templatel ip address 22 0 0 2 255 255 255 0 ip mtu 1492 peer default ip address pool adsl interface ATMO no ip address pvc 1 40 encapsulation aal5snap protocol pppoe no atm limi keepalive ip local pool adsl 22 0 0 1 ip classless ip route 0 0 0 0 0 0 0 0 22 0 0 1 50 ip route 0 0 0 0 0 0 0 0 30 1 1 2 80 This portion of the example configures the ISDN peer isdn switch type basic net3 interface Ethernet0 ip address 30 1 1 2 255 0 0 0 interface BRIO description to 836 dialbackup no ip address encapsulation ppp dialer pool member 1 isdn switch type basic net3 I interface Dialer0 E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configura
286. gital signal processor Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EGN Chapter Configuring Next Generation High Density PVDM3 Modules WE Glossary Glossary AGC Automatic Gain Control BCN Backward Congestion Notification CM Connection manager TDM COS Class of service 802 1p DA Fthernet Destination Address DMA Direct Memory Access DSA Distributed Switch Architecture DSP Digital Signal Processor DSPRM DSP Resource Manager DTMF Dual tone multi frequency ECAN Echo Canceller EVSM Extended Voice Service Module FC Flex Complexity FPGA Field Programmable Gate Array HC High Complexity HDLC High level Data Link Control Protocol HPI Host Port Interface LC Low Complexity MAC Media Access Control MC Medium Complexity McBSP Multi Channel Buffer Serial Port MTBF Mean Time Between Failures MTP Media Termination Point NTE Named Telephone Events OIR Online Insertion and Removal PCE Packet Classification Engine PVDM3 Next generation Packet Voice Data Module PVDM2 PVDM hosting 5510 DSP QOS Quality of Service REA Ethernet Ready Announcement like bootp message RI Restart indication from DSP Device RTP Real time Transport Protocol SA Ethernet source address SGMII Serial Gigabit Media Independent Interface SM S
287. global configuration mode 1 crypto isakmp policy priority hash md5 sha group 1 2 5 lifetime seconds exit o N os FF Y DN Command or Action encryption des 3des aes aes 192 aes 256 authentication rsa sig rsa encr pre share Purpose crypto isakmp policy priority Example Router config crypto isakmp policy 1 Router config isakmp Creates an IKE policy that is used during IKE negotiation The priority is a number from 1 to 10000 with 1 being the highest Also enters the ISAKMP policy configuration mode encryption des 3des aes aes 192 aes 256 Example Router config isakmp encryption 3des Router config isakmp Specifies the encryption algorithm used in the IKE policy The example specifies 168 bit DES hash md5 sha Example Router config isakmp hash md5 Router config isakmp Specifies the hash algorithm used in the IKE policy The example specifies the MD5 algorithm The default is SHA 1 authentication rsa sig rsa encr pre share Example Router config isakmp authentication pre share Router config isakmp Specifies the authentication method used in the IKE policy The example specifies a pre shared key group 11215 Example Router config isakmp group 2 Router config isakmp Specifies the Diffie Hellman group to be used in an IKE policy I OL 20696 04 lt C
288. gned After authentication on the port use the show ip access list privileged EXEC command to display the downloaded ACL on the port Filter ID or Named Access Control List Filter Id also works as a dACL but the ACL commands are configured on the authenticator Authentication authorization and accounting AAA provides the name of the ACL to the authenticator IP Device Tracking The IP Device Tracking feature is required for the dACL and Filter ID features to function To program a dACL or Filter ID in a device IP address is required IP device tracking provides the IP address of the corresponding device to the Enterprise Policy Manager EPM module to convert the dACLs to each user by adding the IP address to them Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Configuring Identity Features on Layer 3 Interface HZ IP Device Tracking Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 128 OL 20696 04 Unified Communications on Cisco Integrated Services Routers The following sections describe Unified Communications UC application services that are supported on Cisco 3900 series and Cisco 2900 series integrated services routers ISRs e Modules and Interface Cards page 130 e Call Control page 130 Cisco Unified Communicati
289. gnize the 54 Mb s data rate and do not operate if data rates higher than 11 Mb s are set to required on the connecting access point To configure the radio data rates follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 interface dotllradio 011 3 speed parameters 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface dot11radio 011 Enters interface configuration mode for the radio interface The 2 4 GHz and the 802 11g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 1 1n 5 GHz radio is radio 1 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Radio Settings W Configuring Radio Data Rates Step 3 228 E Command Purpose speed 802 11b 2 4 GHz radio 1 0 11 0 2 0 5 5 basic 1 0 basic 11 0 basic 2 0 basic 5 5 range throughput 802 11g 2 4 GHz radio 1 0 2 0 5 5 6 0 9 0 11 0 12 0 18 0 24 0 36 0 48 0 54 0 basic 1 0 basic 2 0 basic 5 5 basic 6 0 basic 9 0 basic 11 0 basic 12 0 basic 18 0 basic 24 0 basic 36 0 basic 48 0 basic 54 0 range throughput ofdm default 802 11a 5 GHz radio 6 0 9 0 12 0 18 0 24 0 36 0 48 0 54 0 basic 6 0 basic 9 0
290. guration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces CFM Support on Routed Port and Port MEP W DETAILED STEPS Command Purpose Step1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global configuration mode Example Router configure terminal Step3 ethernet cfm ieee Enables the IEEE version of CFM Example Router config ethernet cfm ieee Step4 ethernet cfm global Enables CFM processing globally on the router Example Router config ethernet cfm global Step5 jethernet cfm domain domain name level Defines a CFM maintenance domain at a specified level ORO and enters Ethernet CFM configuration mode level can be any value from 0 to 7 Example Router config ecfm ethernet cfm domain customer level 7 Step6 service service name vlan vlan id Enters the CFM service configuration mode inner vlan inner vlan id direction down The following are the parameters e vlan Specifies the VLAN Example e inner vlan The inner vlan keyword and the inner Router config ecfm service vlan id argument specify the VLAN tag for customer tr or vlan 100 inner vlan 30 double tagged packets direction down Step7 j continuity check Enables sending continuity check messages Example Router config ecfm srv continuity ch eck Step8 jinterf
291. guration file for the VPN and IPSec tunnel described in this chapter aaa new model aaa authentication login rtr remote local aaa authorization network rtr remote local aaa session id common username usernamel password 0 password1 I crypto isakmp policy 1 encryption 3des authentication pre share group 2 lifetime 480 crypto isakmp client configuration group rtr remote key secret password dns 10 50 10 1 10 60 10 1 domain company com pool dynpool I crypto ipsec transform set vpn1 esp 3des esp sha hmac crypto ipsec security association lifetime seconds 86400 crypto dynamic map dynmap 1 set transform set vpnl reverse route crypto map static map 1 ipsec isakmp dynamic dynmap crypto map dynmap isakmp authorization list rtr remote crypto map dynmap client configuration address respond Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 Chapter Configuring Security Features WE Configuring VPN crypto ipsec client ezvpn ezvpnclient connect auto group 2 key secret password mode client peer 192 168 100 1 interface fastethernet 4 crypto ipsec client ezvpn ezvpnclient outside crypto map static map interface vlan 1 crypto ipsec client ezvpn ezvpnclient inside Configure a Site to Site GRE Tunnel To configure a site to site GRE tunnel follow these steps beginning in global configurat
292. guration mode Example Router configure terminal Step3 ip sla operation number Enables the IP SLA configuration operation number The IP SLA operation you want to Example configure Router config ip sla 1101 Step4 ethernet y1731 delay DMM domain value Configures a two way delay measurement vlan vian id mpid value cos value source mpid value Note Both single tagging and double tagging are supported or The following are the parameters ethernet y1731 delay DMM domain value AEI Aen g vlan vlan id inner vlan inner vlan iq delay Specifies the delay distribution parameter mpid value cos value source mpid N value _ Note DMMis the only supported delay distribution arameter Example 3 Router config ip sla ethernet y1731 ae delay DMM domain customer vlan 100 e vlan Specifies the VLAN id 3101 1 id 4101 praia Oe i FONEEME ALO e inner vlan The inner vlan keyword and the inner ST vlan id argument specify the VLAN tag for double tagged packets Router config ip sla ethernet y1731 e cos Specifies the CoS The value can be any delay DMM domain customer vlan 100 inner vlan 1101 mpid 3101 cos 1 number between 0 and 7 source mpid 4101 amp Note For double tagged packets the cos value corresponds to the value specified for the outer tag e mpid Specifies the destination MPID e source Specifies the source MPID Step5 aggregate interval seconds Configures the Y 1731 aggregation parameter where
293. gure terminal Enters global configuration mode Step3 config register 0x0 Example Router config config register 0x0 Changes the configuration register settings e The 0x0 setting forces the router to boot to the ROM monitor at the next system reload Step4 exit Example Router config exit Exits global configuration mode Step5 write memory Example Router write memory Sets to boot the system image from flash memory Step6 reload Example Router reload lt output deleted gt rommon 1 gt Reloads the operating system e Because of the 0x0 configuration register setting the router boots to ROM monitor mode Examples The following example shows how to set the configuration register to boot to ROM monitor mode Router gt Router gt enable Router config exit Router Router write memory OK Router reload Router configure terminal Enter configuration commands one per line End with CNTL Z Router config config register 0x0 Sep 23 16 01 24 351 SYS 5 CONFIG_I Building configuration Proceed with reload confirm Configured from console by console Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor Aug 24 11 09 31 167 SSYS 5 R Command System Bootstrap Version 15 0 1r M1 How to Use the
294. hapter Configuring Security Features HZ Configuring VPN Command or Action Purpose Step 6 lifetime seconds Specifies the lifetime from 60 to 86400 seconds for an IKE SA5 Example Router config isakmp lifetime 480 Router config isakmp Step 7 exit Exits IKE policy configuration mode and enters global configuration mode Example Router config isakmp exit Router config ISAKMP Internet Security Association Key and Management Protocol DES data encryption standard MD5 Message Digest 5 SHA 1 Secure Hash standard NORE CO IN SA security association Configure Group Policy Information To configure the group policy follow these steps beginning in global configuration mode SUMMARY STEPS 1 crypto isakmp client configuration group group name default 2 key name 3 dns primary server 4 domain name 5 exit 6 ip local pool default poolname low ip address high ip address DETAILED STEPS Command or Action Purpose Step 1 crypto isakmp client configuration group Creates an IKE policy group containing attributes group name default to be downloaded to the remote client Also enters the ISAKMP group policy Example configuration mode Router config crypto isakmp client configuration group rtr remote Router config isakmp group Step 2 key name Specifies the IKE pre shared key for the group policy Example Router config isakmp group key secret password R
295. hapter Overview of the Hardware and Software Feature Information W Table 1 Feature Information continued Feature Description New Modules and Cisco 3900 series 2900 series and 1900 series ISRs introduce the Interface Cards following new modules and interface cards which are inserted in the following new router slots e EHWIC e PVDM3 e ISM e SM Note See the router s product page at Cisco com for a complete list of supported modules and interfaces Multi Gigabit Fabric Cisco 3900 series Cisco 2900 series and Cisco 1900 series ISRs use a Communication MGF for the new modules and interface cards to inter communicate on the router Legacy modules that support Cisco HIMP also support MGF to inter communicate on the router Next generation module drivers integrate with the MGF to perform port configurations configure packet flow and control traffic buffering All configurations are performed from the module side which may or may not lead to changes on the MGF For more information see the Configuring Multi Gigabit Fabric Communication section on page 171 Integrated Application Cisco 3900 series 2900 series and 1900 series ISRs offer integrated Services Features security features and voice features e See the Configuring Security Features section on page 87 e See the Unified Communications on Cisco Integrated Services Routers section on page 129 SPE Services Performance Engine USB
296. he default gateway address For example rommon gt DEFAULT_GATEWAY 172 16 23 40 Set the TFTP server IP address which is the location from which the software will be downloaded rommon gt TFTP_SERVER 172 16 23 33 Set the name and directory location to which the image file will be downloaded onto the router For example rommon gt TFTP_FILE archive rel22 lt image name gt Optional Set the input port to use a Gigabit Ethernet port Usage is GE_PORT 0 1 2 For example rommon gt GE_PORT 0 Optional Set the Ethernet media type Usage is TFTP_ MEDIA_TYPE 0 1 where Copper 0 and Fiber 1 rommon gt TFTP_MEDIA_TYPE 1 Optional Decide whether the router will perform a checksum test on the downloaded image Usage is TFTP_CHECKSUME 01 1 where 1 checksum test is performed default and 0 no checksum test For example rommon gt TFTP_CHECKSUM 0 Optional Set the number of times that the router will attempt Address Resolution Protocol ARP and TFTP download The default is 7 attempts For example rommon gt TFTP_RETRY_COUNT 10 Optional Set the amount of time in seconds before the download process times out The default is 2400 seconds 40 minutes The following example shows 1800 seconds 30 minutes TFTP_TIMEOUT 1800 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 2069
297. he login dialog box and follow the instructions that appear If you know the Cisco IOS release and feature set you want to download go directly to http www cisco com kobayashi sw center index shtml For more information before selecting the Cisco IOS release and feature set go to the Software Download Center at http www cisco com public sw center index shtml For more information about Loading and Managing System images go to http www cisco com en US docs ios fundamentals configuration guide cf_system_images html How to Upgrade the Cisco IOS Image This section provides information about upgrading the Cisco IOS image on the router e Saving Backup Copies of Your Old System Image and Configuration page 180 e Ensuring Adequate DRAM for the New System Image page 181 e Ensuring Adequate Flash Memory for the New System Image page 183 e Copying the System Image into Flash Memory page 186 e Loading the New System Image page 192 e Saving Backup Copies of Your New System Image and Configuration page 197 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image Saving Backup Copies of Your Old System Image and Configuration To avoid unexpected downtime in the event you encounter serious problems using a new system image or startup configuration we reco
298. hen you create the password for example to create the password abc 123 do this 1 Enter abc 2 Enter Crtl V 3 Enter 123 When the system prompts you to enter the enable password you need not precede the question mark with the Ctrl V you can simply enter abc 123 at the password prompt Note The characters TAB and are invalid characters for passwords Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file The enable password is not encrypted and can be read in the wireless device configuration file The following example shows how to change the enable password to 1u2c3k4y5 The password is not encrypted and provides access to level 15 standard privileged EXEC mode access AP config enable password 11u2c3k4y5 Protecting Enable and Enable Secret Passwords with Encryption To provide an additional layer of security particularly for passwords that cross the network or that are stored on a TFTP server you can use either the enable password or enable secret command in global configuration mode The commands accomplish the same thing that is you can establish an encrypted password that users must enter to access privileged EXEC mode the default or any privilege level that you specify We recommend that you use the enable secret command because it uses an improved encryption algo
299. hentication and Authorization page 288 Configuring the Authentication Cache and Profile page 290 Configuring the Access Point to Provide DHCP Service page 292 Configuring the Access Point for Secure Shell page 295 Configuring Client ARP Caching page 296 Configuring Multiple VLAN and Rate Limiting for Point to Multipoint Bridging page 297 Disabling the Mode Button Function You can disable the mode button on the wireless device by using the no boot mode button command I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device HZ Disabling the Mode Button Function A Caution amp This command disables password recovery If you lose the privileged EXEC mode password for the access point after entering this command you will need to contact the Cisco Technical Assistance Center TAC to regain access to the access point command line interface CLI Note To reboot the wireless device use the service module wlan ap reset command from the Cisco IOS CLI See the Rebooting the Wireless Device section on page 274 for information about this command The mode button is enabled by default To disable the access point s mode button Follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 no boot mode button 3 end DETAILED STEP
300. herSwitch service modules as Layer 2 switches using Cisco StackWise technology e NME 16ES 1G ME 16ES 1G P ME X 23ES 1G ME X 23ES 1G P ME XD 48ES 2S P e NME XD 24ES 1S P e N e N e N N The Cisco EtherSwitch service modules are supported by either the IP base image formerly known as standard multilayer image SMI or the IP services image formerly known as the enhanced multilayer image EMI The IP base image provides Layer 2 features including access control lists quality of service QoS static routing and the Routing Information Protocol RIP The IP services image provides a richer set of enterprise class features including Layer 2 features and full Layer 3 routing IP unicast routing IP multicast routing and fallback bridging To distinguish it from the Layer 2 static routing and RIP the IP services image includes protocols such as the Enhanced Interior Gateway Routing Protocol EIGRP and the Open Shortest Path First OSPF Protocol Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers support the following Cisco EtherSwitch service modules for SM to SM or SM to ISM communication e NME 16ES 1G e NME 16ES 1G P e NME X 23ES 1G e NME X 23ES 1G P Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 172 OL 20696 04 Chapter Configuring Multi Gigabit Fabric Communication Cisco High S
301. hernet PM packet receive events debug epmpal tx Enables debugging of Ethernet PM packet transmit events Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 56 OL 20696 04 Configuring Backup Data Lines and Remote Management Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs support remote management and backup data connectivity by means of ISDN The following sections describe how to configure backup data lines and remote management e Configuring Backup Interfaces page 57 e Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port page 69 e Configuring Data Line Backup and Remote Management Through the ISDN S T Port page 76 e Configuring Third Party SFPs page 81 Configuring Backup Interfaces This section contains the following topics e Configuring the Backup Interface page 57 e Configuring Gigabit Ethernet Failover Media page 59 e Configuring Cellular Dial on Demand Routing Backup page 61 Configuring the Backup Interface When the router receives an indication that the primary interface is down the backup interface is enabled After the primary connection is restored for a specified period the backup interface is disabled amp Note For dial on demand routing DDR backup even if the backup interface comes out of standby mode the router does not enab
302. high priority in the CPU process it can diminish the performance of the router or even render it unusable For this reason use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff Note Before you run any of the debug commands listed in the following table ensure that you run the logging buffered debugging command and then turn off console debug logging using the no logging console command Table 3 debug Commands for Ethernet CFM Configuration debug Command Purpose debug ethernet cfm all Enables all Ethernet CFM debug messages debug ethernet cfm diagnostic Enables low level diagnostic debugging of Ethernet CFM general events or packet related events debug ethernet cfm error Enables debugging of Ethernet CFM errors debug ethernet cfm packets Enables debugging of Ethernet CFM message packets debug ecfmpal all Enables debug messages for all Ethernet CFM platform events debug ecfmpal api Displays debug messages for all Ethernet CFM platform API events debug ecfmpal common Displays debug messages for all Ethernet CFM platform common events debug ecfmpal ecfmpal Enables debugging of all Ethernet CFM platform events debug ecfmpal epl Enables debugging of all Ethernet CFM platform endpoint list EPL events debug ecfmpal isr Enables debugging of all Ethernet CFM platform i
303. his central device In contrast IP phones normally send voice signals directly between phones without the need to go through a central device Conference services however require a network based conference bridge In an IP telephony network using Cisco Unified Communications Manager the Conferencing and Transcoding for Voice Gateway Routers feature provides the conference bridging service Cisco Unified Communications Manager uses a DSP farm to mix voice streams from multiple participants into a single conference call stream The mixed stream is played out to all conference attendees minus the voice of the receiving attendee The Ad Hoc and Meet Me conferencing features are supported a conference can be either of these types e Ad Hoc The person controlling the conference presses the telephone conference button and adds callers one by one e Meet Me Participants call in to a central number and are joined in a single conference Participants whose end devices use different codec types are joined in a single conference no additional transcoding resource is needed I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Next Generation High Density PVDM3 Modules HZ Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers Broadcast Fast Busy Tone for DSP Oversubscription There should always
304. his example specifies a console terminal for access password password Example Router config line password 5dr4Hepw3 Router config line Specifies a unique password for the console terminal line login Example Router config line login Router config line Enables password checking at terminal session login exec timeout minutes seconds Example Router config line exec timeout 5 30 Router config line Sets the interval that the EXEC command interpreter waits until user input is detected The default is 10 minutes Optionally add seconds to the interval value This example shows a timeout of 5 minutes and 30 seconds Entering a timeout of 0 0 specifies never to time out line aux console tty vty line number Example Router config line line vty 0 4 Router config line Specifies a virtual terminal for remote console access password password Example Router config line password aldf2ad1 Router config line Specifies a unique password for the virtual terminal line login Example Router config line login Router config line Enables password checking at the virtual terminal session login end Example Router config line end Router Exits line configuration mode and returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generati
305. ic characters The string cannot start with a number is case sensitive and allows spaces but ignores leading spaces By default no password is defined e Optional For encryption type only type 5 a Cisco proprietary encryption algorithm is available If you specify an encryption type you must provide an encrypted password an encrypted password you copy from another access point wireless device configuration Note If you specify an encryption type and then enter a clear text password you cannot reenter privileged EXEC mode You cannot recover a lost encrypted password by any method Step 3 service password encryption Optional Encrypts the password when the password is defined or when the configuration is written Encryption prevents the password from being readable in the configuration file Step 4 end Returns to privileged EXEC mode Step 5 copy running config startup config Optional Saves your entries in the configuration file Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 260 OL 20696 04 Chapter Administering the Wireless Device Protecting Access to Privileged EXEC Commands W If both the enable and enable secret passwords are defined users must enter the enable secret password Use the level keyword to define a password for a specific privilege level After you specify the level and set a password give the password only
306. ice FXO ear and mouth E amp M and foreign exchange station FXS These voice gateway are highly scalable from just a few analog connections to up to 24 T1 or El interfaces The Cisco ISR series voice gateway routers can communicate with the Cisco Unified Communications Manager using Session Initiation Protocol SIP H 323 or Media Gateway Control Protocol MGCP The Cisco IOS voice gateway routers can also connect directly to other Cisco voice gateway routers using SIP or H 323 and to various other VoIP destinations and call agents For more information see ISDN Voice Video and Data Call Switching with Router TDM Switching Features at http www cisco com en US tech tk652 tk653 technologies_tech_note09186a00804794c6 shtml For details about tuning voice ports see Cisco IOS Voice Port Configuration Guide Release 12 4T at Cisco com at http www cisco com en US docs ios voice voiceport configuration guide 12_4t vp_12_4t_book html The Integrated Data Voice and Video Services for ISDN Interfaces feature allows multimedia communications between H 320 endpoints and H 323 SIP or Skinny Client Control Protocol SCCP endpoints See Integrating Data Voice and Video Services for ISDN Interfaces at Cisco com for details about setting up a Video gateway http www cisco com en US docs ios 12_4t 12_4t11 h320gw html See Cisco IOS H 323 Configuration Guide Release 12 4T at Cisco com for details about the H 323 protocol http www
307. ices Routers Generation 2 Software Configuration Guide If the access point enters Bootloader mode manually configure the IP address default router netmask and default gateway to upgrade the IOS image The IP address must be assigned to the same subnet as the VLAN1 interface on the router Here is an example configuration ap set CONTROLLER_TYPE 0x05A4 DEFAULT_ROUTER 192 168 10 1 ENABLE_BREAK yes IOS_STATIC_DEFAULT_GATEWAY 192 168 10 1 IP_ADDR 192 168 10 2 MANUAL_BOOT yes NETMASK 255 255 255 0 PEP_PRODUCT_ID AP801AGN A K9 PRODUCT_MODEL_NUM AP801AGN A K9 TOP_ASSY_SERIAL_NUM FHKTESTTEST ap copy tftp 223 255 254 254 saek ap801 k9w7 tar 124 10b JDA flashO ap801 k9w7 tar 124 10b JDA I OL 20696 04 Chapter Upgrading the Cisco 10S Software HE Additional References Additional References The following sections provide references related to upgrading the system image on your router Related Documents and Websites Related Topic Document Title or Website Matching Cisco IOS releases and features to hardware Cisco Feature Navigator http www cisco com go fn Downloading system images Displaying minimum DRAM and flash memory requirements Cisco IOS Upgrade Planner http www cisco com cgi bin Software Iosplanner Planner tool iosplanner cgi Choosing and downloading system images Software Download Center http www cisco com kobayashi sw center index shtml Loading and maint
308. ices Routers Generation 2 Software Configuration Guide fair queue crypto ipsec client ezvpn hw client interface Dialer2 ip address negotiated ip mtu 1492 ip nat outside ip virtual reassembly encapsulation ppp load interval 30 dialer pool 2 dialer idle timeout 0 dialer persistent dialer group 2 ppp authentication chap callin ppp chap hostname ciscoenzo2 sbcglobal net ppp chap password 0 Enzo221 Configuring Backup Interfaces i ppp pap sent username ciscoenzo2 sbcglobal net password 0 Enzo221 ppp ipcp dns request no cdp enable crypto ipsec client ezvpn hw client pri I ip local policy route map track primary if ip forward protocol nd I no ip http server no ip http secure server ip dns server ip nat inside source route map nat2cell interface Dialerl overload ip nat inside source route map nat2dsl interface Dialer2 overload ip route 0 0 0 0 0 0 0 0 Dialer2 track 234 ip route 0 0 0 0 0 0 0 0 Dialerl 253 ip sla 1 icmp echo 128 107 248 247 source interface Dialer2 frequency 5 ip sla schedule 1 life forever start time now 1 permit any 2 permit 10 1 0 0 0 0 255 255 access list access list access list access list access list access list access list access list access list dialer list dialer list no cdp run I 100 100 101 101 102 131 131 deny permit permit permit permit deny permit 1 protocol 2 protocol ip 10 1 0 0 0 ip any any
309. ide gy Chapter Configuring Security Features HZ Configuring VPN DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Command or Action Purpose crypto ipsec client ezvpn name Example Router config crypto ipsec client ezvpn ezvpnclient Router config crypto ezvpn Creates a Cisco Easy VPN remote configuration and enters Cisco Easy VPN remote configuration mode group group name key group key Example Router config crypto ezvpn group ezvpnclient key secret password Router config crypto ezvpn Specifies the IPSec group and IPSec key value for the VPN connection peer ipaddress hostname Example Router config crypto ezvpn peer 192 168 100 1 Router config crypto ezvpn Specifies the peer IP address or hostname for the VPN connection Note A hostname can be specified only when the router has a DNS server available for hostname resolution Note Use this command to configure multiple peers for use as backup If one peer goes down the Easy VPN tunnel is established with the second available peer When the primary peer comes up again the tunnel is reestablished with the primary peer mode client network extension network extension plus Example Router config crypto ezvpn mode client Router config crypto ezvpn Specifies the VPN mode of operation exit Example Router config crypto ezvpn exit Router config
310. ied image from a network TFTP server e Boot the image stored on the USB flash device Note Platforms can boot from USB in ROM monitor with or without a compact flash device It is not necessary to use a bootloader image from the compact flash device Partitions such as usbflash0 2 image_name are not supported on USB flash drives The boot usbflash lt x gt command will boot the first file on the device if it is a valid image You can override the default boothelper image setting by setting the BOOTLDR Monitor environment variable to point to another image Any system image can be used for this purpose e Options for the boot command are x load image but do not execute and v verbose I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide AppendixC Using ROM Monitor HI Howto Use the ROM Monitor Typical Tasks Examples The following example shows how to load boot flash memory and USB boot flash memory rommon 7 gt boot flash0 c2900 universalk9 mz SSA program load complete entry point 0x80803000 size 0x1b340 IOS Image Load Test Digitally Signed Development Software program load complete entry point 0x81000000 size 0x3968d28 Self decompressing the image Ha HE HE HE HE HE HE HE HE HE HE EE HE HE EE HE HE HE HE HE HE HE HH EE HE HH FE HE HE HE HE a aH HH HH HH HE HE HE HE HE HE HE H FE HE HE HE HE H
