Configuring RADIUS Authorization for User Privileged Access and Network
Services 264
Displaying the RADIUS Configuration 266
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Controlling Access Point Access with TACACS+ 266
Default TACACS+ Configuration 266
Configuring TACACS+ Login Authentication 266
Configuring TACACS+ Authorization for Privileged EXEC Access and Network
Services 268
Displaying the TACACS+ Configuration 269
Administering the Access Point Hardware and Software 269
Administering the Wireless Hardware and Software 269
Resetting the Wireless Device to the Factory Default Configuration 269
Rebooting the Wireless Device 269
Monitoring the Wireless Device 270
Managing the System Time and Date 270
Understanding Simple Network Time Protocol 271
Configuring SNTP 271
Time and Date Manual Configuration 271
Example Configuration : Time and Date 274
Configuring a System Name and Prompt 274
Configuring a System Name 274
Understanding DNS 275
Creating a Banner 277
Configuring a Message-of-the-Day Login Banner 277
Example: Configuring a MOTD Banner 278
Configuring a Login Banner 279
Example Configuration: Login Banner 279
Administering Wireless Device Communication 279
Configuring Ethernet Speed and Duplex Settings 280
Configuring the Access Point for Wireless Network Management 280
Configuring the Access Point for Local Authentication and Authorization 281
Configuring the Authentication Cache and Profile 282
Example Configuration: Authentication Cache and Profile 283
Configuring the Access Point to Provide DHCP Service 285
Setting up the DHCP Server 285
Monitoring and Maintaining the DHCP Server Access Point 287
Configuring the Access Point for Secure Shell 288
Understanding SSH 288
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xv
Contents
Configuring SSH 288
Client ARP Caching 289
Understanding Client ARP Caching 289
Configuring Client ARP Caching 289
Configuring Multiple VLAN and Rate Limiting for Point-to-Multipoint
Bridging 290
Embedded AP860VAE Wireless Access Points (for 860VAE series routers) 290
Configuring WLAN (AP860VAE) 290
Configuring WLAN Using the Web-based Interface 291
Connecting to the Web-based WLAN Interface 291
Address for Accessing Web-based Interface 291
Subnet 291
Displaying Device Information 291
Displaying Connection Statistics 291
Configuring Access to the Web-based Interface 291
Configuring Basic Wireless Settings 292
Configuring Security 293
Configuring MAC Filtering 293
Configuring Advanced Wireless Settings 294
Station Information 296
Configuring the Password for Connecting to the Web-based Interface 296
Saving the Wireless LAN Configuration to a File 297
Loading a Wireless LAN Configuration File 297
Restoring the Default Configuration 297
Configuring WLAN Using the CLI-based Interface 297
WLAN CLI Interface 297
Displaying Command Information for WLAN CLI 298
Example : Displaying Command Information for WLAN CLI 298
Connecting to the WLAN CLI Interface 298
Example: Configuring a Loopback Interface 298
xvi
Example: Accessing WLAN CLI Using Telnet Through the Loopback
Interface 299
Exiting from the WLAN CLI Interface 299
Setting the IP Address for the Web-based Interface 299
Enabling and Disabling WLAN 300
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Configuring the Main SSID 300
Configuring Guest SSIDs 301
Enabling and Disabling Guest SSIDs 301
Hiding an Access Point 302
Enabling and Disabling Client Isolation 303
Enabling and Disabling WMM Advertise 304
Enabling and Disabling Wireless Multicast Forwarding (WMF) 305
Configuring the Global Maximum Number of Clients 305
Configuring the Maximum Number of Clients for an SSID 306
Configuring Authentication Options 307
Configuring Encryption Options 311
Configuring the MAC Address Filter Access List 313
Configuring the MAC Address Filter Mode 314
Configuring Radio Channel 315
Configuring 802.11n Options 316
Configuring the 54g Mode 318
Configuring the 54g Preamble Type 318
Configuring the 54g Rate 319
Configuring 54g Protection 320
Configuring the Multicast Rate 321
Configuring the Basic Rate 322
Configuring the Fragmentation Threshold 323
Configuring the RTS Threshold 323
Configuring the DTIM Interval 324
Configuring the Beacon Interval 324
Configuring the Radio Transmit Power 325
Configuring WMM Options 326
Displaying Current CLI Values and Keywords 326
Displaying Current Channel and Power Information 328
Displaying Current Associated Clients 330
Displaying the SSID to BSSID Mapping 330
Displaying the Tx/Rx Statistics 331
Displaying the BVI 1 Interface Details 332
Displaying Dot11Radio 0 Interface Information 332
Example: Displaying Dot11Radio 0 Interface Information 333
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xvii
Contents
Displaying Brief Details for All Interfaces 333
Displaying CPU Statistics 334
Example: Displaying CPU Statistics 334
Showing a Summary of Memory Usage 334
Pinging an Address 335
Changing the Administrator Password 335
Configuring the Number of Lines on Screen 336
4G LTE Support on Cisco 800 Series ISRs 336
How to Configure Cisco 800 Series 4G LTE ISRs 337
Configuration Examples for Cisco 800 Series 4G LTE ISRs 337
