Cisco 700 Series, 765 Series Configuration Manual

Page 1
Cisco 700 Series Router Configuration Guide
Software Release 4.4.
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
408 526-4000
Tel:
800 553-NETS (6387)
408 526-4100
Text Part Number: OL-0184-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT AR E PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interferen ce when the equipment is operated in a commercial en vironm ent. This equ i pm ent generates , uses, and can radiate radio-frequency energ y and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communicati on s. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency
energy. If it is not in stalled in accordance with Cisco’s installation in structions, it may cau se interferen ce with radio and televisio n reception. Th is equi pment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interfer ence in a resident ial installation . However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digi ta l dev ic es. I n th at e ve nt, y our ri gh t t o us e t h e eq uipm e nt may be li mit ed by FCC r egu la tions , an d you m ay be re qui red to correct any interferen ce to radio or televisi on communications at your own expense.
You can determine whether y our equipment is causing in terference by turnin g it off. I f the interf erence stops, it was probably caused by the C isco equipment or one of its peripheral devices. If the equipment causes interference t o radio or television reception, t ry to correct the interference by using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the tele vision or ra dio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the tele vision or radio are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of
UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE
PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Access Registrar, AccessPath, Any to Any, AtmDirector, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, the Cisco logo, Cisco Certified Intern e twork Expe rt logo, CiscoLink, the Cisco Mana gement Conn e ction logo, t he Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Capit a l, the Cisco Sys tems Cap ital lo go, Cisco Systems Networking A c ademy, the Cisco T e chnologies l ogo, ConnectWay, ControlStr eam, Fast Step, FireRunner, GigaStack, IGX, JumpStart, Kernel Proxy, MGX, Natural Network Viewer, NetSonar, Network Registrar, New World, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, Rout eStr eam, Secure Scrip t, Serv ice Way, SlideCast, S MARTnet, Strea mView, The Cell, TrafficDirector, TransPath, ViewRunner, VirtualStream, VisionWay, VlanDirector, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and Asist, BPX, Cat alys t, Cisco, Cisco IOS, the C isco I OS log o, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastLink, FastPAD, FastSwitch, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Registrar, Strata View Plus, Stratm , TeleRouter, an d VCO are registered trademar ks of Cisco Systems, Inc. in th e U.S. and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship bet we en Cisc o and any of its resellers. (9906R)
Page 3
About This Manual vii
Related Documentation viii Conventions ix
Chapter 1 Overview 1-1
Supported Protocols 1-1 Software Images 1-2 Administrative Configuration Options 1-3
Chapter 2 Using Profiles w it h Cisco 700 Series Route rs 2-1
Profile Overview 2-1
Profiles and Connections 2-2
System and Profile Parameters 2-2
System Mode Parameter Set 2-3 Profile Mode Parameter Set 2-3 Permanent Profiles 2-4
CONTENTS
Creating and Modifying Profiles 2-5
Displaying Pr ofile Configurations 2-5 Removing Profile-Based Values 2-5 Deleting Profiles 2-6
Changing Profile Names 2-6 Incoming Calls 2-6 Outgoing Calls 2-7
Chapter 3 Basic Configurations 3-1
Basic Configura tion Concepts 3-1
Bridges and Routers 3-2
Profiles 3-2
LANs and WANs 3-2
Current Configuration 3-3
Remote and Central Sites 3-4
Contents iii
Page 4
Password and Secret 3-4
Additional Refere nce 3-4 Starting Point 3-4
Setting SPID Autodetection (North America only) 3-5
Setting SPIDs Manually (North America only) 3-6 Bridging with a Ci sc o 700 S eries Router 3-7
Cisco 700 Series Router Bridgi ng Instructions 3-8 Routing IP with a Cisco 700 Series Router to an ISP 3-9
Routing a Cisco 700 Series Router to an ISP I ns tructions 3-11 Routing IP to a Central Sit e 3-11
Central Sit e IP Routing Command Summary 3-13 Routing IP and IPX On-Demand 3-14
On-Demand IP and IPX Routing with PPP Instructions 3-16
Central Site On-Demand IP and IPX Routing with PPP
Commands 3-17
Chapter 4 Using CHAP 4-1
SPID Detection (North America only) 4-2
iv
IP Static Routing and Callback with CHAP Authentication 4-2
Remote Cisco 76 5 Comma n d Summ ary 4-3 IP Static Routing with CHAP Authentication and MLP 4-4
Remote Cisco 76 5 Comma n d Summ ary 4-5 IP Static Routing with PAP Authentication and MLP 4-6
Remote Cisco 76 5 Comma n d Summ ary 4-7 IP Unnumbered Static Routing and CHAP with MLP 4-8
Remote Cisco 76 5 Comma n d Summ ary 4-9 IP Static and IPX Stati c Routing with CHAP and MLP 4-10
Remote Cisco 76 5 Comma n d Summ ary 4-11 IPX Static Routing with CHAP and MLP 4-12
Remote Cisco 76 5 Comma n d Summ ary 4-13 Multilink PPP Encaps ulation 4-14
Cisco 700 Series Router Configuration Guide
Page 5
Dynamic Routing Protocols 4-14 Bridging to a Rout er Running Cisco IOS Software 4-15
Chapter 5 Configuring DHCP Relay, DHCP Server, and PAT 5-1
DHCP Description 5-2
DHCP Server Applica tion Notes 5-2
DHCP Relay Application Notes 5-3 PAT Description 5-3
PAT Application Notes 5-3 IPCP Description 5-4
IPCP Address Negotiation Applic ation Notes 5-4 PPP IPCP Negotiation Example 5-5
Cisco 765 Series Router Commands 5-5
Verify the Configuration 5-6 DHCP Relay with IPCP Negotiation Example 5-6
Cisco 765 Series Router Commands 5-6
Verify the Configuration 5-7 DHCP Server with IPCP Negotiation Example 5-7
Cisco 765 Series Router Commands 5-8
Verify the Configuration 5-8 PAT with IPCP Single-Desti nation Negotiat ion Example 5-9
Cisco 765 Series Router Commands 5-10
Verify the Configuration 5-10 DHCP Server and PAT with IPCP Singl e-Destinat ion Negotiation
Example 5-11
Cisco 765 Series Router Commands 5-12
Verify the Configuration 5-12 DHCP Server with PAT and IPCP Dual-Destination PPP Negotiation
Example 5-13
Cisco 765 Series Router Commands 5-14
Verify the Configuration 5-15
Contents v
Page 6
Chapter 6 Configuring Remote CAPI 6-1
CAPI and RVS-COM 6-2
Supported D-Channel Protocols 6-3
Supported Applications 6-3
Remote CAPI Router Commands 6-3 Configuring the Cis co 700 Router as an RCAPI Server 6-4
RCAPI Command Summary 6-4
Verify the Configuration 6-5
Appendix A Token Card and Cisco Secure Authentication Support A-1
Token C achi n g A- 2
vi
Cisco 700 Series Router Configuration Guide
Page 7
About This Manual
This chapt er discusses the organization, related documentation, an d conventions of the Cisco 700 Series Router Configuration Guide.
This document is organized as follows:
Chapter 1, “Overview,” provi des a brie f overview of Cisco IOS-700 software and
supported protocols.
Chapter 2, “Using Profiles with Cisco 700 Series Routers, ” describes a set of
user -defi ned parameter s grouped in a customi zed prof il e and associa ted with a speci f ic remote de vice.
Chapter 3, “Basic Configurations,” describes how to connect a Ci sco 700 series router
to an In ternet service provider (ISP) or to a central site, s uch as you r company network.
Chapter 4, “Using CHAP,” describes how to connect a Cisco 700 series router to a
router running Cisco IOS software.
Chapter 5, “Configuring DHCP Relay, DHCP Server, and PAT,” describes how to
config ure Dyn amic Host Conf i gura tion Pr otocol (DHCP) re lay, DHCP server , and Po rt Address Translation (PAT) on the Cisco 700 series router.
Chapter 6, “Configuri ng Remote CAPI ,” describes how to configure Remote Common
Application Programmers Interfac e (CAPI) and the ISDN Device Control Protocol (ISDN-DCP) on the Cisco 7 00 series router.
Appendix A, “Token Card and Cisco Secure Authentic ation Support,” de sc ribes the
Token Card and Cisco Secure Authentication Supp ort security features.
About This Manual vii
Page 8
Related Documentation
Related Documentation
The following documentation is also provided with your Cisco 700 series router:
Release Notes for Cisco 700 Seri es Router Software provides the latest infor ma tion on
the router software. Release notes for previous versions of the softwa re are on the Cisco Documentation CD-ROM and the Cisco Web site.
Cisco 760 Quick Reference Guide and Cisco 770 Quick Reference Guide provide
hardware installa tion instructions and forms to assist you in gathe r ing configuration information. Each guide incl udes a Cisco 700 Fast Step CD-ROM.
Cisco 700 Series Router Command Reference provides details of all router commands.
The document is available on the Cisco Documentation CD-ROM and the Cisco Web site in HTML format.
Cisco 700 Series Router Install ation Guide provides instructions for cabling the
Cisco 700 series router. The documen t is available on the Cisco Documentati on CD-ROM and the Ci sc o Web site in HTML format. A paper copy of the doc um ent is provide d with your router.
Additional Cisco documentation and literature are available in a CD-ROM package tha t ships with your Cis co 700 series router. The Documentation CD-ROM, a member of the Cisco Connec tion famil y , is upda ted monthly. Therefore, it may be more up to dat e than the printed doc umentation. T o order additi onal copies of the Document ation CD-ROM, conta ct your local sales representative or call customer service. You can also access Cisco documentat ion on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco 700 series router configuration information can be found at http://www.cisco. com /warp/public/779/s mbiz/service/configs/700_configs. htm and http://www.cisco.com/warp/cpropub/67/sample.html
If you are reading Cis co product documenta tion on the World Wide Web, you can submit comments electronically. Click Feedback in the tool bar , an d sel ect Docume ntation. After you complete the form, click Submit to send it to Cisco. W e appreciate your comments.
viii
Cisco700 Series Route r Conf iguration Guide
Page 9
Con ven ti ons
This publication uses the following conventions to convey instructions and information:
The caret character (^) represents the Control ke y.
For exa mple, the k ey combina tions ^D an d Ctrl-D are e quiv alent: Bot h mean hol d down the Control key while you pre ss the D key. Keys are indicated in capitals, but are not case sensitive.
A string is defined as a nonquoted se t of cha r acters.
There are a f ew st rings tha t i nclude quotat ion marks a s pa rt of th e st atem ent. The ref ore, common practice is not to include the quotation marks unless they are included in the statement. For example, set the SNMP community string to public does not use
quotation marks around the string “public” bec ause when you enter the string, you would not include the quotation marks.
Command descriptions use these conventions:
Conventions
Verti cal bars ( | ) sepa r at e alter n at ive, mu tu a ll y excl u sive, ele m en t s.
Square brackets ([ ]) indicate optional elements.
Variables for which you supply values are in italic.
Examples that contain system prompts denote interactive sessions, indicating the user
enters the command at the prompt. The system prompt indicates the current command mode. For example, the prom pt router:2503> indicates profile mode. The exception is when a list of commands is provided in an example c onfiguration; the prompt is not show n for the sake of clarity.
Fixed inf ormation you ent er is in boldface screen font . Variab le informatio n you
enter is in it a lic.
Terminal sessions and infor mation the system displays are in screen font.
Nonprinting characters, such as passwords, are in angle brackets (< >).
The command synt ax conta ins a combinat ion of bold and re gu lar uppe rcase a nd lo wercas e alphanumer ic char acter s. You can ente r the full tex t of the commands, or you can enter the abbre via ted fo rm. Th e abb rev iated form co nsis ts of t he f irs t chara cters in ea ch wo rd, s hown in upperc ase bol d in the c ommand s ynt ax. The upperca se bold chara cters a re the m inimum you must enter for the command to be recognized and exe cuted.