311. ient devices that are associated to different access points on your wireless LAN you must set up protected ports on the switch to which the wireless devices are connected To define a port on your switch as a protected port follow these steps beginning in privileged EXEC mode 1 configure terminal interface interface id switchport protected end eo Aa YS DS Command show interfaces interface id switchport copy running config startup config Purpose configure terminal Enters global configuration mode interface interface id Enters interface configuration mode Enter the type and number of the switch port interface to configure such as wlan gigabitethernet0 switchport protected Configures the interface to be a protected port end Returns to privileged EXEC mode show interfaces interface id switchport Verifies your entries copy running config startup config Optional Saves your entries in the configuration file I OL 20696 04 EE Chapter Configuring Radio Settings HZ Configuring the Beacon Period and the DTIM To disable protected port use the no switchport protected command For detailed information on protected ports and port blocking see the Configuring Port Based Traffic Control chapter in Catalyst 3550 Multilayer Switch Software Configuration Guide 12 1 12c EAI Click this link to browse to that guide http www cisco com en US docs swi
312. ies ISRs e Cisco 1941W Wireless Device This module contains the following sections e Restrictions for Upgrading the System Image page 177 e Information About Upgrading the System Image page 178 e How to Upgrade the Cisco IOS Image page 179 e How to Upgrade the IOS Image on the Access Point page 199 e Additional References page 202 Restrictions for Upgrading the System Image e Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs download images to new Advanced Capability CompactFlash CF memory cards Legacy CF will not operate in Cisco 3900 series Cisco 2900 series and Cisco 1900 series ISRs When legacy CF is inserted the following error message appears WARNING Unsupported compact flash detected Use of this card during normal operation can impact and severely degrade performance of the system Please use supported compact flash cards only e Slot0 is the default CF slot CF in Slot0 stores system image configuration and data files CF must be present in this slot for the router to boot and perform normal file operations e Cisco IOS images for the access point download images to the CF embedded on the access point I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Upgrading the Cisco 10S Software HZ Information About Upgrading the System Image Table 1 describes the slo
313. ifferent zones and configuring a policy to inspect the traffic moving between these zones The policy specifies a set of actions to be applied on the defined traffic class For additional information about configuring zone based policy firewall see the Zone Based Policy Firewall section of Cisco IOS Security Configuration Guide Securing the Data Plane Release 12 4T at http www cisco com en US docs ios sec_data_plane configuration guide 12_4t sec_data_plane_12_4t_book html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 90 OL 20696 04 Chapter Configuring Security Features Configuring Cisco 10S IPS W Configuring Cisco IOS IPS Cisco IOS Intrusion Prevention System IPS technology enhances perimeter firewall protection by taking appropriate action on packets and flows that violate the security policy or represent malicious network activity Cisco IOS IPS identifies attacks using signatures to detect patterns of misuse in network traffic Cisco IOS IPS acts as an in line intrusion detection sensor watching packets and sessions as they flow through the router scanning each to match currently active loaded attack signatures When Cisco IOS IPS detects suspicious activity it responds before network security can be compromised it logs the event and depending on the action s configured to be taken for the detected signature s
314. ig ip sla 1101 router config ip sla ethernet y1731 delay DMM domain customer vlan 100 mpid 3101 cos 1 router config sla y1731 delay aggregate interval 30 router config sla y1731 delay exit router config ip sla schedule 1102 life forever start time now router config end This example shows how to configure two way delay measurement using double tagging router gt enable router configure terminal router config ip sla 1101 router config ip sla ethernet y1731 delay DMM domain customer vlan 100 inner vlan 1101 mpid 3101 cos 1 source mpid 4101 router config sla y1731 delay aggregate interval 30 router config sla y1731 delay exit router config ip sla schedule 1101 life forever start time now router config end Verifying Two Way Delay Measurement Configuration Use the following commands to verify the performance monitoring sessions e show run sec ip sla e show ip sla summary e show ip sla statistics entry number e show ip sla configuration entry number e show ethernet cfm pm session summary e show ethernet cfm pm session detail session id Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 52 OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface e show ethernet cfm pm session
315. ign Guide at http www cisco com en US docs voice_ip_comm cucme vrf design guide vrfDesignGuide html Applications and Application Interfaces APIs The Cisco 3900 series and Cisco 2900 series ISRs support the following applications and application interfaces e Cisco Unity Express page 140 e Voice XML page 140 e Hoot n Holler page 141 e Hoot n Holler page 141 e Cisco Application Extension Platform page 141 e APIs page 141 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Unified Communications on Cisco Integrated Services Routers W Applications and Application Interfaces APIs Cisco Unity Express Voice XML Cisco Unity Express provides integrated messaging voicemail Automated Attendant services and optional interactive voice response IVR for the small and medium sized office or branch office The application is delivered on either a network module or advanced integration module both of which are supported on a variety of voice enabled integrated services routers This application is ideal for companies that need the following e Integrated messaging voicemail Automated Attendant or interactive voice response IVR services at the branch or small office to support local users e Up to 250 users per site e Networking of multiple Cisco Unity Express systems for easy management of messages across s
316. ilable the following error message appears xxx kernel context state is invalid can not proceed The ROM monitor commands in this section are all optional and can be entered in any order _ Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor Router Crashes Router Hangs How to Use the ROM Monitor Typical Tasks W A router or system crash is a situation in which the system detects an unrecoverable error and restarts itself The errors that cause crashes are typically detected by processor hardware which automatically branches to special error handling code in the ROM monitor The ROM monitor identifies the error prints a message saves information about the failure and restarts the system For detailed information about troubleshooting crashes see the Troubleshooting Router Crashes and Understanding Software forced Crashes tech notes A router or system hang is a situation in which the system does not respond to input at the console port or to queries sent from the network such as Telnet and Simple Network Management Protocol SNMP Router hangs occur when e The console does not respond e Traffic does not pass through the router Router hangs are discussed in detail in the Troubleshooting Router Hangs tech note ROM Monitor Console Communication Failure Restrictions SUMMARY STEPS
317. imum storage capacity for the USB in Slot0 and Slot is 4GB Prerequisites In order to check whether your router has enough flash memory for a new system image you need to obtain the image s flash requirements from Cisco Choose the Cisco IOS release and system image to which you want to upgrade See the Information About Upgrading the System Image section on page 178 e Select the system image in the Cisco IOS Upgrade Planner at http www cisco com cgi bin Software Iosplanner Planner tool iosplanner cgi You must have an account at Cisco com If you do not have an account or have forgotten your username or password click Cancel at the login dialog box and follow the instructions that appear From the File Download Information table write down the minimum flash requirements for the image Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image SUMMARY STEPS 10 11 12 enable dir flash0 From the displayed output of the dir flash0 command compare the number of bytes available to the minimum flash requirements for the new system image a Ifthe available memory is equal to or greater than the new system image s minimum flash requirements proceed to the Copying the System Image into Flash Memory section on page 186 b I
318. in Banner You can configure a login banner to appear on all connected terminals This banner appears after the MOTD banner and appears before the login prompt appears To configure a login banner follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 banner login c message c 3 end 4 show running config 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Ste p2 banner login c message c Specifies the login message For c enter the delimiting character of your choice such as a pound sign and press the Return key The delimiting character signifies the beginning and end of the banner text Characters after the ending delimiter are discarded For message enter a login message up to 255 characters You cannot use the delimiting character in the message Step3 end Returns to privileged EXEC mode Step4 show running config Verifies your entries Step5 copy running config startup config Optional Saves your entries in the configuration file E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Configuring Ethernet Speed and Duplex Settings W To delete the login banner use the no banner login command in global configuration mode The following example sh
319. in local mode The wireless device then handles authentication and authorization No accounting is available in this configuration Note SUMMARY STEPS You can configure the wireless device as a local authenticator for 802 1x enabled client devices to provide a backup for your main server or to provide authentication service on a network without a RADIUS server See Using the Access Point as a Local Authenticator at Cisco com for detailed instructions on configuring the wireless device as a local authenticator http www cisco com en US docs routers access wireless software guide SecurityLocalAuthent html To configure the wireless device for local AAA follow these steps beginning in privileged EXEC mode 1 configure terminal aaa new model aaa authentication login default local aaa authorization exec local aaa authorization network local username name privilege evel password encryption type password fF oo FPF YN end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 288 OL 20696 04 Chapter Administering the Wireless Device Configuring the Access Point for Local Authentication and Authorization W 8 show running config 9 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 aaa new model Enables AAA Step3 aaa authenticati
320. inal Access Controller Access Control System Plus 3 WPA Wireless Protected Access 4 CCKM Cisco Centralized Key Management 5 WEP Wired Equivalent Privacy 6 AES Advanced Encryption Standard 7 MIC Message Integrity Check 8 TKIP Temporal Key Integrity Protocol 9 SSID service set identifiers 10 QoS quality of service Table 3 Unified Documentation Network Design Links Why Migrate to the Cisco Unified Wireless Network http www cisco com en US solutions ns175 networking_solutions_product s_genericcontent0900aecd805299ff html Wireless LAN Controller WLC FAQ http www cisco com en US products ps6366 products_qanda_item09186a0 08064a991 shtml Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges versions 12 4 10b JA and 12 3 8 JEC http www cisco com en US docs wireless access_point 12 4_10b_JA command reference cr2410b html Cisco Aironet 1240AG Access Point Support Documentation http www cisco com en US docs wireless access_point 1240 quick guide ap1240qs html Cisco 4400 Series Wireless LAN Controllers Support Documentation http www cisco com en US products ps6366 tsd_products_support_series_home html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 E Chapter Configuring the Wireless Device HI Related Documentation Cisco
321. ine If you use TFTP Configure the TFTP application to operate as a TFTP server not a TFTP client Specify the outbound file directory to which you will download and store the system image e Download the new Cisco IOS software image into the workstation or PC See the Where Do I Download the System Image section on page 179 e Establish a console session to the router We recommend that you connect your PC directly to the router console port See the hardware installation guide for your router e Verify that the TFTP or RCP server has IP connectivity to the router If you cannot successfully ping between the TFTP or RCP server and the router do one of the following Configure a default gateway on the router Make sure that the server and the router each have an IP address in the same network or subnet See the Determining IP Addresses Frequently Asked Questions tech note P Tip For more detailed information on how to perform the prerequisites see the Software Installation and Upgrade Procedure tech note SUMMARY STEPS 1 enable 2 copy tftp flash0 or copy rcp flash0 When prompted enter the IP address of the TFTP or ROP server When prompted enter the filename of the Cisco IOS software image to be installed When prompted enter the filename as you want it to appear on the router eo aAa w If an error message appears that says Not enough space on device do one of the following as appr
322. ing NTP packets the server with the best stratum is selected Click this URL for more information on NTP and strata http www cisco com en US docs ios 12_1 configfun configuration guide fcd303 html wp 1001075 If multiple servers are at the same stratum a configured server is preferred rather than a broadcast server If multiple servers pass both tests the first one to send a time packet is selected SNTP chooses a new server only if the client stops receiving packets from the currently selected server or if according to the above criteria SNTP discovers a better server Configuring SNTP SNTP is disabled by default To enable SNTP on the access point use one or both of the commands listed in Table 2 in global configuration mode Table 2 SNTP Commands Command Purpose sntp server address hostname Configures SNTP to request NTP packets from an version number NTP server sntp broadcast client Configures SNTP to accept NTP packets from any NTP broadcast server Enter the sntp server command once for each NTP server The NTP servers must be configured to respond to the SNTP messages from the access point If you enter both the sntp server command and the sntp broadcast client command the access point accepts time from a broadcast server but prefers time from a configured server if the strata are equal To display information about SNTP use the show sntp EXEC command Configuring Time and Date Manually If no o
323. int to point network topology e The granularity of the clock for delay measurement is in seconds and nanoseconds e CFM Y 1731 packets work with a maximum of two VLAN tags The expected behavior is not observed with more VLAN tags Also CFM Y 1731 packets do not work with untagged cases Configuring Two Way Delay Measurement The following steps show how to configure two way delay measurement Both single and double tagging methods are included in the steps listed below SUMMARY STEPS Step 1 enable Step2 configure terminal Step3 ip sla operation number Step4 ethernet y1731 delay DMM domain value vlan vlan id mpid value cos value source mpid value or ethernet y1731 delay DMM domain value vlan vian id inner vlan inner vian id mpid value cos value source mpid value Step5 aggregate interval seconds Step6 exit Step7 ip sla schedule operation number start time start time now Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 50 OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Step8 end DETAILED STEPS Command Purpose Step1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global confi
324. ion mode SUMMARY STEPS 1 interface type number 2 ip address ip address mask 3 tunnel source interface type number 4 tunnel destination default gateway ip address 5 crypto map map name 6 exit 7 ip access list standard extended access list name 8 permit protocol source source wildcard destination destination wildcard 9 exit DETAILED STEPS Command or Action Purpose Step 1 interface type number Creates a tunnel interface and enters interface configuration mode Example Router config interface tunnel 1 Router config if Step 2 ip address ip address mask Assigns an address to the tunnel Example Router config if 10 62 1 193 25572557 255 7252 Router config if Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 106 OL 20696 04 _ Chapter Configuring Security Features Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 3 Step 4 Step5 Step 6 Step7 Step 8 Step 9 Command or Action Configuring VPN W Purpose tunnel source interface type number Example Router config if tunnel source fastethernet 0 Router config if Specifies the source endpoint of the router for the GRE tunnel tunnel destination default gateway ip address Example Router config if tunnel destination 192 16
325. ion sessions Interface Gid 1 MAC Address unknown Method dot1ix Domain DATA Status Authz Failed c1921 show authentication sessions interface gi0 1 Interface MAC Address IP Address Status Domain Oper host mode Oper control dir Session timeout Idle timeout Common Session ID Acct Session ID Handle Runnable methods list Method State dot1x GigabitEthernet0 1 Unknown Unknown Authz Failed DATA single host both N A N A 0303030300000009002AB7FC 0x0000000C O0x8BO0000A Authc Failed c1921 show dot1x interface g0 1 Dot1x Info for GigabitEthernet0 1 PAE PortControl ControlDirection HostMode QuietPeriod ServerTimeout SuppTimeout ReAuthMax Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide AUTHENTICATOR _ UNAUTHORIZED HOST Controlling Port Authorization State Session ID 0303030300000009002AB7FC I OL 20696 04 EEE Chapter Configuring Identity Features on Layer 3 Interface HI Flexible Authentication MaxReq TxPeriod Flexible Authentication Flexible Authentication sequencing allows a user to enable all or some authentication methods on a router port and specify the order in which the methods should be executed Configuring Flexible Authentication Host mode For more information about configuring of Flexible Authentication see http www cisco
326. ip 10 0 0 0 0 ip host 1 1 1 icmp any host ip 10 0 0 0 0 ip any any ip permit ip permit route map track primary if permit 10 match ip address 102 set interface Dialer2 Nul1l0 route map nat2dsl permit 10 match ip address 101 match interface Dialer2 0 0 255 10 4 0 0 0 0 0 255 255 255 255 any 1 any 128 107 248 247 255 255 255 any log input I OL 20696 04 E Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces I route map nat2cell permit 10 match ip address 101 match interface Dialer1 control plane l I line con 0 exec timeout 0 0 line aux 0 line 0 0 0 exec timeout 0 0 script dialer cdma login modem InOut no exec transport input all transport output all autoselect ppp rxspeed 3100000 txspeed 1800000 line 67 no activation character no exec transport preferred none transport input all transport output pad telnet rlogin lapb ta mop udptn v120 ssh line vty 0 4 login exception data corruption buffer truncate scheduler allocate 20000 1000 event manager applet pri_back event track 234 state any action 2 0 cli command clear ip nat trans forced I end Router Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 6 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Dial Backup and Remote Management Through the Conso
327. irm connectivity 2 Enter the service module wlan ap 0 session command to establish a session into the access point For instructions see Starting a Wireless Configuration Session section on page 207 3 Ping the external server from the access point to confirm connectivity The following example shows a sample router and access point configuration interface Wlan GigabitEthernet0 0 interface GigabitEthernet0 0 ip address dhcp duplex auto speed auto I interface wlan ap0 E Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco 10S Software How to Upgrade the IOS Image onthe Access Point W description Service module interface to manage the embedded AP ip address 10 0 0 1 255 0 0 0 arp timeout 0 interface GigabitEthernet0 1 no ip address shutdown duplex auto speed auto interface Vlanl ip address 192 168 10 1 255 255 255 0 ip forward protocol nd ip route 0 0 0 0 0 0 0 0 GigabitEthernet0 0 no ip http server Upgrading the IOS Image on the Access Point amp Follow the image upgrade instructions at Cisco com using the IOS CLI http www cisco com en US docs wireless access_point 12 3_8_JA configuration guide s38mfw html wp1035609 Note amp Note Example Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Serv
328. is 100 percent Router1 round trip min avg max 1 1 1 ms Use the traceroute command to send the Ethernet CFM traceroute messages Router traceroute ethernet mpid 44 domain carrier service carrier Type escape sequence to abort Tracing the route to 5657 a86c fa92 on Domain carrier Traceroute sent via Gi0 2 B Intermediary Bridge Target Destination Per hop Timeout MAC Forwarded TTL 64 Linktrace Timeout is 5 seconds Level 2 service carrier Relay Action Previous Hop Ingr Action Egr Action Ingress Egress Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces CFM Support on Routed Port and Port MEP W 1 5657 a86c fa92 Gi0 2 IngOk RlyHit MEP Not Forwarded 5657 9945 04fa Router Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 39 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP Configuring Ethernet CFM Single Tagged Packets Complete these steps to configure and enable Ethernet CFM for single tagged packets SUMMARY STEPS Step 1 enable Step2 configure terminal Step3 ethernet cfm ieee Step4 ethernet cfm gl
329. isco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 274 OL 20696 04 Chapter Administering the Wireless Device Managing the System Time and Date W Monitoring the Wireless Device This section provides commands for monitoring hardware on the router e Displaying Wireless Device Statistics page 275 e Displaying Wireless Device Status page 275 Displaying Wireless Device Statistics Use the service module wlan ap0 statistics command in privileged EXEC mode to display wireless device statistics The following is sample output for the command CLI reset count 0 CLI reload count 1 Registration request timeout reset count 0 Error recovery timeout reset count 0 Module registration count 10 The last IOS initiated event was a cli reload at 04 27 32 041 UTC Fri Mar 8 2007 Displaying Wireless Device Status Use the service module wlan ap0 status command in privileged EXEC mode to display the status of the wireless device and its configuration information The following is sample output for the command Service Module is Cisco wlan ap0O Service Module supports session via TTY line 2 Service Module is in Steady state Service Module reset on error is disabled Getting status from the Service Module please wait Image path flash c8xx_19xx_ap k9w7 mx acregr c8xx_19xx_ap k9w7 mx acre gr System uptime 0 days 4 hours 28 minutes 5 seconds Router d was
330. isco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 240i OL 20696 04 Chapter Configuring Radio Settings Disabling and Enabling Short Radio Preambles W Disabling and Enabling Short Radio Preambles SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 The radio preamble sometimes called a header is a section of data at the head of a packet that contains information that the wireless device and client devices need when sending and receiving packets You can set the radio preamble to long or short e Short A short preamble improves throughput performance e Long A long preamble ensures compatibility between the wireless device and all early models of Cisco Aironet Wireless LAN Adapters If these client devices do not associate to the wireless devices you should use short preambles You cannot configure short or long radio preambles on the 5 GHz radio To disable short radio preambles follow these steps beginning in privileged EXEC mode 1 configure terminal 2 interface dotilradio 0 1 3 no preamble short 4 end 5 copy running config startup config Command Purpose configure terminal Enters global configuration mode interface dotllradio 0l 1 Enters interface configuration mode for the 2 4 GHz radio interface no preamble short Disables short preambles and enable long preambles end Re
331. isco IOS Network Management Configuration Guide SUMMARY STEPS 1 enable configure terminal line console 0 end 7 F WC DN show running config DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command or Action exec timeout minutes seconds Purpose enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode line console 0 Example Router config line console 0 Configures the console line and starts the line configuration command collection mode exec timeout minutes seconds Example Router config line exec timeout 0 0 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Sets the idle privileged EXEC timeout which is the interval that the privileged EXEC command interpreter waits until user input is detected e The example shows how to specify no timeout Setting the exec timeout value to 0 causes the router to never log out once logged in This could have security implications if you leave the console without manually logging out using the disable command I OL 20696 04 E AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration Command or Action Purpose Step 5 end
332. it 10 which controls the host portion of the IP broadcast address See Table D 3 for the combined effect of bits 10 and 14 15 0x8000 Enables diagnostic messages and ignores the contents of NVRAM 1 OEM Original Equipment Manufacturer 2 CLI command line interface m_ Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Appendix D Changing the Configuration Register Settings About the Configuration Register Hil Table D 2 describes the boot field which is the lowest four bits of the configuration register bits 3 2 1 and 0 The boot field setting determines whether the router loads an operating system and where the router obtains the system image Table D 2 Boot Field Configuration Register Bit Descriptions Boot Field Bits 3 2 1 and 0 Meaning 0000 At the next power cycle or reload the router boots to the ROM monitor bootstrap program To use the ROM monitor you must use a terminal or PC that is 0x0 oe connected to the router console port For information about connecting the router to a PC or terminal see the hardware installation guide for your router In ROM monitor mode you must manually boot the system image or any other image by using the boot ROM monitor command 0001 Boots the first image in flash memory as a system image 0x01 0010 1111 At the next power cycle or r
333. it number called Security Group Tag SGT SGT is then propagated between network hops to allow intermediary devices switches and routers to enforce policies based on the identity tag CTS capable devices have built in hardware capabilities than can send and receive packets with SGT embedded in the MAC L2 layer This feature is called L2 SGT imposition This allows Ethernet interfaces on the device to be enabled for L2 SGT imposition to enable the device to insert an SGT in the packet that is to be carried to its next hop Ethernet neighbor SGT over Ethernet Tagging is a type of hop by hop propagation of SGTs embedded in clear text unencrypted Ethernet packets Restrictions for SGT over Ethernet Tagging e SGT over Ethernet Tagging is supported on plain text Ethernet frames only e SGT over Ethernet Tagging is supported on on board Gigabit Ethernet interfaces on the following Cisco ISR G2 Series routers Cisco ISR G2 2951 Cisco ISR G2 3945 Cisco ISR G2 3900 E Series Cisco ISR G2 1921 ISR G2 1941 ISR G2 2901 ISR G2 2911 ISR G2 2921 Configuring SGT over Ethernet Tagging Perform these steps to configure SGT over Ethernet Tagging SUMMARY STEPS 1 enable configure terminal interface gigabitethernet s ot port cts manual propagate sgt policy static sgt tag trusted BS Sl ee NS end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Con
334. ites The application features follow e Affordable messaging greeting services for increased customer service and rich employee communications e Intuitive telephone prompts and a web based interface provide fast convenient voicemail and Automated Attendant administration e Cisco Unity Express can view sort search and play back voice messages using the display of a Cisco Unified IP Phone or your e mail client e Scalable solution from 4 to 16 concurrent voicemail or Automated Attendant calls and 12 to 250 mailboxes e Deployable with Cisco Unified Communications Manager Express Cisco Unified Communications Manager Cisco Unity and Cisco Unity Connection systems See the Unity Express Configuration guides at Cisco com for more information http www cisco com en US products sw voicesw ps2237 products_installation_and_configuration_g uides_list html Cisco IOS unified communications routers provide many rich voice capabilities including Voice Extensible Markup Language VoiceXML browser services VoiceXML is an open standard markup language used to create voice enabled Web browsers and interactive voice response IVR applications Available on a wide range of Cisco IOS Software voice gateways these services are used in conjunction with a VoiceXML application service such as Cisco Unified Customer Voice Portal CVP Other VoiceXML applications can also use the Cisco IOS routers as a VoiceXML browser to provide IVR services to ca
335. itor Mode help section on page C 7 Entering ROM Monitor Mode This section provides two ways to enter ROM monitor mode e Using the Break Key Sequence to Interrupt the System Reload and Enter ROM Monitor Mode page C 4 e Setting the Configuration Register to Boot to ROM Monitor Mode page C 5 Prerequisites Connect a terminal or PC to the router console port For help see the hardware installation guide for your router Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I oL 20696 04 g cs AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks Using the Break Key Sequence to Interrupt the System Reload and Enter ROM Monitor Mode To enter ROM monitor mode by reloading the router and entering the Break key sequence follow these steps SUMMARY STEPS 1 enable 2 reload 3 Press Ctrl Break DETAILED STEPS Command or Action Purpose Step1 enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted Step2 reload Example Router reload Reloads the operating system Step3 Press Ctrl Break Example Router send break Interrupts the router reload and enters ROM monitor mode e You must perform this step within 60 seconds after you enter the reload command e The Break key sequence varies depending on the software on your P
336. ive San Jose California 95134 1706 Cisco IOS Software C2900SM Software C2900 UNIVERSALK9 M Experimental Version 12 4 20090709 004325 ypatel secport2 128 Copyright c 1986 2009 by Cisco Systems Inc Compiled Thu 16 Jul 09 12 55 by ypatel This product contains cryptographic features and is subject to United States and local country laws governing import export transfer and use Delivery of Cisco cryptographic products does not imply third party authority to import export distribute or use encryption Importers exporters distributors and users are responsible for compliance with U S and local country laws By using this product you Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 10 OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks Ti agree to comply with applicable laws and regulations If you are unable to comply with U S and local laws return this product immediately A summary of U S laws governing Cisco cryptographic products may be found at http www cisco com wwl export crypto tool stqrg html If you require further assistance please contact us by sending email to export cisco com Cisco c2911 revision 1 0 with 987136K 61440K bytes of memory Processor board ID 3 Gigabit Ethernet interfaces 1 terminal line DRAM configuration is 64 bits wide with parity enabled 255K bytes