Example: Basic Cellular Configuration 337
Example: Dialer-Watch Configuration without External Dialer Interface 338
Example: Dialer-Persistent Configuration with External Dialer Interface 338
CHAPTER 12
Example: GRE Tunnel over Cellular Interface Configuration 338
Modem Firmware Upgrade 339
Troubleshooting 339
3G Support on Cisco 880G series ISRs 339
Configuring PPP over Ethernet with NAT 341
Overview 342
PPPoE 342
NAT 343
Configuration Tasks 343
Configure the Virtual Private Dialup Network Group Number 343
Configure Ethernet WAN Interfaces 344
Configure the Dialer Interface 345
Configure Network Address Translation 347
Configuration Example 350
Verifying Your Configuration 351
CHAPTER 13
xviii
Configuring PPP over ATM with NAT 353
Overview 353
Configure the Dialer Interface 355
Configure the ATM WAN Interface 357
Configure DSL Signaling Protocol 358
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Configuring ADSL 358
Verifying the Configuration 359
Configure Network Address Translation 360
Configuration Example 363
Verifying Your Configuration with NAT 364
CHAPTER 14
CHAPTER 15
Environmental and Power Management 365
Environmental and Power Management 365
Cisco EnergyWise Support 366
Configuring a LAN with DHCP and VLANs 367
Configuring a LAN with DHCP and VLANs 367
DHCP 368
VLANs 368
Configuring DHCP and VLANs 368
Configuring DHCP 368
Configuration Example: DHCP 370
Verifying Your DHCP Configuration 370
Configuring VLANs 371
Assigning a Switch Port to a VLAN 372
Verifying Your VLAN Configuration 372
CHAPTER 16
Configuring a VPN Using Easy VPN and an IPSec Tunnel 375
Configuring a VPN Using Easy VPN and an IPSec Tunnel 375
Configuring the IKE Policy 377
Configuring Group Policy Information 379
Applying Mode Configuration to the Crypto Map 380
Enabling Policy Lookup 381
Configuring IPSec Transforms and Protocols 382
Configuring the IPSec Crypto Method and Parameters 383
Applying the Crypto Map to the Physical Interface 384
Creating an Easy VPN Remote Configuration 385
Verifying Your Easy VPN Configuration 387
Configuration Examples for VPN and IPSec 387
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xix
Contents
CHAPTER 17
CHAPTER 18
CHAPTER 19
Configuring Cisco Multimode G.SHDSL EFM/ATM 389
Configuring VDSL2 Bonding and Single-Wire Pair 391
Restrictions 391
Configuring Bonding in Auto Mode 392
Configuring Bonding in VDSL2 Mode 392
Configuring a Single-Wire Pair on Line 0 393
Configuring a Single-Wire Pair on Line 1 394
Configuration Examples 395
Configuring Cisco IOx 397
Configuring Cisco IOx 397
Configuration Examples 399
Developer Mode with Ethernet 399
Stationary with Ethernet 400
Mobile with Cellular 401
CHAPTER 20
Cellular IP Address Type 402
Accessing the Web Interface of Local Manager 404
Configuring NTP Server 405
Configuring IOS NAT for Applications Installed using BRIDGE and NAT Networking
Modes 405
Configuring Guest Serial 406
Upgrading Cisco IOx 407
Troubleshooting 407
Deployment Scenarios 417
About the Deployment Scenarios 417
Enterprise Small Branch 418
Internet Service and IPSec VPN with 3G 419
SMB Applications 420
Enterprise Wireless Deployments with LWAPP 421
Enterprise Small Branch Office Deployment 422
CHAPTER 21
xx
Troubleshooting Cisco 800 Series Routers 423
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Getting Started 423
Before Contacting Cisco or Your Reseller 423
ADSL Troubleshooting 424
SHDSL Troubleshooting 424
VDSL2 Troubleshooting 425
show interfaces Troubleshooting Command 425
ATM Troubleshooting Commands 427
ping atm interface Command 428
show atm interface Command 428
debug atm Commands 429
Guidelines for Using Debug Commands 429
debug atm errors Command 429
APPENDIX A
debug atm events Command 430
debug atm packet Command 431
Software Upgrade Methods 432
Recovering a Lost Password 432
Change the Configuration Register 432
Reset the Router 434
Reset the Password and Save Your Changes 435
Reset the Configuration Register Value 436
Enabling SIM Fast Switchover 437
Cisco Configuration Professional Express 438
Cisco IOS Software Basic Skills 439
Configuring the Router from a PC 439
Understanding Command Modes 440
Getting Help 442
Enable Secret Passwords and Enable Passwords 443
Entering Global Configuration Mode 444
Using Commands 444
Abbreviating Commands 445
Undoing Commands 445
Command-Line Error Messages 445
Saving Configuration Changes 446
Summary 446
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxi
Contents
APPENDIX B
Concepts 447
ADSL 447
SHDSL 448
Network Protocols 448
IP 448
Routing Protocol Options 448
RIP 449
Enhanced IGRP 449
PPP Authentication Protocols 449
PAP 450
CHAP 450
TACACS+ 451
Network Address Translation 451
Easy IP (Phase 1) 451
Easy IP (Phase 2) 452
Network Interfaces 452
Ethernet 452
ATM for DSL 453
PVC 453
Dialer Interface 453
Dial Backup 454
Backup Interface 454
Floating Static Routes 454
Dialer Watch 454
QoS 454
IP Precedence 455
PPP Fragmentation and Interleaving 455
CBWFQ 455
RSVP 456
Low Latency Queuing 456
Access Lists 456
APPENDIX C
xxii
ROM Monitor 457
Entering the ROM Monitor 457
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
ROM Monitor Commands 458