About This Manual ix
Page 10
Conventions
The actua l commands you ent er ar e not c ase s ensi tiv e . The ca pit aliz ation and bold type are used in this manual only to differenti ate the characters required for the abbreviated forms of commands.
For example, The syntax of the se t system command is as fo llows:
SEt SYstemname [systemname]
The complete version of the set system command can be entered at the command prompt as foll ow s:
12
93
6
>set systemname
systemname
>
systemname
The abbreviated version of the same command can be entered as follows :
>se sy
systemname
Note Means reader take note . Notes conta in helpful sugges tions o r references to mater ials
systemname
>
not contained in this manual.
Timesaver This symbol means the described action saves time. You can save
time by performing the action des cribed in the paragraph.
Caution This symb ol me ans reader be careful. In this situ ation, you might do
something that could result in equipment damage or loss of data.
x
Cisco700 Series Route r Conf iguration Guide
Page 11
CHAPTER
1
Overview
Cisco 700 series ro uters connec t small off ice Ether net LANs t o corporat e networks t hrough Integrated S ervices Digital Network (ISDN) Basic Rate Interface (BRI) lines. After configuration, the router automatically routes pac kets to and from remote dest inations using IP or Internetwork Pa ck et Exchange (IPX).
The Cisco 700 series router is a fixed config u ration rou t er. The rou t er op e r at in g syst em is called Cisco IOS-700 software and is unique to the Cisco 700 series router.
Supported Protocols
The Cisco 700 series routers support the following protocols:
IP
IPX
Internet Protocol Control Protocol (IPCP)
Internet Control Message Protocol (ICMP)
Internetwork Packet Exchange Control Protocol (IP XCP )
Point-to-Point Protocol (PPP)
Bridge Control Protocol (BCP)
Multilink PPP (MLPPP)
Address Resolution Protocol (ARP)
Service Advertisement Protocol (SAP)
Password Authentication Protocol (PAP)
Ove rview 1-1
Page 12
Software Images
Trivial File Transfer Protocol (TFTP server)
Simple Network Manage ment Protocol (SNMP)
Routing Information Protoco l (RIP) for IP and IPX
Triggered RIP for IP
Chall enge Handshak e A u thenticatio n Protocol (CHAP)
Dynamic Host Configuration Protocol (DHCP)
Port Address Translation (PAT)
Remote Common Appli cation Programmers Interface (RCAPI)
ISDN Device Control Protocol (ISDN-DCP)
Software Images
The Cisco 700 Series routers run a proprietary Cisco software (Cisco IOS-700 software) image, whic h is differ ent than traditional Cisco IOS software. The image you use varies, dependin g on the re gion in which the router is used and what feature set you desire. The image name, fo r e xample, c760-i n.r- TPH. 43-1.bin , d esignat es th e re gion and featu res. The regions are as follows :
US for use in North America
NET3 for use in Europe
TR6 for use in Germany
INS for use in Japan
TPH for use in Australia
The fe atures are indicated as follows:
Internet Read y ( IP onl y, 30 users with data compres si on on) im age s have a "b"
designation.
Internet Re ady X.25 (IP only, 30 LAN de vices, compression, X.25) images have a "bxd"
designati on.
1-2
Cisco700 Series Router Command Reference
Page 13
Administrative Configuration Opti ons
Remote Office (IP/IPX, 1500 LAN devices, compression) images have an "r"
designation.
Remote Office X.25 (IP/IPX, 1500 LAN devices, compr ession, X.25) images have an
"rxd" designation.
So the exampl e image named "c760-in.b-TPH.43-1.bin" is a Series 760 router image software Release 4.3(1) wi th the Internet Ready feature set for Australia. (All Cisco 700 series routers run Series 760 router images. There are no Series 770 router images.)
You can verify the image loaded on your router by entering the command-line prompt. The following example shows a router running a Cisco 760 (c760) image for the Un ited States (US), release 4.0(1 ), and using t he Remote Off ice (r) f eature set:
guest> version Software Version c760-in.r.US 4.0(1) - Jan 14 1997 19:00:23 Cisco 766 ISDN Stack Revision US 2.10 (5ESS/DMS/NI-1)
Administrative Configuration Opt ions
You can configure routers through the configuration port or across an IP network using Telnet. In addition, Cisco IOS-700 software supports Cisco 700 Fast Step software applications. These tools are on the Cisco 700 Fast Step CD-ROM in the Cisco 700 Quick Reference Guide.
version command at the
Ove rview 1-3
Page 14
Administra ti ve Configuration Options
1-4
Cisco700 Series Router Command Reference
Page 15
CHAPTER
2
Using Profiles with Cisco 700 Series Routers
A profile is a set of configuration parameters associated with ports on the router or WAN devices.
This chapter contains the following sections:
Profile Overview
System and Profile Parameters
Creating and Modifying Profiles
Incoming Calls
Outgoing Calls
Profile Overview
There are two modes in which you can set parameters, the system mode and the profil e mode. Syst em m ode parameters af fect the configuration on a global level. Profiles are se ts of local parameters. Pr ofile mode parameters affect how the router handles the connection to a device.
You do not have to rec onfigure the router every time you connect to a differe nt device. Instead of using one set of configuration parameters for all devices, you can use different profiles to c ommunicate with a varie ty of devic es.
For e xample , you c an cre ate a us er -def in ed prof i le call ed 250 0 t hat c ontain s the p aramete rs to be used when communicating with a Cisco 2500 series router over the WAN. You can customiz e your Cisco 700 series router to maintain up to 17 user-defined profil es . Profiles are saved in the Cisco 700 series router nonvolatile RAM (NVRAM).
Using Profi les with Cisco 700 Series Routers 2-1
Page 16
System and Profile Parameters
In addition to user-defined profiles, there are three permanent profiles, Internal, LAN, and Standard. The Interna l profile stores parameters used to communicate be tween the LAN and WAN ports on the Cisco 700 series router. The LAN profile stores paramet ers that configure the LAN port on the router. The Standard prof ile is the default profil e. If authentication is not required and the de st ination device you are connecting to does not have a user-defined profile, the router uses the Standard profile.
Profiles and Connections
Prof iles are eithe r active or inactive. An ac tive profile cr eates a virtual connection to the remote de vice associate d with the profile. A virtual connection is a connection without physical channels. After creating a virtual connection, an on-demand call can be made to the ass o ci at ed r em o t e d evic e to est ab lish a physical connection.
A physical connection is a dynamically crea ted pipeline of packets from the Cis co 700 series router to a switch on the WAN. All connections are associated with the profile that defines the configuration of the connection.
Virtual and physical connections behave similarly; the difference is that physical connections forward pack ets to the WAN. V irtual conn ections monitor packet tr affi c on the
LAN until a demand filter “see s” that a packet is destined for the WAN a n d in itiates a call to the swit ch, opening the physical connection. Once the call is establis hed, the virtual connection becomes an active physical connection, and the packets move through the pipeline.
System and Profile P arameters
The system is composed of both system mode parameters, user-defined profiles, and permanent profiles. System mode parameters can be changed only in system mode. The prompt indi ca tes you are in system mode by displaying nothing or the router name . An example of the prompt is shown below:
Router_name>
If you are in profile mode, the prof ile name appears on the prompt, separat ed from the system name by a colon (:). An example of the prom pt is shown below:
Router_name:Profile>
2-2
Cisco700 Series Router Configuration Guide
Page 17
All profi les are bas ed on the prof ile templa te and inhe rit the syst em-lev el v alues. When you create a new profile, its default values are taken from the profile template.
System Mode Parameter Set
System mode par ameters aff ect the router as a system. Table 2-1 l ists the system parameters.
Table 2-1 System Parameter Set
System Mode Parameter Set
Calle r ID pa ra m e te rs Call waiting PPP Date and time Country group Screen length Directory number(s) Addre ss age time Screen echo Delay time Local and remote access SNMP Forwarding mode Phone 1 and 2 SPIDs Mult id es ti na tion di a lin g PPP cl ie nt pa ss wo r d Switch type Numbering plan PPP client secret System password Patterns Voice priority Power Source 1 detect Passthru Compression System name PPP auth entic a tio n
1 PPP = Po in t -to-P oint Pr oto col 2 SNMP = Simple Network Management Protocol 3 SPID = service profile identifier
Profile Mode Parameter Set
Changes made to profile mode parameters in system mode affect the profile template. When a profil e is created, it in herits the matching system mode param eters from the profi le template. Any changes to parameters in pr ofile mode apply only to that profile. Changes made to prof ile par ameters i n system mode are stored i n the prof ile t emplate. Whe n you use the set user command to create a user-defined profile, the default parameters for the new profile are taken from system mode.
1
param e te rs
2
parame ters
3
Using Profi les with Cisco 700 Series Routers 2-3
Page 18
System and Profile Parameters
Table 2-2 lists the parameters that can be configured in a profile.
Table 2-2 P rofile Parameters
Bridging Line speed PPP authentication (outgoing) Ringback number Auto calling All IP parameters, including filters Passthrough Demand PAP password (client and host) Learning Timeout All IPX parameters, including filters Subnet m ask Called number CHAP secr et (client and host) Protocol Encapsulation Bridge filters (addr ess, type, and user -defined) Loopback
Permanent Profile s
Cisco 700 series routers contain three permanent profiles. Permanent profiles can be modif ied, but the y cannot be deleted. The permanent profiles are as follows:
LAN Determines how dat a is passed from the router to the LAN. This profile
is commonly used for connections made directly to the loca l network.
Internal Determines how data is passed between the bridge e ngine a nd the IP/ IPX
router .
Standard The default profile. If authentication is set to non e an d a profile does not
exis t for the WAN switch, the router uses the St andard prof ile by default. If authenti ca tion is required and no profile is found, the call is dropped.
The decision to use the LAN or Internal profile involves some knowledge of your network design and whether you are bridging or routing to remot e sites (or a combination of both). It is be st t o use t he LAN prof ile inst ead of th e I nterna l p rof ile to simplif y t he conf igura tion. You can easily associate the LAN profile with the Ethernet interface and the user-defined profiles with the ISDN interface.
Sometimes situations arise (very infrequent) where you must route a protocol to one site and bridge the same protocol to another sit e. Simply leave the LAN profile as a bridging prof ile, and use the Internal profile for all routed protocol inf ormation.
2-4
Cisco700 Series Router Configuration Guide
Page 19
Creating and Modifying Profiles
A new profile is created with the set user command. When you create a new profile, you auto matically enter pr o file mode for that profile. The following example creates a user profile called tomd. Ente r the set user command to create a profile using the profile template for the default values of the parameters, a s follows:
Creating and Modifying Profiles
Host> set user Host:tomd>
Notice that th e prof i le mode is indica ted b y the prom pt, whic h appear s as th e system name and the profile name, separated by a colon. While this prompt is displayed, modifications to the pa rameters only aff ect the p arameters in the prof ile. The changes do n ot af fect system mode parameters or othe r profiles.
The cd command is used to change to system mode or to another profile. Following is an exampl e of th e cd command used to chan g e to a permanent profile called LAN:
Router_name> cd LAN Router_name:LAN>
Note that the prompt inc ludes the name o f the prof ile. You can no w modify th e LAN prof ile parameters.
tomd
Displaying Profile Configurations
The show commands display the val ues associated with a pro file parameter in prof ile mode. The commands work in system m o de to show the values ass o ciated with parameters in the prof ile template.
In prof ile mode, some show commands only display profile paramete rs. Parameter values that have been redefined in profile mode are indicat ed with a <*>. All other param ete r values ar e in h erit ed fr o m the pr ofi l e template.
Removing Profile-Based Values
You can remove any parameter va lue within a profile with the unset command. The parameter you removed inherits its value from the system mode.
Using Profi les with Cisco 700 Series Routers 2-5
Page 20
Incoming Calls
In the following example, the profile parameter number is removed from the profile by using the unset command:
Host:Profile> unset number
Deleting Profiles
The reset u ser co mman d de le t es a us er-d efi n ed pro fi le fro m th e rou t er. The thr e e permanent prof iles (LAN, Internal, and Standard) cannot be deleted. This command also closes any connection assoc iated with the prof ile.