337. ivileged EXEC mode 1 configure terminal 2 aaa authorization network tacacs 3 aaa authorization exec tacacst 4 end 5 show running config 6 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 aaa authorization network tacacs Configures the wireless device for user TACACS authorization for all network related service requests Step3 aaa authorization exec tacacs Configures the wireless device for user TACACS authorization to determine whether the user has privileged EXEC access The exec keyword might return user profile information such as autocommand information Step4 end Returns to privileged EXEC mode Step5 show running config Verifies your entries Step6 copy running config startup config Optional Saves your entries in the configuration file I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Administering the Wireless Device W Administering the Wireless Hardware and Software To disable authorization use the no aaa authorization network exec method command in global configuration mode Displaying the TACACS Configuration To display TACACS server statistics use the show tacacs command in privileged EXEC mode Administering the Wireless Hardware and Software This section provides instruction
338. l allreleasemcl all_book html provides more information about these commands I OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces W Ethernet Data Plane Loopback A Caution amp Because debugging output is assigned high priority in the CPU process it can diminish the performance of the router or even render it unusable For this reason use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff Note Before you run any of the debug commands listed in the following table ensure that you run the logging buffered debugging command and then turn off console debug logging using the no logging console command Table 1 debug Commands for NID Configuration debug Command Purpose debug ethernet nid configuration Enables debugging of configuration related issues debug ethernet nid packet egress Enables debugging of packet processing VLAN tag push on the egress side debug ethernet nid packet ingress Enables debugging of packet processing VLAN tag pop on the ingress side Ethernet Data Plane Loopback amp The Ethernet Data Plane Loopback feature provides a means for remotely testing the throughput of an Ethernet port You can verify the maximum rate of frame transmission with no frame loss Note amp Note This feature is supported only if you have pu
339. l configuration command is used e Optional For key string specify the authentication and encryption key used between the wireless device and the RADIUS daemon running on the RADIUS server Note The key is a text string that must match the encryption key that is used on the RADIUS server Always configure the key as the last item in the radius server host command Leading spaces are ignored but spaces within and at the end of the key are used If you use spaces in your key do not enclose the key in quotation marks unless the quotation marks are part of the key To configure the wireless device to recognize more than one host entry that is associated with a single IP address enter this command as many times as necessary making sure that each UDP port number is different The wireless device software searches for hosts in the order in which you specify them Set the timeout retransmit and encryption key values to use with the specific RADIUS host Step4 aaa group server radius group name Defines the AAA server group with a group name This command puts the wireless device in a server group configuration mode Step5 server ip address Associates a particular RADIUS server with the defined server group Repeat this step for each RADIUS server in the AAA server group Each server in the group must be previously defined in Step 2 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services R
340. l period that separates an unqualified name from the domain name At boot time no domain name is configured However if the wireless device configuration comes from a BOOTP or DHCP server then the default domain name might be set by the BOOTP or DHCP server if the servers were configured with this information Ste p3 ip name server server addressI Specifies the address of one or more name servers to use for name and address server address2 resolution server address6 l You can specify up to six name servers Separate server addresses with a space The first server specified is the primary server The wireless device sends DNS queries to the primary server first If that query fails the backup servers are queried Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 mw 283 Chapter Administering the Wireless Device W Creating a Banner Command Purpose Step4 ip domain lookup Optional Enables DNS based hostname to address translation on the wireless device This feature is enabled by default If your network devices require connectivity with devices in networks for which you do not control name assignment you can dynamically assign device names that uniquely identify your devices by using the global Internet naming scheme DNS Step5 end Returns to privileged EXEC mode Step6 show running confi
341. lash0 USB flash device inserted in port 0 e usbflash1 USB flash device inserted in port 1 Step11 TFTP_MACADDR MAC_address Example rommon gt TFTP_MACADDR 000e 8335 360 Optional Sets the Media Access Controller MAC address for this router Step12 TFTP_RETRY_COUNT retry_times Example rommon gt TFTP_RETRY_COUNT 10 Optional Sets the number of times that the router attempts Address Resolution Protocol ARP and TFTP download The default is 18 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor Command or Action How to Use the ROM Monitor Typical Tasks Ti Purpose Step 13 TETP_TIMEOUT time Optional Sets the amount of time in seconds before the download process times out The default is 7200 seconds 120 minutes Example TFTP_TIMEOUT 1800 Step14 TETP_ ACK RETRY time Optional Sets the amount of time in seconds before the client will resend the ACK packet to indicate to the server to continue transmission of the remaining packets The Example default is 5 seconds TFTP_TIMEOUT 6 Step15 TFTP_VERBOSE setting Optional Configures how the router displays file download progress with these options Example e 0 No progress is displayed rommon gt TFTP_VERBOSE 2 e 1 Exclamation points are displayed to indicate fi
342. late radar detection on the current channel using the debug dot11 dfs simulate command The following example simulates radar on dfs channel 36 Five beacons are sent ap gt enable Password ap debug dot11 dotilradiol dfs simulate 36 5 The following is an example message displayed on the console when radar is detected Mar 6 12 35 09 750 DOG11 6 DFS_TRIGGERED DFS triggered on frequency 5500 MHz Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 238 OL 20696 04 Chapter Configuring Radio Settings Enabling and Disabling World Mode W Setting the 802 11n Guard Interval The 802 11n guard interval is the period in nanoseconds between packets Two settings are available short 400ns and long 800ns To to set the 802 11n guard interval follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 interface dotllradio 0 1 3 guard interval any long 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface dotl1radio 0 1 Enters interface configuration mode for the radio interface The 802 1 1n 2 4 GHz radio is radio 0 The 802 11n 5 GHz radio is radio 1 Step3 guard interval any long Specifies a guard interval e any allows either the short 400ns or long 800ns guard interval e l
343. le Port or Auxiliary Port W Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port When customer premises equipment such as a Cisco 3900 series ISR is connected to an ISP an IP address is dynamically assigned to the router or the IP address is assigned by the router peer through the centrally managed function The dial backup feature can be added to provide a failover route in case the primary line fails Cisco 3900 series ISRs can use the auxiliary port for dial backup and remote management Figure shows the network configuration used for remote management access and for providing backup to the primary WAN line Figure 1 Dial Backup and Remote Management Through the Auxiliary Port 6 om l 2 g 1 Cisco 3900 series A Main WAN link primary connection to Internet service provider router 2 Modem B Dial backup serves as a failover link for Cisco 3900 routers when primary line goes down 3 PC c Remote management serves as dial in access to allow changes or updates to Cisco IOS configurations Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 go eo Chapter Configuring Backup Data Lines and Remote Management W Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port SUMMARY STEPS DETAILED STEPS Step 1 Step 2
344. le download progress This is the default setting e 2 Detailed progress is displayed during the file download process for example Initializing interface Interface link state up ARPing for 1 4 0 1 ARP reply for 1 4 0 1 received MAC address 00 00 0c 07 ac 01 Step 16 set Displays the ROM monitor environment variables Verify that you correctly configured the ROM monitor environment variables Example rommon gt set Step17 tftpdnld h r Downloads the system image specified by the ROM monitor environment variables Example e Entering h displays command syntax help text romion 2 tfepanid e Entering r downloads and boots the new software but does not save the software to flash memory e Using no option that is using neither h nor r downloads the specified image and saves it in flash memory Step18 y Confirms that you want to continue with the TFTP download Example Do you wish to continue y n n y Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 g cio AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks Examples Sample Output for Recovering the System Image tftpdnid rommon rommon rommon rommon rommon rommon Invoke this command for disaster recovery only all existing data in all partitions on flash will be lost Do you wish to continue y n In Yy WARNING 16 17 1
345. le the backup interface unless the router receives the traffic specified for that backup interface To configure the router with a backup interface follow these steps beginning in global configuration mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E57 Chapter Configuring Backup Data Lines and Remote Management WE Configuring Backup Interfaces SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 1 interface type number 2 backup interface interface type interface number 3 backup delay enable delay disable delay 4 exit Command Purpose interface type number Example Router config interface atm 0 0 0 Router config if Enters interface configuration mode for the interface for which you want to configure backup The example shows configuration of a backup interface for an ATM WAN connection backup interface interface type interface number Example Router config if backup interface bri 0 0 1 Router config if Assigns an interface as the secondary or backup interface This can be a serial interface or an asynchronous interface For example a serial interface could be configured to back up a serial 0 2 1 interface The example shows a BRI interface configured as the backup interface for the ATM 0 0 0 interface backup delay enable delay disabl
346. lename configuration variable 7 Optional Set the GE_PORT 0 11 2 3 port number for download 8 Optional Set the TFTP_MEDIA_TYPE 0 1 copper or fiber 9 Optional Set the TFTP_MACADDR mac address of unit 10 Optional Set the TFTP_VERBOSE 0 1 2 print setting variable 11 Optional Set the TFTP_RETRY_COUNT retry_times configuration variable 12 Optional Set the TFTP_TIMEOUT timeout of operation in seconds 13 Optional Set the TFTP_ACK_RETRY ack retry in seconds 14 Optional Set the TFTP_CHECKSUM 0 1 perform checksum test on image I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step7 Step 8 Step 9 Step 10 Step 11 15 Optional Set the TFTP_DESTINATION flash0 flash1 usbflashO usbflash1 flash destination device for file 16 Optional Set the GE_SPEED_MODE speed configuration 17 Use the set command to verify that you have set the variables correctly 18 Use the tftpdnld r command to download the image Enter ROM monitor mode Set the IP address of the router For example rommon gt IP_ADDRESS 172 16 23 32 Set the IP subnet mask For example rommon gt IP_SUBNET_MASK 255 255 255 224 Set t
347. less network In large installations wireless users within radio range of an access point can roam throughout a facility while maintaining seamless uninterrupted access to the network With a management system based on Cisco IOS software wireless devices are Wi Fi CERTIFIED 802 1 1a compliant 802 11b compliant 802 11 g compliant and 802 1 1n compliant wireless LAN transceivers This module contains the following information e Software Modes page 203 e Management Options page 204 Software Modes The access point is shipped on the Cisco 1941W integrated services router and it includes an autonomous image and recovery image on the access point s flash The default mode is autonomous however the access point can be upgraded to operate in Cisco Unified Wireless mode Each mode is described below Autonomous mode Supports standalone network configurations where all configuration settings are maintained locally on the wireless device Each autonomous device can load its starting configuration independently and still operate in a cohesive fashion on the network Cisco Unified Wireless mode Operates in conjunction with a Cisco Unified Wireless LAN controller where all configuration information is maintained within the controller In the Cisco Unified Wireless LAN architecture wireless devices operate in the lightweight mode using Lightweight Access Point Protocol LWAPP as opposed to autonomous mode The lightweight ac
348. less LANs Note When you configure the access point as a DHCP server it assigns IP addresses to devices on its subnet The devices communicate with other devices on the subnet but not beyond it If data needs to be passed beyond the subnet you must assign a default router The IP address of the default router should be on the same subnet as the access point configured as the DHCP server For detailed information on DHCP related commands and options see the DHCP part in Cisco IOS IP Addressing Services Configuration Guide Release 12 4 Click this URL to browse to the DHCP part http www cisco com en US docs ios ipaddr configuration guide iad_dhcp_rdmp_ps6350_TSD_Products_Configuration_Guide_Chapter html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Configuring the Access Point to Provide DHCP Service W To configure an access point to provide DHCP service and to specify a default router follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 ip dhcp excluded address ow_address high_address 3 ip dhcp pool pool_name 4 network subnet_number mask prefix length 5 lease days hours minutes infinite 6 default router address address2 address 8 7 end 8 show running config 9 copy running config startup config DETA
349. less Settings W Configuring Wireless Security Settings e Configuring Authentication page 211 e Configuring WEP and Cipher Suites page 212 e Configuring Wireless VLANs page 212 e Configuring the Access Point in Hot Standby Mode page 215 Configuring Authentication Authentication types are tied to the Service Set Identifiers SSIDs that are configured for the access point If you want to serve different types of client devices with the same access point configure multiple SSIDs Before a wireless client device can communicate on your network through the access point it must authenticate to the access point by using open or shared key authentication For maximum security client devices should also authenticate to your network using MAC address or Extensible Authentication Protocol EAP authentication Both of these authentication types rely on an authentication server on your network See Authentication Types for Wireless Devices at Cisco com to select an authentication type http www cisco com en US docs routers access wireless software guide Security AuthenticationTypes html See RADIUS and TACACS Servers in a Wireless Environment at Cisco com to set up a maximum security environment http www cisco com en US docs routers access wireless software guide SecurityRadiusTacacs_1 html Configuring Access Point as Local Authenticator To provide local authentication service or backup authentication service for a WAN link failur
350. less device transmits only unicast packets at this rate multicast packets are sent at one of the data rates set to basic e Disabled The wireless device does not transmit data at this rate Note At least one data rate must be set to basic You can use the data rate settings to set an access point to serve client devices operating at specific data rates For example to set the 2 4 GHz radio for 11 Mb s service only set the 11 Mb s rate to basic and set the other data rates to disabled To set the wireless device to serve only client devices operating at 1 and 2 Mb s set 1 and 2 to basic and set the rest of the data rates to disabled To set the 2 4 GHz 802 11g radio to serve only 802 11g client devices set any orthogonal frequency division multiplexing OFDM data rate 6 9 12 18 24 36 48 54 to basic To set the 5 GHz radio for 54 Mb s service only set the 54 Mb s rate to basic and set the other data rates to disabled Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Radio Settings amp Configuring Radio Data Rates W You can configure the wireless device to set the data rates automatically to optimize either the range or the throughput When you enter range for the data rate setting the wireless device sets the 1 Mb s rate to basic and sets the other rates to enabled The range setting
351. llers To configure a Voice XML gateway on the Cisco 3900 series or Cisco 2900 series Integrated Services Router see http www cisco com en US docs ios voice ivr configuration guide ivrapp01 html wp 1010676 Cisco IOS voice features having to do with Cisco IOS Tcl IVR and VoiceXML for developers and network administrators who are installing configuring and maintaining a Tcl or VoiceXML application on a Cisco voice gateway are provided at http www cisco com en US docs ios voice ivr configuration guide Roadmap html wp 1008602 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Unified Communications on Cisco Integrated Services Routers Hoot n Holler Applications and Application Interfaces APIs W Cisco Hoot n Holler network solution uses Cisco IOS Multicast and Cisco IOS Voice over IP technologies The Cisco IP based Hoot network uses bandwidth when it is in use when it is not the same bandwidth can be used to carry other traffic The IP backbone interoperates with existing Hoot amp Holler end station equipment such as microphones turrets Hoot phones or squawk boxes as well as bridges and mixers for a seamless transition Brokerage houses can adapt this solution to eliminate costly private telco circuits and reap significant operational cost savings up to millions of dollars per year for a rapid return on inves
352. lobal configuration mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 73 es OL 20696 04 _ Chapter Configuring Backup Data Lines and Remote Management Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Configuring Data Line Backup and Remote Management Through the ISDN S T Port W Command Purpose interface dialer dialer rotary group number Example Router config interface dialer 0 Router config if Creates a dialer interface numbered 0 to 255 and enters interface configuration mode ip address negotiated Example Router config if ip address negotiated Router config if Specifies that the IP address for the interface is obtained through PPP IPCP IP Control Protocol address negotiation The IP address is obtained from the peer encapsulation encapsulation type Example Router config if encapsulation ppp Router config if Sets the encapsulation type for the interface dialer pool number Example Router config if dialer pool 1 Router config if Specifies the dialer pool to be used In the example the dialer pool setting associates the dialer 0 interface with the BRIO interface because the BRIO dialer pool
353. lomicroseconds Step5 end Returns to privileged EXEC mode Step6 copy running config startup config Optional Saves your entries in the configuration file Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 248 OL 20696 04 Chapter Configuring Radio Settings Configure RTS Threshold and Retries W Configure RTS Threshold and Retries SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 The request to send RTS threshold determines the packet size at which the wireless device issues an RTS before sending the packet A low RTS threshold setting can be useful in areas where many client devices are associating with the wireless device or in areas where the clients are far apart and can detect only the wireless device and not detect each other You can enter a setting ranging from 0 to 2347 bytes Maximum RTS retries is the maximum number of times the wireless device issues an RTS before stopping the attempt to send the packet over the radio Enter a value from to 128 The default RTS threshold is 2347 for all access points and bridges and the default maximum RTS retries setting is 32 To configure the RTS threshold and maximum RTS retries follow these steps beginning in privileged EXEC mode 1 configure terminal 2 interface dotilradio 0 1 3 rts threshold value 4 rts retries valu
354. lover Router config if Step 5 end Exits to global configuration mode Enabling Auto Detect The Auto Detect feature is enabled if media type is not configured This feature automatically detects which media is connected and links up If both media are connected whichever media comes up first is linked up amp Note The Auto Detect feature only works with GigE SFPs This feature does not detect 100M SFPs Use the no media type command in interface configuration mode to enable the Auto Detect feature To configure the Auto Detect feature follow these steps beginning in global configuration mode SUMMARY STEPS 1 configure terminal 2 interface gigabitethernet slot port 3 no media type Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide o p OL 20696 04 _ Chapter Configuring Backup Data Lines and Remote Management DETAILED STEPS Command Configuring Backup Interfaces il Purpose Step 1 configure terminal Example Router configure terminal Router config Enters global configuration mode Step 2 interface gigabitethernet s ot port Example Router config interface gigabitethernet O 1 Router config if Enters interface configuration mode Step 3 no media type Example Router config if no media type GigabitEthernet0 1 Changing media to UNKNOWN
355. low connections h323 to h323 allow connections h323 to sip allow connections sip to h323 allow connections sip to sip fax protocol cisco archive log config hidekeys controller T1 0 0 0 cablelength long Odb dsO group 1 timeslots 1 24 type e amp m immediate start controller T1 0 0 1 cablelength long 0db pri group timeslots 1 24 controller T1 2 0 controller T1 2 1 controller T1 2 0 0 cablelength long 0db controller T1 2 0 1 cablelength long 0db interface GigabitEthernet0 0 mtu 9600 ip address 10 1 32 147 255 255 0 0 duplex auto speed auto no cdp enable interface GigabitEthernet0 1 mtu 9600 ip address 10 1 1 1 255 255 255 0 duplex auto speed auto media type rj45 no cdp enable interface GigabitEthernet0 2 no ip address shutdown duplex auto speed auto no cdp enable interface Serial0 0 1 23 no ip address encapsulation hdlc isdn switch type primary ni isdn incoming voice voice no cdp enable I OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules W Configuration Examples for Configuring the PVDM3 Module on Cisco Voice Gateway Routers ip forward protocol nd ip route 223 255 254 254 255 255 255 255 10 1 0 1 no ip http server no ip http secure server nls resp timeout 1 cpd cr id 1 control plane voice port 0 0 0 1 voice port 0 0 1 23 mgcp fax t38
356. minfo ROM Monitor Command page C 24 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Appendix Using ROM Monitor Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Sample Output for the stack ROM Monitor Command rommon 6 gt stack Kernel Level Stack Trace Initial SP 0x642190b8 Frame 0 FP 0x642190b8 PC Frame Frame Frame A FP 0x642190b8 PC 2 FP 0x642190d0 PC Frame 3 FP 0x642190f 8 PC 4 FP 0x64219118 PC Process Level Stack Trace Initial SP 0x64049cb0 FP 0x64049cb0 PC FP 0x64049cc8 PC FP 0x64049ce0 PC FP 0x64049e90 PC FP 0x64049ec8 PC Frame Frame Frame Frame Frame BWDNYP OO Initial PC 0x607a0d44 RA 0x607a0d44 0 bytes 0x61d839f8 24 bytes 0x6079b6c4 40 bytes 0x6079ff70 32 bytes 0x6079eaec 0 bytes Initial PC Ox60e3b7 4 RA 0x60e3b7 4 24 bytes Ox60e36fa8 24 bytes 0x607a5800 432 bytes 0x607a8988 56 bytes 0x64049f14 0 bytes Sample Output for the context ROM Monitor Command rommon 7 gt context Kernel Level Context Reg MSW Zero 00000000 AT 00000000 vO 00000000 v1 00000000 a0 00000000 al 00000000 a2 00000000 a3 00000000 t 00000000 t1 00000000 t2 00000000 t 00000000 t4 T EFEFEFEEEE t5 2 EELEPELE t 000000
357. mmand Purpose line aux console tty vty Jine number ending line number Example Router config line aux 0 Router config Enters configuration mode for the auxiliary interface flowcontrol none software lock in out hardware in out Example Router config flowcontrol hardware Router config Enables hardware signal flow control Example The following configuration example specifies an IP address for the ATM interface through PPP and IP Control Protocol IPCP address negotiation and specifies dial backup over the console port ip name server 192 168 28 12 ip dhcp excluded address 192 168 1 1 ip dhcp pool 1 import all network 192 168 1 0 255 255 255 0 default router 192 168 1 1 Need to use your own correct ISP phone number modemcap entry MY USER_MODEM MSC amp F1S0 1 chat script Dialout ABORT ERROR ABORT BUSY TIMEOUT 45 CONNECT c AT I interface vlan 1 ip address 192 168 1 1 255 255 255 0 ip nat inside ip tcp adjust mss 1452 hold queue 100 out OK ATDT 5555102 T Dial backup and remote management physical interface interface Asyncl no ip address encapsulation ppp dialer in band dialer pool member 3 async default routing async dynamic routing async mode dedicated ppp authentication pap callin I interface ATMO mtu 1492 no ip address no atm ilmi keepalive pve 0 35 pppoe
358. mmend that you save backup copies of your current startup configuration file and Cisco IOS software system image file on a server For more detailed information see the Managing Configuration Files chapter and the Loading and Maintaining System Images chapter of Cisco IOS Configuration Fundamentals Guide at http www cisco com en US docs ios fundamentals configuration guide 12_4t cf_12_4t_book html To save backup copies of the startup configuration file and the system image file complete the following steps SUMMARY STEPS 1 enable 2 copy nvram startup config ftp rep tftp 3 dir flash0 flash1 4 copy flash0 ftp rep tftp DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted copy nvram startup config ftp rcp tftp Example Router copy nvram startup config ftp Copies the startup configuration file to a server e The configuration file copy can serve as a backup copy e Enter the destination URL when prompted dir flash0 Example Router dir flash0 Displays the layout and contents of a flash memory file system flash0 is aliased onto flash e Learn the name of the system image file copy flash0 ftp rep tftp Example Router copy flash0 ftp Copies a file from flash memory to a server e Copy
359. mote management access and backup for the primary WAN line Figure 2 shows a dial backup link that goes through a customer premises equipment CPE splitter a digital subscriber line access multiplexer DSLAM and a central office CO splitter before connecting to the ISDN switch Figure 2 Data Line Backup Through CPE Splitter DSLAM and CO Splitter a 1 Cisco 3900 series router A Primary DSL interface FE interface Cisco 3900 series router DSLAM B Dial backup and remote management through the ISDN interface ISDN S T port serves as a failover link when the primary line goes down ATM aggregator ISDN switch ISDN c Provides administrator with remote management capability through the ISDN interface when the primary DSL link is down serves as dial in access to allow changes or updates to Cisco IOS configuration ISDN peer router w 0 0 eA UO N Web server 8 Administrator Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 76 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Data Line Backup and Remote Management Through the ISDN S T Port W Figure 3 shows a dial backup link that goes directly from the router to the ISDN switch Figure 3 Data Line Backup Directly from Router to ISDN Switch
360. mple router service module wlan ap0 session Trying 10 21 0 20 2002 Open ap gt 1 GEO Gigabit Ethernet 0 P Tip If you want to create an IOS software alias for the Console to session into the wireless device enter the alias exec dot11radio service module wlan ap 0 session command at the EXEC prompt After entering this command you automatically skip to the dot11 radio level in the IOS Closing the Session To close the session between the wireless device and the router s console perform both of the following steps Wireless Device 1 Control Shift 6 x Router 2 disconnect 3 Press Enter twice Configuring Wireless Settings N Note If you are configuring the autonomous wireless device for the first time start a configuration session between the router and the access point before attempting to configure basic wireless settings See the Starting a Wireless Configuration Session section on page 207 Configure the wireless device with the appropriate software tool e Unified software Cisco Express Setup page 210 e Autonomous software Cisco IOS CLI page 210 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 SENN Chapter Configuring the Wireless Device HZ Configuring Wireless Settings Cisco Express Setup To configure the Cisco Unified wireless device use the web browser Cisco
361. mple Router config subif end Returns the router to the privileged EXEC mode Configuration Example for Ethernet CFM Double Tagged Packets This example shows how to configure Ethernet CFM for double tagged packets Router gt enable Router configure terminal Router config ethernet cfm ieee Router config ethernet cfm global Router config subif end Router config ecfm ethernet cfm domain customer level 7 Router config ecfm service customer1101 vlan 100 inner vlan 30 direction down Router config ecfm srv continuity check Router config ecfm srv interface gigabitethernet 0 2 Router config if ethernet cfm mep domain customer mpid 100 service customer1101 Router config if ecfm mep interface gigabitethernet 0 2 1101 Router config subif encapsulation dotiq 100 second doti1q 30 Verififying the Ethernet CFM Configuration for Double Tagged Packets Use the following commands to verify Ethernet CFM configured for double tagged packets e show ethernet cfm maintenance points local e show ethernet cfm maintenance points remote e ping ethernet mpid mpid value domain domain name service service name cos value e traceroute ethernet mpid mpid value domain domain name service service name e show ethernet cfm error configuration Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Co
362. n the small office and also many advanced features not available with traditional telephony solutions The ability to deliver IP telephony and data routing by using a single converged solution allows customers to optimize their operations and maintenance costs resulting in a very cost effective solution that meets office needs Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 130 OL 20696 04 _ Chapter Unified Communications on Cisco Integrated Services Routers Call Control W A Cisco Unified CME system is extremely flexible because it is modular A Cisco Unified CME system consists of a router that serves as a gateway and one or more VLANs that connect IP phones and phone devices to the router See Cisco Unified Communications Manager Express CME Overview at http www cisco com en US docs voice_ip_comm cucme admin configuration guide cmeover html Unified Survivable Remote Site Telephony Cisco Unified Survivable Remote Site Telephony SRST enables Cisco routers to provide call handling support for Cisco IP phones when they lose connection to Cisco Unified Communications Manager CUCM installations or when the WAN connection is down In a centralized deployment under normal conditions Cisco IP phones are controlled by the Cisco Unified Communications Manager located at a central site like the headquarters of an enterprise When connection t