ROM Monitor Commands for 860VAE ISRs 459
ROM Monitor Command Descriptions 459
TFTP support with Ethernet WAN interface 460
Disaster Recovery with TFTP Download 461
TFTP Download Command Variables 461
Required Variables 461
Optional Variables 462
Using the TFTP Download Command 462
Configuration Register 463
Changing the Configuration Register Manually 463
Changing the Configuration Register Using Prompts 464
Console Download 464
Error Reporting 465
ROM Monitor Debug Commands 466
Exiting the ROM Monitor 467
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxiii
Contents
xxiv
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Audience
Preface
This preface describes the audience, organization, and conventions of this guide, and describes related
documents that have additional information. It contains the following sections:
Audience, page xxv
•
Document Organization, page xxv
•
Document Conventions, page xxvii
•
Related Documentation, page xxviii
•
Obtaining Documentation and Submitting a Service Request, page xxix
•
This guide provides an overview and explains how to configure the various features for the Cisco 810, Cisco
860, Cisco 880, and Cisco 890 series Integrated Services Routers (ISRs). Some information may not apply
to your particular router model.
This guide is intended for Cisco equipment providers who are technically knowledgeable and familiar with
Cisco routers and Cisco IOS software and features.
For warranty, service, and support information, see the “Cisco One-Year Limited Hardware Warranty Terms”
section in the Readme First for the Cisco 800 Series Integrated Services Routers that was shipped with your
router.
Document Organization
This document is organized into the following chapters:
Product Overview
DescriptionChapter
Provides a brief description of the router models and the available software
features.
Provides procedures for configuring the basic parameters of the router.Basic Router Configuration
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxv
Document Organization
Preface
DescriptionChapter
Configuring Ethernet CFM and
Y.1731 Performance Monitoring
on Layer 3 Interfaces, on page
83
Configuring Power Management
Configuring Security Features
Configuring Backup Data Lines
and Remote Management
Configuring Ethernet Switches
Configuring the Serial Interface
Configuring Wireless Devices
Provides procedures for configuring the network interface device
functionality, Ethernet data plane loopback, IEEE connectivity fault
management, and Y.1731 performance monitoring.
Provides the configuration of power management and
Power-over-Ethernet (PoE).
Provides procedures for implementing the security features that can be
configured on the router.
Provides procedures for configuring remote management functions and
a backup data line connection.
Provides an overview of the configuration tasks for the 4-port Fast
Ethernet switch on the router.
Provides references to the procedures for voice configuration.Configuring Voice Functionality
Provides information about WAN access and aggregation, Legacy protocol
transport, and Dial Access Server.
Provides procedures for initial configuration of the wireless device, radio
settings, WLAN, and administration of the wireless device. Also provides
information about 4G LTE and 3G cellular networks.
Configuring PPP over Ethernet
with NAT
Configuring PPP over ATM with
NAT
Configuring a LAN with DHCP
and VLANs
Configuring a VPN Using Easy
VPN and an IPSec Tunnel
G.SHDSL EFM/ATM
Deployment Scenarios
Provides an overview of Point-to-Point Protocol over Ethernet (PPPoE)
clients and network address translation (NAT)s that can be configured
on the Cisco 860 and Cisco 880 series Integrated Services Routers (ISRs).
Provides an overview of Point-to-Point Protocol over Asynchronous
Transfer Mode (PPPoA) clients and network address translation (NAT)
that can be configured on the Cisco 860 and Cisco 880 series Integrated
Services Routers (ISRs).
Describes how the routers can use the Dynamic Host Configuration
Protocol (DHCP) to enable automatic assignment of IP configurations
for nodes on these networks.
Provides an overview of the creation of Virtual Private Networks (VPNs)
that can be configured on the Cisco 860 and Cisco 880 series Integrated
Services Routers (ISRs).
Describes the configuration of the Cisco Multimode 4-pair G.SHDSL.Configuring Cisco Multimode
Shows some typical deployment scenarios for the Cisco 860, Cisco 880,
and Cisco 890 series ISRs.
xxvi
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Preface
Document Conventions
DescriptionChapter
Provides information to help isolate problems you might encounter.Troubleshooting Cisco 800 Series
Routers
Cisco IOS Software Basic Skills
Concepts
ROM Monitor
Document Conventions
This document uses the following conventions:
^ or Ctrl
Italic font
Provides information for how to use Cisco IOS software to configure
your router.
Provides conceptual information that may be useful to Internet service
providers or network administrators when they configure Cisco routers.
Provides information on how to use Cisco’s ROM Monitor firmware.