In the following example, the tomd profile is removed from the system by using the reset user command:
Host:Profile> reset user tomd
Changing Profile Names
The set profile user command changes the name of an existing prof ile. Enter this command while in pr ofile m ode for t he prof ile you want to aff ect. In the follo wing example, the profile name is being changed from 2500 to 4500:
766:2500> set profile user 4500 766:4500>
Incoming Calls
When th e router receives an inc oming c al l , th e r ou t er searches both act ive an d in ac tive prof iles for a profile with the same name as the calling de vice. If it finds a prof ile with the matching user ID, the router uses the configuration parameters of that profile while communicating with the remote device. If the profi le is inactive, it is automatica lly activated for the duration of the connec tion.
When the call is finished, the physical link between the two devices is disconnected. However, the virtual conne ction to the remote router might be configured to remain active.
2-6
Cisco700 Series Router Configuration Guide
Page 21
If the profile is configured to remain active after a link disconne cts, a virtual connection remains. T he vir tua l conne ction monit ors t he LAN traffic. If pack ets des tine d for th e WAN are detected, the router opens up the physical connection and forwards the packets.
If the profi le is configur ed to become inacti ve after a li nk disconnects, both the physical link and the virtual connection to the re mot e router are disconne cted until anoth er call is rece ived from th e same remote router.
Outgoing Calls
Outgoing calls require that the associated user-defin ed profiles be set to act ive, that the set auto command be on , and t hat a p hone num ber to c all be stor ed i n the pr of il e. If t he pr of ile
is inactive, a number to dial is not available to the router.
Outgoing Calls
Using Profi les with Cisco 700 Series Routers 2-7
Page 22
Outgoing Calls
2-8
Cisco700 Series Router Configuration Guide
Page 23
CHAPTER
3
Basic Configurations
This chapt er contains basic conf iguration examples for connec ting a Cisco 700 seri es router to an Internet se rvice provider ( I S P) or to a central site, s uch as your company netw ork. It is assumed t hat your rout er i s ca bled a s desc ribed i n th e Cis co 700 Quick R efer e nce Gui de. Before you procee d with the examples in this chapter, have the infor mation regarding ordering the I SDN li ne an d the connection information in the Cisco 700 Quick Reference Guide (shipped with your router package) available.
The chapter is writt en so that a kno wledge ab le begi nner can perform a basic conf igurat io n of the router, guided by the examples. Explanations are kept to a minimum, but they do show ho w the individual commands fit into the framework of a conf iguration.
This chapter has the following sections:
Basic Configuration Concepts
Starting Point
Setting SPI Ds Man ually (North America only)
Bridging with a Cisco 700 Series Router
Routing IP wit h a Cis co 700 Series Router to an IS P
Routing IP to a Central Site
Routing IP and IPX On-Demand
Basic Configuration Concepts
The info r mation in t his section describes basic networking concepts as they relate to the Cisco 700 series router and the examples present ed. If you have som e experience with Cisco 700 series routers, you can skip this section.
Basic Configurations 3-1
Page 24
Basic Configuration Concepts
Bridges and Route r s
Routers forward packets on to specific network segments based on a logical network address, reducing network traff ic b y keeping unnecessary pa ckets off net work segment s by only forwarding packets to se gments as required.
A bridge joins individual network segments into a singl e network. The bridge floods packets on to all the network segments it is connected to. In other words, bridges offe r simplicity and routers offer a greater degree of cont rol. Cisco 700 series routers can function as a bridge and a router.
Profiles
Profiles are logically organized sets of commands for each connection that can be customized and stored independently. This allows you to configure your router for more than one conn ection. There are two types of profiles, permanent and user-defined. The Cisco 700 Series Router Co mmand R eference publicat ion contai ns a n ext ensi v e d iscussi on on profiles. It is importan t to understand the use of profiles before attempting to configure your router.
LANs and WANs
Cisco 700 seri es r outers ha ve a “ LAN si de” and a “WAN side .” The LAN s ide of the ro uter is the Ethernet 10Bas eT connection wher e your comput er (or another short -range networ k device) is connected to the router. The WAN side is ISDN. The configuration commands can affect function on one or both sides of the router. Which side is affected depends upon the command and the profile containing the command.
3-2
Cisco 700 Seri es Router Configuration Guide
Page 25
Current Configuration
You can display the current configura tion at any time using the show configuration command. If you iss ued the com mand in s yst em mode , system m ode c ommands dis play. If you issue the command in profile mode, profile mode commands display. An asterisk (*) next t o a v al ue ind ica tes the v a lue ha s bee n modi f ied from t he def aul t va lu e. Th e com mand is entered as follows:
>show config
Basic Configurations 3-3
Page 26
Basic Configuration Concepts
The following sample display shows output for the Cisco 700 series routers, from the show configuration command in system mode:
Host> show config System Parameters
Environment
Screen Length 20 Echo Mode ON CountryGroup 1
Bridging Parameters
LAN Forward Mode ANY WAN Forward Mode ONLY Address Age Time OFF
Call Startup Parameters
Multidestination OFF
Line Parameters
Switch Type 5ESS
Call Parameters Link 1 Link 2
Retry Delay 30 30
Profile Parameters
Bridging Parameters
Bridging ON Routed Protocols Learn Mode ON Passthru OFF
Call Startup Parameters
Encapsulation PPP
Line Parameters
Line Speed AUTO Numbering Plan NORMAL
Call Parameters Link 1 Link 2
Auto ON ON Called Number Ringback Number
Remote and Central Sites
In the exam ples, th e Cis co 7 00 se ries route r you are con f iguring is referred t o a s t he remote router. This is strictly for ide ntification purposes and doe s not have anything to do with geography or the physical location of the router.
3-4
Cisco 700 Seri es Router Configuration Guide
Page 27
Password and Secret
Ther e ar e several typ es of auth en ti cat ion, s uch as P a ssw ord Aut hen tic at ion Pro toc ol ( PAP) and Challenge Handshake Authentication Protocol (CHAP). To avoid confusion, the PAP password is r eferre d t o as pas sword, and the CHAP s ecre t pass word is referre d to a s secret. The PAP password is plain text. The CHAP secret is encrypted.
Additional Reference
For more information on the commands, basics of net working, profiles and so forth, refer to the Cisco 700 Series Router Command Reference publication . The Cisco 700 Series Command Reference publication also contains advanced configuration examples.
Starting Point
This section shows how to set the router to default values and provide basic configuration information used in all configurations. All of the example configurations assume defa ult values unless otherwise indicated.
Step 1 Use the set default c ommand as f ollo ws to be sure that you begi n with al l defa ult
values when configuring your router:
> set def
System-le ve l param eter s and the parame ters in the permanen t prof ile s are set to their d efault values. Existing user-defined profil es are deleted and the router reboots.
Step 2 Enter the set directorynumber command (usua lly a te n-digit local number wit h
no spaces or dashes) to set the ISDN directory numbers.
>set 1 directory number 4085551234 >set 2 directory number 4085551235
You are ready to set Servic e Profile Identifier (SP I D) automatic detection. A SPID is a number pr ovided by the ISDN c arrier to identify the line configurati on of the BRI service. Each SPID points to line setup and conf iguration information.
Basic Configurations 3-5
Page 28
Starting Point
Setting a SPI D is des cribed in the section “Setting SPID Autodetection (North America only)” in this chapter (recommended i f you are connec ting to a service provider where the ISDN switch type is DMS-100 or National ISDN-1 (NI1)) or to enter the SPIDs manually, as descr ibed in t he se ction “ Set tin g SPIDs Ma nually (North Americ a only)” in t his ch apter.
Setting SPID Autodetection (North America only)
If the servi ce pro vider ISDN swi tc h type is DMS-100 or Na tional ISDN-1 (NI1), the route r supports an au tom atic SPID detection feature. This section describes ho w to s et the autodet ection feature . If the switch type is 5ESS Custom PPP, do not enter SPIDs; go to the next section.
Enable automatic SPI D detection featu r e as follows:
>set autodetection on
Once you enable the autodetection feature, wait for the router to complete the process. This process might take several minutes to complete. When autodete ction is successful, the following messages display:
>L76 1 Auto Spid Detect Successful 5ESS >L76 1 055512340 Auto Spid Detect Successful >L76 2 055512350 Auto Spid Detect Successful
No additional procedures are required. You can now enter specific configuration information.
If autodetection fails , the followi ng me ssage displays :
>L84 Manually enter spids and set autodetection off
In this event, set autodetection off by using the set autodetection command and continue with the section “Setting SPIDs Manually (North America only)” to enter SPIDs manually.
3-6
Cisco 700 Seri es Router Configuration Guide
Page 29
Setting SPIDs Manually (North America only)
SPIDs can be detected automatically usi ng the set autodetection command, or SPIDs can be entered manua lly, as described in this section.
If the service provider switch type is 5ESS Custom PPP, you do not need to enter SPIDs; go to the next section. If the se rvice pro vider switch type is DMS-100, National (NI1), or 5ESS Multipoint, continue with this section.
To enter the SPIDs assigned by your ISDN service provider, take the following steps:
Step 1 Enter the set switch command to conf igure the ISDN switch type that is being
used with your ISDN line:
> set switch dms
Step 2 Enter the set spid command to set the r outer’s SPID numbers:
> set 1 spid > set 2 spid
0510198765430 0510187654320
You are re ady to configure the router for a specific routing e nvironment.
An AT&T 5ESS switch can support up to eight SPIDs per BRI line. Beca use multiple SPIDs can be applied to a single B channel, multiple services can be supported simultaneou sly. For e x ample, th e f irs t B ch annel can be conf ig ured for da ta , a nd the se cond B channel ca n be c onf igure d fo r both v o ic e and data. In th is scena rio, the sec ond B c hannel can support an ISDN telephone in addition to supporting data connections. For 5ESS switches , the SPID is usually the 10-digit ISDN number beginning with “01” and ending with “0.” For example: ISDN number, 4085551212; SPI D, 0140855512120. (There is no standard format for SPIDs. As a result, SPID value s can vary, depending on the switch vendor and the carri er.)
DMS-100 and NI1 s wi tches s upport only tw o SPIDs , with only one B cha nnel pe r SPID. If both B channels will be used for data only, enter the two SPIDs (one for each B channel). An issue comes up when trying to run data and voice over the same B channel. Assuming the f irst S PID is a pplied to t he fi rst B c hannel for data traf fi c and is l imited t o that B channel only, this leaves only one other SPID for the s econd B channel.
Consequently, the sec ond B channel can be used for either data or voice, but not both simultaneous ly. The absence or presence of the second SPID in the configuration dictates whether the second B channel can be used for data or voice. This is an example of SPID
Basic Configurations 3-7
Page 30
Bridging with a Cisco 700 Ser ies Router
values for DMS-100 and NI1 switches: ISDN number, 4085551212; SPID 1, 408555121201; SPID 2, 408555121202. In this c ase the S PID is the 10-digit IS DN number
ending with a “01” for SPID 1 and a “02” for SPID 2.
Bridging with a Cisco 700 Series Router
This s ectio n d escribe s ho w to br idge a Cisc o 700 se ries ro uter o v er a n ISDN l ine t o a nother router. Bridging is used in c as es where you do not need a lot of filtering to manage the network. Basically , you are relying on the nodes on the LAN side of the router to de termine if a packet shoul d be accepted or droppe d. (If you turn routin g on, you can fil ter the pack ets on the WAN side, reducing your traffic on the LAN side.)
Note Bridging ov er an ISDN l ine i s not a n ef f icie nt us e of ISDN ba ndwid th. Ro uti ng ov e r
the ISDN line helps optimize ISDN bandwidth by reducing traffic to the WAN.
Figure 3-1 illustrates an example of a remote Cisco 700 series router bridging to a router called central at a central site.
Figure 3-1 Bridging Example
IP address 172.16.125.9 Subnet mask 255.255.0.0
Enterprise
CPA765 Central
ISDN
network
IP address 172.16.125.10 Subnet mask 255.255.0.0
San Jose
H5860
You are going t o establish a basic connection with another router, relying primarily on the defaul ts . In this example configuration, a simple user-defined profile is created in your Cisco 700 series router to bridge over an ISDN network to a nother router.