363. nabled Although this example is based on a TACACS server the access point could be configured for Admin authentication using RADIUS version 12 3 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password encryption hostname ap username Cisco password 7 123A0C041104 username admin privilege 15 password 7 01030717481C091D25 ip subnet zero aaa new model aaa group server radius rad_eap server 192 168 134 229 auth port 1645 acct port 1646 aaa group server radius rad_mac server 192 168 134 229 auth port 1645 acct port 1646 aaa group server radius rad_acct server 192 168 134 229 auth port 1645 acct port 1646 aaa group server radius rad_admin server 192 168 134 229 auth port 1645 acct port 1646 cache expiry 1 cache authorization profile admin_cache cache authentication profile admin_cache aaa group server tacacs tac_admin server 192 168 133 231 cache expiry 1 cache authorization profile admin_cache cache authentication profile admin_cache Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 290 E OL 20696 04 Chapter Administering the Wireless Device aaa aaa aaa aaa aaa aaa aaa aaa all aaa bri I int no no shu Configuring the Authentication Cache and Profile Hi group server radius rad_pmip
364. nal Router config if ecfm mep end ig ecfm ethernet cfm domain carrier level 2 ig ecfm service carrier port ig ecfm srv continuity check interval 100m Router config interface gigabitethernet 0 2 Router config if ethernet cfm mep domain carrier mpid 44 service carrier Verifying the Ethernet CFM Configuration on a Port MEP Use the following commands to verify Ethernet CFM configured on a port MEP e show ethernet cfm domain e show ethernet cfm maintenance points local e show ethernet cfm maintenance points remote e ping ethernet mpid mpid value domain domain name service service name cos value e traceroute ethernet mpid mpid value domain domain name service service name e show ethernet cfm error configuration Use the show ethernet cfm domain command to view details about CFM maintenance domains Router show ethernet cfm domain carrier Domain Name carrier Level 2 Total Services 1 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces CFM Support on Routed Port and Port MEP W Services Type Id Dir CC CC int Static rmep Crosscheck MaxMEP Source MA Name Port none Dwn Y 100ms Disabled Disabled 100 Static carrier Router Use the show ethernet cfm maintenance points local command to view the MEPs that are
365. nd Router show running interface gigabitethernet 0 0 interface gigabitethernet 0 0 ip address 50 0 0 1 255 255 255 0 cts manual no propagate sgt policy static sgt 77 trusted end Verifying SGT over Ethernet Tagging Use the show cts interface brief command to display the CTS interface specific configuration Router show cts interface brief Interface gigabitethernet 0 0 CTS is enabled mode MANUAL Propagate SGT Enabled Static Ingress SGT Policy Peer SGT Td Peer SGT assignment Trusted Use the show cts platform interface interface name stats detail command to display platform specific CTS related statistics Router show cts platform interface gigabitethernet 0 0 stats detail Interface gigabitethernet 0 0 L2 SGT Statistics Pkts In 31627 Pkts policy SGT assigned 24 Pkts Out 6866 Pkts Drop malformed packet 0 Pkts Drop invalid SGT ug I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Security Features HZ SGT over Ethernet Tagging Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 114 OL 20696 04 Configuring Identity Features on Layer 3 Interface This chapter describes the identify features supported on the Onboard Gigabit Ethernet Layer 3 ports of the Cisco 1921 Integrated Services Rout
366. nd increments each time you press Return or Enter in ROM monitor mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide oL 20696 04 g ca AppendixC Using ROM Monitor HI Information About the ROM Monitor Why is the Router in ROM Monitor Mode The router boots to ROM monitor mode when one of the following occurs e During power up or reload the router did not find a valid system image e The last digit of the boot field in the configuration register is 0 for example 0x100 or 0x0 e The Break key sequence was entered during the first 60 seconds after reloading the router To exit ROM monitor mode see the Exiting ROM Monitor Mode section on page C 25 When do I use ROM Monitor Use ROM monitor in the following situations e Manually loading a system image You can load a system image without configuring the router to load that image in future system reloads or power cycles This can be useful for testing a new system image or for troubleshooting See the Loading a System Image boot section on page C 8 e Upgrading the system image when there are no TFTP servers or network connections and a direct PC connection to the router console is the only viable option See information about upgrading the system image in the configuration documentation for your router e During troubleshooting if the router crashes and hangs See the T
367. nd maintaining network borders gathering statistics and billing information on each network segment separately e Security Provides interworking between encrypted and non encrypted network segment SIP registration services DOS protection authentication services and toll fraud protection on H 323 or SIP trunks See Cisco Unified Border Element Configuration Guide at Cisco com for more information http www cisco com en US docs ios voice cube configuration guide vb_book vb_book html Unified Messaging Gateway The Cisco Unified Messaging Gateway provides an open and secure method of intelligently routing messages and exchanging subscriber and directory information within a unified messaging network It acts as the central hub in a network of Cisco unified messaging solutions and third party gateways that interface with older voicemail systems Unified Messaging Gateway is ideal for companies that need the following key features e Scales the unified messaging network as required for branch office customers and larger distributed enterprises e Simplifies configuration tasks and centralize voicemail system management e Transparently integrates Cisco Unified Communications solutions into existing voicemail installations e Integrates small to large scale unified messaging deployments that consist of more than five Cisco Unity Express systems e Integrates up to 10 000 mixed Cisco Unity Express Cisco Unity and Cisco Unity Connection
368. nfigure the Controlling Port Authorization state SUMMARY STEPS 1 enable configure terminal interface gigabitethernet slot port authentication port control auto mab ea on F WY HN end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EN Chapter HZ Controlling Port Authorization State DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode interface gigabitethernet slot port Example Router config interface gigabitethernet 0 0 Enters interface configuration mode authentication port control auto force authorized force unauthorized Example Router config if authentication port control auto force authorized force unauthorized Enables the manual control of the port authorization state auto Allows only EAPol traffic until successful authentication force authorized Allows all traffic requires no authentication force unauthorized Allows no traffic mab Example Router config if mab Enables MAC based authentication on a port end Example Router config if end Router Returns to privileged EXE
369. nfiguring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide CFM Support on Routed Port and Port MEP W Use the show ethernet cfm maintenance points local command to view the local MEPs The following is a sample output of the show ethernet cfm maintenance points local command Router show ethernet cfm maintenance points local MPID Domain Name MacAddress T St Ptst Lvl Domain ID Ingress RDI MA Name Type Id SrvcInst EVC Name Age Local MEP Info 100 customer 8843 e154 6f01 Up Up 7 customer Gi0 2 1101 customer1101 S C 100 30 N A N A 58s MPID 100 Domain customer MA customer1101 Router Use the show ethernet cfm maintenance points remote command to display the remote maintenance point domains In the following example customer carrier and enterprise are the maintenance point domains that are configured On router 1 Routerl show ethernet cfm maintenance points remote MPID Domain Name MacAddress TES Ptst Lvl Domain ID Ingress RDI MA Name Type Id SrvcInst EVC Name Age Local MEP Info 110 customer 8843 e154 6f01 Up Up 7 customer Gi0 2 1101 customer1101 S C 100 30 N A N A 58s MPID 100 Domain customer MA customer1101 43 carrier 8843 e154 6f01 Up Up 2 carrier Gi0 2 2 carrier S C 50 20 N A N A 58s MPID 44 Domain carrier MA carrier 410 en
370. nformation on how to effectively use this k command in ROM monitor mode see the Troubleshooting Router Hangs tech note Example rommon gt stack Step2 context Optional Displays the CPU context at the time of the fault e If it is available the context from kernel mode and Example process mode of a loaded image is displayed rommon gt context Step3 frame number Optional Displays an entire individual stack frame e The default is O zero which is the most recent frame Example rommon gt frame 4 Step4 sysret Optional Displays return information from the last booted system image Example e The return information includes the reason for rommon gt sysret terminating the image a stack dump of up to eight frames and if an exception is involved the address at which the exception occurred Step5 meminfo 1 Optional Displays memory information including e Main memory size starting address and available Example range Tommon 2 TEMES e Packet memory size e NVRAM size Alternatively using the meminfo l command provides information on supported DRAM configurations for the router Examples This section provides the following examples e Sample Output for the stack ROM Monitor Command page C 23 e Sample Output for the context ROM Monitor Command page C 23 e Sample Output for the frame ROM Monitor Command page C 24 e Sample Output for the sysret ROM Monitor Command page C 24 e Sample Output for the me
371. ning in global configuration mode Note SUMMARY STEPS The TTY lines are asynchronous lines used for inbound or outbound modem and terminal connections and can be seen in a router or access server configuration as line x The specific line numbers are a function of the hardware built into or installed on the router or access server In Cisco ISR G2 series routers the TTY lines are incremented by 1 and start with line number3 instead of line number 2 in Cisco ISR G1 series routers In ISR G2 series routers line number 2 cannot be accessed since it has been used for the second core feature TTY lines are not static and line numbers can be changed in future when more features are added similar to the second core 1 line aux console tty vty line number password password login exec timeout minutes seconds line aux console tty vty line number password password login o N os FF ooN end OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Chapter Basic Router Configuration WE Configuring Command Line Access DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Step7 Step 8 Command Purpose line aux console tty vty line number Example Router config line console 0 Router config line Enters line configuration mode and specifies the type of line T
372. nitor mode e If you reload the router and enter the Break key sequence to enter ROM monitor mode when the router would otherwise have booted the system image you can exit ROM monitor mode by doing either of the following Enter the i command or the reset command which restarts the booting process and loads the system image Enter the cont command which continues the booting process and loads the system image e If your router entered ROM monitor mode because it could not locate and load the system image perform the steps in the following procedure SUMMARY STEPS 1 dir flash0 directory 2 boot flash0 directory filename or boot filename tftpserver or boot filename Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I oL 20696 04 g c25 AppendixC Using ROM Monitor HI How to Use the ROM Monitor Typical Tasks DETAILED STEPS Command or Action Purpose Step1 dir flash0 directory Displays a list of the files and directories in flash memory e Locate the system image that you want the router to Example load nomon me eke e If the system image is not in flash memory use the second or third option in Step 2 Step2 boot flash0 directory filename In order the examples here direct the router to or e Boot the first image or a specified image in flash memory boot filename tftpserver e Boot the specified image
373. nitored access point goes off line and the standby access point takes its place in the network matching settings ensure that client devices can switch easily to the standby access point See Hot Standby Access Points at Cisco com for more information http www cisco com en US docs routers access wireless software guide RolesHotStandby html Upgrading to Cisco Unified Software To run the access point in Cisco Unified mode upgrade the software by following these major steps e Preparing for the Upgrade page 215 e Performing the Upgrade page 216 e Downgrading the Software on the Access Point page 217 e Recovering Software on the Access Point page 217 Software Prerequisites e Cisco 1941W ISRs are eligible to upgrade to Cisco Unified software if the router is running IP Base feature set and Cisco IOS Release 15 0 1 M e To use the embedded access point in a Cisco Unified Architecture the Cisco wireless LAN controller WLC must be running version 5 1 or later Preparing for the Upgrade Perform these tasks to prepare for the upgrade e Secure an IP Address on the Access Point page 215 e Prior to the Upgrade page 216 Secure an IP Address on the Access Point Secure an IP address on the access point so it can communicate with the WLC and download the Unified image upon boot up The host router provides the access point DHCP server functionality through the DHCP pool Then the access point communicates with the WLC and setup option
374. nning config Verifies your entries Step9 copy running config startup config Optional Saves your entries in the configuration file To disable AAA use the no aaa new model command in global configuration mode To disable authorization use the no aaa authorization network exec method command in global configuration mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 ms 289 Chapter Administering the Wireless Device W Configuring the Authentication Cache and Profile Configuring the Authentication Cache and Profile The authentication cache and profile feature allows the access point to cache the authentication and authorization responses for a user so that subsequent authentication and authorization requests do not need to be sent to the AAA server Note On the access point this feature is supported only for Admin authentication The following commands that support this feature are included in Cisco IOS Release 12 3 7 cache expiry cache authorization profile cache authentication profile aaa cache profile Note See Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges Versions 12 4 10b JA and 12 3 8 JEC for information about these commands The following is a configuration example for an access point configured for Admin authentication using TACACS with the authorization cache e
375. nterrupt service request ISR events I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Y 1731 Performance Monitoring PM provides a standard Ethernet PM function that includes measurement of Ethernet frame delay frame delay variation frame loss and frame throughput measurements specified by the ITU T Y 1731 standard and interpreted by the Metro Ethernet Forum MEF standards group amp Note This feature is supported only if you have purchased the DATA technology package functionality datak9 licensing package For more information about managing software activation licenses on the Cisco ISR and Cisco ISR G2 platforms see http www cisco com en US docs routers access sw_activation SA_on_ISR html Frame Delay Ethernet frame delay measurement is used to measure frame delay and frame delay variations Ethernet frame delay is measured using the Delay Measurement Message DMM method Restrictions for Configuring Two Way Delay Measurement Follow the guidelines and restrictions listed here when you configure two way delay measurement e Y 1731 PM measurement works only for a po
376. ntication default list name copy running config startup config Purpose Step1 configure terminal Enters global configuration mode Step2 aaa new model Enables AAA Step3 aaa authentication login default list name method method2 Creates a login authentication method list e To create a default list that is used when a named list is not specified in the login authentication command use the default keyword followed by the methods that are to be used in default situations The default method list is automatically applied to all interfaces e For list name specify a character string to name the list you are creating e For method1 specify the actual method the authentication algorithm tries The additional methods of authentication are used only if the previous method returns an error not if it fails Select one of these methods e local tuUse the local username database for authentication You must enter username information in the database Use the username password global configuration command e radius Use RADIUS authentication You must configure the RADIUS server before you can use this authentication method For more information see the Identifying the RADIUS Server Host section of the Configuring Radius and TACACS Servers chapter in Cisco IOS Software Configuration Guide for Cisco Aironet Access Points Step4 line console tty vty line number ending line numb
377. nticator aAa WwW DN end Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode interface gigabitethernet slot port Example Router config interface gigabitethernet 0 0 Enters interface configuration mode authentication port control auto Example Router config if authentication port control auto Enables the manual control of the port authorization state dot1x pae authenticator Example Router config if dot1x pae authenticator Configures the port as an IEEE 802 1x Port Access Entity PAE authenticator end Example Router config if end Router Returns to privileged EXEC mode Verifying the IEEE 802 1X Use the show authentication sessions command to verify the configuration c1921 show authentication sessions Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Identity Features on Layer 3 Interface Interface Gid 1 MAC Address 000d e105 c771 Method dot1ix Status Authz Success Domain DATA c1921 show authentication sessions interface Gi0 1 Interface MAC Address IP Address User Name Status Domain Oper host mode Oper control dir
378. o 2921 Integrated Services Router Cisco 2951 Integrated Services Router Cisco 3900 Integrated Services Router Cisco 3900E Series Integrated Services Routers Cisco 892 F Gigabit Ethernet Security Router Cisco 898 EA Gigabit Ethernet Security Router EHWIC 1GE SFP 1 enable 2 configure terminal 3 service unsupported transceiver 4 interface type slot subslot port number I OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management WE Configuring Third Party SFPs media type sfp speed value shutdown no shutdown o o N Q o exit DETAILED STEPS Command or Action Purpose Step 1 enable Example Router gt enable Enables the privileged EXEC mode Enter your password if prompted Step2 configure terminal Example Router configure terminal Enters the global configuration mode Step3 service unsupported transceiver Example Router config service unsupported transceiver Enables third party SFP support Step4 interface type slot subslot port number Example Router config interface ethernet 0 3 0 Selects an interface to configure Step5 media type sfp Example Router config if media type sfp Changes media type to SFP Step6 speed value Example Router config if speed 100 Configures the speed of the interface Note For 1OOBASE SFPs configure the speed to 100 Mbps only Similarly for 1OOOBASE SFPs configure the sp
379. o CUCM breaks for example as result of a failure in the network Unified SRST automatically detects the failure and auto configures the router for providing backup call processing functionality During a WAN failure the router allows all the phones to re register to the remote site router in SRST mode allowing all inbound and outbound dialing to be routed off to the PSTN on a backup Foreign Exchange Office FXO BRI or Primary Rate Interface PRI connection Unified SRST provides redundancy for both Cisco IP as well as Analog phones to ensure that the telephone system remains operational during network failures Both Skinny Client Control Protocol SCCP and session initiation protocol SIP based Cisco IP phones are supported with the Unified SRST When the WAN link or connection to the Cisco Unified Communications Manager is restored call handling reverts back to the Cisco Unified Communications Manager automatically without need for any human intervention For general Unified SRST information see Cisco Unified SRST System Administrator Guide e For information on how the H 323 and Media Gateway Control Protocol MGCP call control protocols relate to SRST see Cisco Unified SRST System Administrator Guide For H 323 see H 323 Gateways and SRST at Cisco com For MGCP see MGCP Gateways and SRST at Cisco com e Configurations of major SRST features are provided in the following chapters of the Cisco Unified SRST System Administr
380. o determine the routes to all other networks To provide complete routing capability the common practice is to use some routers as smart routers and give the remaining routers default routes to the smart router Smart routers have routing table information for the entire internetwork These default routes can be passed along dynamically or can be configured into the individual routers Most dynamic interior routing protocols include a mechanism for causing a smart router to generate dynamic default information that is then passed along to other routers If a router has an interface that is directly connected to the specified default network the dynamic routing protocols running on the router will generate or source a default route In the case of RIP the router will advertise the pseudo network 0 0 0 0 In the case of IGRP the network itself is advertised and flagged as an exterior route A router that is generating the default for a network also may need a default of its own One way a router can generate its own default is to specify a static route to the network 0 0 0 0 through the appropriate device Gateway of Last Resort SUMMARY STEPS When default information is being passed along through a dynamic routing protocol no further configuration is required The system periodically scans its routing table to choose the optimal default network as its default route In the case of RIP there is only one choice network 0 0 0 0 In the case
381. o routers e Entering a Directory and Determining Which Directory You Are In page B 7 e Creating a New Directory page B 8 e Removing a Directory page B 9 Entering a Directory and Determining Which Directory You Are In To enter a directory of a CF memory card enter the ed command in privileged EXEC mode The cd command specifies or changes the default directory or file system If you enter cd only without specifying a file system the router enters the default home directory which is flashO If you enter ca flash1 the router enters the flash directory Router cd To determine which directory you are in enter the pwd command in privileged EXEC mode The CLI displays which directory or file system is specified as the default by the ed command Router pwd To display a list of files in the directory that you are in enter the dir command in privileged EXEC mode The command line interface will display the files in the file system that was specified as the default by the cd command Router dir Directory of flash0 1580 rw 6462268 Mar 06 2004 06 14 02 c2900 universalk9 mz 3600ata 3 rw 6458388 Mar 01 2004 00 01 24 c2900 universalk9 mz 63930368 bytes total 51007488 bytes free Entering a Directory Example To enter the config directory Router cd config To verify that you are in the config directory I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Genera
382. obal Step5 ethernet cfm domain domain name level level id Step6 service service name vlan vlan id direction down Step7 continuity check Step8 interface gigabitethernet slot port Step9 ethernet cfm mep domain domain name mpid value service service name Step10 interface gigabitethernet s ot port subinterface Step11 encapsulation dotlq vlan id Step12 end DETAILED STEPS Command Purpose Step1 enable Enables the privileged EXEC mode Enter your password when prompted Example Router gt enable Step2 configure terminal Enters the global configuration mode Example Router configure terminal Step3 ethernet cfm ieee Enables the IEEE version of CFM Example Router config ethernet cfm ieee Step4 jethernet cfm global Enables CFM processing globally on the router Example Router config ethernet cfm global Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Command CFM Support on Routed Port and Port MEP W Purpose Step5 ethernet cfm domain domain name level value Example Router config ethernet cfm domain customer level 7 Defines a CFM maintenance domain at a specified level and enters the Ethernet CFM configuration mode level can be any value from 0 to 7 Step 6 service service name vlan vlan id dire
383. of IGRP there might be several networks that can be candidates for the system default The Cisco IOS software uses both administrative distance and metric information to determine the default route gateway of last resort The selected default route appears in the gateway of last resort display of the show ip route EXEC command If dynamic default information is not being passed to the software candidates for the default route are specified with the ip default network global configuration command In this usage the ip default network command takes an unconnected network as an argument If this network appears in the routing table from any source dynamic or static it is flagged as a candidate default route and is a possible choice as the default route If the router has no interface on the default network but does have a route to it it considers this network as a candidate default path The route candidates are examined and the best one is chosen based on administrative distance and metric The gateway to the best default path becomes the gateway of last resort 1 enable 2 configure terminal 3 ip routing 4 ip route dest prefix mask next hop ip address admin distance permanent 5 ip default network network number or ip route dest prefix mask next hop ip address I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide AppendixA Cis
384. of by using a binary library or DLL The AXL API methods known as requests use a combination of HTTPS and SOAP SOAP is an XML remote procedure call RPC protocol The server receives the XML structures and executes the request If the request completes successfully the system returns the appropriate AXL response All responses are named identically to the associated requests except that the word Response is appended See Cisco Unified Communications Manager XML Developers Guide Release 7 0 1 at Cisco com for information http www cisco com en US docs voice_ip_comm cucm devguide 7_0_1 ccmdvCh1 html Gatekeeper Transaction Message Protocol GKTMP The Cisco Gatekeeper Transaction Message Protocol GKTMP and application programming interface APJ is available for your use See GKTMP Commands GK API Guide Version 4 4 at Cisco com for the latest Gatekeeper API inputs and outputs http www cisco com en US docs ios 12_3 gktmpv4_3 guide gk_cli html Online Insertion and Removal lt a Online insertion and removal OIR is a feature that allows you to replace modules without turning off the router and without affecting the operation of other interfaces OIR of a module provides uninterrupted operation to network users maintains routing information and ensures session preservation For instructions on inserting removing and replacing the module see the hardware installation guide for your router at Cisco com Cisco 3900 S
385. of non volatile configuration memory 62960K bytes of USB Flash usbflash0O Read Write 248472K bytes of ATA System CompactFlash 0 Read Write 248472K bytes of ATA CompactFlash 1 Read Write Press RETURN to get started Nov 22 09 20 19 839 Nov 22 09 20 19 839 LINK 3 UPDOWN Interface GigabitEthernet0 0 changed state to up LINK 3 UPDOWN Interface GigabitEthernet0 1 changed state to down Nov 22 09 20 19 839 LINK 3 UPDOWN Interface GigabitEthernet0 2 changed state to down Nov 22 09 20 19 839 LINEPROTO 5 UPDOWN Line protocol on Interface GigabitEthernet0 0 64 changed state to down Nov 22 09 20 19 839 SLINEPROTO t5 UPDOWN Line protocol on Interface GigabitEthernet0 1 64 changed state Router gt rommon 1 gt boot usbflash1 c2900 universalk9 mz SSA program load complete entry point 0x80803000 size 0x1b340 IOS Image Load Test Digitally Signed Development Software program load complete entry point 0x81000000 size 0x3968d28 Self decompressing the image Hat HE HE HE HE HE HE HEE EE HE HE HE HE HE HE EE HE HE HE HE HE HE HE HE HE FE HE HE FE HE HE EE EE HE HE HE FE a HE HE Ha FE HE HE HH HH HE HE HE HE HE HE HE H Ht HE HE HE HE HE HE HE HE FE HE HE HE HE HE HE HE HE HE HE FE HE HE FE HE HE FE HE HE FE HE HE HE HE FE HE FE FE HE FE FE HE FE FE HE HE HH HE FE FE HE FHE HE HE FHE HE HE HE FE HE HE HE HE HE HE FHE HE HE FHE HE HE FHE HE HE HE HE HE HE HE HE HE HE HE HH Ha E HE HE HE H
386. olicies Session timeout N A Idle timeout N A Common Session ID 030303030000000C00310024 Acct Session ID 0x0000000F Handle 0x8C00000D Runnable methods list Method State dot1ix Authc Success c1921 show dotix interface g0 1 Dot1x Info for GigabitEthernet0 1 PAE AUTHENTICATOR PortControl AUTO ControlDirection In HostMode SINGLE_HOST QuietPeriod 60 ServerTimeout 0 SuppTimeout 30 ReAuthMax 2 MaxReq 2 TxPeriod 30 Preauthentication Access Control List When Open Access is installed we recommend that a default port access control list ACL is configured on the authenticator The ACL allows the end point to get a minimum access to the network to get its IP Address and running Configuring the Preauthentication Access Control List For information about preconfiguring ACL see http www cisco com c en us td docs switches lan catalyst6500 ios 12 2S Y configuration guide sy_s wcg port_acls html wp 1039754 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 126 OL 20696 04 Chapter Configuring Identity Features on Layer 3 Interface Downloadable Access Control List W Downloadable Access Control List A Downloadable ACL is also referred to as dACL For a dACL to work on a port the ip device tracking feature should be enabled and the end point connected to the port should have an IP address assi
387. omain names to IP addresses you must first identify the hostnames specify the name server that is present on your network and enable the DNS This section contains the following configuration information e Default DNS Configuration page 283 e Setting Up DNS page 283 e Displaying the DNS Configuration page 284 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Configuring a System Name and Prompt W Default DNS Configuration Table 3 describes the default DNS configuration Table 3 Default DNS Configuration Feature Default Setting DNS enable state Disabled DNS default domain name None configured DNS servers No name server addresses are configured Setting Up DNS To set up the wireless device to use the DNS follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 ip domain name name 3 ip name server server address1 server address2 server address6 4 ip domain lookup 5 end 6 show running config 7 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 ip domain name name Defines a default domain name that the software uses to complete unqualified hostnames names without a dotted decimal domain name Do not include the initia
388. ommand page 263 e Logging Into and Exiting a Privilege Level page 264 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Protecting Access to Privileged EXEC Commands W Setting the Privilege Level for a Command To set the privilege level for a command mode follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 privilege mode level level command 3 enable password level evel password 4 end 5 show running config or show privilege 6 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 privilege mode level level command Sets the privilege level for a command e For mode enter configure for global configuration mode exec for EXEC mode interface for interface configuration mode or line for line configuration mode e For level the range is from 0 to 15 Level 1 is for normal user EXEC mode privileges Level 15 is the level of access permitted by the enable password e For command specify the command to which you want to restrict access Step3 enable password level level password _ Specifies the enable password for the privilege level e For level the range is from 0 to 15 Level 1 is for normal user EXEC mode privileges e For password specify a