DescriptionConvention
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard.
For example, the key combination ^D or Ctrl-D means that you hold
down the Control key while you press the D key. (Keys are indicated in
capital letters but are not case sensitive.)
Commands and keywords and user-entered text appear in bold font.bold font
Document titles, new or emphasized terms, and arguments for which you
supply values are in italic font.
Courier font
...
|
[x | y]
{x | y}
Terminal sessions and information the system displays appear in courier
font.
Bold Courier font indicates text that the user must enter.Bold Courier font
Elements in square brackets are optional.[x]
An ellipsis (three consecutive nonbolded periods without spaces) after
a syntax element indicates that the element can be repeated.
A vertical line, called a pipe, indicates a choice within a set of keywords
or arguments.
Optional alternative keywords are grouped in brackets and separated by
vertical bars.
Required alternative keywords are grouped in braces and separated by
vertical bars.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxvii
Related Documentation
Preface
DescriptionConvention
Note
[x {y | z}]
Nested set of square brackets or braces indicate optional or required
choices within optional or required elements. Braces and a vertical bar
within square brackets indicate a required choice within an optional
element.
string
A nonquoted set of characters. Do not use quotation marks around the
string or the string will include the quotation marks.
Nonprinting characters such as passwords are in angle brackets.< >
Default responses to system prompts are in square brackets.[ ]
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line
of code indicates a comment line.
Reader Alert Conventions
This document uses the following conventions for reader alerts:
Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Tip
Means the following information will help you solve a problem.
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Timesaver
Means the described action saves time. You can save time by performing the action described in the
paragraph.
Warning
Means reader be warned. In this situation, you might perform an action that could result in bodily
injury.
Related Documentation
In addition to this document, the Cisco 810, Cisco 860, Cisco 880, and Cisco 890 series ISR documentation
set includes the following documents:
xxviii
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Preface
Obtaining Documentation and Submitting a Service Request
Readme First for the Cisco 800 Series Integrated Services Routers.
•
Cisco 860, Cisco 880, and Cisco 890 Series Integrated Services Routers Hardware Installation Guide
•
Regulatory Compliance and Safety Information for Cisco 800 Series and SOHO Series Routers
•
Declarations of Conformity and Regulatory Information for Cisco Access Products with 802.11n Radios
•
Software Activation on Cisco Integrated Services Routers and Cisco Integrated Service Routers G2
•
You might also need to refer to the following documents:
Cisco System Manager Quick Start Guide
•
Cisco IOS Release 12.4 Quality of Service Solutions Configuration Guide
Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges, versions 12.4(10b) JA
•
and 12.3(8) JEC
Cisco Aironet 1240AG Access Point Support Documentation
•
Cisco 4400 Series Wireless LAN Controllers Support Documentation
•
LWAPP Wireless LAN Controllers
•
LWAPP Wireless LAN Access Points
•
Cisco IOS Release 12.4 Voice Port Configuration Guide
•
SCCP Controlled Analog (FXS) Ports with Supplementary Features in Cisco IOS Gateways
•
Cisco Software Activation Conceptual Overview
•
Cisco Software Activation Tasks and Commands
•
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information,
see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco
technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxix
Obtaining Documentation and Submitting a Service Request
Preface
xxx
Cisco 800 Series Integrated Services Routers Software Configuration Guide
CHAPTER 1
Product Overview
This chapter provides an overview of the features available for the Cisco 810, Cisco 860, Cisco 880 and
Cisco 890 series Integrated Services Routers (ISRs), and contains the following sections:
Information About Cisco 800 Series ISRs, page 1
•
Cisco 860 Series ISRs, page 1
•
Cisco 880 Series ISRs, page 6
•
Cisco 890 Series ISRs, page 10
•
Cisco 810 Series ISRs, page 11
•
Licensing for Cisco 800 Series ISRs, page 15
•
Information About Cisco 800 Series ISRs
The Cisco 860, Cisco 880, and Cisco 890 series ISRs provide Internet, VPN, voice, data, and backup capability
to corporate teleworkers and remote and small offices of fewer than 20 users. These routers are capable of
bridging and multiprotocol routing between LAN and WAN ports, and provide advanced features such as
antivirus protection. In addition, the Cisco 860W, Cisco 880W, and Cisco 890W series ISRs incorporate an
802.11n wireless LAN option that allows the ISR to act as a wireless access point.
The Cisco 810 series ISRs provide Internet, VPN, data, and backup capability to corporate teleworkers and
remote and small offices of fewer than 20 users and provides machine to machine connectivity. Under Cisco
810 series ISRs, there are two different series of routers available - Cisco 812 series ISRs and Cisco 819 series
ISRs. The Cisco 812 ISRs support Gigabit Ethernet (GE), WAN connections over Cellular (3G) interface,
and WLAN. The Cisco 819 ISRs are fixed-configuration data routers that provide four 10/100 Fast Ethernet
(FE), 1 Gigabit Ethernet (GE), WAN connections over Serial and Cellular (3G, 4G) interfaces and WLAN.
Cisco 860 Series ISRs
The Cisco 860 series ISRs are fixed-configuration data routers that provide either a 10/100 Fast Ethernet (FE)
or an ADSL2 over POTs WAN connection.