By def ault, the Cisco 7 00 series router a utomati cally “lear ns” the MA C addr esses that ex ist locally and remotely across th e WAN. The router stores the MAC addresses in a MAC address table, so it kno ws if the unicast packe ts should remain on the LAN or forwar ded
3-8
Cisco 700 Seri es Router Configuration Guide
Page 31
across the ISDN li ne. In a bridging scenar io, the router does not ne ed an IP addr es s and bridging occ urs regardless. The IP address is used when the router is being mana ged remote ly by a Telnet session or par ticipating in SNMP.
Both sides of the WAN must be configured with PPP host names, secrets, and passwords for authentication. Each profile must a lso include dialing information.
Cisco 700 Series Router Bridging Instructio ns
The IP address and subnet mask are not entered. IP address assignments are not necessary in a bridged network; they are used only if the router is being pinged or accessed through Telne t or SNM P.
Follow ing is the co m m and su m mary for co nfigu r ing th e Cisc o 700 s er ies r o uter to br idge to the ro ut er called ce nt ral at the central site:
set system set user set active set ppp secret client set ppp password client set bridging on
1
number
set set 2 number reboot
CPA765
central
phone_number phone_number
Routing IP with a Cisco 700 S eries Router to an ISP
This sect ion descri bes ho w to c onfigu re a Cisc o 700 serie s router to rout e to an I SP by us ing Internet Protocol (IP). Figure 3-2 illus trates the configuration used in this example. By default, PPP incoming authentication is on and outgoing authentication is off.
Note If you are connecting to an Ascend device, you must disable PPP Bandwidth
Allocation Control Protocol (BA CP) and PPP multilink.
Basic Configurations 3-9
Page 32
Routing IP with a Cisco 700 Series Router to an ISP
The example also us es an unnumbered IP address on the Cisco 700 series router and a dynamically-a ssigned IP address from the ISP, a common practice used to conserve IP addresses.
Figure 3-2 Connecting to an ISP–Example Configuration
ISDN (WAN) interface IP address: 0.0.0.0. Subnetwork mask: 0.0.0.0.
Ethernet (LAN) interface IP address: 172.16.17.9 Subnet mask: 255.255.255.248
Cisco 700
Cisco 700 series router system name: 765 CHAP secret: cisco
ISDN network
IP unnumbered
Central
Central site router System name: isp
H8757
In this exa m p le , a user-defin ed pr o file named is p is created, representi ng the ISP router. Your router uses the isp pr ofile to initiate the call to the ISP router.
When the Cisco 700 series router calls the ISP router, it sends the ISP the PPP host name, the CHAP secrets, and PAP passwords, depending upon what the other router requires to authenticate the call.
3-10
Cisco 700 Seri es Router Configuration Guide
Page 33
Routing a Cisco 700 Series Router to an ISP Instructions
Following is the command summa r y for configuring the remot e Cisco 700 series router to connect to an ISP:
set system cd lan set ip address set ip netmask set ip routing on set user set number set ppp password client set ppp secret client set ppp address negotiation local on set ip routing on set ip route destinatio set bridging off set ip address set ip netmask set timeout set ip pat on set active reboot
764
172.16.17.9
255.255.255.248
isp
5558011
0.0.0.0
0.0.0.0
360
n 0.0.0.0/0
gateway
0.0.0.0
propagate on
If you are being charg ed for each connecti on, you can use the set timeout comman d to set the ti meout to ze ro. Doin g s o maint ai ns your co nnecti on and minimiz es t he num ber of fees .
Routing IP to a Central Site
This section describe s how to configure a remote Cisco 765 router and a central site Cisco 765 router for on-demand IP routing using PPP.
PPP addresses issues that include the assignme nt and manage me nt of IP addresses, asynchronous (start/stop) and bit-oriented synchronous encapsulation, network protocol multiplexing, error detection, and option negotiation.
PPP addresses these issues by providing an extensible Link Control Protocol (LCP) and a family of Network Control Protocols (NCPs) to negotiate optional configuration parameters and facilities . PPP supports IP and IPX.
Figure 3-3 is an illustration of the configuration used in this example.
Basic Configurat ions 3-11
Page 34
Routing IP to a Central Site
Figure 3-3 Routing IP to a Central Site—Exam ple Configuration
ISDN interface IP address: 10.48.125.7 IP subnet mask: 255.255.255.0
Ethernet interface IP address: 172.16.17.9 IP subnet mask: 255.255.255.0
Cisco765
Remote router System name: remote765 ISDN number: 5553693/4 User profile name: central765
In this example, the Cisco 765 router named remote765 is used to establis h a connection through the ISDN service provider to the corporate network at a central site.
Ethernet interface IP address: 172.15.1.100 IP subnet mask: 255.255.255.0
ISDN interface IP address: 10.48.125.4 IP subnet mask: 255.255.255.0
ISDN
network
Central site router System name: central765 ISDN number: 5550143/4 User profile name: remote765
Cisco765
S4802
3-12
Cisco 700 Seri es Router Configuration Guide
Page 35
Central Sit e IP Routing Command Summary
Following is the command summary for conf iguring the remote Cisco 765 router for on-demand IP routing using PPP:
set system set multidestination on cd LAN set ip address set ip netmask set ip routing on set ip rip update periodic set user set ppp password client set ppp secret client set ip address set ip netmask set ip routing on set ip rip update demand set ip route destination set number set timeout set active reboot
remote765
172.16.17.9
255.255.255.0
central765
10.48.125.7
255.255.255.0
0.0.0.0/0
5550143
360
gateway
10.48.125.4
Basic Configurat ions 3-13
Page 36
Routing IP and IPX On-Demand
Follo wing is the command summary for c onfigu ring the centra l site Cisc o 700 series rout er for on-demand IP routing with PPP:
set system set multidest on set ppp auth in chap set ppp secret host cd lan set ip address set ip netmask set ip routing on set ip rip update periodic set user set ppp auth out chap set ppp secret client set bridging off set ip address set ip netmask set ip routing on set ip rip update demand set ip route destination set ip rip version 1
1
number
set
2
number
set set timeout set active reboot
central766
172.15.1.100
255.255.255.0
remote765
10.48.125.4
255.255.255.0
5553693 5553694
360
0.0.0.0
gateway
10.48.125.7
The set ip rip update demand com mand is only a pplicable to the Cisco 700 series route r. If you are being charg ed for each connecti on, you can use the set timeout comman d to set
the ti meout to ze ro. Doin g s o maint ai ns your co nnecti on and minimiz es t he num ber of fees .
Routing IP and IPX On-Demand
This section describe s how to configure the remote Cisco 765 route r and the central sit e Cisco 765 router for on-demand IP and IPX routing using PPP.
Figure 3-4 illustrates the configuration used in this e xam ple.
3-14
Cisco 700 Seri es Router Configuration Guide
Page 37
Figure 3-4 Routing IP and IPX On-Demand —Example Configuration
ISDN interface IP address: 10.32.125.7 IP subnet mask: 255.255.255.0 IPX network: 32125
Ethernet interface IP address: 172.16.17.9 IP subnet mask: 255.255.255.0 IPX network: 1478 IPX Framing 802.2
765
Cisco765
Remote router System name: remote765 ISDN number: 5553693/4 User profile name: central765
The remote Cisc o 765 router is used to establish a connect ion through the ISDN service provider to the corporate network at a centra l site using PP P. The remote Cisco 765 router has three permanent profiles: LAN, Internal , and Standard. This example uses the LAN profile and a user-defined profile.
Ethernet interface IP address: 172.15.1.100 IP subnet mask: 255.255.255.0 IPX network: 73146 IPX framing 802.2
ISDN interface IP address: 10.32.125.4 IP subnet mask: 255.255.255.0 IPX network: 32125
ISDN network
Central site router System name: central765 ISDN number: 5550143/4 User profile name: remote765
Cisco765
S4800
Basic Configurat ions 3-15
Page 38
Routing IP and IPX On-Demand
On-Demand IP and IPX Routing with PPP Instructions
Following is the command summary for conf iguring the remote Cisco 765 router for on-demand IP and IPX rout ing using PPP:
set system set multidestination on set ppp password client set ppp secret client set ppp auth out chap set ppp password host set ppp secret host cd LAN set ipx routing on set ipx network set ipx framing 802.2 set ipx rip update periodic set ip address set ip netmask set ip routing on set ip rip update periodic set user set ipx routing on set ipx network set ipx rip update demand set ipx spoof set ip route destination set ip address set ip netmask set ip routing on set ip rip update demand
1
number
set set 2 number set timeout set active reboot
remote765
1478
172.16.17.9
255.255.255.0
central765
32125
10
0.0.0.0/0
10.32.125.7
255.255.255.0
5550143 5551044
360
gateway
10.32.125.4
3-16
Cisco 700 Seri es Router Configuration Guide
Page 39
Central Sit e On-Demand IP and IPX Routing with PPP Commands
Follo wing is the command summary for c onfigu ring the centra l site Cis co 700 series router router for on-demand IP and IPX routing us ing PPP:
set system set multidestination on set ppp auth in chap set ppp secret client cd lan set ipx routing on set ipx network set ipx framing 802.2 set ipx rip update periodic set ip address set ip netmask set ip routing on set ip rip update periodic set user set bridging off
1
number
set set 2 number set ipx network set ipx routing on set ipx framing none set ipx rip update demand set ipx spoof set ip route destination set ip address set ip netmask set ip routing on set ip rip update demand set ppp auth out chap set ppp secret host reboot
central765
73146
172.15.1.100
255.255.255.0
remote765
5553693 5553694
32125
10
0.0.0.0/0
10.32.125.4
255.255.255.0
gateway
10.32.125.7
Basic Configurat ions 3-17
Page 40
Routing IP and IPX On-Demand
3-18
Cisco 700 Seri es Router Configuration Guide
Page 41
CHAPTER
4
Using CHAP
This chapt er contains conf igura tion e xa mples for connec ting a Ci sco 700 series router to a router running Cisco IOS software. In thes e examples, the remote rout er is a Cisco 765 series router, and the central si te router is a Cisco 4500 series route r. Any Cisco 700 series router can be used in place of the remote Cisco 765 series router. Any router running Cisco IOS software can replace the cent ral site Cisco 4500 series router.
In thes e ex amp l es, the Ci sco 45 00 s er i es r o ut er seri al - in t er f ac e co n fig u ration is an ISDN Primary R ate Interfac e (PRI). Depend ing on the route r model us ed at the cent ral site, the serial interface might be a different type.
In addition, this chapter lists several interoperability is sues that exist between Cisco IOS software and Cisco 700 series routers. These issues must be considered if you are connecting your Cisco 700 series router to a router running Cisco IOS software.
This chapter contains the following sections:
IP Static Routing and Callback with CHAP Authentication
IP Static Routi ng with CHAP Authenticat ion and MLP
IP Static Routing with PAP Authentication and MLP
IP Unnumbered Static Routing and CHAP with MLP
IP Static and IPX Static Routing with CHAP and MLP
IPX Static Routing with CHAP a nd MLP
Multilink PPP Encapsulation
Dynamic Routing Protocols
Bridging to a Rout er Running Cisco IOS Software
Using CHAP 4-1
Page 42
SPID Detection (North America only)
SPID Detection (North America only)
In North Am erica, SPIDs can be automatically dete cted or manually configured. For more information on SPID detection, see "Setting SPID Autodetection (North America only)" and "Setti ng SPIDs Manually (No rth America only)" in the "Basi c Configur ations" ch apter .
IP Static Routing and Callback with CHAP Authentication
This sectio n descri bes how to co nf igur e the route rs for Inter net Protocol (IP ) static rout ing and callbac k with Challenge Handshake Authentica tion Protocol (CHAP).
Figure 4-1 illustrates the configuration used in this example.