389. on and Accounting comprehensive solution that allows easy access to a broad range of web resources and web enabled applications using native HTTP over SSL HTTPS browser support SSL VPN delivers three modes of SSL VPN access clientless thin client and full tunnel client support For additional information about configuring SSL VPN see the SSL VPN section of Cisco IOS Security Configuration Guide Secure Connectivity Release 12 4T at http www cisco com en US docs ios sec_secure_connectivity configuration guide 12_4t sec_secure_connectivity_12_4t_book html Authentication Authorization and Accounting Authentication Authorization and Accounting AAA network security services provide the primary framework through which you set up access control on your router Authentication provides the method of identifying users including login and password dialog challenge and response messaging support and depending on the security protocol you choose encryption Authorization provides the method for remote access control including one time authorization or authorization for each service per user account list and profile user group support and support of IP Internetwork Packet Exchange IPX AppleTalk Remote Access ARA and Telnet Accounting provides the method for collecting and sending security server information used for billing auditing and reporting such as user identities start and stop times executed commands such as
390. on 2 Software Configuration Guide OL 20696 04 Chapter Basic Router Configuration Example Configuring Static Routes W The following configuration shows the command line access commands You do not need to input the commands marked default These commands appear automatically in the configuration file generated when you use the show running config command I line con 0 exec timeout 10 0 password 4youreyesonly login transport input none default stopbits 1 default line vty 0 4 password secret login I Configuring Static Routes SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Static routes provide fixed routing paths through the network They are manually configured on the router If the network topology changes the static route must be updated with a new route Static routes are private routes unless they are redistributed by a routing protocol To configure static routes follow these steps beginning in global configuration mode 1 ip route prefix mask ip address interface type interface number ip address 2 end Command Purpose ip route prefix mask ip address interface type Specifies the static route for the IP packets interface number ip address For details about this command and about f additional parameters that can be set see Cisco Example IOS IP Command Reference Volume 2 of 4 Router config ip route 192 168 1 0 Routing Protocols Release 12 3 255 255 0 0 10
391. on Guide 2009 2014 Cisco Systems Inc All rights reserved Preface This preface describes the objectives audience organization conventions of this guide and the references that accompany this document set The following sections are provided e Objectives page 1 e Audience page 1 e Organization page 1 e Conventions page 3 e Related Documentation page 4 e Searching Cisco Documents page 5 Objectives This guide provides an overview and explains how to configure the various features for the Cisco 1900 series Cisco 2900 series and Cisco 3900 series integrated services routers generation 2 ISR G2 Some information may not apply to your particular router model Audience This document is written for experienced technical workers who install monitor and troubleshoot routers under a service contract or who work for an information technology IT department Organization This guide is divided into three parts e Part 1 Configuring the Router e Part 2 Configuring the Access Point e Part 3 Appendix Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 E Preface W Organization Part 1 Configuring the Router Description Module 1 Overview of Hardware and Software Describes new hardware and software features in this release features by platform ne
392. on for Cisco Access Products with 802 1 1la b g and 802 11b g Radios Regulatory Compliance and Safety Information for Cisco 2900 Series Integrated Services Routers Regulatory Compliance and Safety Information for Cisco 3900 Series Integrated Services Routers Software Activation Software Activation for Cisco Integrated Services Routers Cisco IOS Software Activation Configuration Guide Configuration Cisco CP Express User s Guide Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Preface Searching Cisco Documents W Type of Document Links Cisco Internet Operating Cisco IOS software release 15 0 is the next IOS release following the Cisco System Software IOS IOS 12 4 24 T release For information about new features in Cisco IOS software release 15 0 see the Cisco IOS software pages at Cisco com Go here to read a product bulletin that specifies the software feature sets available for Cisco 1900 2900 and 3900 Series Integrated Services Routers in release 15 0 It also issues recommendations for Flash and DRAM memory configuration http www cisco com en US prod collateral fiosswrel ps8802 ps5460 product_bulletin_c25 566278_ps10537_Products_Bulletin html Wireless e Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges versions 12 4 10b JA and 12 3 8 JEC e Wireless LAN
393. on login default local Sets the login authentication to use the local username database The default keyword applies the local user database authentication to all interfaces Step4 aaa authorization exec local Configures user AAA authorization to determine whether the user is allowed to run an EXEC shell by checking the local database Step5 aaa authorization network local Configures user AAA authorization for all network related service requests Step6 username name privilege level Enters the local database and establishes a username based password encryption type password authentication system Repeat this command for each user e For name specify the user ID as one word Spaces and quotation marks are not allowed e Optional For level specify the privilege level that the user has after gaining access The range is 0 to 15 Level 15 gives privileged EXEC mode access Level 0 gives user EXEC mode access e For encryption type enter 0 to specify that an unencrypted password follows Enter 7 to specify that a hidden password follows e For password specify the password that the user must enter to gain access to the wireless device The password must be from 1 to 25 characters long can contain embedded spaces and must be the last option specified in the username command Note The characters TAB and are invalid characters for passwords Step7 end Returns to privileged EXEC mode Step8 show ru
394. onfiguration register bits only from the ROM monitor To change the configuration register using the ROM monitor see Appendix C Using ROM Monitor To configure the console line speed from the Cisco IOS command line interface complete the following steps SUMMARY STEPS 1 enable configure terminal line console 0 PF N speed baud DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode Enter your password if prompted Example Router gt enable Password password Router Step2 configure terminal Enters global configuration mode Example Router configure terminal Router config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I oL 20696 04 g Dos Appendix D Changing the Configuration Register Settings HZ Configuring the Console Line Speed Cisco IOS CLI Command or Action Purpose Step3 line console 0 Specifies the console line and enters line configuration mode Example Router config line console 0 Router config line Step4 speed baud Specifies the console line speed Possible values in baud 1200 2400 4800 9600 19200 38400 57600 115200 Example Router config line speed baud Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide D 6 OL 20696 04
395. onfiguring Radio Settings Step5 Step 6 Step7 Enabling and Disabling Gratuitous Probe Response W Command Purpose antenna transmit Sets the transmit antenna to diversity left or right diversity left right Note For best performance with two antennas leave the receive antenna setting at the default setting diversity For one antenna attach the antenna on the right and set the antenna for right end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Enabling and Disabling Gratuitous Probe Response SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Gratuitous Probe Response GPR aids in conserving battery power in dual mode phones that support cellular and WLAN modes of operation GPR is available on 5 Ghz radios and is disabled by default You can configure two GPR settings e Period tThis setting determines the time between GPR transmissions in Kusec intervals from 10 to 255 similar to the beacon period e Speed tThe speed is the data rate used to transmit the GPR Selecting a longer period reduces the amount of RF bandwidth consumed by the GPR with the possibility of shorter battery life Selecting higher transmission speeds also reduces the amount of bandwidth consumed but at the expense of a smaller cell size To enable GPR and set its parameters follow these steps beginning in privileged EXEC
396. onfiguring Third Party SFPs Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 84 OL 20696 04 Configuring Power Efficiency Management The Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers generation 2 ISR G2 have hardware and software features for reducing power consumption The hardware features include high efficiency AC power supplies and electrical components with built in power saving features such as RAM select and clock gating See your router s hardware installation guide for more information on these hardware features The software features include Energy Wise a power efficiency management feature that will power down unused modules and disable unused clocks to the modules and peripherals on the router ISR G2s must be running Cisco IOS Release 15 0 1 M or later to support Energy Wise Detailed configuration procedures are included in the Cisco EnergyWise Configuration Guide which can be found at Cisco com The following sections provide general information about the Energy Wise feature running on ISR G2s e Modules and Interface Supporting EnergyWise page 85 e Restrictions for Power Efficiency Management and OIR page 86 Modules and Interface Supporting EnergyWise Table 1 lists the modules and interface cards that are supported for use with Energy Wise at the time of this product release
397. ong allows only the long 800ns guard interval Step4 end Returns to privileged EXEC mode Step5 copy running config Optional Saves your entries in the configuration file startup config Enabling and Disabling World Mode You can configure the wireless device to support 802 11d world mode Cisco legacy world mode or world mode roaming When you enable world mode the wireless device adds channel carrier set information to its beacon Client devices with world mode enabled receive the carrier set information and adjust their settings automatically For example a client device used primarily in Japan could rely on world mode to adjust its channel and power settings automatically when it travels to Italy and joins a network there Cisco client devices detect whether the wireless device is using 802 11d or Cisco legacy world mode and automatically use the world mode that matches the mode used by the wireless device You can also configure world mode to be always on In this configuration the access point essentially roams between countries and changes its settings as required World mode is disabled by default To enable world mode follow these steps beginning in privileged EXEC mode I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Radio Settings W Enabling and Disabling World Mode SU
398. onnection name module module vlan id module module2 command to redirect VLAN traffic flows from SM to SM or SM to ISM connections on the MGF The following two modules as well as others support VLAN traffic redirection e Cisco Etherswitch service module e Cisco Services Ready Engine internal service module ISM SRE See the module documentation to validate HIMI support I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Multi Gigabit Fabric Communication W Viewing Platform Information Viewing Platform Information The following sections explain how to view VLAN slot module interface card and MGF statistics on the router e Viewing VLAN and Slot Assignments page 174 e Viewing Module and Interface Card Status on the Router page 174 e Viewing Multi Gigabit Fabric Statistics page 175 Viewing VLAN and Slot Assignments Slots on the router are optionally assigned to VLANs From privileged EXEC mode enter the show platform mgf command then press Enter to display VLAN and slot assignments on the router An asterisk next to the slot indicates that the vlan is the slot s default VLAN The following example displays output from a Cisco 3945 ISR amp Note VLANI is the default when no other VLAN are listed Router show platform mgf VLAN Slots 1 ISM EHWIC 0 EHWIC 1 EHWIC 2 EHW
399. ons Manager Express page 130 Unified Survivable Remote Site Telephony page 131 Cisco Unified SIP Proxy CUSP page 132 Gatekeeper page 132 e Call Control Protocols page 132 Trunk side Protocols page 132 Line side Protocols page 133 e Unified Communications Gateways page 134 TDM Gateways page 135 Cisco Unified Border Element page 136 Unified Messaging Gateway page 136 e IP Media Services page 137 Conferencing Transcoding and Media Termination Point MTP page 137 RSVP Agent page 137 Trusted Relay Point TRP page 137 Packet Voice Data Module page 138 e Voice Security page 138 UC Trusted Firewall page 138 Signaling and Media Authentication and Encryption page 139 Virtual Route Forward page 139 e Applications and Application Interfaces APIs page 139 Cisco Unity Express page 140 Voice XML page 140 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chapter Unified Communications on Cisco Integrated Services Routers HE Modules and Interface Cards Hoot n Holler page 141 Cisco Application Extension Platform page 141 APIs page 141 e Online Insertion and Removal page 142 Modules and Interface Cards Cisco 3900 series and Cisco 2900 series ISRs support Unified Communications UC modules and interface cards in the following slots e Next generation packet voice data
400. onsidered if randomly scheduled Next Scheduled Start Time Start Time already passed Group Scheduled FALSE Randomly Scheduled FALSI Life seconds Forever Entry Ageout seconds never GI Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 x Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Recurring Starting Status of entry SNM Statistics Parameters Frame offset 1 Distribution Delay Two Way Number of Bins 10 Everyday FALSE P RowStatus Active Bin Boundaries 5000 10000 15000 20000 25000 30000 35000 40000 45000 1 Distribution Delay Variation Two Way Number of Bins 10 Bin Boundaries 5000 10000 15000 20000 25000 30000 35000 40000 45000 1 Aggregation Period 30 History Number of intervals 2 Router show ethernet cfm pm session summary Number of Configured Session Number of Active Session 2 Number of Inactive Session Router Session ID 0 Sla Session ID 1101 Level 7 Service Type S C Service Id 100 1101 Direction Down Session Version 0 Source Mac 5352 a824 04fr Destination Mac 5067 a87c fa92 Session Operation Proactive Session Status Active MPID 4101 Tx active yes Rx active yes Timeout timer stopped
401. ontains different sets of Cisco IOS features therefore select an appropriate system image to suit your network requirements Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 178 OL 20696 04 Chapter Upgrading the Cisco IOS Software How to Upgrade the Ciscol0S Image W Which Cisco IOS Release Is Running on My Router Now To determine the Cisco IOS release that is currently running on your router and the filename of the system image enter the show version command in user EXEC or privileged EXEC mode How Do I Choose the New Cisco IOS Release and Feature Set To determine which Cisco IOS releases and feature are supported on your platform go to Cisco Feature Navigator at http www cisco com go cfn You must have an account at Cisco com If you do not have an account or have forgotten your username or password click Cancel at the login dialog box and follow the instructions that appear Cisco 3900 series 2900 series and 1900 series ISRs support Cisco IOS software entitlement and enforcement See Software Activation on Cisco Integrated Services Routers at Cisco com for feature and package license information Where Do Download the System Image To download a system image you must have an account at Cisco com to gain access to the following websites If you do not have an account or have forgotten your username or password click Cancel at t
402. ontinues the booting process and loads the system image Setting the Configuration Register to Boot to ROM Monitor Mode This section describes how to enter ROM monitor mode by setting the configuration register to boot to ROM monitor mode at the next system reload or power cycle For more information about the configuration register see the Changing the Configuration Register Settings document at http www cisco com en US docs routers access 1800 184 1 software configuration guide b_creg html A Caution Do not set the configuration register by using the config register 0x0 command after you have set the baud rate To set the configuration register without affecting the baud rate use the current configuration register setting by entering the show ver inc configuration command and then replacing the last rightmost number with a 0 in the configuration register command SUMMARY STEPS 1 enable configure terminal config register 0x0 exit write memory a FF oN reload Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide oL 20696 04 g cs AppendixC Using ROM Monitor HI Howto Use the ROM Monitor Typical Tasks DETAILED STEPS Command or Action Purpose Step1 enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted Step2 configure terminal Example Router confi
403. opriate e If you are certain that all the files in flash memory should be erased enter y twice when prompted to erase flash before copying e If you are not certain that all files in flash memory should be erased press Ctrl Z and follow the instructions in the Ensuring Adequate Flash Memory for the New System Image section on page 183 7 If the error message does not appear enter no when prompted to erase the flash memory before copying Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 a is7 Chapter Upgrading the Cisco 10S Software W How to Upgrade the Cisco 10S Image DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step7 Troubleshooting Tips enable Use this command to enter privileged EXEC mode Enter your password if prompted Router gt enable Password lt password gt Router copy tftp flash0 or copy rep flash0 Use one of these commands to copy a file from a server to flash memory Router copy tftp flash0 When prompted enter the IP address of the TFTP or RCP server Address or name of remote host 10 10 10 2 When prompted enter the filename of the Cisco IOS software image to be installed Source filename c2900 universalk9 mz bin amp Note The filename is case sensitive When prompted enter the filename as you want it to appear on the r
404. ort interfacel 2 port _ interface 2 port interface 1 4 port interface 1 4 port Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 E Chapter Basic Router Configuration WE Configuring Gigabit Ethernet Interfaces Table 1 Slots Ports Logical Interface Interfaces 1941 Interfaces by Cisco Router continued 2901 2911 amp 2921 2951 amp 3925 amp 3945 3925E amp 3945E Interfaces on Double Wide SM not supported not supported not supported interface 2 port interface4 port interface 2 port interface 4 port Interfaces HWIC on SM Interfaces VWIC on SM not supported not supported interfacelwic slot port interface 1 2 wic slot port interface 1 4 wic slot port interface 1 2 wic slot port interface 1 4 wic slot port 1 On the Cisco 2901 router the numbering format for configuring an asynchronous interface is 0 slot port To configure the line associated with an asynchronous interface simply use the interface number to specify the asynchronous line For example line 0 1 0 specifies the line associated with interface serial 0 1 0 on a WIC 2A S in slot 1 Similarly line 0 2 1 specifies the line associated with interface async 0 2 1 on a WIC 2AM in slot 2 MGF multi gigabit fabric Applies only to Cisco 2951 Cisco
405. ous level 0 SHUT Transitions Successful Unsuccessful SHUT 1 0 FRUGAL 0 1 FULL 1 0 Slot 0 3 Levels supported 0x441 SHUT FRUGAL FULL CURRENT level 10 FULL Previous level 10 FULL Transitions Successful Unsuccessful SHUT 0 0 FRUGAL 0 0 FULL 0 0 Step2 show voice call slot port amp Note If you are connected using a Telnet session you must enter the terminal monitor command before the show voice call command to see console messages This step is not necessary if you are connected to the console port Use this command to display statistics for voice calls on a specific slot and port for example Router show voice call 0 1 1 23 0717123 I vtsp level 0 state S_CONNECT callid 0x0011 B01 state S_TSP_CONNECT clld 4085001112 cllg 4085001112 07171723 2 vtsp level 0 state S_CONNECT callid 0x0012 B02 state S_TSP_CONNECT clld 4085001112 cllg 4085001112 0 1 1 23 3 0 1 1 23 4 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Next Generation High Density PVDM3 Modules HZ How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 0 1 Step 3 1 23 1 23 1 23 1 23 1 23 1 23 L 23 123 1 23 1 23 1 23 1 23 D323 1 23 1
406. outer Typically the same filename is entered as was used in Step 4 Destination filename c2900 universalk9 mz bin If an error message appears that says Not enough space on device do one of the following as appropriate e If you are certain that all the files in flash memory should be erased enter y when prompted twice to confirm that flash memory will be erased before copying Accessing tftp 10 10 10 2 c2900 universalk9 mz bin Erase flash0O before copying confirm y Erasing the flash filesystem will remove all files Continue confirm y Erasing device eeeeeeeeececeeeceecececececececececeeeceeceeeeeeeeeeeeceecee e If you are not certain that all the files in flash memory should be erased press Ctrl Z and follow the instructions in the Ensuring Adequate Flash Memory for the New System Image section on page 183 If the error message does not appear enter no when prompted to erase the flash memory before copying Accessing tftp 10 10 10 2 c2900 universalk9 mz bin Erase flash0O before copying confirm no See the Common Problems in Installing Images Using TFTP or an RCP Server tech note Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 188 OL 20696 04 Chapter Upgrading the Cisco 10S Software What to Do Next How to Upgrade the Ciscol0S Image W Proceed to the Loading the New System Image
407. outer config isakmp group Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 96 OL 20696 04 _ Chapter Configuring Security Features Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Step 3 Step 4 Step5 Step 6 Command or Action Configuring VPN W Purpose dns primary server Example Router config isakmp group dns 10 50 10 1 Router config isakmp group Specifies the primary DNS server for the group You may also want to specify WINS servers for the group by using the wins command domain name Example Router config isakmp group domain company com Router config isakmp group Specifies group domain membership exit Example Router config isakmp group exit Router config Exits IKE group policy configuration mode and enters global configuration mode ip local pool default poolname low ip address high ip address Example Router config ip local pool dynpool 30 30 30 20 30 30 30 30 Router config Specifies a local address pool for the group For details about this command and additional parameters that can be set see Cisco IOS Dial Technologies Command Reference 1 DNS Domain Name System 2 WINS Windows Internet Naming Service I OL 20696 04
408. outers Generation 2 Software Configuration Guide Appendix B Using CompactFlash Memory Cards W File Operations on CompactFlash Memory Cards amp Note Use flash1 in the command syntax to access CF in slot 1 Use 1asho in the command syntax to access CF in slot 0 Formatting CompactFlash Memory as a Class C Flash File System Example Router format flash0 Format operation may take a while Continue confirm Format operation will destroy all data in flashO Continue confirm Enter volume ID up to 64 chars default flash Current Low End File System flash card in flash will be formatted into DOS File System flash card Continue confirm Format Drive communication amp lst Sector Write OK Weiting Monl ib SeGhOrsy c2y aiv di don Vase Rae bees sae E ME REE S BLESSES DANSE Oe ew ead Monlib write complete Format All system sectors written OK Format Total sectors in formatted partition 250592 Format Total bytes in formatted partition 128303104 Format Operation completed successfully Format of flash complete File Operations on CompactFlash Memory Cards Copying Files This section describes the following file operations for external CF memory cards e Copying Files page B 4 e Displaying Files page B 5 e Displaying File Content page B 5 e Displaying Geometry and Format Information page B 6 e Deleting Files page B 6 e Renaming Files page B 6 To copy files enter the copy comm
409. outers Generation 2 Software Configuration Guide OL 20696 04 Chapter Administering the Wireless Device Controlling Access Point Access with RADIUS W Command Purpose Step6 end Returns to privileged EXEC mode Step7 show running config Verifies your entries Step8 copy running config startup config Optional Saves your entries in the configuration file Step9 aaa authorization exec radius Enables RADIUS login authentication See the Configuring RADIUS Login Authentication section of the Configuring Radius and TACACS Servers chapter in Cisco IOS Software Configuration Guide for Cisco Aironet Access Points To remove the specified RADIUS server use the no radius server host hostname ip address command in global configuration mode To remove a server group from the configuration list use the no aaa group server radius group name command in global configuration mode To remove the IP address of a RADIUS server use the no server ip address command in sg radius configuration mode In the following is example the wireless device is configured to recognize two different RADIUS group servers group and group2 Group has two different host entries on the same RADIUS server which are configured for the same services The second host entry acts as a failover backup to the first entry config aaa new model config radius server host 172 20 0 1 auth port 1000 acct port 1001 config radius server host 1
410. over the network from the specified TFTP server hostname or IP address or boot filename e Boot from the boothelper image because it does not recognize the device ID This form of the command is Example used to netboot a specified image ROMMON gt boot flash0 myi f EER S ii You can override the default boothelper image setting by setting the BOOTLDR Monitor environment Example variable to point to another image Any system image ROMMON gt boot someimage 172 16 30 40 can be used for this purpose Note Options to the boot command are x load image but Example do not execute and v verbose ROMMON gt boot Examples Sample Output for the dir flash Command in ROM Monitor mode rommon gt dir flash0 File size Checksum File name 2229799 bytes 0x220627 0x469e c2801 j m2 113 4T What to Do Next If you want to configure the router to load a specified image at the next system reload or power cycle see the Loading and Managing System Images section in Cisco IOS Configuration Fundamentals Command Reference Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 26 OL 20696 04 Appendix Using ROM Monitor Additional References Additional References W The following sections provide references related to using the ROM monitor Related Documents Related Topic Document Title Connecting your PC
411. ow these steps beginning in global configuration mode 1 aaa new model 2 aaa authentication login default ist name method method2 3 aaa authorization network exec commands Zevel reverse access configuration default list name method method2 4 username name nopassword password password password encryption type encrypted password Command or Action Purpose aaa new model Example Router config aaa new model Router config Enables the AAA access control model aaa authentication login default Jist name method method2 Example Router config aaa authentication login rtr remote local Router config Specifies AAA authentication of selected users at login and specifies the method used This example uses a local authentication database You could also use a RADIUS server for this For details see Cisco IOS Security Configuration Guide Securing User Services Release 2 4T and Cisco IOS Security Command Reference aaa authorization network exec commands level reverse access configuration default list name method method2 Example Router config aaa authorization network rtr remote local Router config Specifies AAA authorization of all network related service requests including PPP and specifies the method of authorization This example uses a local authorization database You could also use a RADIUS server
412. owing methods e Force authorized This is the default setting that disables IEEE 802 1X and causes a port to transition to the authorized state without any authentication exchange required The port transmits and receives normal traffic without IEEE 802 1 X based authentication of the client e Force unauthorized This causes a port to remain in the unauthorized state ignoring all the authentication attempts made by a client A router cannot provide authentication services to clients through the interface e Auto This enables IEEE 802 1X authentication and causes a port to start in the unauthorized state allowing only Extensible Authentication Protocol over LAN EAPoL frames to be sent and received through a port The authentication process begins when the link state of the port transitions from down to up or when an EAPoL start frame is received The router requests the identity of the client and begins relaying authentication messages between the client and the authentication server Each client attempting to access the network is uniquely identified by the router with the help of the client s MAC address If the client is successfully authenticated the port state changes to authorized and all the frames from the authenticated client are allowed through the port If authentication fails the port remains in the unauthorized state but authentication can be retried Configuring the Controlling Port Authorization State Perform these steps to co
413. ows how to configure a login banner for the wireless device using the dollar sign as the beginning and ending delimiter AP config banner login Access for authorized users only Please enter your username and password AP config Configuring Ethernet Speed and Duplex Settings The Cisco 1941 W ISR interface supports only 1000 Mbps speed and duplex settings by default and the interface is always up When the wireless device receives inline power from a switch any change in the speed or duplex settings that resets the Ethernet link reboots the wireless device a Note The speed and duplex settings on the wireless device Ethernet port must match the Ethernet settings on the port to which the wireless device is connected If you change the settings on the port to which the wireless device is connected change the settings on the wireless device Ethernet port to match The Ethernet speed and duplex are set to auto by default To configure Ethernet speed and duplex follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 interface fastethernet0 3 speed 10 100 auto 4 duplex auto full half 5 end 6 show running config 7 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface fastethernet0 Enters configuration interface mode Step3 speed 10 100 auto Configures the