This section contains the following topics:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
1
Features of Cisco 860 Series ISRs
Features of Cisco 860 Series ISRs
The following features are supported on all Cisco 860 series ISRs:
4-port 10/100 FE LAN Switch of Cisco 860 Series ISRs
The 4-port 10/100 FE LAN switch provides four ports for connecting to 10/100BASE-T (10/100 Mbps) Fast
Ethernet (FE) LANs or access points.
Security Features for Cisco 860 Series ISRs
The Cisco 860 Series ISRs provide the following security features:
IPsec
•
Firewall
•
Product Overview
802.11n Wireless LAN Option for Cisco 860 Series ISRs
The Cisco 861W ISR has an integrated 802.11b/g/n single radio module for wireless LAN connectivity. With
this module, the router can then act as an access point in the local infrastructure.
Features of Cisco 860VAE Series ISRs
The following sections describe the features of the Cisco 860VAE series ISRs:
General Features of Cisco 860 VAE Series Routers
Table 1: General Features of Cisco 860VAE Series ISRs, on page 2 describes the general features of Cisco
860VAE series routers.
Table 1: General Features of Cisco 860VAE Series ISRs
Increased performance
BenefitFeature
Performance enables customers to take
•
advantage of broadband network speeds while
running secure, concurrent data, voice, video,
and wireless services.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
2
Product Overview
Features of Cisco 860VAE Series ISRs
BenefitFeature
Security and QoS with secure routers
State-of-the-art xDSL
ScanSafe web filtering
IPSec & Easy VPN with 10 tunnels.
•
BGP.
•
MAC filtering and port security.
•
QoS features include LLQ and WFQ.
•
NBAR and DiffServ.
•
State-of-the-art xDSL features, including latest
•
ADSL2+/VDSL2 standards.
Improved interoperability vs. various DSLAMs
•
deployed at WW SPs.
Protects network and staff from undesirable web
•
content
Increases productivity by limiting time spent on
•
recreational surfing
Optimizes network resources by reducing
•
bandwidth congestion
IPv6 support
WAN Diversity
Four-port 10/100-Mbps managed switch
1 GE port for secure routers
Monitors online activity with comprehensive
•
reporting
Supports latest IP addressing standards
•
GE + DSL multimode VDSL2 and ADSL 1, 2,
•
and 2+.
Multiple WAN options within the same box
•
allow consistent configuration across diverse
deployments.
Connection of multiple devices within a
•
teleworker home or a small office, with the
ability to designate a port as the network edge.
VLANs allow for secure segmentation of
•
network resources.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
3
Features of Cisco 860VAE Series ISRs
Product Overview
BenefitFeature
CON/AUX port
Real-time clock
Interfaces of Cisco 860 VAE Series ISRs
Table 2: Interfaces of the Cisco 860VAE Series ISRs, on page 4 describes the interfaces of the Cisco
860VAE series routers.
Table 2: Interfaces of the Cisco 860VAE Series ISRs
ModelsInterfaces
A single dual-purpose port provides direct
•
connection to a console or external modem for
management or backup access points.
A built-in real-time clock maintains an accurate
•
date and time for applications that require an
accurate time stamp, such as logging and digital
certificates.
867VAE-K9866VAE-K9867VAE866VAE
xxxx4 FE1switch ports
1
FE = Fast Ethernet
2
GE = Gigabit Ethernet
Note
1 GE2switch port
——
xx
xxxx1 GE WAN port
1 VDSL/ADSL over
—
x
—
x
POTS port
x1 VDSL/ADSL over
—
x
—
ISDN port
The Cisco 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9 routers each have two WAN ports. Only
one of the two ports can be active at any given time.
Table 3: Interfaces of the C860VAE Series ISRs, on page 5 describes the interfaces of the C860VAE series
routers.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
4
Product Overview
Features of Cisco 860VAE Series ISRs
Table 3: Interfaces of the C860VAE Series ISRs
ModelsInterfaces
C867VAE-K9C866VAE-K9C867VAE
xxx3 FE3switch ports
xxx2 GE4switch port
xxx1 GE WAN port
3
FE = Fast Ethernet
4
GE = Gigabit Ethernet
x1 VDSL/ADSL over
—
x
POTS port
1 VDSL/ADSL over
—
x
—
ISDN port
Table 4: Interfaces of the C860VAE-W Series ISRs, on page 5 describes the interfaces of the C860VAE
series routers.
Table 4: Interfaces of the C860VAE-W Series ISRs
ModelsInterfaces
C866VAE-W-E-K9
C867VAE
-W-E-K9
C867VAE
-W-A-K9
C867VAE
-POE-W-A-K9
xxxx3 FE5switch ports
xxxx2 GE6switch port
xxxx1 GE WAN port
1 VDSL/ADSL
—
over POTS port
x1 VDSL/ADSL
over ISDN port
5
FE = Fast Ethernet
6
GE = Gigabit Ethernet
IOS Images for Cisco 860 VAE Series ISRs
Table 5: IOS Images of the Cisco 860VAE Series ISRs, on page 6 describes the IOS images included in
Cisco 860VAE series routers.
xxx
———
Cisco 800 Series Integrated Services Routers Software Configuration Guide
5
Cisco 880 Series ISRs
Product Overview
Table 5: IOS Images of the Cisco 860VAE Series ISRs
ModelIOS Image
Cisco 867VAE-K9Cisco 867VAECisco 866VAE
xxc860vae-ipbasek9-mz
c860vae-advsecurityk9-mz
c860vae-advsecurityk9_npe-mz
Table 6: IOS Images of the C860VAE Series ISRs, on page 6 describes the IOS images included in Cisco
860VAE series routers.