Figure 4-1 IP Static Routing and Callback with CHAP Authentication
Serial interface IP address: 172.16.125.7 IP subnet mask: 255.255.255.0
Ethernet interface IP address: 192.168.147.9 IP subnet mask: 255.255.255.248
765 CPA4500
Telecommuter PC IP address:
192.168.147.8
Remote router ISDN number: 5553693 User profile name: 4500
Ethernet interface IP address: 172.18.124.2 IP subnet mask: 255.255.255.0
Serial interface IP address: 172.16.125.1 IP subnet mask: 255.255.255.0
ISDN
Central site router ISDN number: 5558011 Host name: 4500
S4768
Central site network IP network: 172.18.124.0
4-2
Cisco700 Series Router Configuration Guide
Page 43
Remote Cisco 765 Command Summary
Follo wing is t he command summar y for conf igur ing the re mote Cisc o 765 s erie s rout er f or IP static r outing and callback with CHAP authentication:
set switch 5ess
1
dir
set set 2 dir set system set ppp authentication incoming chap set ppp secret client set multidestination on cd lan set ip address set ip netmask set ip routing on set ip rip update periodic set ip rip receive v2 set ip rip version 2 set user set ppp secret client set ppp secret host set ip route destination set ip address set ip netmask set ip routing on set ip framing none set ppp callback request always
1
set set 2 ringback set number set bridging off set ip rip update off set timeout set active reboot
directory_number directory_number
765
192.168.147.9
255.255.255.248
4500
172.16.125.7
255.255.255.0
ringback
5558011
360
number number
0.0.0.0
gateway
Remote Cisco 765 Command Summary
172.16.125.1
propagate on
Multilink PPP is e nabled b y de fault . If th e Cisco 700 series router is dialing into a host tha t does not support m ultili nk PPP or that doe s not hav e mult ilink PPP enable d, the Ci sco 700 series router migh t report a misconfiguration. This is most commonly seen when the Cisco 700 series router is connected to equipment f r om Ascend.
Using CHAP 4-3
Page 44
IP Static Routing with CHAP Authenti cati on and MLP
IP Static Routing with CHAP Au th entication and MLP
This section describe s how to configure the central site Cisco 4500 series router and the remote Cisco 765 series router for IP static routing with Challenge Handshake Authentic ation Protocol (CHAP ) and Multilink Protocol (MLP).
Figure 4-2 is an illustration of the configuration used in this example.
Figure 4-2 IP Static Routing with CHAP Authentication and MLP
Serial interface IP address: 172.16.125.7 IP subnet mask: 255.255.255.0
Ethernet interface IP address: 192.168.147.9 IP subnet mask: 255.255.255.248
765 CPA4500
elecommuter PC
IP address:
192.168.147.8
Remote router ISDN number: 5553693 User profile name: 4500
Ethernet interface IP address: 172.18.124.2 IP subnet mask: 255.255.255.0
Serial interface IP address: 172.16.125.1 IP subnet mask: 255.255.255.0
ISDN
Central site router ISDN number: 5558011 Host name: 4500
S4768
Central site network IP network: 172.18.124.0
4-4
Cisco700 Series Router Configuration Guide
Page 45
Remote Cisco 765 Command Summary
Follo wing is the command s ummary t o conf igur e th e remote Ci sco 765 series router for IP static rout ing with CHAP and MLP:
set switch 5ess
1
dir
set set 2 dir set system set multidestination on set ppp multilink on set ppp authentication incoming chap set ppp authentication outgoing chap cd lan set ip address set ip netmask set ip routing on set ip rip update periodic set user set ppp secret client set ip address set ip netmask set ip routing on set ip framing none set ip route destination set number set bridging off set ip rip update off set ppp secret host set timeout demand 2 threshold 32 duration set active reboot
directory_number directory_number
765
192.168.147.9
255.255.255.248
4500
172.16.125.7
255.255.255.0
5558011
360
0.0.0.0
gateway
5
Remote Cisco 765 Command Summary
172.16.125.1
propagate on
Note The set ppp authentication outgoing chap command in this example is not
recommended when connecting to Ascend 4000 or NAS routers.
For detaile d information re gardi ng the commands listed here, refer to the Cis co 700 Series Router Command Reference.
Using CHAP 4-5
Page 46
IP Static Routing with PAP Authentication and MLP
IP Static Rout ing with PAP A uthentication and MLP
This section describe s how to configure the central site Cisco 4500 series router and the remote Cisco 765 series router for Internet Protocol (IP) static routing with Password Authentication Protocol (PAP) authe ntication.
Figure 4-3 is an illustration of the configuration used in this example.
Figure 4-3 IP Static Routing with PAP Authentication
Serial interface IP address: 172.16.125.7 IP subnet mask: 255.255.255.0
Ethernet interface IP address: 192.168.147.9 IP subnet mask: 255.255.255.248
765 CPA4500
Telecommuter PC IP address:
192.168.147.8
Remote router ISDN number: 5553693 User profile name: 4500
Ethernet interface IP address: 172.18.124.2 IP subnet mask: 255.255.255.0
Serial interface IP address: 172.16.125.1 IP subnet mask: 255.255.255.0
ISDN
Central site router ISDN number: 5558011 Host name: 4500
S4768
Central site network IP network: 172.18.124.0
4-6
Cisco700 Series Router Configuration Guide
Page 47
Remote Cisco 765 Command Summary
Follo wing is the command s ummary t o conf igur e th e remote Ci sco 765 series router for IP static routing with PAP authe n tication:
set switch 5ess
1
dir
set set 2 dir set system set multidestination on set ppp multi on set ppp authentication in pap set ppp authentication out pap cd lan set ip address set ip netmask set ip routing on set ip rip update periodic set ip rip receive v2 set ip rip version 2 set user set ip route destination set ip address set ip netmask set ip routing on set ip framing none set ppp clientname set ppp password client set ppp password host set number set bridging off set timeout set active reboot
directory_number directory_number
765
192.168.147.9
255.255.255.248
4500
172.16.125.7
255.255.255.0
765
5558011
360
0.0.0.0
gateway
Remote Cisco 765 Command Summary
172.16.125.1
propagate on
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
Using CHAP 4-7
Page 48
IP Unnumbered Static Routing and CHAP with MLP
IP Unnumbered Static Routing and CHAP with MLP
This section describe s how to configure the central site Cisco 4500 series router and the remote Cisco 765 series router for Internet Protocol (IP) unnumbered routing with Challen g e Handshake Authentication Protocol (CHAP) authe n tication and Multilink Protocol (MLP).
Figure 4-4 is an illustration of the configuration used in this example.
Figure 4-4 IP Unnumbered Routing and CHAP Aut hentication with MLP
Ethernet interface IP address: 192.168.147.9 IP subnet mask: 255.255.255.248
Serial interface IP unnumbered
Telecommuter PC IP address:
192.168.147.8
Remote router ISDN number: 5553693/4 User profile name: 4500
765
ISDN network
Ethernet interface IP address: 172.18.124.2 IP subnet mask: 255.255.255.0
Serial interface IP unnumbered
4500
Central site router ISDN number: 5558011/2 Host name: 4500
Central site network IP network: 172.18.124.0
S4769
4-8
Cisco700 Series Router Configuration Guide
Page 49
Remote Cisco 765 Command Summary
Follo wing is t he command summar y for conf igur ing the re mote Cisc o 765 s erie s rout er f or IP unnumbered routing with CHAP authentication and MLP:
set switch 5ess set system set multidestination on set ppp multilink on set ppp authentication incoming chap set ppp authentication outgoing chap set ppp secret client set ppp secret host cd lan set ip address set ip netmask set ip routing on set ip rip update periodic set ip rip receive v2 set ip rip version 2 set user set ppp secret client set ip rip update off set ip routing on set ip framing none set ip route destination set number set bridging off set ppp secret host set timeout set active reboot
765
4500
5558011
360
192.168.147.9
255.255.255.248
0.0.0.0
gateway
Remote Cisco 765 Command Summary
0.0.0.0
For detailed information regarding the commands listed here, refer to theCisco 700 Series Router Command Reference.
Using CHAP 4-9
Page 50
IP Static and IPX Static Routing with CHAP and MLP
IP Static and IPX Static Routing with CHAP and MLP
This section describe s how to configure the central site Cisco 4500 series router and Cisco 765 series router for Internet Protocol (IP) static and Internet work Packet Exchange (IPX) static routing with Point -to-P oint Protocol (PPP) using CHAP and MLP.
Figure 4-5 is an illustration of the configuration used in this example.
Figure 4-5 IP Static and IPX Static Routing with PPP
Serial interface IP address: 172.16.125.7 IP subnet mask: 255.255.255.0 IPX network: 32125
Ethernet interface IP address: 192.168.147.9 IP subnet mask: 255.255.255.248 IPX network: 1478
Telecommuter PC IP address: 192.168.147.8
Remote router IPX address: 32125: 0040f9cfd5 ISDN number: 5553693/4 User profile name: 4500
765
Ethernet interface IP address: 172.18.124.2 IP subnet mask: 255.255.255.0 IPX network: 48124
Serial interface IP address: 172.16.125.1 IP subnet mask: 255.255.255.0 IPX network: 32125
ISDN network
Central site router IPX address: 32125: 0c08af65 ISDN number: 5558011/2 Host name: 4500
4500
S4770
IPX file server IPX internal address: 3039e670
Central site network IP network: 172.18.124.0
4-10
Cisco700 Series Router Configuration Guide
Page 51
Remote Cisco 765 Command Summary
Follo wing is the command s ummary t o conf igur e th e remote Ci sco 765 series router for IP static and IPX static routing with PPP using CHAP and MLP:
set switch 5ess
1
dir
set set 2 dir set system set multidestination on set ppp authentication incoming chap set ppp authentication outgoing chap set ppp secret client set ppp secret host cd lan set ipx network set ipx framing 802.2 set ipx routing on set ipx rip update periodic set ip address set ip netmask set ip routing on set ip rip update periodic set user set ipx network set ipx routing on set ipx route destination set ipx service name CORP_FS1 type 4 address set ipx spoof set ipx rip update off set ipx framing none set ip routing on set ip route destination set ip address set ip netmask set ip framing none set number set bridging off set ip rip update off set timeout set active reboot
directory_number directory_number
765
1478
192.168.147.9
255.255.255.248
4500
32125
10
172.16.125.7
255.255.255.0
5558011
360
3039e670
0.0.0.0
gateway
gateway
Remote Cisco 765 Command Summary
32125:0c08af65
3039e670:01:0451
172.16.125.1
propagate on
Using CHAP 4-11
Page 52
IPX Static Routing with CHAP and MLP
IPX Static Routing with CHAP and MLP
This section describes how to configure the remote Cisco 765 series router and the central site Cisco 4500 series router for Internetwork Packet Exchange (IPX) static routing with Point-to-Point Protocol (PPP).
Figure 4-6 is an illustration of the configuration used in this example.
Figure 4-6 IPX Static Routing with PPP
Ethernet interface IPX network: 1478
Remote router IPX address: 32125: 0040f9cfd5 ISDN number: 5553693/4 User profile name: 4500
Serial interface IPX network: 32125
765
ISDN network
Ethernet interface IPX network: 23160
Serial interface IPX network: 32125
4500
Central site router IPX address: 32125: 0c08af65 ISDN number: 5558011/2 Host name: 4500
S4771
IPX file server IPX internal address: 3039e670
4-12
Cisco700 Series Router Configuration Guide
Page 53
Remote Cisco 765 Command Summary
Follo wing is t he command summar y for conf igur ing the re mote Cisc o 765 s erie s rout er f or IPX static routing with PPP:
set switch 5ess
1
dir
set set 2 dir set system set multidestination on set ppp auth in chap set ppp secret client set ppp secret host set multilink on cd lan set ipx network set ipx framing 802.2 set ipx routing on set ipx rip update periodic set user set ppp secret client set ipx network set ipx routing on set ipx route destination set ipx service name CORP_FS1 type 4 address set ipx spoofing set ipx rip update off set ipx framing none set number set bridging off set timeout set active reboot
directory_number directory_number
765
1478
4500
32125
10
5558011
360
3039e670
gateway
Remote Cisco 765 Command Summary
32125:0c08af65
3039e670:01:0451
For detailed information regarding the commands listed here, refer to theCisco 700 Series Router Command Reference.