414. peed Intrachassis Module Interconnect HIMI e NME XD 48ES 2S P e NME XD 24ES 1S P See the Cisco EtherSwitch Feature Guide documentation at Cisco com for configuration details http www cisco com en US docs ios 12_3t 12_3t14 feature guide miragenm html wp178781 1 Cisco High Speed Intrachassis Module Interconnect HIMI Cisco 3900 series and Cisco 2900 series routers use Cisco High Speed Intrachassis Module Interconnect HIMI to support SM to SM or SM to ISM communication through the MGF Use the connect connection name module Modulel Channel idl module Module2 Channel id2 command to establish a maximum of two HIMI connections on the Cisco 3900 series ISR routers and one HIMI connection on Cisco 2900 series andCisco 1900 series ISRs Module 1 and Module 2 are the slot port of the two modules The Channel id and Channel id2 variables must always have a value of 0 When two modules are configured in a HIMI connection the modules cannot send traffic to any other module except its HIMI dedicated partner See Cisco High Speed Intrachassis Module Interconnect HIMI Configuration Guide at Cisco com for detailed configuration instructions http www cisco com en US docs ios 12_4 12_4_mainline srdesfm1 html Note Note See the module documentation to validate HIMI support Using HIMI for VLAN Traffic Flows For HIMI configurations the port level VLAN memberships are ignored on the Multi Gigabit Fabric MGF Use the connect c
415. points with 5 GHz radios configured at the factory for use in the United States Europe Singapore Korea Japan Israel and Taiwan now comply with regulations that require radio devices to use Dynamic Frequency Selection DFS to detect radar signals and avoid interfering with them When an access points detects a radar on a certain channel it avoids using that channel for 30 minutes Radios configured for use in other regulatory domains do not use DFS When a DFS enabled 5 GHz radio operates on one of the 15 channels listed in Table 2 the access point automatically uses DFS to set the operating frequency When DFS is enabled the access point monitors its operating frequency for radar signals If it detects radar signals on the channel the access point takes these steps e Blocks new transmissions on the channel e Flushes the power save client queues e Broadcasts an 802 11h channel switch announcement e Disassociates remaining client devices e If participating in WDS sends a DFS notification to the active WDS device that it is leaving the frequency Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Radio Settings Configuring Radio Channel Settings W e Randomly selects a different 5 GHz channel e Ifthe channel selected is one of the channels in Table 2 scans the new channel for radar signals for
416. pported simultaneous BSSID on Dot11Radiol 8 Carrier Set Americas OFDM US Uniform Spreading Required Yes Current Frequency 5300 MHz Channel 60 DFS enabled Current Frequency 5300 MHz Channel 60 DFS enabled Allowed Frequencies 5180 36 5200 40 5220 44 5240 48 5260 52 5280 56 53 00 60 5320 64 5500 100 5520 104 5540 108 5560 112 5580 116 5660 13 2 5680 136 5700 140 5745 149 5765 153 5785 157 5805 161 May only be selected by Dynamic Frequency Selection DFS Listen Frequencies 5170 34 5190 38 5210 42 5230 46 5180 36 5200 40 5220 4 4 5240 48 5260 52 5280 56 5300 60 5320 64 5500 100 5520 104 5540 108 55 60 112 5580 116 5600 120 5620 124 5640 128 5660 132 5680 136 5700 140 57 45 149 5765 153 5785 157 5805 161 5825 165 DFS Blocked Frequencies none Beacon Flags 0 Beacons are enabled Probes are enabled Current Power 17 dBm Allowed Power Levels 1 2 5 8 11 14 15 17 Allowed Client Power Levels 2 5 8 11 14 15 17 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Radio Settings Configuring a Channel SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Configuring Radio Channel Settings W Use the channel command to configure a channel The command for the interface is modified to only allow you to select a
417. prevent unauthorized access to the router Example Router config enable secret criny5ho Router config no ip domain lookup Disables the router from translating unfamiliar words typos into IP addresses Example Router config no ip domain lookup Router config For complete information on global parameter commands see the Cisco IOS Release configuration guide documentation set Configuring I O Memory Allocation Example To reallocate the percentage of DRAM in use for I O memory and processor memory on Cisco 3925E and Cisco 3945E routers use the memory size iomem i o memory percentage command in global configuration mode To revert to the default memory allocation use the no form of this command This procedure enables smartinit Syntax Description i o memory percentage The percentage of DRAM allocated to I O memory The values permitted are 5 10 15 20 25 30 40 and 50 A minimum of 201 MB of memory is required for I O memory Tip We recommend that you configure the memory size iomem below 25 Any value above 25 should be used only for enhancing IPSec performance When you specify the percentage of I O memory in the command line the processor memory automatically acquires the remaining percentage of DRAM memory The following example allocates 25 of the DRAM memory to I O memory and the remaining 75 to processor memory Router config t Enter configuration commands one per
418. pri inside crypto ipsec client ezvpn hw client inside l interface Cellular0 0 0 no ip address ip access group 131 out ip nat outside ip virtual reassembly encapsulation ppp load interval 30 dialer in band dialer pool member 1 dialer idle timeout 0 dialer group 1 no peer default ip address async mode interactive no ppp lcp fast start ppp ipcp dns request ppp timeout retry 120 ppp timeout ncp 30 fair queue 64 16 0 l routing dynamic I interface ATM0 1 0 no ip address no atm ilmi keepalive no dsl bitswap interface ATM0 1 0 1 point to point ip virtual reassembly pve 0 35 pppoe client dial pool number 2 l interface Vlanl ip address 10 9 0 254 255 255 0 0 ip nat inside ip virtual reassembly interface Dialerl ip address negotiated ip access group 131 out ip nat outside ip virtual reassembly encapsulation ppp load interval 30 dialer pool 1 dialer idle timeout 0 dialer string cdma dialer persistent dialer group 1 no peer default ip address no ppp lcp fast start ppp chap hostname nousername ppp chap password 0 nopassword ppp ipcp dns request ppp timeout retry 120 ppp timeout ncp 30 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 66 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Serv
419. psulation dotlq vlan id Defines the encapsulation format as IEEE 802 1Q dotlq and specifies the VLAN identifier or For double tagging use the second dotlq keyword and encapsulation dotia Wiancta the inner vlan id argument to specify the VLAN tag second dotiq inner vlan id Example Router config subif encapsulation dotlq 100 or Router config subif encapsulation dotiq 100 second dotiq 1101 Step5 ethernet loopback permit external Configures Ethernet external loopback on the subinterface Example Router config subif ethernet loopback permit external Step6 end Exits the subinterface configuration mode Example Router config subif end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Ethernet Data Plane Loopback W To start Ethernet data plane loopback run the following command Command Purpose Step1 ethernet loopback start local Starts Ethernet external loopback on a subinterface interface gigabitethernet i slot port sub port external timeout Enter timeout as none to have no time out period for the none loopback Example Router ethernet loopback start local interface gigabitethernet 0 2 1101 external timeout none To stop Ethernet data plane loopback perform the following steps
420. r the delete flash0 command amp Note Use flash1 in the command syntax to access CF in slot 1 Use 1asho in the command syntax to access CF in slot 0 amp Note The dir flash0 command does not display deleted files and files with errors Renaming Files To rename a file on a CF memory card enter the rename command in privileged EXEC mode amp Note Use flash1 in the command syntax to access CF in slot 1 Use 1asho in the command syntax to access CF in slot 0 Router dir flash0 Directory of flash0 3 rw 6458388 Mar 01 2004 00 00 58 c2900 universalk9 mz tmp Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Appendix B Using CompactFlash Memory Cards Directory Operations on a CompactFlash Memory Card W 1580 rw 6462268 Mar 06 2004 06 14 02 c2900 universalk9 mz 3600ata 63930368 bytes total 51007488 bytes free Router rename flash0 c2900 universalk9 mz tmp flash0 c2900 universalk9 mz Destination filename c2900 universalk9 mz Router dir flash0 Directory of flash0 1580 rw 6462268 Mar 06 2004 06 14 02 c2900 universalk9 mz 3600ata 3 rw 6458388 Mar 01 2004 00 01 24 c2900 universalk9 mz 63930368 bytes total 51007488 bytes free Directory Operations on a CompactFlash Memory Card The following sections describe directory operations for external CF memory cards on Cisc
421. r unicast traffic GET VPN enables the router to apply encryption to nontunneled that is native IP multicast and unicast packets and eliminates the requirement to configure tunnels to protect multicast and unicast traffic By removing the need for point to point tunnels meshed networks can scale higher while maintaining network intelligence features that are critical to voice and video quality such as QoS routing and multicast GET VPN offers a new standards based IP security IPsec security model that is based on the concept of trusted group members Trusted member routers use a common security methodology that is independent of any point to point IPsec tunnel relationship For additional information about configuring GET VPN see Cisco Group Encrypted Transport VPN at http www cisco com en US docs ios 12_4t 12_4t11 htgetvpn html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide o g OL 20696 04 _ Chapter Configuring Security Features SGT over Ethernet Tagging W SGT over Ethernet Tagging Cisco TrustSec CTS is an end to end network infrastructure that provides a scalable architecture for enforcement of role based access control identity aware networking and data confidentiality that helps to secure the network and its resources CTS works by identifying and authenticating each network user and resource and assigning a 16 b
422. r1 route map secondary permit 10 match ip address 103 match interface Dialer3 Change console to aux function line con 0 exec timedout 0 0 modem enable stopbits 1 line aux 0 exec timeout 0 0 To enable and communicate with the external modem properly script dialer Dialout modem InOut modem autoconfigure discovery transport input all stopbits 1 speed 115200 flowcontrol hardware line vty 0 4 exec timeout 0 0 password cisco login scheduler max task time 5000 end Starting from Cisco IOS Release 15 3 3 M if the second core of the CPU was disabled then you do not need to include transport input all command in line 2 If the second core was enabled then the transport input all command is added to the configuration line 2 no activation character no exec transport preferred none I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Backup Data Lines and Remote Management W Configuring Data Line Backup and Remote Management Through the ISDN S T Port Configuring Data Line Backup and Remote Management Through the ISDN S T Port This section contains the following topics e Configuring ISDN Settings page 77 e Example page 80 Cisco 3900 series routers can use the ISDN S T port for remote management Figure 2 and Figure 3 show two typical network configurations that provide re
423. rames are supported on the main interface e Single VLAN is supported as a filtering option for a subinterface but VLAN list and VLAN range are not supported e Only MAC address is supported as a filtering option for the main interface e For the filtering option the destination MAC cannot be combined with inner VLAN or outer VLAN e There is no support for L3 and L4 loopback Source and destination IP address or source and destination ports will not be swapped e Connectivity Fault Management CFM packets are transparent to the data plane loopback configuration and cannot be looped back e Packets coming from the other side of the wire where loopback is configured and having the same destination MAC address are dropped e The broadcast and multicast IP addresses of the broadcast and multicast IP frames that are received cannot be used as the source IP address of the frame when it is sent back to the initiator In such a case the IP address of the subinterface is used as the source IP address of the frame when it is sent back to the initiator Configuring External Ethernet Data Plane Loopback SUMMARY STEPS Step 1 Step 2 Step 3 Step 4 Configuring external Ethernet data plane loopback is permitted on a Layer 3 main interface and subinterfaces Figure represents a sample topology to configure Ethernet data plane loopback Figure 1 Sample Topology Router 1 ra Router 2 Gi 0 0 Gi 0 2 Gi 0 2 Gi 0 0 eS Metro Ethernet es
424. ration 2 Software Configuration Guide 16 OL 20696 04 Overview of the Hardware and Software The Cisco 3900 series Cisco 2900 series and Cisco 1900 series integrated services routers ISRs offer secure wire speed delivery of concurrent data voice and video services The modular design of these routers provides maximum flexibility allowing you to configure your router to meet evolving needs The routers offer features such as hardware based virtual private network VPN encryption acceleration intrusion protection and firewall functions and optional integrated call processing and voice mail A wide variety of legacy network modules and interfaces service modules SMs internal services modules ISMs next generation packet voice data modules PVDM3 Services Performance Engines SPEs high density interfaces for a wide range of connectivity requirements and sufficient performance and slot density for future network expansion requirements and advanced applications are available Power saving hardware and software features are incorporated throughout the series These routers provide access to the multi gigabit fabric which provides a connection between switch ports without using up external ports The logical Gigabit Ethernet GE interface on the router connects external and internal modules through the backplane for LAN and WAN switching Software feature upgrades are provided through software licensing The following sections d
425. rcd cc td doc product software ios 123 123newft 123_1 ftatosec htm Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Security Features Configuring Access Lists Hi Configuring Access Lists Access lists permit or deny network traffic over an interface based on source IP address destination IP address or protocol Access lists are configured as standard or extended A standard access list either permits or denies passage of packets from a designated source An extended access list allows designation of both the destination and the source and it allows designation of individual protocols to be permitted or denied passage For more complete information on creating access lists see the Access Control Lists section of Cisco IOS Security Configuration Guide Securing the Data Plane Release 12 4T at http www cisco com en US docs ios sec_data_plane configuration guide 12_4t sec_data_plane_12_4t_book html An access list is a series of commands with a common tag to bind them together The tag is either a number or a name Table 1 lists the commands used to configure access lists Table 1 Access List Configuration Commands Access Control List ACL Type Configuration Commands Numbered Standard access list 1 99 permit deny source addr source mask Extended access list 100 199 permit deny proto
426. rchased the DATA technology package functionality datak9 licensing package For more information about managing software activation licenses on the Cisco ISR and Cisco ISR G2 platforms see http www cisco com en US docs routers access sw_activation SA_on_ISR html Internal Ethernet data plane loopback is not supported Restrictions for Configuring External Ethernet Data Plane Loopback Follow the guidelines and take note of the restrictions listed here when configuring Ethernet data plane loopback on a Layer 3 interface e Only external loopback packets coming from the wire side on the L3 dotlq subinterface and untagged main interface are supported e To perform a MAC swap the destination address and source address must be swapped for the packets that are looped back If the destination address is broadcast or multicast the MAC address is used as the source address for the packets that are looped back e Loopback operations are supported at line rate e Untagged frames are not supported on a subinterface However the frames for dotlq and ging are supported on a subinterface Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces Ethernet Data Plane Loopback Wi e dotlad is not supported on the main interface However untagged f
427. re enhanced e For the PVDM3 DSP participant per conference support is expanded to a maximum of 64 Note that this is supported only by low complexity conference in Cisco IOS Release 15 0 1 M e Transcoding or conferencing channel allocation for a new call is modified to achieve load balancing This is supported by the capability to select one channel from one DSP at a time DSP Farm Profiles Conferencing DSP farm profiles are created to allocate DSP farm resources Under the profile you select the service type conference transcode or Media Termination Point MTP associate an application and specify service specific parameters such as codecs and maximum number of sessions A DSP farm profile allows you to group DSP resources based on the service type Applications associated with the profile such as SCCP can use the resources allocated under the profile You can configure multiple profiles for the same service each of which can register with one Cisco Unified Communications Manager group The profile ID and service type uniquely identify a profile allowing the profile to uniquely map to a Cisco Unified Communications Manager group that contains a single pool of Cisco Unified Communications Manager servers Voice conferencing involves adding several parties to a phone conversation In a traditional circuit switched voice network all voice traffic passes through a central device such as a PBX Conference services are provided within t
428. ream page appears Click the tab for the radio to configure For both CoS 5 Video and CoS 6 Voice user priorities choose Low Latency from the Packet Handling drop down menu and enter a value for maximum retries for packet discard in the corresponding field The default value for maximum retries is 3 for the Low Latency setting Figure 2 This value indicates how many times the access point will try to retrieve a lost packet before discarding it Figure 2 Packet Handling Configuration Packet Handling per User Priority User Priority Packet Handling Max Retries for Packet Discard NO DISCARD 0 128 NO DISCARD 0 128 NO DISCARD 0 128 NO DISCARD 0 128 NO DISCARD 0 128 CoS 0 Best Effort CoS 1 Background CoS 2 Spare CoS 3 Excellent CoS 4 Controlled Load CoS 5 Video Reliable x NO DISCARD 9 428 CoS 6 Voice Low Latency 7 3 0 128 CoS 7 Network Control 146920 Reliable x NO DISCARD 0 128 amp Note You may also configure the CoS 4 Controlled Load user priority and its maximum retries value Click Apply You can also configure VoIP packet handling using the CLI For a list of Cisco IOS commands for configuring VoIP packet handling using the CLI consult Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
429. ress 7 interface cellular 0 8 dialer string string DETAILED STEPS Command or Action Purpose Step1 configure terminal Enters global configuration mode Example Router configure terminal Step2 interface type number Specifies the interface Example Router config interface ATM 0 Step3 dialer watch group group number Enables dialer watch on the backup interface Example Router config if dialer watch group 2 Step4 dialer watch list group number ip ip address address mask Defines a list of all IP addresses to be watched Example Router config if dialer watch list 2 ip 10 4 0 254 255 255 0 0 Step5 dialer list dialer group protocol protocol name permit Creates a dialer list for traffic of interest and permits deny list access list number access group gt access to an entire protocol Example Router config dialer list 2 protocol ip permit Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 62 OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Backup Interfaces Tl Command or Action Purpose Step6 lip access list access list number permit ip source address Defines traffic of interest Do not use the access list permit all command to Example avoid sending traffic to the IP network This may Router config access list 2 permit 10 4 0 0 result in call termination
430. rform Initial Configuration W DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 ping ip address hostname Diagnoses initial network connectivity e To verify connectivity ping the next hop router or Example connected host for each configured interface to Router ping 172 16 74 5 Step3 telnet ip address hostname Logs in to a host that supports Telnet e If you want to test the vty line password perform this Example step from a different network device and use your Router telnet 10 20 30 40 router s IP address Examples The following display shows sample output for the ping command when you ping the IP address 192 168 7 27 Router ping Protocol ip Target IP address 192 168 7 27 Repeat count 5 Datagram size 100 Timeout in seconds 2 Extended commands n Sweep range of sizes n Type escape sequence to abort Sending 5 100 byte ICMP Echos to 192 168 7 27 timeout is 2 seconds BRER Success rate is 100 percent round trip min avg max 1 2 4 ms The following display shows sample output for the ping command when you ping the IP hostname username Router ping usernamel Type escape sequence to abort Sending 5 100 byte ICMP Echos to 192 168 7 27 timeout is 2 seconds trig Success rate is 100 percent round trip min avg max 1 3 4 ms Cisco 3900 Series Cisco 2900 Series and Cis
431. rifying Network Connectivity page A 14 Required e Saving Your Router Configuration page A 16 Required e Saving Backup Copies of Configuration and System Image page A 16 Optional Configuring the Router Hostname The hostname is used in CLI prompts and default configuration filenames If you do not configure the router hostname the router uses the factory assigned default hostname Router Do not expect capitalization and lower casing to be preserved in the hostname Uppercase and lowercase characters are treated as identical by many Internet software applications It may seem appropriate to capitalize a name as you would ordinarily do but conventions dictate that computer names appear in all lowercase characters For more information see RFC 1178 Choosing a Name for Your Computer The name must also follow the rules for Advanced Research Projects Agency Network ARPANET hostnames They must start with a letter end with a letter or digit and have as interior characters only letters digits and hyphens Names must be 63 characters or fewer For more information see RFC 1035 Domain Names Implementation and Specification SUMMARY STEPS 1 enable 2 configure terminal 3 hostname name 4 Verify that the router prompt displays your new hostname 5 end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide A 2 OL 20696 04 Appendix A Cisco
432. rithm If you configure the enable secret command it takes precedence over the enable password command the two commands cannot be in effect simultaneously I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide E Chapter Administering the Wireless Device HZ Protecting Access to Privileged EXEC Commands To configure encryption for enable and enable secret passwords follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 enable password level level password encryption type encrypted password or enable secret level level password encryption type encrypted password 3 service password encryption 4 end 5 copy running config startup config DETAILED STEPS Command Purpose Step 1 configure terminal Enters global configuration mode Step 2 enable password level Zevel password Defines a new password or changes an existing password for encryption type encrypted password access to privileged EXEC mode or or enable secret level Zevel password Defines a secret password which is saved using a encryption type encrypted password nonreversible encryption method e Optional For level the range is from 0 to 15 Level 1 is normal user EXEC mode privileges The default level is 15 privileged EXEC mode privileges e For password specify a string from 1 to 25 alphanumer
433. roubleshooting Crashes and Hangs stack context frame sysret meminfo section on page C 20 e Disaster recovery Use one of the following methods for recovering the system image or configuration file TFTP download tftpdnld Use this method if you can connect a TFTP server directly to the fixed LAN port on your router See the Recovering the System Image tftpdnld section on page C 16 amp Note Recovering the system image is different from upgrading the system image You need to recover the system image if it becomes corrupt or if it is deleted because of a disaster that affects the memory device severely enough to require deleting all data on the memory device in order to load a system image Tips for Using ROM Monitor Commands e ROM monitor commands are case sensitive e You can halt any ROM monitor command by entering the Break key sequence Ctrl Break on the PC or terminal The Break key sequence varies depending on the software on your PC or terminal If Ctrl Break does not work see the Standard Break Key Sequence Combinations During Password Recovery tech note e To find out which commands are available on your router and to display command syntax options see the Displaying Commands and Command Syntax in ROM Monitor Mode help section on page C 7 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 2
434. rovides a secure connection between two networks over a public network such as the Internet Cisco 3900 series 2900 series and 1900 series ISRs support two types of VPNs site to site and remote access Remote access VPNs are used by remote clients to log in to a corporate network Site to site VPNs connect branch offices to corporate offices This section gives an example for each Remote Access VPN Example The configuration of a remote access VPN uses Cisco Easy VPN and an IP Security IPSec tunnel to configure and secure the connection between the remote client and the corporate network Figure 1 shows a typical deployment scenario I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Security Features WE Configuring VPN Figure 1 Remote Access VPN Using IPSec Tunnel 121782 m o 7 1 Remote networked users 2 VPN client Cisco 3900 series 2900 series or 1900 series ISR 3 Router Provides corporate office network access 4 VPN server Easy VPN server for example a Cisco VPN 3000 concentrator with outside interface address 210 110 101 1 5 Corporate office with a network address of 10 1 1 1 6 IPSec tunnel The Cisco Easy VPN client feature eliminates much of the tedious configuration work by implementing the Cisco Unity Client protocol This protocol
435. rver and an SSH integrated client The client supports the following user authentication methods e RADIUS for more information see the Controlling Access Point Access with RADIUS section on page 265 e Local authentication and authorization for more information see the Configuring the Access Point for Local Authentication and Authorization section on page 288 For more information about SSH see Part 5 Other Security Features in the Cisco IOS Security Configuration Guide for Release 12 4 I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Administering the Wireless Device W Configuring Client ARP Caching amp Note The SSH feature in this software release does not support IP Security IPsec Configuring SSH Before configuring SSH download the cryptographic software image from Cisco com For more information see the release notes for this release For information about configuring SSH and displaying SSH settings see Part 6 Other Security Features in the Cisco IOS Security Configuration Guide for Release 12 4 which is available at Cisco com at the following link http www cisco com en US docs ios security configuration guide 12_4 sec_12_4_book html Configuring Client ARP Caching You can configure the wireless device to maintain an address resolution protocol ARP cache for
436. s Sample Output for the dir usbFlash Command rommon gt dir usbflash0 program load complete entry point 0x80903000 size 0x4c400 Directory of usbflash0 2 54212244 rw c2900 universalk9 mz Sample Output for the dev ROM Monitor Command rommon 2 gt dev Devices in device table Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide C 14 OL 20696 04 Appendix Using ROM Monitor How to Use the ROM Monitor Typical Tasks Tl id name flash compact flash bootflash boot flash usbflash0O usbflash0 usbflashl usbflashl eprom eprom Modifying the I O Memory iomemset amp This section describes how to modify the I O memory by using the memory size iomemset command Note SUMMARY STEPS DETAILED STEPS Use the iomemset command only when it is necessary to temporarily set the I O memory from the ROM monitor mode Using this command improperly can adversely affect the functioning of the router The Cisco IOS software can override the I O memory percentage if the memory size iomem command is set in the NVRAM configuration If the Cisco IOS command is present in the NVRAM configuration the I O memory percentage set in the ROM monitor with the iomemset command is used only the first time the router is booted up Subsequent reloads use the I O memory percentage set by using the memory size iomem command that is saved in the NVRA
437. s e Cisco 2901 and Cisco 2911 each router supports up to two PVDM3 modules e Cisco 2921 and Cisco 2951 each router supports up to three PVDM3 modules e Cisco 3925 and Cisco 3945 each router supports up to four PVDM3 modules e Cisco 3925E and Cisco 3945E each router supports up to three PVDM3 modules All codecs that are supported on the PVDM2 are supported on the PVDM3 except that the PVDM3 does not support the G 723 G 723 1 and G 723 1A codecs The PVDM2 can be used to provide G 723 codec support or the G 729 codec can be as an alternative on the PVDM3 The PVDM3 DSP does not support Cisco Fax Relay The PVDM2 5510 DSP does support Cisco Fax Relay The coexistence of PVDM2 and PVDM3 modules on the same motherboard is not supported If these two modules are installed on the same motherboard the PYDM2 is shut down Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 146 OL 20696 04 _ Chapter Configuring Next Generation High Density PVDM3 Modules Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers W Information About Configuring the PYVDM3 Module on Cisco Voice Gateway Routers To take full advantage of the PVDM3 cards on Cisco voice gateway routers you should understand the following concepts e Video Conference and Transcoding e DSP Resource Manager Enhancement and DSP Numbering e DSP Image for the PVDM3
438. s Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 m Chapter Configuring Radio Settings HZ Enabling the Radio Interface SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step5 Step 6 Step7 To enable the access point radio follow these steps beginning in privileged EXEC mode 1 configure terminal dot11 ssid ssid interface dotllradio 0 1 ssid ssid no shutdown end ss oo FP YS DN Command copy running config startup config Purpose configure terminal Enters global configuration mode dot11 ssid ssid Enters the SSID The SSID consists of up to 32 alphanumeric characters SSIDs are case sensitive interface dot1llradio 0 1 Enters interface configuration mode for the radio interface The 2 4 GHz and 802 11g n 2 4 GHz radios are radio 0 The 5 GHz and the 802 11n 5 GHz radio is radio 1 ssid ssid Assigns the SSID that you created in Step 2 to the appropriate radio interface no shutdown Enables the radio port end Returns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Use the shutdown command to disable the radio port Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 22 E OL 20696 04