Table 6: IOS Images of the C860VAE Series ISRs
ModelIOS Image
xc860vae-ipbasek9-mz
c860vae-advsecurityk9-mz
c860vae-advsecurityk9_npe-mz
—
—
——
——
—
x
x
C867VAE-K9C866VAE-K9C867VAE
——
xx
xx
Table 7: IOS Images of the C860VAE-W Series ISRs, on page 6 describes the IOS images included in
Cisco 860VAE series routers.
Table 7: IOS Images of the C860VAE-W Series ISRs
Cisco 880 Series ISRs
The Cisco 880 series ISRs are a family of fixed-configuration data and voice routers as described in the
following sections:
ModelIOS Image
C866VAE-W-E-K9
C867VAE
-W-E-K9
C867VAE
-W-A-K9
C867VAE
-POE-W-A-K9
xxxxc860vaew-advsecurityk9-mz
xxxxc860vaew-advsecurityk9_npe-mz
Cisco 800 Series Integrated Services Routers Software Configuration Guide
6
Product Overview
Models of Cisco 880 Series ISRs
The Cisco 880 series ISRs have data and voice capabilities. Each router has one WAN port. In addition, routers
supporting voice have either FXS (Foreign Exchange Station) or BRI voice ports. Data or voice backup ports
are also available on most of the routers. The Cisco 880G routers come with a commercial third-generation
(3G) wireless interface card that provides cellular backup. 802.11b/g/n option is available on all models.
Table 8: Port Configurations of the Cisco 880 Series Data ISRs , on page 7 gives the port configurations
of Cisco 880 series data ISRs.
Table 8: Port Configurations of the Cisco 880 Series Data ISRs
Models of Cisco 880 Series ISRs
BackupWAN PortModel
Data 3GData ISDN
FE881 and 881W
FE881-V
FE881G and 881GW
—
xADSL2oPOTS886 and 886W
ADSL2oPOTS886G and 886GW
—
xADSL2oPOTS887 and 887W
ADSL2oPOTS887G and 887GW
—
——
——
x
—
x
—
x
xxVDSL2oPOTS887-VA-V
xVDSL2oPOTS887V and 887VW
VDSL2oPOTS887VG and 887VGW
—
xG.SHDSL888 and 888W
G.SHDSL888G and 888GW
—
—
x
—
x
xEFM over G.SHDSL888E and 888EW
xMultimodeC888EA-K9
—
—
Table 9: Port Configurations of Cisco 880 Series Voice ISRs , on page 8 gives the port configurations of
Cisco 880 series voice ISRs.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
7
Models of Cisco 880 Series ISRs
Table 9: Port Configurations of Cisco 880 Series Voice ISRs
Product Overview
BackupFXS Voice PortsWAN PortModel
PSTN BRIPSTN FXO
x4FEC881SRST and
—
C881SRSTW
4G.SHDSLC888SRST and
—
x
C888SRSTW
C888ESRST and
C888ERSTW
G.SHDSL
4EFM over
—
4
Table 10: Port Configurations of Cisco 880 Series Data and Voice ISRs , on page 8 gives the port
configurations of Cisco 881-V, Cisco887VA-V, and Cisco 887VA-V-W series ISRs.
Table 10: Port Configurations of Cisco 880 Series Data and Voice ISRs
WAN PortModel
BackupWLANPSTN BRIFXS Voice
Ports
Data (ISDN)PSTN FXO
24FEC881-V
—
24VDSL2/ADSL2C887VA-V
x24VDSL2/ADSL2C887VA-V-W
1
——
—
—
x
x
The Cisco 887 VA-V and Cisco 881-V routers give you the flexibility to use the FXS or BRI voice ports (The
Cisco 881-V router also supports a backup FX0 port), but the number of concurrent calls that the router
supports is limited by the codec complexity configuration. The router supports less calls when the codec
complexity setting is configured for high complexity. Table 11: Number of Concurrent Calls Supported on
Cisco 880 Series Data and Voice ISRs, on page 8 shows the number of concurrent calls that is supported
on the router for each codec complexity setting. Configuring the codec complexity setting to support secure
calls does not affect the numbers below.
Table 11: Number of Concurrent Calls Supported on Cisco 880 Series Data and Voice ISRs
High ComplexityMedium ComplexityFlexible ComplexityModel
689C881-V
688C887VA-V
688C887VA-V-W
Cisco 800 Series Integrated Services Routers Software Configuration Guide
8
Product Overview
Common Features of Cisco 880 Series ISRs
Cisco 880 series ISRs support the following features:
4-port 10/100 FE LAN Switch of Cisco 880 Series ISRs
This switch provides four ports for connecting to 10/100BASE-T FE LANs, access points, or IP phones. In
addition, an upgrade is available that gives Power over Ethernet (PoE) on two of the ports to provide power
to access points or phones.