Using CHAP 4-13
Page 54
Multilink PPP Encapsulat ion
Multilink PPP Encapsulation
Cisco 700 series routers imple ment mult il ink PP P, which is av a ilabl e in Release 11.0(3) or later of Cisc o I OS software. You can disable multilink PPP in the following two environments:
You are co nnecting your Cis co 7 00 se ries rout er to a rout er running a Cisco IOS r elease
prior to 11.0(3).
You are c onnecting your Cisco 700 series router to a router running Cisco IOS Release
11.0(3) or la ter , and you h ave no t conf igured mul tilink PPP on that rou ter runni ng Cisco IOS.
Use the set ppp multilink command at the system level to disable multilink PPP, as follows:
766> set ppp multilink off
Dynamic Routing Protocols
Cisco 700 se ries routers imple ment RIP Versions 1 a nd 2 and de mand RIP. Demand RIP is not implemented in Cisco IOS software. If you are connec ting your router to a router running Cisco IOS software, a nd you want to use a dynamic routing protocol, you must disable de mand RIP.
Use one of the following set ip rip update commands to disable demand RIP:
766> set ip rip update periodic / snapshot
or
766> set ip rip update none
Note Setting the IP RIP updat e to periodic maintains the connection indefinitel y. This
might be a conc ern if it is no t necess ary to ma intai n the line 24 hou rs a day, 7 days a week; you are paying for connection time that you are not using.
4-14
Cisco700 Series Router Configuration Guide
Page 55
Bridging to a Router Running Cisco IOS Software
Bridging to a Router Running Cisco IOS Software
It is possibl e to bridge data o ver ISDN to and from Cisco ISDN routers. Dependin g on your network environment, this might be an ide al s olution. Bridging offe rs c onfiguration simplicity with few concer ns regarding network address space limitatio ns a nd unroutable protocols. Bridging also offers compatibility with other products that need to bridge.
When bridging, you do not have the same ISDN line c ontrol that routing access lists provide. When bridging protoc ols such as Novell IPX, AppleTalk, or NetBIOS, it is possible for the ISDN line to remain connected for long periods of time. This can result i n high ISDN usage charges. If bridging is the only solution for your environment, we recommend monitoring the ISDN line connection.
Cisco IOS Release 11.1 and earlier li mit the number of simult aneous ISDN bridge sessions to one per in terf ace .
Prior to Cisco IOS Release 11.2 (half-bridging), the Cisco IOS must also b e configured to the bridging protocol, not the route r protocol.
Using CHAP 4-15
Page 56
Bridging to a Router Running Cisco IOS Software
4-16
Cisco700 Series Router Configuration Guide
Page 57
CHAPTER
5
Configuring DHCP Relay, DHCP Server, and PAT
Cisco 700 series routers can perform the role of the relay age nt, relaying IP configuration information request packets from the LAN interfa ce, ove r the ISDN interf ace, to a specif ied Dynamic Host Configuration Protocol (DHCP) serv er. Cisco 700 series routers provide DHCP relay, DHCP server, Port Address Translation (PAT), and Inter net Protocol Control Protocol (IPCP).
This chapt er provides descriptions, appl ication notes, and example configurations for configuring Dynamic Host Configuration Protocol (DHCP) relay, DHCP serve r, and Port Address Translation (PAT) on the Cisco 700 series router. It contains the following sections:
DHCP Description
PAT Description
IPCP Description
PPP IPCP Negotiation Example
DHCP Relay with IPCP Negotiation Example
DHCP Server with IPCP Negotiation Example
PAT with IPCP Single-Destination Negotiation Example
DHCP Server and PAT with IPCP Single-Destination Negotiation E xam ple
DHCP Server with PAT and IPCP Dual-Destination PPP Negot iation Example
Configuring DHCP Relay, DHCP Server, and PAT 5-1
Page 58
DHCP Description
DHCP Description
DHCP is a client-server protocol that allows devi ces on an IP netw ork (the DHCP clients) to request configuration information from a DHCP server. DHCP allocates network addresses from a cent ral pool on an as-needed basis. DHCP is usef ul for assigning IP addresses to hosts conne cted to th e network temporar ily or for shar ing a limite d pool of IP addresses among a group of hos ts that do not need permanent IP addresses.
DHCP allows for increased automation and fewer network a dmi nistration problems by:
Eliminat ing the need for the manual co nfigurat ion of indivi dual computers, printers, and
shared file systems.
Preventing the simultaneous us e of the same IP address by two clients.
Allowing configuration from a central site.
DHCP Server Application Notes
The following are application notes for DHCP server:
DHCP relay and DHCP server are mutually exclusive.
When DHCP server is initialized, default a ddr esses are used if no LAN or internal
address ex ists . Th e Cis co 700 se ries router p ick s up th e DHCP cli ent’s default ga te wa y , netmask, and starting DHCP addresses by using the LAN IP address, if one exists . If a LAN address does not exist, the router uses the internal IP address. If neither exists, it uses the default settings: 10.0.0.1 as th e LAN IP address (default gateway for DHCP client s), 255.0.0.0 as th e s ubnet mask, and 10.0.0.2 as the starti ng DHCP client addresses.
For the DHCP values to be automatic ally generated based on the LAN or internal IP
address, each DHCP value must be set to 0.0.0.0 or none, for the new v alues to take effect.
5-2
Cisco700 Series Router Configuration Guide
Page 59
DHCP Relay Applica tio n Notes
The following are application notes for DHCP relay:
The IP ad dr ess in t he I nt ern al pro f il e must be o n the sam e netw ork as t hat of the DHCP
client s.
A firewall configuration (where there is an Inte rnal profile and LAN IP address) does
not work with DHCP relay.
A configura tion where PAT is on and DHCP relay is enabled is not v alid. DHCP relay
will attempt to cross from a public to a private domain. PAT prevents access to the
priv ate domai n. DHCP r ela y fa ils becau se i t must refere nce the rou ter’s priv ate addre ss.
DHCP relay an d DHCP server are mutually exclusive. The Cisco 700 series router can
function as one or the other, but not both.
PAT Description
DHCP Relay Application Notes
Cisco 700 series routers pro vide PAT, ena bling local hosts on a private IP network to communicate externally.
Packets destined for an external address have their private IP address plus port number
trans l at ed t o th e ro ut er ’s extern al IP addr es s bef ore the I P pac k et i s f orw ar de d t o the WAN. IP packets returning to th e router have their external IP addresses (plus port number) trans lated back to the private IP addresses, and the packets are forwarded to the LAN.
When PAT is enabled, the transmission of RIP packets is automatically disabled to prevent a broadcast of the private IP add resses externally.
PAT Application Notes
A configura tion where PAT is on and DHCP relay is enabled is not v al id. DHCP rela y will attempt to c ross from a public to a private domain. PAT prevents access to the priv ate domain. DHCP relay fails becaus e it must referenc e the router’s private address.
Configuring DHCP Relay, DHCP Server, and PAT 5-3
Page 60
IPCP Descripti on
IPCP Description
If you are using IP routing, Cisco 700 s eries rout ers must be conf igured for IPCP t o connect to routers running Cisco IOS software. Use the set ip framing command in profile mode to enable IPCP for user-defined WAN profiles by setting IP framing to none.
The following example illustrates IPCP enabled by disabling IP framing:
766:2503> set ip framing none
Note Do not set the ip framing or the ipx framing co mman d s to none when configuring
the permanent LAN prof ile.
IPCP Address Negotiation Application Notes
The following are application notes for IPCP address negoti ation:
Cisco 700 ser ies router s require a user -def ined profi le, conf igured with IP routing on, to
receive an IPCP addr esses .
A router running Cisco IOS software must be configured to hand off IPCP addresses.
If a manually configured IP address exists on the Internal profile of a Cisco 700 series
router, the IP CP address is assigned to the WAN profile.
If a manually configured IP address exi st s on the LAN profile, the IPCP addre ss is
assigned to the Internal profile.
5-4
Cisco700 Series Router Configuration Guide
Page 61
PPP IPCP Negotiation Example
This section describes how to config ure a remot e Cisco 700 series router for PPP IPCP negoti ation t o a cent ral s ite rout er , such a s a Cisc o 4500 series router, that is runni ng Cis co IOS software.
Figure 5-1 is an illustration of the configuration used in this example.
Figure 5-1 PPP IPCP Negotiation
ISDN network
PPP IPCP Negotiation Example
Cisco 765 Cisco 4500
Cisco 765 Series Router Commands
Following are the commands for configuring the remote Cisco 765 series router for point-to-point IPCP negotiation with a Cisco 4500 router:
set switch 5ess
1
dir
set set 2 dir set system set user set ppp secret client set ppp password client set active set 1 number set 2 number set ip routing on set ip route destination set ip rip version 2 set ip rip receive v2 set ip rip update linkup reboot
directory_number directory_number
765
4500
phone_number phone_number
0.0.0.0/0
gateway
H9230
0.0.0.0
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
Configuring DHCP Relay, DHCP Server, and PAT 5-5
Page 62
DHCP Relay with IPCP Negotiation Example
Verify the Configuration
Y ou can use the show ip configuration all and show ip route all comman ds t o se e the IPCP negotiation address.
DHCP Relay with IPCP Negotiation Example
This section describes how to config ure a remot e Cisco 700 series router for DHCP relay with IPCP negotiation to a central-site router running Cisco IOS software.
Figure 5-2 is an illustration of the configuration used in this example.
Figure 5-2 DHCP Relay with IPCP Negotiation
DHCP
client
DHCP relay agent
ISDN network
Cisco 765
Cisco 765 Series Router Commands
Follo wing are the comm ands for confi guri ng th e remote Ci sco 765 series router for DHCP Relay with IPCP Negotiation with a Cisco 4500 router:
set system set dhcp relay set user set 1 number set 2 number set ip routing on set ip rip version 2 set ip rip receive v2 set ip rip update linkup reboot
765
172.168.100.2
4500
phone_number phone_number
172.168.100.2Cisco 4500
DHCP
server
H9231
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
5-6
Cisco700 Series Router Configuration Guide
Page 63
Verify the Configuration
Verify the Configuration
You can use the show ip co nfiguration and show ip route commands to see the IPCP negotiation address.
You can use the show dhcp configuration command to see the IP address returned by DHCP.
DHCP Server with IPCP Negotiation Example
This sect ion describ es how to configu re a remote Ci sco 700 series router a s a DHCP serve r with IPCP negotiation to a central-site router running Cisco IOS software.
Figure 5-3 is an illustration of the configuration used in this example.
Figure 5-3 DHCP Server with IPCP Negotiation
DHCP
client
DHCP
server
Cisco 765
ISDN network
Cisco 4500
H9232
Configuring DHCP Relay, DHCP Server, and PAT 5-7
Page 64
DHCP Server with IPCP Negotiation Example
Cisco 765 Series Router Commands
Follo wing are the commands for c onfiguri ng the remot e Cisco 765 se ries router as a DHCP server with IPCP negotiation with a Cisco 4500 router:
set switch NI-1
1
dir
set set 2 dir set 1 spid set 2 spid set system set dhcp server set dhcp address set dhcp netmask set dhcp gateway primary cd lan set ip address set ip netmask set ip routing on set user
set ip routing on
set active
1
set
2
set set ip routing on set ip rip version 2 set ip rip receive v2 set ppp address negotiation local on set ip rip update periodic reboot
5551211 5551212
88855512110101 88855512120101 765
4500
number number
172.168.1.2 128
255.255.255.0
172.168.1.1
255.255.255.0
phone_number phone_number
172.168.1.1
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
Verify the Configuration
When a call is made, you can us e the show ip configuration all and show ip route all commands to see the IPCP negotiation addres s.
You can use the show dhcp configuration command to see the IP address returned by DHCP.