439. s 3 hours and the 5 means 50 percent In this case the necessary command is clock timezone AST 3 30 To set the time to UTC use the no clock timezone command in global configuration mode Configuring Summer Time Daylight Saving Time To configure summer time daylight saving time in areas where it starts and ends on a particular day of the week each year follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 clock summer time zone recurring week day month hh mm week day month hh mm offset 3 end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 278 OL 20696 04 Chapter Administering the Wireless Device Managing the System Time and Date W 4 show running config 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 clock summer time zone recurring Configures summer time to start and end on the specified days every year week day month hh mm week day month Summer time is disabled by default If you specify clock summer time hh mm offset zone recurring without parameters the summer time rules default to the United States rules e For zone specify the name of the time zone for example PDT to be displayed when summer time is in effect e Optional For week specify the week of the month
440. s 98 2000 XP and Solaris platforms Note Avoid using the CLI and the web browser tools concurrently when configuring the wireless device If you configure the wireless device using the CLI the web browser interface may display an inaccurate interpretation of the configuration This inappropriate display of information does not necessarily mean the wireless device is not configured properly Use the interface dot11radio command in global CLI configuration to place the wireless device into the radio configuration mode Network Configuration Examples Setup the access point role in any of these common wireless network configurations The access point default configuration is a root unit connected to a wired LAN or the central unit in an all wireless network e Root Access Point page 204 e Central Unit in an All Wireless Network page 205 Root Access Point An access point connected directly to a wired LAN provides a connection point for wireless users If more than one access point is connected to the LAN users can roam from one area of a facility to another without losing their connection to the network As users move out of range of one access point they automatically connect to the network associate through another access point The roaming process is seamless and transparent to the user Figure 1 shows access points acting as root units on a wired LAN Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integra
441. s Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Next Generation High Density PVDM3 Modules How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways W Max credits 645 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 645 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 Slot 0 Device idx 0 PVDM Slot 0 Dsp Type SP2600 dsp 4 State UP firmware 26 0 135 Max signal voice channel 43 43 Max credits 645 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 645 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 Slot 0 Device idx 1 PVDM Slot 0 Dsp Type SP2600 dsp 5 State UP firmware 26 0 135 Max signal voice channel 43 43 Max credits 645 num_of_sig_chnls_allocated 0 Transcoding channels allocated 0 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 645 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used rounded up 0 Slot 0 Device idx 1 PVDM Slot 0 Dsp Type SP2600 dsp 6 State UP firmware 26 0 135 Max signal voice channel 42 43 Max credits 645 num_of_sig_chnls_
442. s for performing the following tasks e Resetting the Wireless Device to the Factory Default Configuration page 274 e Rebooting the Wireless Device page 274 e Monitoring the Wireless Device page 275 Resetting the Wireless Device to the Factory Default Configuration To reset the wireless device hardware and software to its factory default configuration use the service module wlan ap0 reset default config command in the router s Cisco IOS privileged EXEC mode A Caution Because you may lose data use only the service module wlan ap0 reset command to recover from a shutdown or failed state Rebooting the Wireless Device To perform a graceful shutdown and reboot the wireless device use the service module wlan ap0 reload command in the router s Cisco IOS privileged EXEC mode At the confirmation prompt press Enter to confirm the action or enter n to cancel When running in autonomous mode the reload command saves the configuration before rebooting If the attempt is unsuccessful the following message displays Failed to save service module configuration When running in Lightweight Access Point Protocol LWAPP mode the reload function is typically handled by the wireless LAN controller WLC If you enter the service module wlan ap0 reload command you are prompted with the following message The AP is in LWAPP mode Reload is normally handled by WLC controller Still want to proceed yes Cisco 3900 Series C
443. s on Cisco Voice Gateways Voice Channels g7llperdsp 43 g726perdsp 32 g729perdsp 20 g729aperdsp 32 g723perdsp 20 g728perdsp 20 g7 23perdsp 20 gsmperdsp 32 gt gsmefrperdsp 20 gsmamrnbperdsp 20 ilbcperdsp 20 modemrelayperdsp 20 g72264Perdsp 32 h324perdsp 20 m_f_thruperdsp 43 faxrelayperdsp 32 maxchperdsp 43 minchperdsp 20 srtp_maxchperdsp 27 srtp_minchperdsp g711_srtp_perdsp 27 g729_srtp_perdsp I i I 14 faxrelay_srtp_perdsp 14 14 g729a_srtp_perdsp 24 I Step6 show voice dsp group slot number Use this command to display the current status or selective statistics of DSP voice channels for a specific DSP group For example Router show voice dsp group slot 0 dsp 1 State UP firmware 8 4 0 Max signal voice channel 16 16 Max credits 240 Group FLEX_GROUP_VOICE complexity FLEX Shared credits 240 reserved credits 0 Signaling channels allocated 0 Voice channels allocated 0 Credits used 0 Oversubscription can either be an indicator or a counter DSP type SP260x Step7 show voice dsp statistics device Use this command to display DSP voice statistics for the device Router show voice dsp statistics device DEVICE DSP CURR AI RST WDT ACK MAC TX RX PACK KEEPALIVE ID ID STATE COUNT FAIL ADDRESS COUNT TX RX SKP 0 0 0 E 1 0 0 0 0 00fa ce25 0000 51645919 37972871 29875 29875 0 0 0 0 2 1 0 0 0 0 00fa ce25 0000 51645919 37972871 29875 29875
444. s typically not modified 10 0x0400 Controls the host portion of the IP broadcast address e Setting bit 10 causes the processor to use all zeros e Factory default Clearing bit 10 causes the processor to use all ones Bit 10 interacts with bit 14 which controls the network and subnet portions of the IP broadcast address See Table D 3 for the combined effects of bits 10 and 14 05 11 12 0x0020 0x0800 0x 1000 Controls the console line speed See Table D 4 for the eight available bit combinations and console line speeds Factory default is 9600 baud where bits 5 11 and 12 are all zero clear Note You cannot change the console line speed configuration register bits from the Cisco IOS CLI You can however change these bits from the ROM monitor Or instead of changing the configuration register settings you can set the console line speed through other Cisco IOS commands 13 0x2000 Determines how the router responds to a network boot failure e Setting bit 13 causes the router to boot the default ROM software after 6 unsuccessful network boot attempts e Factory default Clearing bit 13 causes the router to indefinitely continue network boot attempts 14 0x4000 Controls the network and subnet portions of the IP broadcast address e Setting bit 10 causes the processor to use all zeros e Factory default Clearing bit 10 causes the processor to use all ones Bit 14 interacts with b
445. sco Unified mode Module 2 Configuring the Wireless Device Describes how to configure the autonomous wireless device how to upgrade the autonomous software to Cisco Unified software and how to configure a Unified wireless device Module 3 Configuring the Radio Settings Describes how to configure the radio settings for the wireless device Module 4 Administering the Wireless Device Describes many administration tasks for the wireless device Part 3 Appendix Description Appendix A Cisco IOS CLI for Initial Describes how to perform the initial Configuration configuration of the router using the Cisco IOS CLI and additional configuration procedures for the router Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 2 g OL 20696 04 Chapter Preface Appendix B Using CompactFlash Memory Cards Conventions W Describes how to use Advanced Capability CF memory cards on the router Appendix C Using ROM Monitor Describes how to use the ROM monitor to manually load a system image upgrade the system image when there are no TFTP servers or network connections or prepare for disaster recovery Appendix D Changing the Configuration Register Settings Describes the 16 bit configuration register in NVRAM and how to make changes to the register settings using the Cisco IOS CLI 1 PVDM3 packet voi
446. scription Administering the Access Point Administering the Wireless Device Describes how to administer the wireless device on the network Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 218 E OL 20696 04 Chapter Configuring the Wireless Device Related Documentation W Table 2 Autonomous Documentation continued Quality of Service http www cisco com en US docs routers access wireless software guide QualityOfService html Describes how to configure QoS on your Cisco wireless interface With this feature you can provide preferential treatment to certain traffic at the expense of other traffic Without QoS the device offers best effort service to each packet regardless of the packet contents or size It sends the packets without any assurance of reliability delay bounds or throughput Regulatory Domains and Channels http www cisco com en US docs router s access 800 860 880 890 software conf iguration guide scg_chanels html Lists the radio channels supported by Cisco access products in the regulatory domains of the world System Message http www cisco com en US docs Describes how to configure system message logging on Logging routers access wireless software guide S your wireless device ysMsgLogging html 1 RADIUS Remote Authentication Dial In User Service 2 TACACS Term
447. se 6 enterprise custservice N A MPID 44 carrier 2 carrier carrier N A MPID 43 Total Remote MEPs 3 Router2 110 Domain 410 Domain Domain 0026 99 7 0b41 Gi0 2 Vlan 100 customer MA customer1101 0026 99f7 0b41 Gid 1 Vlan 110 enterprise MA custservice 0026 99f7 0b41 Gi0 2 Vlan 200 carrier MA carrier Up Up N A 2s Up Up N A 2s Up Up N A 2s Use the show ethernet cfm error configuration command to view Ethernet CFM configuration errors if any The following is a sample output of the show ethernet cfm error configuration command Router show ethernet cfm error configuration CFMLeak Configuring Ethernet CFM Double Tagged Packets SUMMARY STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step7 Step 8 Step 9 Step 10 Step 11 Step 12 Complete these steps to configure and enable Ethernet CFM for double tagged packets enable configure terminal ethernet cfm ieee ethernet cfm global ethernet cfm domain domain name level value service service name vlan vlan id inner vlan inner vlan id direction down continuity check interface gigabitethernet slot port ethernet cfm mep domain domain name mpid mpid value service service name interface gigabitethernet slot port subinterface encapsulation dotlq v an id second dotlq inner vlan id end Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Confi
448. se steps beginning in global configuration mode SUMMARY STEPS 1 crypto dynamic map dynamic map name dynamic seq num 2 set transform set transform set name transform set name2 transform set name6 3 reverse route 4 exit 5 crypto map map name seq num ipsec isakmp dynamic dynamic map name discover profile profile name DETAILED STEPS Command or Action Purpose Step 1 crypto dynamic map dynamic map name Creates a dynamic crypto map entry and enters dynamic seq num crypto map configuration mode See Cisco IOS Security Command Reference for Example more detail about this command Router config crypto dynamic map dynmap 1 Router config crypto map Step 2 set transform set transform set name Specifies which transform sets can be used with transform set name2 transform set name6 the crypto map entry Example Router config crypto map set transform set vpnl Router config crypto map Step 3 reverse route Creates source proxy information for the crypto map entry Example See Cisco IOS Security Command Reference for Router config crypto map reverse route details Router config crypto map Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EON Chapter Configuring Security Features HZ Configuring VPN Command or Action Purpose Step 4 exit Returns to global configuration mode Exampl
449. sername specified in Step 2 Step4 end Returns to privileged EXEC mode Step5 show running config Verifies your entries Step6 copy running config startup config Optional Saves your entries in the configuration file Note To disable username authentication for a specific user use the no username name command in global configuration mode To disable password checking and allow connections without a password use the no login command in line configuration mode You must have at least one username configured and you must have login local set to open a Telnet session to the wireless device If you do not enter a username for the only username you can be locked out of the wireless device Configuring Multiple Privilege Levels By default Cisco IOS software has two modes of password security user EXEC and privileged EXEC You can configure up to 16 hierarchical levels of commands for each mode By configuring multiple passwords you can allow different sets of users to have access to specified commands For example if you want many users to have access to the clear line command you can assign it level 2 security and distribute the Level 2 password fairly widely But if you want more restricted access to the configure command you can assign it Level 3 security and distribute that password to a more restricted group of users This section includes this configuration information e Setting the Privilege Level for a C
450. specific channel number and to enable DFS To configure a channel follow these steps 1 configure terminal end show running config eo Aa YC DN Command interface dotllradiol dfs simulate channel number dfs band lt 4 gt copy running config startup config Purpose configure terminal Enters global configuration mode interface dotl1radio1 dfs simulate Enters the configuration interface for the 802 1 1a radio channel number dfs band lt 4 gt Specifies the channel to use For number enter one of the following channels 36 40 44 48 149 153 157 161 5180 5200 5220 5240 5745 5765 5785 or 5805 Enter dfs and one of the following frequency bands to use dynamic frequency selection on the selected channel 1 5 150 to 5 250 GHz 2 5 250 to 5 350 Ghz 3 5 470 to 5 725 GHz 4 5 725 to 5 825 GHz If you attempt to configure a channel that may only be selected by dfs the following message appears This channel number frequency can only be used by Dynamic Frequency Selection DFS end Returns to the privileged EXEC mode show running config Verifies your entries copy running config startup config Optional Saves your entries to the configuration file The following example selects channel 36 and configures it to use DFS on a frequency band 1 ap configure terminal ap config interface dotilradiol ap config if channel 36 ap config if
451. state from administratively down to administratively up Step 4 exit Example Router config if exit Router config Exits configuration mode for the GE interface and returns to global configuration mode Configuring Wireless LAN Interfaces The wireless LAN interface on the Cisco 1941 W router enables connection to the router through interface wlan ap0 For more information about configuring a wireless connection see the Configuring the Wireless Device section on page 207 Configuring Interface Card and Module Interfaces To configure interface cards and modules inserted in internal services module ISM enhanced high speed WAN interface card EHWIC Ethernet WAN interface card EWIC and service module SM slots see the appropriate interface card or module configuration documents on Cisco com Configuring a Loopback Interface The loopback interface acts as a placeholder for the static IP address and provides default routing information For complete information on the loopback commands see the Cisco IOS Release configuration guide documentation set To configure a loopback interface follow these steps beginning in global configuration mode SUMMARY STEPS 1 interface type number 2 ip address ip address mask 3 exit I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Basic Ro
452. sted and will be used by the device for any SGT aware policy enforcement or for egress tagging If the trusted keyword is not configured all the ingress traffic is assigned with the static SGT value specified in the configuration end Example Router config if cts manual end Exits the configuration session Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Configuring Security Features SGT over Ethernet Tagging W Example Configuring SGT over Ethernet Tagging This example shows how to configure SGT over Ethernet tagging with CTS SGT propagation enabled Router configure terminal Router config interface gigabitethernet 0 0 Router config if cts manual Router config if cts manual propagate sgt Router config if cts manual policy static sgt 77 trusted Router config if cts manual end Router show running interface gigabitethernet 0 0 interface gigabitethernet 0 0 ip address 50 0 0 1 255 255 255 0 cts manual policy static sgt 77 trusted end This example shows how to configure SGT over Ethernet tagging with CTS SGT propagation disabled Router configure terminal Router config interface gigabitethernet 0 0 Router config if cts manual Router config if cts manual no propagate sgt Router config if cts manual policy static sgt 77 trusted Router config if cts manual e
453. system image s minimum flash requirements proceed to the Copying the System Image into Flash Memory section on page 186 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco IOS Software DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 How to Upgrade the Cisco IOS Image W enable Use this command to enter privileged EXEC mode Enter your password if prompted For example Router gt enable Password Router dir flash0 Use this command to display the layout and contents of flash memory Router dir flash0 Flash CompactFlash directory File Length Name status L 6458208 c39xx tmp deleted 2 6458208 c39xxmz 12916544 bytes used 3139776 available 16056320 total 15680K bytes of ATA CompactFlash Read Write From the displayed output of the dir flash0 command compare the number of bytes available to the minimum flash requirements for the new system image e Ifthe available memory is equal to or greater than the new system image s minimum flash requirements proceed to the Copying the System Image into Flash Memory section on page 186 e Ifthe available memory is less than the new system image s minimum flash requirements proceed to Step 4 From the displayed output of the dir flash0 command compare the number of bytes total to the size of the sys
454. system image s minimum flash requirements proceed to the Copying the System Image into Flash Memory section on page 186 Proceed to the Copying the System Image into Flash Memory section on page 186 Copying the System Image into Flash Memory This section describes how to copy the system image into the compact flash memory card for your router Choose one of the following methods e Using TFTP or Remote Copy Protocol to Copy the System Image into Flash Memory page 187 e Using the ROM Monitor to Copy the System Image over a Network page 189 e Using a PC with a CompactFlash Card Reader to Copy the System Image into Flash Memory page 191 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Upgrading the Cisco IOS Software How to Upgrade the Cisco IOS Image W Using TFTP or Remote Copy Protocol to Copy the System Image into Flash Memory This section describes how to use TFTP or Remote Copy Protocol RCP to upgrade the system image This is the recommended and most common method of upgrading the system image Prerequisites The following details the logistics of upgrading the system image e Install a TFTP server or an RCP server application on a TCP IP ready workstation or PC Many third party vendors provide free TFTP server software which you can find by searching for TFTP server in a web search eng
455. systems See Cisco Unified Messaging Gateway 1 0 Command Reference at Cisco com for more information http www cisco com en US docs voice_ip_comm umg rel1_0 command reference UMG_1 0_CmdRe f html Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 136 OL 20696 04 Chapter Unified Communications on Cisco Integrated Services Routers IP Media Services W IP Media Services The Cisco 3900 series and Cisco 2900 series ISRs support the following media services e Conferencing Transcoding and Media Termination Point MTP page 137 e RSVP Agent page 137 e Trusted Relay Point TRP page 137 Conferencing Transcoding and Media Termination Point MTP RSVP Agent Cisco Enhanced Conferencing and Transcoding for Voice Gateway Routers provides conferencing and transcoding capabilities in Cisco IOS Software based gateways using the onboard Cisco Packet Voice Fax Digital Signal Processor Modules on the Cisco voice gateway routers This capability is also supported on Cisco voice gateway router platforms using the Cisco IP Communications Voice Fax Network Module and the Cisco IP Communications High Density Digital Voice Fax Network Module This feature is delivered in Cisco IOS Software and operates in conjunction with Cisco CallManager See Configuring Enhanced Conferencing and Transcoding for Voice Gateway Routers at Cisco com for configuration information
456. t number and name for the Advanced Capability CF slots Table 1 Compact Flash Slot Numbering and Naming Slot Number CF Filenames Slot0 flasho Slot1 flash1 1 Slot 0 is the default CF slot It stores the system image configurations and data files CF must be present in this slot for the router to boot and perform normal file operations 2 flash0 is aliased to flash Table 2 describes the slot number and name for the USB slots Table 2 USB Slot Numbering and Naming Slot Number USB Filenames SlotO usbflash0 Slot1 usbflash1 Information About Upgrading the System Image To upgrade the system image on your router review the following sections e Why Would I Upgrade the System Image page 178 e Which Cisco IOS Release Is Running on My Router Now page 179 e How Do I Choose the New Cisco IOS Release and Feature Set page 179 e Where Do I Download the System Image page 179 Why Would Upgrade the System Image System images contain the Cisco IOS software Your router was shipped with an image installed amp Note The Cisco 1941W access point runs a Cisco IOS image that is separate from the Cisco IOS image on the router At some point you may want to load a different image onto the router or the access point For example you may want to upgrade your IOS software to the latest release or you may want to use the same Cisco IOS release for all the routers in a network Each system image c
457. t7 HI EPC Stat 00000000 00000000 00000000 fLLLLLLL 00000000 3401 03 00000001 00000000 6408d464 e57fce22 60e3b7f4 sp s8 ra LO ErrPC Cause Sample Output for the frame ROM Monitor Command rommon 6 gt frame 2 Stack Frame 2 0x6421 0x6421 0x6421 0x6421 0x6421 0x6421 0x6421 0x6421 0x6421 0x6421 90d0 90d4 90d8 90dc 90e0 90e4 90e8 90ec 90f 0 90f4 SP sp sp sp sp sp sp sp sp sp sp te tee tteet 0x642190d0 Size 40 0x000 0x004 0x008 0x00c 0x010 0x014 0x018 0x01c 0x020 0x024 Oxffffffff Oxbfc05f2c OXETEFEFEE OXEEEFFFEE 0x6401a6f4 0x00000000 0x64049c 0 0x63360000 0x63360000 0x6079 70 Sample Output for the sysret ROM Monitor Command rommon 8 gt sysret System Return Info reason user break error address 0x801111b0 count pce 0x801111b0 Stack Trace FP 0x80005ea8 FP 0x80005eb4 FP 0x80005f74 FP 0x80005f9c F F F F 19 P 0x80005fac P 0x80005fc4 P 0x80005ffc P 0x00000000 PC PC PC PC PC PCs PC PC 0x801111b0 0x801136 94 0x8010eb44 0x800081 0x800080 18 64 Oxf 03d70 0x000000 0x000000 00 00 Sample Output for the meminfo ROM Monitor Command rommon 3 gt meminfo Current Memory configuration is Onboard SDRAM Size 128 MB Se Bank 0 128 MB 0 MB Size 256 MB Bee Bank 0 128 MB Bank 1 128 MB Main m
458. tches lan catalyst3550 software release 12 1_12c_eal configuration guide 3550scg html Configuring the Beacon Period and the DTIM The beacon period is the amount of time between access point beacons in kilomicroseconds Kmicrosecs One Kmicrosec equals 1 024 microseconds The data beacon rate always a multiple of the beacon period determines how often the beacon contains a delivery traffic indication message DTIM The DTIM tells power save client devices that a packet is waiting for them For example if the beacon period is set at 100 its default setting and if the data beacon rate is set at 2 its default setting then the wireless device sends a beacon containing a DTIM every 200 Kmicrosecs The default beacon period is 100 and the default DTIM is 2 To configure the beacon period and the DTIM follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 interface dotilradio 0 1 3 beacon period value 4 beacon dtim period value 5 end 6 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 interface dotilradio 0 1 Enters interface configuration mode for the radio interface The 802 11g n 2 4 GHz radio is radio 0 The 802 1 1n 5 GHz radio is radio 1 Step3 beacon period value Sets the beacon period Enter a value in kilomicroseconds Step4 beacon dtim period value Sets the DTIM Enter a value in ki
459. ted Services Routers Generation 2 Software Configuration Guide OL 20696 04 Chapter Wireless Device Overview Management Options W Figure 1 Access Points as Root Units on a Wired LAN CC Ss es Access point io 135445 Central Unit in an All Wireless Network In an all wireless network an access point acts as a stand alone root unit The access point is not attached to a wired LAN it functions as a hub linking all stations together The access point serves as the focal point for communications increasing the communication range of wireless users Figure 2 shows an access point in an all wireless network Figure 2 Access Point as Central Unit in All Wireless Network Access point CORD 135443 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 TEN Chapter Wireless Device Overview W Management Options Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 206 OL 20696 04 Configuring the Wireless Device The following sections describe how to configure the wireless device on the Cisco 1941 W integrated services router ISR e Starting a Wireless Configuration Session page 207 e Configuring Wireless Settings page 209 e Upgrading to Cisco Unified Software page 215 e Related Documentation page 218 Note
460. tem image or startup configuration you can quickly revert to the previous working configuration and system image For more detailed information see the Managing Configuration Files chapter and the Loading and Maintaining System Images chapter of the Cisco IOS Configuration Fundamentals Configuration Guide at http www cisco com en US docs ios fundamentals configuration guide 12_4 cf_12_4_book html To save backup copies of the startup configuration file and the system image file complete the following steps 1 enable 2 copy nvram startup config ftp rep tftp 3 dir flash0 4 copy flash0 ftp rep tftp I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software HZ How to Upgrade the Cisco 10S Image DETAILED STEPS Command or Action Purpose Step1 enable Enables privileged EXEC mode e Enter your password if prompted Example Router gt enable Step2 copy nvram startup config ftp rep tftp Copies the startup configuration file to a server e The configuration file copy serves as a backup copy Example e Enter the destination URL when prompted Router copy nvram startup config ftp Step3 dir flash0 Displays the layout and contents of a flash memory file system Example e Write down the name of the system image file Router
461. tem image to which you want to upgrade e Ifthe total memory is less than the new system image s minimum flash requirements you must upgrade your compact flash memory card See the hardware installation guide for your router e Ifthe total memory is equal to or greater than the new system image s minimum flash requirements proceed to Step 5 dir all flash0 Use this command to display a list of all files and directories in flash memory Router dir all flasho Directory of flash 3 rw 6458388 Mar 01 1993 00 00 58 c39xx tmp 1580 rw 6462268 Mar 06 1993 06 14 02 c39xx ata 63930368 bytes total 51007488 bytes free From the displayed output of the dir all flash0 command write down the names and directory locations of the files that you can delete If you cannot delete any files you must upgrade your compact flash memory card See the hardware installation guide for your router amp Note Do not delete the system image that the router already uses If you are not sure which files can be safely deleted either consult your network administrator or upgrade your compact flash memory card to a size that can accommodate both the existing files and the new system image See the hardware installation guide for your router I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Upgrading the Cisco 10S Software
462. tep 1 Step 2 Step 3 Step 4 Step5 5 end Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode interface gigabitethernet s ot port Example Router config interface gigabitethernet 0 0 Enters interface configuration mode authentication control direction in lboth Example Router config if authentication control direction in Router config if authentication control direction both Configures the port mode as unidirectional or bidirectional in The port can send packets to the host but cannot receive packets from the host both The port cannot receive packets from or send packets to the host This is the default value end Example Router config if end Router Returns to privileged EXEC mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 124 OL 20696 04 _ Chapter Configuring Identity Features on Layer 3 Interface Verifying Default Control Direction Setting Both Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Use the show authentication sessions and show dot1x commands to verify the default control direction
463. ter Configuring Multi Gigabit Fabric Communication HZ Supported Slots Modules and Interface Cards The following modules and interface cards support communication through the MGF e Wireless LAN Module in the Cisco 1941 W ISR page 172 e Cisco Etherswitch Service Modules page 172 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers support legacy interface cards and modules Some modules will require an adapter See your router s hardware installation guide at Cisco com for adapter installation information See the routers s Product page at Cisco com for a complete list of supported new and legacy modules Wireless LAN Module in the Cisco 1941W ISR When configured as an autonomous access point the wireless LAN WLAN device serves as the connection point between wireless and wired networks or as the center point of a stand alone wireless network In large installations wireless users within radio range of a device can roam throughout a facility while maintaining seamless and uninterrupted access to the network Cisco 1941W supports ISM to EHWIC communication with an integrated switch communicating through the MGF In this scenario traffic goes from the WLAN through the Multi Gigabit Fabric s CPU port and out through a port on the front panel Cisco Etherswitch Service Modules The following Cisco EtherSwitch service modules provide Cisco modular access routers the ability to stack Cisco Et
464. ter in Cisco IOS Security Configuration Guide Also see the Cisco IOS Password Encryption Facts tech note and the Improving Security on Cisco Routers tech note Restrictions If you configure the enable secret command it takes precedence over the enable password command the two commands cannot be in effect simultaneously Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 AppendixA Cisco 10S CLI for Initial Configuration HZ Using the Cisco 10S CLI to Perform Initial Configuration SUMMARY STEPS 1 enable configure terminal enable password password enable secret password end enable oO n PF YW DN end DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose enable Example Router gt enable Enables privileged EXEC mode e Enter your password if prompted configure terminal Example Router configure terminal Enters global configuration mode enable password password Example Router config enable password pswd2 Optional Sets a local password to control access to various privilege levels e We recommend that you perform this step only if you boot an older image of the Cisco IOS software or if you boot older boot ROMs that do not recognize the enable secret command enable secret password Example