802.11n Wireless LAN Option of Cisco 880 Series ISRs
The Cisco 880W series ISRs have an integrated 802.11b/g/n single radio module for wireless LAN connectivity.
With this module, the router can act as an access point in the local infrastructure.
Common Features of Cisco 880 Series ISRs
Real-Time Clock of Cisco 880 Series ISRs
A real-time clock (RTC) provides date and time when the system is powered on. The RTC is used to verify
the validity of the Certification Authority stored on the router.
Note
Cisco 881V Series Routers do not support BRI2 as a clock source. It supports only BRI1 as a clock source.
If you configure BRI2 as a clock source, the router will show a LINK DOWN message.
Security Features of Cisco 880 Series ISRs
The Cisco 880 Series ISRs provide the following security features:
Intrusion Prevention System (IPS)
•
Dynamic Multipoint VPN (DMVPN)
•
IPsec
•
Quality of service (QoS)
•
Firewall
•
URL filtering
•
Voice Features of Cisco 880 Series ISRs
The Cisco 880 voice and data platforms (C880SRST, C880SRSTW, C881-V, C887 VA-V, and C887VA-V-W)
support the following voice features:
Signaling protocols: Session Initiation Protocol (SIP), Media Gateway Control Protocol (MGCP), and
•
H323
Cisco 800 Series Integrated Services Routers Software Configuration Guide
9
Cisco 890 Series ISRs
Product Overview
Real-time transfer protocol (RTP), Cisco RTP (cRTP), and secure RTP (SRTP) for these signaling
• Dual tone multifrequency (DTMF) Relay—OOB and RFC2833
Silence suppression/comfort noise
•
G.711 (a-law and u-law), G.729A, G.729AB, G.729, G.729B, G.726
•
Support of SRST failover to a Foreign Exchange Office (FXO) or BRI backup port connected to PSTN
•
in case of WAN failure on C880SRST and C880SRSTW.
Support for SRST and CME requires user license, but only a 5-user license is supported on C881-V,
•
C887VA-V, and C887VA-V-W routers.
Direct inward dialing (DID) on FXS
•
Cisco 890 Series ISRs
The Cisco 890 series ISRs are fixed-configuration data routers. These routers have a Gigabit Ethernet WAN
port and data backup ports.
Table 12: Port Configurations of the Cisco 890 Series ISRs, on page 10 gives the port configurations for the
Cisco 890 Series ISRs.
Table 12: Port Configurations of the Cisco 890 Series ISRs
Data BackupWAN PortModel
xxGE891 and 891W
xGE892 and 892W
892F and 892F-W
7
GE copper port.
8
SFP port supports GE with fiber. For a complete list of SFPs supported, see the Cisco 892F ISR data sheet on Cisco.com.
8
xGE7or SFP
Some of the features supported on Cisco 890 series ISRs are given as follows:
—
—
ISDNV.92FE
—
x
x
8-port 10/100 FE LAN Switch of Cisco 890 Series ISRs
The 8-port 10/100 FE LAN switch provides eight ports for connecting to 10/100BASE-T FE LANs, access
points, or IP phones. In addition, an upgrade is available that gives PoE on four of the ports to provide power
to access points or phones.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
10
Product Overview
802.11n Wireless LAN Option of Cisco 890 Series ISRs
802.11n Wireless LAN Option of Cisco 890 Series ISRs
The Cisco 890W series ISRs have integrated 802.11b/g/n and 802.11a/n dual radio modules for wireless LAN
connectivity. With these modules, the router can act as an access point in the local infrastructure.
Real-Time Clock of Cisco 890 Series ISRs
A real-time clock (RTC) provides date and time when the system is powered on. The RTC is used to verify
the validity of the Certification Authority stored on the router.
Security Features of Cisco 890 Series ISRs
Cisco 890 Series ISRs provide the following security features:
Intrusion Prevention System (IPS)
•
Dynamic Multipoint VPN (DMVPN)
•
IPsec
•
Quality of service (QoS)
•
Firewall
•
URL filtering
•
Cisco 810 Series ISRs
This section provides information about the features supported by Cisco 810 series ISRs. In Cisco 810 series
ISRs, there are two different series of routers available - Cisco 812 series ISRs and Cisco 819 series ISRs.
This section contains the following topics:
Features of Cisco 812 Series ISRs
This section lists the software, platform, and security features supported by the Cisco 812 Series ISRs.
Note
The WAAS Express feature is not supported. This feature will be supported for 3G and 4G interfaces with
later IOS releases.