5-8
Cisco700 Series Router Configuration Guide
Page 65
PAT with IPCP Single-Destination Negotiation Example
PAT with IPCP Single-Destination Negotiation Example
This sect ion descri bes ho w to c onfigu re a remote Cisco 700 series r outer f or P AT with IPCP single-destination negotiation to a central-site router running Cisco IOS software.
Figure 5-4 is an illustration of the configuration used in this example.
Figure 5-4 PAT with IPCP Si ngle-Destination Negot iat ion
Internal
FTP
server
10.0.0.2
10.0.0.1
IPCP negotiated
address assigned
profile
Cisco 765
ISDN network
Cisco 4500
PAT on
A
H9233
Private
network
Public
network
Configuring DHCP Relay, DHCP Server, and PAT 5-9
Page 66
PAT with IPCP Single-Destinat ion Negotiation Example
Cisco 765 Series Router Commands
Following are the commands for configuring the remote Cisco 765 series router for PAT with IPCP single-destination negotiation with a Cisco 4500 router:
set system set ip pat po ftp cd lan set ip address set ip netmask set ip routing on set user set active set 1 number set 2 number set ip routing on set ip rip version 2 set ip rip receive v2 set ip pat on reboot
765
4500
phone_number phone_number
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
Verify the Configuration
When a de m a n d ca ll is m ad e , yo u can use the show ip config all and show ip route all commands to see the IPCP negotiation addres s.
10.0.0.2
10.0.0.1
255.0.0.0
You can use the show ip pat command to see the services returned by PAT.
5-10
Cisco700 Series Router Configuration Guide
Page 67
DHCP Server and PAT with IPCP Single-Destination Negoti ation Example
DHCP Server and PAT with IPCP Single-Destination Negotiation Example
This section describes ho w to config ure a remote Cisco 700 series router for DHCP server with PAT and IPCP single-destination negotiation to a Cisc o 4500 series router running Cisco IOS software at a central site.
Figure 5-5 is an illustration of the configuration used in this example.
Figure 5-5 DHCP Server with PAT and IPCP Single-Destination Negotiation
Cisco 765
Private
network
PAT on
ISDN network
Cisco 4500
H9234
Public
network
Configuring DHCP Relay, DHCP Server, and PAT 5-11
Page 68
DHCP Server and PAT with IPCP Single-Destination Negotiation Example
Cisco 765 Series Router Commands
Following are the commands for configuring the remote Cisco 765 series router for PAT with IPCP single-destination negotiation with a Cisco 4500 router:
set system set ppp secret client set ppp password client set dhcp server set dhcp address set dhcp netmask set dhcp gateway primary set ip pat porthandler ftp cd lan set ip routing on set ip address set ip netmask set user set 1 number set 2 number set ip routing on set ip route destination set ip address set ip netmask set ip pat on set active
765
172.168.99.1
255.255.255.0
4500
phone_number phone_number
0.0.0.0
0.0.0.0
172.168.99.2 128
255.255.255.0
172.168.99.1
172.168.99.3
0.0.0.0/0
gateway
0.0.0.0
For detaile d information re gardi ng the commands listed here, refer to the Cisco 700 Series Router Command Reference.
Verify the Configuration
When a de m a n d ca ll is m ad e , yo u can use the show ip config all and show ip route all commands to s ee the IPCP ne goti ation addre ss. You can also use the show dhcp config and show ip pat commands to verify the configuration.
5-12
Cisco700 Series Router Configuration Guide
Page 69
DHCP Server with PAT and IPCP Dual-Destination PPP Negotiation Example
DHCP Server with PAT and IPCP Dual-Destination PPP Negotiation Example
This section describes ho w to config ure a remote Cisco 700 series router for DHCP server with PAT and IPCP dual-destination PPP negotiation to two routers running Cisco IOS software.
Figure 5-6 is an illustration of the configuration used in this example.
Figure 5-6 DHCP Server with PAT and IPCP and Dual-Destination PPP Negotiati on
DHCP server
Cisco 4500
ISDN network
Cisco 765
Cisco 2500
S5815
Configuring DHCP Relay, DHCP Server, and PAT 5-13
Page 70
DHCP Server with PAT and IPCP Dual-Destination PPP Negotiation Example
Cisco 765 Series Router Commands
Follo wing are the commands for c onfiguri ng the remot e Cisco 765 se ries router as a DHCP server with PAT and IPCP multilink PPP to two router s running Cisco IOS softwa re:
set system set ppp secret client set ppp password client set dhcp server set dhcp address set dhcp netmask set dhcp gateway primary set ip pat porthandler ftp cd lan set ip routing on set ip address set ip netmask set user set ppp clientname set 1 number set 2 number set ip routing on set ip route destination set ip address set ip netmask set ip pat on set active set user set ppp clientname set 1 number set 2 number set ip routing on set ip route destination set ip address set ip netmask set ip pat on set active
765
172.168.99.2 128
255.255.255.0
172.168.99.1
172.168.99.1
255.255.255.0
2500
2500 phone_number phone_number
0.0.0.0/0
30.169.100.1
255.255.255.0
4500
4500 phone_number phone_number
120.50.40.0/0
173.100.10.1
255.255.255.0
172.168.99.3
gateway
30.169.100.2
gateway
173.100.10.2
Note If you create a mult ipl e d estina tio n conf igur at ion with PAT enabled in bot h prof ile s,
the IP route destination must be specified, using the set ip route destination co mmand .
5-14
Cisco700 Series Router Configuration Guide
Page 71
Verify the Configuration
When a de m a n d ca ll is m ad e , yo u can use the show ip configuration all command to see the IPCP negotiation address.
You can use the show dhcp connections command to see the IP addresses returned by DHCP.
Verify the Configuration
Configuring DHCP Relay, DHCP Server, and PAT 5-15
Page 72
DHCP Server with PAT and IPCP Dual-Destination PPP Negotiation Example
5-16
Cisco700 Series Router Configuration Guide
Page 73
CHAPTER
6
Configuring Re mote CAPI
This chapt er provides procedures for configuring Rem ote Common Application Programming Inte rface (CAPI) support on a Cisco 700 series router.
CAPI is an application programming in terface standard used to access ISDN equipment connected to Basic Rate Interfaces (BRIs) and Primary Rate Interf ac es (PRI s). CAPI prov ides a standar dized int erfac e that al lows app licat ion program s to use ISDN dri ver s and controll ers. One appl ication can us e one or more c ontrollers . Sev eral appl ications ca n share one or more controlle r s.
CAPI provi des a selection mechanism that s upports applic ations that use different p rotocols at dif ferent prot ocol le vels. CAPI also pro vides sta ndardized ne twork acc ess by performing an abstrac tion from different protocol variables. All connection-related data, such as connection state, display messages, and so on, is available to the applications at any time.
The framing protocols supported by CAPI consist of High-Level Data Link Control (HDLC), HDLC inverted, bit-transparent (speech), and V.110 synchronous/asynchronous.
CAPI integrates the following data link and network layer protocols:
Link Access Procedure on the D channel (LAPD) in accordance with Q.921 for X.25
D-channel implementation
Point-to-Point Protocol (PPP)
ISO 8208 (X.25 DTE-DTE)
X.25 DCE, T.90NL, and T.30 (fax group 3)
Configuring Remote CAPI 6-1
Page 74
CAPI and RVS-COM
CAPI and RVS-COM
The Cisco 700 serie s router s upports the ISDN De vice Control Protocol (I SDN-DCP) from RVS-COM. ISDN-DCP allows a workstation on the LAN to use legacy dial computer telephony integrat ion ( CTI) application s. These applicatio ns include fax transm itting and receiving and placing and receiving phone calls.
Using ISDN-DCP, the router acts as a DCP serv er. By default, the router listens for DCP messages on TCP port number 2578 (the Internet-assi gned number for RVS-COM DCP) on its LAN port.
When the r outer re cei ve s a DC P message from a DCP cli ent (c onnect ed to t he LAN port of the route r), the router processes the message and acts o n it. The actions consist of sending confirmations to the DCP clients and sending ISDN packets through the router BRI port.
When the router receives a packet on its BRI port for one of the DCP clients, the router formats the pack et as a DCP message and sends it to the corresponding cl ient. The router supports all the DCP messages specified in the ISDN-DCP specific ation.
The router provides two 64-kbps B channels to CAPI cli ents. Each B channel can be configured separately to work in either HDLC mode or bit-transparent mode. For CAPI support, the higher layer protocols (B2 through B7) are transparent to the applications using these B channels.
The ISDN Core Engine of RVS-COM supports the following B channel protocols:
CAPI layer B1
64 kbps with HDLC framing64-kbps bit-tra nsparent operation with byte framing from the networkT.30 modem for fax group 3Modem with full negotiation
CAPI layer B2
X.75 SLP (ISO 7776) with V.42bis compression option (negotiated)V.120 with V.42bis compression opti on (negotiated)TransparentT.30 modem for fax group 3
6-2
Cisco700 Series Router Configuration Guide
Page 75
Supported D-Chann el Protocols
Modem with full negotiation
CAPI layer B3
TransparentT.90NL with compatibility with T.70NL, according to T.90 Appendix IIISO 8208 (X.25 DTE-DTE) modulo 8 and windows size 2, no multiple logical
connections
T.30 for fax group 3Modem with full negotiation
T.30 for fax group 3 (SFF fi le format [default], sending and receiving up to 14400 bps
with ECM option, mo dulations V.17, V.21, V.27ter, V.29)
Analog modem (sending and re ceiving up to 14400 bps with V.42 error correction and
V.42bis compression option, modulations V.21, V.22, V.22bis, V.23, V.32, V.32bis)
Supported D-Channel Proto cols
CAPI support is available only for the ISDN swit ch type Net3.
Supported Applications
ISDN-DCP supports CAPI and non-CAPI a pplications. Supported applications consist of those that use one or two B channels for data transfer, different HDLC- bas ed protocols, Euro File trans fer , or fax G4; also support ed are appli ca tions that send b it-tra nspare nt data, such as A/Mu lay audio, fax G3, analog modem, or analog telephones.
Remote CAPI Rout er Commands
The commands used in this chapter have been added to the router user interface to support CAPI. Note t hat CAPI run s on a remote ne twork de vice, not the ro uter; the Cis co 700 seri es router enables remote CAPI applications.
Configuring Remote CAPI 6-3
Page 76
Configuring t he Cisco 700 Router as an RCAPI Server
Configuring the Cisco 700 Router as an RCAPI S erver
This secti on des cribes how to configure t he Cis co 700 se ries rout er t o be an RC API serv er. By defaul t, RCAPI is disabled in the router. Enabling RCAPI causes the rout er to become
an RCAPI server. When RCAPI is enable d , the rou ter listens for incoming RCAPI messages from PCs connected on its LAN side. By default, the router listens for RCAPI messages on TCP port 2578.
Figure 6-1 illustrates the configuration used in this example. The PCs in the figure have RVS-COM software in stalled.
Figure 6-1 RCAPI Server Configuration Example
Local PC Remote PC
IP address
192.168.2.2
Local 7xx
router
IP address
192.168.2.1 Directory numbers 5554000/5552000
RCAPI Command Summary
Foll owing is the command summary for configuring the RCAPI on the local Cisco 700 series router.
set rcapi on set dir set rcapi 1 number set rcapi server port reboot
5554000
5554000
2578
Remote 7xx
router
IP address
192.168.3.1 Directory numbers 5553000/551000
IP address
192.168.3.2
26547
6-4
Cisco700 Series Router Configuration Guide
Page 77
Verify the Configuration
You can u se the command show rcapi status to see the status of RCAPI server, the clients that are in the listening state, and the status of RCAPI calls:
local-router> show rcapi status Rcapi Sever ON Rcapi Server Port 2578 Rcapi Number(s) 5554000
CLIENT SESSION-ID LISTEN CONNECTION-ID TYPE CALL-STATUS
------------------------------------------------------------------------
192.168.100.3 16777218 ON
Verify the Configuration
Configuring Remote CAPI 6-5
Page 78
Configuring t he Cisco 700 Router as an RCAPI Server
6-6
Cisco700 Series Router Configuration Guide
Page 79
APPENDIX A
Token Card and Cisco Secure Authentication Support
This appendix provides Token Card and Cisco Secure Authentication support concepts as they app ly to the Cisco 700 serie s router. Cisco Sec ure Authentication Age nt supports single-user mode, which extends B channel authentication to a Cisco Secure Authentication Agent client.