465. ter out unwanted messages For more information see Cisco IOS Firewall SIP Enhancements ALG and AIC at Cisco com Unified Communications Gateways The Cisco 3900 series and Cisco 2900 series ISRs support the following Unified Communication gateways e TDM Gateways page 135 e Cisco Unified Border Element page 136 e Unified Messaging Gateway page 136 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 134 OL 20696 04 Chapter Unified Communications on Cisco Integrated Services Routers Unified Communications Gateways W TDM Gateways Voice Gateways Video Gateway The Cisco 3900 series and Cisco 2900 series ISRs support the following type of time division multiplexing TDM gateways e Voice Gateways page 135 e Video Gateway page 135 Cisco IOS voice gateways connect TDM equipment such as private branch exchanges PBXs and the PSTN to VoIP packet networks The Cisco ISR voice gateway routers support the widest range of packet telephony based voice interfaces and signaling protocols within the industry providing connectivity support for more than 90 percent of all PBXs and public switched telephone network PSTN connection points Signaling support includes T1 E1 Primary Rate Interface PRI T1 channel associated signaling CAS E1 R2 T1 E1 QSIG protocol T1 Feature Group D FGD Basic Rate Interface BRI foreign exchange off
466. terprise 8843 e154 6f01 Up Up 6 enterprise Gi0 1 1 custservice S C 200 70 N A N A 58s MPID 400 Domain enterprise MA custservice Router1 On router 2 Router2 show ethernet cfm maintenance points remote MPID Domain Name MacAddress EESE PtSt Lvl Domain ID Ingress RDI MA Name Type Id SrvcInst EVC Name Age Local MEP Info I OL 20696 04 Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP 100 customer 0026 99f7 0b41 Up Up 7 customer Gi0 2 1101 customer1101 S C 100 30 N A N A 40s MPID 110 Domain customer MA customer1101 44 carrier 0026 99f7 0b41 Up Up 2 carrier Gi0 2 2 carrier S C 50 20 N A N A 40s MPID 43 Domain carrier MA carrier 400 enterprise 0026 99f7 0b41 Up Up 6 enterprise Gi0 1 1 custservice S C 200 70 N A N A 40s MPID 410 Domain enterprise MA custservice Router2 Use the ping command to verify if Ethernet CFM loopback messages are successfully sent and received between the routers Router ping ethernet mpid 100 domain customer service customer1101 cos 5 Type escape sequence to abort Sending 5 Ethernet CFM loopback messages to 8843 e154 6f01 timeout is 5 seconds Success rate is 100 percent 5 5 round trip min avg max 1 1 1 ms Router Use the traceroute command to send the Ethernet CFM traceroute messages Router traceroute ethernet mpid 100 domain customer service
467. that affect all network users such as impending system shutdowns The login banner also appears on all connected terminals It appears after the MOTD banner and appears before the login prompts appear Note For complete syntax and usage information for the commands used in this section see Cisco IOS Configuration Fundamentals Command Reference Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 284 OL 20696 04 Chapter Administering the Wireless Device Creating a Banner W This section contains the following configuration information e Default Banner Configuration page 285 e Configuring a Message of the Day Login Banner page 285 e Configuring a Login Banner page 286 Default Banner Configuration The MOTD and login banners are not configured Configuring a Message of the Day Login Banner You can create a single line or multiline message banner that appears on the screen when someone logs into the wireless device To configure an MOTD login banner follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal 2 banner motd c message c 3 end 4 show running config 5 copy running config startup config DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 banner motd c message c Specifies the message of the day For c enter the delimiting
468. the module which may or may not lead to changes on the MGF Modules and interface cards inter communicate using the MGF on the router with or without CPU involvement Modules and interface cards that communicate without CPU involvement reduce load and increase performance on the router Modules and interface cards that do not utilize the MGF communicate with the CPU using the PCI Express PCIe link The following sections describe module and interface card communication through the MGF e Restrictions for Module and Interface Card Communication page 171 e Supported Slots Modules and Interface Cards page 171 e Cisco High Speed Intrachassis Module Interconnect HIMI page 173 e Viewing Platform Information page 174 Restrictions for Module and Interface Card Communication Cisco 1941W The wireless LAN WLAN module is only supported on the Cisco 1941W ISR Maximum Number of Legacy Switch Modules A maximum of two integrated switch modules are supported when a legacy module is present in the system In this scenario the two switch modules have to be externally stacked Supported Slots Modules and Interface Cards The following slots support communication through the MGF e Service module SM e Enhanced high speed WAN interface card EHWIC e Internal service module ISM Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 EEN Chap
469. the two way delay measurement configuration The Cisco IOS Master Command List at http www cisco com en US docs ios mcl allreleasemcl all_book html provides more information about these commands Caution amp Because debugging output is assigned high priority in the CPU process it can diminish the performance of the router or even render it unusable For this reason use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff Note Before you run any of the debug commands listed in the following table ensure that you run the logging buffered debugging command and then turn off console debug logging using the no logging console command Table 4 debug Commands for Two Way Delay Measurement Configuration debug Command Purpose debug epmpal all Enables debugging of all Ethernet performance monitoring PM events debug epmpal api Enables debugging of Ethernet PM API events I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide jg Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E Support for Y 1731 Performance Monitoring on a Routed Port L3 Subinterface Table 4 debug Commands for Two Way Delay Measurement Configuration continued debug Command Purpose debug epmpal rx Enables debugging of Et
470. ther source of time is available you can manually configure the time and date after restarting the system The time remains accurate until the next system restart We recommend that you use manual configuration only as a last resort If you have an outside source to which the wireless device can synchronize you do not need to manually set the system clock This section contains the following configuration information e Setting the System Clock page 277 e Displaying the Time and Date Configuration page 277 e Configuring the Time Zone page 278 e Configuring Summer Time Daylight Saving Time page 278 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 276 OL 20696 04 Chapter Administering the Wireless Device Managing the System Time and Date W Setting the System Clock If you have an outside source on the network that provides time services such as an NTP server you do not need to manually set the system clock To set the system clock follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 clock set hh mm ss day month year or clock set hh mm ss month day year 2 show running config 3 copy running config startup config DETAILED STEPS Command Purpose Step1 clock set hh mm ss day month year Manually sets the system clock by using one of these formats or e For hh mm ss specify the time in hours 24 hour format minutes
471. tion 2 Software Configuration Guide Appendix B Using CompactFlash Memory Cards HI Directory Operations on a CompactFlash Memory Card Router pwd flash0 config Router dir Directory of flash0 config 380 rw 6462268 Mar 08 2004 06 14 02 myconfigl 203 xrw 6458388 Mar 03 2004 00 01 24 myconfig2 63930368 bytes total 51007488 bytes free Creating a New Directory To create a directory in flash memory enter the mkdir flash0 command in privileged EXEC mode amp Note Use flash1 in the command syntax to access CF in slot 1 Use 1asho in the command syntax to access CF in slot 0 Creating a New Directory Example In the following example a new directory named config is created then a new subdirectory named test config is created within the config directory Router dir flash0 Directory of flash0 1580 rw 6462268 Mar 06 2004 06 14 02 c2900 universalk9 mz 3600ata 30 rw 6458388 Mar 01 2004 00 01 24 c2900 universalk9 mz 63930368 bytes total 51007488 bytes free Router mkdir flash0 config Create directory filename config Created dir flash0 config Router mkdir flash0 config test config Create directory filename config test config Created dir flash0 config test config Router dir flash0 Directory of flash0 3 rw 6458208 Mar 01 2004 00 04 08 c2900 universalk9 mz tmp 1580 drw 0 Mar 01 2004 23 48 36 config 128094208 bytes total 121626624 bytes free
472. tion Guide OL 20696 04 Chapter Configuring Backup Data Lines and Remote Management Configuring Third Party SFPs ip address 192 168 2 2 255 255 255 0 encapsulation ppp dialer pool 1 dialer string 384020 dialer group 1 peer default ip address pool isdn ip local pool isdn 192 168 2 1 ip http server ip classless ip route 0 0 0 0 0 0 0 0 192 168 2 1 ip route 40 0 0 0 255 0 0 0 30 1 1 1 dialer list 1 protocol ip permit Configuring Third Party SFPs Small Form Factor Pluggables SFPs that are not Cisco certified are called third party SFPs Cisco approved means the SFPs have undergone rigorous testing with Cisco products and the SFPs are guaranteed to have 100 compatibility Third party SFPs are manufactured by companies that are not on the Cisco approved Vendor List AVL Currently Cisco ISR G2 routers support only Cisco approved SFPs From Release 15 3 2 T Cisco ISR G2 routers recognize third party SFPs Note Restrictions SUMMARY STEPS Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Cisco does not provide any kind of support for the third party SFPs because they are not validated by Cisco e Supports only 1OOBASE SFPs and 1000BASE SFPs under two speed configurations 100 Mbps speed for 1OOBASE SFPs 1000 Mbps speed for 1OOOBASE SFPs e Only the following routers and modules support third party SFPs Cisc
473. tment See Cisco Hoot and Holler over IP at Cisco com for information http www cisco com en US docs ios 12_2 voice configuration guide vvfhhip html See Cisco IOS Multicast for Hoot amp Holler Networks at Cisco com for information http www cisco com en US netsol ns340 ns394 ns 165 ns70 networking_solutions_white_paper09186 a00800a3e6c shtml Cisco Application Extension Platform APIs Cisco Application Extension Platform AXP is an open network platform for application development integration and hosting It is a service module on the Cisco Integrated Services Router ISR AXP realizes the Network as a Platform vision of Cisco while bringing collaborative partnerships and accelerating innovation Cisco AXP offers the following features e Linux based integration environment to develop applications that run on routers e Certified libraries to implement C Python Perl and Java applications http web server and SSH are also supported e Service APIs for integrating applications into the network e Multiple applications can run in their own virtual instance with the ability to segment and guarantee CPU memory and disk resources See Cisco Application eXtension Platform Quick Start Guide at Cisco com for Getting Started information http www cisco com en US docs interfaces_modules services_modules ax 1 0 quick guide axpqs html See Cisco Application eXtension Platform Developer Guide at Cisco com for developers inform
474. to the router console port Hardware installation guide for your router Break key sequence combinations for entering ROM monitor mode within the first 60 seconds of rebooting the router Standard Break Key Sequence Combinations During Password Recovery Upgrading the ROM monitor ROM Monitor Download Procedures for Cisco 2691 Cisco 3631 Cisco 3725 and Cisco 3745 Routers Using the boot image Rx boot to recover or upgrade the system image How to Upgrade from ROMmon Using the Boot Image Booting and configuration register commands Cisco IOS Configuration Fundamentals Command Reference Loading and maintaining system images rebooting Cisco IOS Configuration Fundamentals Configuration Guide Choosing and downloading system images Software Center at http www cisco com kobayashi sw center index shtml Router crashes Troubleshooting Router Crashes Understanding Software forced Crashes Router hangs Troubleshooting Router Hangs Technical Assistance Description Link Technical Assistance Center TAC home page containing 30 000 pages of searchable technical content including links to products technologies solutions technical tips and tools Registered Cisco com users can log in from this page to access even more content http www cisco com public support tac home shtml 1 You must have an account at Cisco com If you do not have an account or have forgott
475. turns to privileged EXEC mode copy running config startup config Optional Saves your entries in the configuration file Short preambles are enabled by default Use the preamble short command to enable short preambles if they are disabled I OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide JE Chapter Configuring Radio Settings W Configuring Transmit and Receive Antennas Configuring Transmit and Receive Antennas You can select the antenna that the wireless device uses to receive and transmit data There are three option settings for both the receive antenna see step 4 and the transmit antenna see step 5 SUMMARY STEPS DETAILED STEPS Step 1 Step 2 Step 3 Step 4 e Gain Sets the resultant antenna gain in decibels dB e Diversity This default setting tells the wireless device to use the antenna that receives the best signal If the wireless device has two fixed non removable antennas you should use this setting for both receive and transmit e Right If the wireless device has removable antennas and you install a high gain antenna on the wireless device s right connector you should use this setting for both receive and transmit When you look at the wireless device s back panel the right antenna is on the right e Left If the wireless device has removable antennas and you install a high gain
476. up an external process break set show clear the breakpoint confreg configuration register utility cont continue executing a downloaded image context display the context of a loaded image cookie display contents of cookie PROM in hex dev list the device table dir list files in file system frame print out a selected stack frame help monitor builtin command help history monitor command history iomemset set IO memory percent meminfo main memory information repeat repeat a monitor command reset system reset rommon pref select ROMMON set display the monitor variables showmon display currently selected ROM monitor stack produce a stack trace sync write monitor environment to NVRAM sysret print out info from last system return tftpdnld tftp image download unalias unset an alias unset unset a monitor variable xmodem x ymodem image download hwpart Read HW resources partition Using ROM Monitor Displaying Files in a File System dir To display a list of the files and directories in the file system use the dir command as shown in the following example rommon 1 gt dir flash0 program load complete entry point 0x80803000 size 0x1b340 Directory of flash0 c2900 universalk9 mz SSA rel1 configuration 2 60199000 rw 14700 1267 rw rommon 2 gt dir usbflash0 program load complete entry point 0x80903000 size 0x4c400 Directory of usbflash0 2 54212244 rw c2900 universalk9 mz SSA Loading a System Image
477. ur entries in the configuration file The first part of the clock summer time global configuration command specifies when summer time begins and the second part specifies when it ends All times are relative to the local time zone The start time is relative to standard time The end time is relative to summer time If the starting month is after the ending month the system assumes that you are in the southern hemisphere To disable summer time use the no clock summer time command in global configuration mode This example shows how to set summer time to start on October 12 2000 at 02 00 and end on April 26 2001 at 02 00 AP config clock summer time pdt date 12 October 2000 2 00 26 April 2001 2 00 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide 280 OL 20696 04 Chapter Administering the Wireless Device Configuring a System Name and Prompt W Configuring a System Name and Prompt You configure the system name on the wireless device to identify it By default the system name and prompt are ap If you have not configured a system prompt the first 20 characters of the system name are used as the system prompt A greater than symbol gt is appended The prompt is updated whenever the system name changes unless you manually configure the prompt by using the prompt command in global configuration mode amp Note For complete synta
478. uration Guide Chapter Administering the Wireless Device HZ Controlling Access Point Access with RADIUS 8 copy running config startup config 9 aaa authorization exec radius DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 aaa new model Enables AAA Step3 radius server host hostname ip address auth port port number acct port port number timeout seconds retransmit retries key string Specifies the IP address or hostname of the remote RADIUS server host e Optional For auth port port number specify the user datagram protocol UDP destination port for authentication requests e Optional For acct port port number specify the UDP destination port for accounting requests e Optional For timeout seconds specify the time interval that the wireless device waits for the RADIUS server to reply before retransmitting The range is to 1000 This setting overrides the radius server timeout global configuration command setting If no timeout is set with the radius server host command the setting of the radius server timeout command is used e Optional For retransmit retries specify the number of times that a RADIUS request is resent to a server if that server is not responding or responding slowly The range is 1 to 1000 If no retransmit value is set with the radius server host command the setting of the radius server retransmit globa
479. uring Radio Settings W Configuring Radio Channel Settings amp Note The maximum legal transmit power is greater for some 5 GHz channels than for others When it randomly selects a 5 GHz channel on which power is restricted the access point automatically reduces transmit power to comply with power limits for that channel Note Cisco recommends that you use the world mode dot11d country code configuration interface command to configure a country code on DFS enabled radios The IEEE 802 1 1h protocol requires access points to include the country information element IE in beacons and probe responses By default however the country code in the IE is blank You use the world mode command to populate the country code IE CLI Commands The following sections describe CLI commands that apply to DFS Confirming that DFS is Enabled Use the show controllers dot11radiol command to confirm that DFS is enabled The command also includes indications that uniform spreading is required and channels that are in the non occupancy period due to radar detection This example shows a line from the output for the show controller command for a channel on which DFS is enabled The indications listed in the previous paragraph are shown in bold ap show controller dot11radiol I interface Dot11Radio1 Radio lt model gt Base Address 011 9290ec0 BBlock version 0 00 Software version 6 00 0 Serial number FOCO83114WK Number of su
480. urity services e UC Trusted Firewall page 138 e Signaling and Media Authentication and Encryption page 139 e Virtual Route Forward page 139 UC Trusted Firewall Cisco Unified Communications Trusted Firewall Control pushes intelligent services onto the network through a Trusted Relay Point TRP Firewall traversal is accomplished using Simple Session Traversal Utilities for NAT STUN on a TRP co located with a Cisco Unified Communications Manager Express Cisco Unified CME Cisco Unified Border Element CUBE Media Termination Point MTP Transcoder or Conference Bridge Firewall traversal for Unified Communications is often a difficult problem Voice over IP VoIP protocols use many ports for a single communication session and most of these ports those used for media H 245 and so forth are ephemeral It is not possible to configure static rules for such ports as they fall in a large range Cisco Unified Trusted Firewall opens ports dynamically based on the conversation of trusted end points By using UC Trusted Firewall in the network following things can be achieved e Firewall can be made independent of protocol because only TRP which is controlled by Call Control needs to be enhanced for various protocols Firewall does not need to change e Increase firewall performance while opening firewall ports in the media path dynamically when a VoIP call is made between two endpoints e Simplify the firewall policy configuration an
481. use channels 44 and 46 for example for radios that are close to each other Caution The presence of too many access points in the same vicinity can create radio congestion that can reduce throughput A careful site survey can determine the best placement of access points for maximum radio coverage and throughput 802 11n Channel Widths SUMMARY STEPS The 802 11n standard allows both 20 MHz and 40 Mhz channel widths consisting of two contiguous non overlapping channels for example 2 4 GHz channels 1 and 6 One of the 20 MHz channels is called the control channel Legacy clients and 20 MHz high throughput clients use the control channel Only beacons can be sent on this channel The second 20 MHz channel is called the extension channel The 40 MHz stations may use this channel and the control channel simultaneously A 40 MHz channel is specified as a channel and extension such as 1 1 In this example the control channel is channel 1 and the extension channel is above it To set the wireless device channel width follow these steps beginning in privileged EXEC mode 1 configure terminal interface dotllradio 01 1 channel frequency least congested width 20 40 above 40 below dfs end a a w N copy running config startup config OL 20696 04 Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Chapter Configuring Radio S
482. uter Configuration WE Configuring a Loopback Interface DETAILED STEPS Example Step 1 Step 2 Step 3 Command Purpose interface type number Enters configuration mode for the loopback interface Example Router config interface Loopback 0 Router config if ip address ip address mask Sets the IP address and subnet mask for the loopback interface Example Router config if ip address 10 108 1 1 255 255 255 0 Router config if exit Exits configuration mode for the loopback interface and returns to global configuration Example mode Router config if exit Router config The loopback interface in this sample configuration is used to support Network Address Translation NAT on the virtual template interface This configuration example shows the loopback interface configured on the gigabit ethernet interface with an IP address of 200 200 100 1 24 which acts as a static IP address The loopback interface points back to virtual template1 which has a negotiated IP address interface loopback 0 ip address 200 200 100 1 255 255 255 0 static IP address ip nat outside l interface Virtual Templatel ip unnumbered loopback0O no ip directed broadcast ip nat outside Verifying Configuration To verify that you have properly configured the loopback interface enter the show interface loopback command You should see verification output similar to the following exampl
483. uter to the privileged EXEC mode Example Router config ecfm srv end Step9 configure terminal Enters the global configuration mode Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide Example Router configure terminal I OL 20696 04 o Chapter Configuring Ethernet CFM and Y 1731 Performance Monitoring on Layer 3 Interfaces E CFM Support on Routed Port and Port MEP Command Purpose Step 10 interface gigabitethernet slot port Example Router config interface gigabitethernet 0 2 Specifies an interface and enters the interface configuration mode Step 11 ethernet cfm mep domain domain name mpid mpid value service service name Example Router config if ethernet cfm mep domain carrier mpid 44 service carrier Sets a port to a maintenance domain and defines it as an MEP Note The values for domain and service must be the same as the values configured for CFM Step 12 end Example Router config if ecfm mep end Returns the router to the privileged EXEC mode Configuration Example for Ethernet CFM Port MEP This example shows how to configure Ethernet CFM on a port MEP Router gt enable Router configure terminal Router config ethernet cfm ieee Router config ethernet cfm global Router con Router con Router con Router config ecfm srv end Router configure termi
484. w cisco com en US docs routers access wireless software guide SecurityLocalAuthent html Describes how to use a wireless device in the role of an access point as a local authenticator serving as a standalone authenticator for a small wireless LAN or providing backup authentication service As a local authenticator the access point performs LEAP EAP FAST and MAC based authentication for up to 50 client devices Cipher Suites and WEP http www cisco com en US docs routers access wireless software guide SecurityCipherSuitesWEP html Describes how to configure the cipher suites required for using WPA and CCKM WEP and WEP features including AES MIC TKIP and broadcast key rotation Hot Standby Access Points http www cisco com en US docs routers access wireless software guide RolesHotStandby html Describes how to configure your wireless device as a hot standby unit Configuring Wireless VLANs http www cisco com en US docs routers access wireless software guide wireless_vlans html Describes how to configure an access point to operate with the VLANs set up on a wired LAN Service Set Identifiers http www cisco com en US docs routers access wireless software guide ServiceSetID html In the role of an access point a wireless device can support up to 16 SSIDs This document describes how to configure and manage SSIDs on the wireless device Administering Links De
485. w slots common ports and getting started tasks Module 2 Basic Router Configuration Describes how to perform the basic router configuration interface configuration and routing configuration Module 3 Configuring Backup Data Lines and Describes how to configure backup interfaces Remote Management dial backup and remote management Module 4 Configuring Power Efficiency Describes the hardware and software power Management efficiency management features on the router See Cisco EnergyWise Configuration Guide for information about configuring power efficiency management on modules and interface Module 5 Configuring Security Features Describes how to configure security features Module 6 Unified Communications on Cisco Describes voice application services that are Integrated Services Routers supported on these routers Module 7 Configuring Next Generation Describes how to configure the new High Density PVDM3 Modules next generation PVDM3 installed on your router Module 8 Multi Gigabit Fabric Describes how modules and interface cards Communication inter communicate using the MGF on the router Module 9 Upgrading the Cisco IOS Software Describes how to upgrade the Cisco IOS software image on the router or the access point Part 2 Configuring the Access Point Description Module 1 Wireless Overview Describes the autonomous image and recovery image shipped on the Cisco 1941W access point flash Explains the default autonomous mode and Ci
486. wn Step5 exit Exit config controller mode Example Router config controller exit Step6 voice port slot number port Enter config voiceport mode Example Router config voice port 0 0 0 1 Step7 shutdown Administratively shuts down the voice port Example Router config voiceport shutdown Step8 exit Exit config voiceport mode Use the exit command till you are in privileged Example EXEC mode Router config voiceport exit Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 EEN Chapter Configuring Next Generation High Density PVDM3 Modules HZ Information About Configuring the PVDM3 Module on Cisco Voice Gateway Routers Perform online insertion and removal SUMMARY STEPS 1 hw module sm slot oir stop 2 Confirm that the board is ready for removal The LED blinks for 3 seconds and turns off After the LED is off the board is ready for removal 3 Insert the replacement board in the same slot or in an empty slot 4 hw module sm slot oir start DETAILED STEPS Command or Action Purpose Step1 hw module sm slot oir stop Shuts down the specified module to prepare it for removal Example Router hw module sm 1 oir stop Step2 Wait until the LED signals that the board is ready for removal The LED blinks for 3 seconds and turns off After the LED is off the board is ready for removal Step3 Insert the replac
487. x and usage information for the commands used in this section see Cisco IOS Configuration Fundamentals Command Reference and Cisco IOS IP Addressing Services Command Reference This section contains the following configuration information e Default System Name and Prompt Configuration page 281 e Configuring a System Name page 281 e Understanding DNS page 282 Default System Name and Prompt Configuration The default access point system name and prompt are ap Configuring a System Name To manually configure a system name follow these steps beginning in privileged EXEC mode SUMMARY STEPS 1 configure terminal hostname name end show running config oF U N copy running config startup config Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide I OL 20696 04 EN Chapter Administering the Wireless Device W Configuring a System Name and Prompt DETAILED STEPS Command Purpose Step1 configure terminal Enters global configuration mode Step2 hostname name Manually configures a system name The default setting is ap Note When you change the system name the wireless device radios reset and associated client devices disassociate and quickly reassociate Note You can enter up to 63 characters for the system name However when the wireless device identifies itself to client devices it uses only the first 15 characters
488. your Cisco voice gateway SUMMARY STEPS 1 show platform hw module power show voice call slot port show voice dsp group all show voice dsp sorted list show voice dsp capabilities slot number dsp number show voice dsp group slot number show voice dsp statistics device show voice dsp statistics tx rx show voice dsp statistics ack o o N SF FF LY DN debug voice dsp crash dump Cisco 3900 Series Cisco 2900 Series and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide OL 20696 04 _ Chapter Configuring Next Generation High Density PVDM3 Modules How to Verify and Troubleshoot the Functionality of the PVDM3 Cards on Cisco Voice Gateways W DETAILED STEPS Step 1 show platform hw module power amp Note Effective with Cisco IOS Releases 15 1 1 T and 15 0 1M 2 the hw module energywise level command is not available in Cisco IOS software For more information see the Cisco 3900 Series 2900 Series and 1900 Series Software Configuration Guide Use this command to display power settings of PVDM3 service modules for example Router show platform hw module power PVDM Slot 0 1 Levels supported 0x441 SHUT FRUGAL FULL CURRENT level 10 FULL Previous level 10 FULL Transitions Successful Unsuccessful SHUT 0 0 FRUGAL 0 0 FULL 0 0 Slot 0 2 Levels supported 0x441 SHUT FRUGAL FULL CURRENT level 10 FULL Previ
Download Pdf Manuals
Related Search
Related Contents
StarTech.com 1U 12 Port Wall Mount Cat5e 110 Patch Panel - 45 Degree Licence Agreement You are about to material 镜子钟 user manual Samsung Samsung HAARTROCKNER - Beurer medical Intel Raptor AT User's Manual ATOS COROLLE-DOC ATOS - Corolles> Home MC2 - alfamatic.es Revision - Cornelius intext:Bedienungsanleitung filetype:pdf Copyright © All rights reserved.
Failed to retrieve file