T ok en ca rds a re cons idere d the most secur e auth enti cation solu tion a v ailab le. The re ar e tw o kinds of token cards, synchronous and asynchronous. Currently, Cisco Secure Authentic ation Agent only supports synchronous token card, which does not nee d a challenge from a token server to generate a token.
Figure A-1 shows the connection between the client and the token ser ver.
Figure A-1 Cisco Secure Authent ication Agent Client-to-Token Server
Connection
LAN ISDN LAN LAN
10259
Cisco Secure AA
client
The follow ing steps illustrate how a link is established using a profile:
Step 1 Deman d traffic or a ca ll command makes a conn ection. Step 2 The router sends a User Datagram Protocol (UDP) packet to a Token
Authorization agent (also known as Cisco Secure Authentication Agent), requestin g a usernam e and passw ord for PAP and CHAP . If T o ken Authori zation Support (TAS) is set to central, the router always sends the authentication information request to the des ig nated client.
Cisco 700 NAS Authentication
Authorization
Accounting
Token server
Token Card and Cisco Secure Auth entication Support A-1
Page 80
Token Caching
Otherwise, the router sends the request to the source of the interesting packet rece iv e d if t he i nte res ti ng pa ck et is an IP pack et . T he ro ute r s ends t h e re que st to the designated clie nt if the interesting packet is not an IP packet.
Step 3 The agent software recognizes the UDP/IP packet and opens an authentication
window on the terminal. The user enters the username and token. The agent organiz es the information into the PAP and CHAP username and password, based on the router conf igurati on. It t hen sends t he username and password bac k to the ro ut er as a r ep l y p ac ket .
Step 4 The reply packet is received, and the router opens an ISDN connection with
Network Access Server (NAS).
Step 5 The router negotiates all line-control protoc ol options, including which
authentication protocol to us e (PAP or CHAP).
Step 6 Depending on which a uthent icat ion proto col is ne goti at ed, th e route r asse mbles
a PAP request or CHAP response packet and sends it to NAS. If authentication fails, NAS passes the failure message from authentication, authorization, and accounting (AAA) to the route r . The route r sends one more req uest to the agent with a mess age t o retry once more . If auth entic ation fa ils aga in, t he router s ends another PAP request with the pppautheninfotype parameter set to message-only to inform the Cisco Secure Authentication Agent client that the authentication failed again and that the router has stopped author ization attempts.
Token Caching
Cisco 700 series routers do not do to ken caching. A token is cached at the client, and the client sends the router the cached token in response to the authentication request from a link that uses a multilink PPP bundle. With its built-in algorithm, the agent can also generate a new token, called a soft token, instead of prompt ing the user to enter a new hard token.
There ar e two authe ntication modes, PAP and CHAP local se cret, shown in the f o llowing figure s.
A-2
Cisco700 Series Router Configuration Guide
Page 81
Figure A-2 PAP Client Packet
Token Caching
Client
username
token
Figure A-3 CHAP Local Secret
Client
username*token
PPP PAP Packet
username
token
Cisco 700 Series Router Configuration
authorization protocol = PAP local secret = N/A
PPP PAP Packet
MD5 (challenge, knock)username*token
Cisco 700 Series Router Configuration
authorization protocol = CHAP use local secret = Yes secret = knock
10260
10262
Token Card and Cisco Secure Auth entication Support A-3
Page 82
Token Caching
A-4
Cisco700 Series Router Configuration Guide
Page 83
INDEX
Numerics
5ESS 3-6
A
Address Resolution Protocol
See ARP address, MAC 3-8 addressing, DHCP 5-2 AppleTalk 4-15 ARP, sup ported protocol 1-1 authentication 2-4
CHAP 3-4
PPP 3-8 autodetection
set autodetection command 3-5
troubleshooting 3-6
B
B channel 3-6 BCP, supported protocol 1-1 Bridge Control Protocol
See BCP bridgi ng 3-7, 4-15
configuration example 3-7
interoperability issues 4-15
C
CAPI 6-1 caution description x cd command 2-5
Challenge Ha ndshake Authentication Protocol
See CHAP changing a profile name 2-6 CHAP 3-10
auth entication 3-10
configuration example
IP static routing and callback 4-2 IP static routing with MLP 4-4 IP unnumbe red routing w ith MLP 4-8
with Cisco IOS software 4-2, 4-4, 4-8 secret 3-4 supported protocol 1-2
Cisco Fast Step 1-3 Cisco Internetwork Operating System
See Cisco I OS
Cisco IOS
configuration vii, 4-1 Release 11.0(3) 4-14 Release 11.1 4-15 softw are, interoperability with IPCP and IPX C P 5-4 with bridging 4-15
Cisco IOS-700 software 1-2 command reference viii Common Appli cation Programming Interface
See CAPI See Remote CAPI
configuration
bridging exampl e 3-7 changing profiles 2-2 displaying profiles 2-5 example
bridging 3-7
IP static and callback with CHAP 4-2
IP static with CHAP and MLP 4-4
IP static with PAP 4-6
IP unnumbered and CHAP with M LP 4-8
RCAPI 6-4
routing a Cisco 700 series router 3-9
rout ing IP an d IPX on -demand 3-14
Index 1
Page 84
routing to an ISP 3-9 ISDN PRI 4-1 line 3-5 options 1-3 port 1-3 profiles 2-1 Remote CAPI example 6-4 system level 2-2 Telnet 1-3 Web s ources viii
connect ions
ISP 3-9
creating profiles 2-5
D
deleting profiles 2-6 dema nd RIP 4-14 DHCP
clients 5-2 defa ult gat e w a y 5 -2 network addresses 5-2 relay 5-1
with IPC P ne go tiatio n 5-6 server 5-2
with IPC P ne go tiatio n 5-7
with PAT and IPCP dual-destinati on PPP
negotiation 5-13
with PAT and IPCP single-destination
negotiation 5-11
supported protocol 1-2
DMS-100 ISD N BRI switch 3-7 document conventions ix documentation viii documentation CD-ROM viii Dynamic Host Configuration Protocol
See DHCP
F
firewall 5-3
I
ICMP, supported protocol 1-1 image (s oftware) 1-3 Integrated Services Digita l Networ k
See ISDN Internal profile 2-4, 5-3 Internet Control Message Protocol
See ICMP Internet Packet Exchange Control Protocol
See IPXCP Internet Protocol Control Protocol
See IPCP Internet service provider
See ISP Internetwork Packet Exchange
See IPX inter o pe ra bility w ith Ci sc o IO S sof tw a re
bridging 4-15
IPCP and IPXCP 5-4
multi li nk PP P en ca p su la tion 4-1 4 IP 3-14, 3-17
configuration example
IP static and callback with CHAP 4-2 IP static with CHAP and MLP 4-4 IP static with PAP 4-6 IP unnumbered and CHAP with M LP 4-8 rout ing IP an d IPX on -demand 3-14
DHCP
network addresses 5-2 relaying configuration infor m ation 5-1
unnumbe red IP address 3-9 IPCP
interoperability 5-1
supported protocol 1-1
Cisco 700 Series Rout er Configuration GuideIndex 2
Page 85
IPX 3-14, 3-17
configuration example, r outing IP and IPX
on-demand 3-14
IPXCP
interoperability issues 5-1 supported protocol 1-1
ISDN
BRI number 3-6 PRI conf iguration 4-1
ISDN Devi ce Control Protocol
See ISDN-DCP ISDN-DCP, supported protocol 1-2 ISP, connections 3-9
L
N
NCP 3-11 NetBIOS 4-15 network address
DHCP 5-2 space limitations 4-15
Network Control Protocol
See NCP NI1 swit ch 3-7 nonvolatile random access m em ory
See NVRAM note, description x Novell IPX 4-15 NVRAM 2-1
LAN
Ethernet 10BaseT connection 3-2
profile 2-4 LCP 3-11 line configuration 3-5 Link Cont rol Protocol
See LCP
M
MAC addres s table 3-8 MLP, configuration example
IP static routing with CHAP 4-4
IP unnumbe red routing with CHAP 4-8 MLPPP
encapsulation 4-14
supported protocol 1-1 Multili n k Po int -to-P oint Protocol
See MLPPP
O
operating system (router) 1-1 overview of Cisco 700 series router s 1-1
P
PAP 3-4
configuration example
IP static routing 4-6 with a router running Cisco IOS software 4-6
supported protocol 1-1
Password A uthentication Protocol
See PAP PAT with IPCP single-destination negotiation 5-9 PAT, supported protocol 1-2 permanent profiles 2-4, 2-6 Point-to-Point Protocol
See PPP Port Address Translation
See PAT
Index 3
Page 86
PPP 3-11
configuration example
routing IP and IPX on-demand 3-14 IP and IPX routing 3-14 IPCP negotiation 5-5 mul til in k enc a ps u la tio n , in terop er ab i lit y 4-14 supported protocol 1-1
private IP addresses 5-3 profile-level param eters 2-1 profiles
active 2-2, 2-6 changing a profile name 2-6 creating 2-5 definition 3-2 deleting 2-6 displayi ng configurations 2-5 inactive 2-2, 2-6 on-demand 2-2 parameters 2-2 permanent 2-4
Internal 2-4
LAN 2-4
Standard 2-4 redefined values indicat or 2-5 removing parameters 2-5 system mode parameters 2 -3 user-def ined 3-10 using with the routers 2-1 to 2-7
protocols supported 1-1
Q
quic k reference viii
R
release notes for Cisco IOS 70 0 software viii Remote CAPI 6-3
configuration 6-4 configuration example 6-4
TCP port 6-4 Remote CAPI, supported protocol 1-2 Remote Common Application Programm ers Interface
See RCAPI removing profile parameters 2-5 reset user command 2-6 RIP
dynamic routing protocols 4-14
PAT enabled 5-3
supported protocol router manuals viii routing
configuration example
bridging 3-7 central site 3-11 routing a Cisco 700 series router 3-9 rout ing IP an d IPX on -demand 3-14 routing to an ISP 3-9
Routing Information Protocol
See RIP
S
SAP, supported protocol 1-1 secret, CHAP 3-4 Service Advertisement Protocol
See SAP set autodetection command 3-5 set default command 3-4 set ip framing command 5-4 set ip rip update command 4-14 set ppp multilink command 4-14 set profile user command 2-6 set switch command 3-6 set user command 2-3 show commands, defined 2-5 show configuration command 3-3
Cisco 700 Series Rout er Configuration GuideIndex 4
Page 87
show dhcp configuration 5-7 show dhcp connections 5-15 show ip configuration command 5-6 show ip route command 5-6 show rc api status command 6-5 Simple Network Management Protocol
See SNMP commands SNMP, sup ported protocol 1-2 softw a re image 1-3 software, Cisco IOS-700 1-2 SPIDs 3-6
autodetection 3-5
definintion 3-5
troubleshooting 3-6 supported protocols 1-1
ARP 1-1
BCP 1-1
CHAP 1-2
DHCP 1-2
ICMP 1-1
IPCP 1-1
IPXCP
ISDN-DCP 1-2
MLPPP 1-1
PAP 1-1
PAT 1-2
PPP 1-1
RCAPI 1-2
RIP
SAP 1-1
SNMP 1-2
TFTP 1-2 system m ode
configuration parameters 2-2
parameters 2-1
T
TFTP server 1-2 TFTP, supported protocol 1-2 timesaver, description x Triggered RIP 1-2 Trivial File Transfer Protocol
See TFTP
U
unnumbered IP address 3-9 unroutable protocols 4-15 unset command 2-5
W
WAN ISDN ports 3-2 World Wide Web viii
Index 5
Loading...