3G Features of Cisco 812 Series ISR
The 3rd Generation (3G) is a generation of standards for mobile technology that facilitates growth, increased
in bandwidth, and supports more diverse applications. The following 3G features are supported in Cisco 812
series ISR.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
11
Features of Cisco 812 Series ISRs
Modem control and management
•
Asynchronous transport (AT) command set
•
Wireless Host Interface Protocol (WHIP)
•
Control and Status (CNS) for out-of-band modem control and status
•
Diagnostic Monitor (DM) logging
•
Account provisioning
•
Modem firmware upgrade
•
SIM locking and unlocking
•
MEP unlocking
•
OMA-DM activation, voice-initiated data callback
•
Dual SIM card slots
•
Link persistence
•
Product Overview
SMS Services
•
Global Positioning System (GPS) Services
•
3G MIB
•
WLAN Features of Cisco 812 Series ISR
A Wireless Local Area Network (WLAN) implements a flexible data communication system frequently
augmenting rather than replacing a wired LAN within a building or campus. WLANs use radio frequency to
transmit and receive data over the air, minimizing the need for wired connections.
Cisco 812 ISR supports the following WLAN features:
Dual Radio of Cisco 812 Series ISR
The Cisco 802 Access Points (AP802) is an integrated access point on Cisco 812 ISRs. The access point is a
wireless LAN transceiver that acts as the connection point between wireless and wired networks or as the
center point of a standalone wireless network. In large installations, the roaming functionality provided by
multiple access points enables wireless users to move freely throughout the facility while maintaining
uninterrupted access to the network.
AP802 Dual Radio contains two different types of wirelesss radio that can support connections on both 2.4
Ghz used by 802.11b, 802.11g, and 802.11n and 5 Ghz used by 802.11a and 802.11n.
All the WLAN traffic for Cisco 812 ISR passes through the Ethernet WAN or 3G interface. The AP802 Dual
Radio is supported on the following SKUs:
C812G-CIFI+7-E-K9
•
C812G-CIFI+7-N-K9
•
C812G-CIFI-V-A-K9
•
C812G-CIFI-S-A-K9
•
Cisco 800 Series Integrated Services Routers Software Configuration Guide
12
Product Overview
Cleanair Technology of Cisco 812 Series ISR
The CleanAir is a new wireless technology that intelligently avoids Radio Frequency (RF) to protect 802.11n
performance. For more information, see Cisco CleanAir Technology . This feature is supported in all SKUs
that has WLAN support.
Dynamic Frequency Selection of Cisco 812 Series ISR
The Dynamic Frequency Selection (DFS) is the process of detecting radar signals that must be protected
against 802.11a interference and upon detection switching the 802.11a operating frequency to one that is not
interfering with the radar systems. Transmit Power Control (TPC) is used to adapt the transmission power
based on regulatory requirements and range information.
Features of Cisco 819 Series ISRs
Note
The DFS functionality is disabled for FCC SKUs pending FCC certification. For more information, see
Dynamic Frequency Selection and IEEE 802.11h Transmit Power Control .
Platform Features of Cisco 812 Series ISR
For the complete list of Cisco 812 ISR platform features, see Platform Features.
TFTP with Ethernet WAN Interface Feature of Cisco 812 Series ISR
For more information on TFTP download, see Disaster Recovery with TFTP Download .
Note
The Cisco 812 ISR has a GE interface as the only Ethernet interface. Hence, the port number is automatically
set at Rommon for TFTP connectivity.
SKU Information for Cisco 812 Series ISR
See the following link for SKUs available for Cisco 812 series ISR router:
The Cisco 810, 860, Cisco 880, and Cisco 890 ISRs ship with licensed software installed. Software features
may be upgraded and the software licenses may be managed through Cisco Licensing Manager . See Software
Activation On Cisco Integrated Services Routers and Cisco Integrated Service Routers G2 for details.
When you order a new router, you specify the software image and feature set that you want. The image and
feature set are installed on your router before you receive it, so you do not need to purchase a software license.
The router stores the software license file on the flash memory.
The Cisco 860VAE does not require licenses.Note
Cisco 800 Series Integrated Services Routers Software Configuration Guide
15
Selecting Feature Sets for Cisco 800 Series ISRs
Selecting Feature Sets for Cisco 800 Series ISRs
Some feature sets are bundled and offered with a software license that is installed on the hardware platforms.
For a list of features available with a software license on the Cisco 810, Cisco 860, Cisco 880, and Cisco 890
platforms, see Cisco 812 Data Sheet Cisco 819 Data Sheet , Cisco 860 Data Sheet , Cisco 880 Data Sheet ,
and Cisco 890 Data Sheet . See Cisco IOS Software Activation Tasks and Commands for details about how
to activate and manage the software licenses.
Product Overview
Cisco 800 Series Integrated Services Routers Software Configuration Guide
16
CHAPTER 2
Basic Router Configuration
This chapter provides procedures for configuring the basic parameters of your Cisco router, including global
parameter settings, routing protocols, interfaces, and command-line access. It also describes the default
configuration on startup.
Note
Individual router models may not support every feature described in this guide. Features that are not
supported by a particular router are indicated whenever possible.
This chapter includes configuration examples and verification steps, as available.
For complete information on how to access global configuration mode, see the Entering Global Configuration
Mode section.
Basic Router Configuration, page 17
•
Basic Router Configuration
This chapter provides procedures for configuring the basic parameters of your Cisco router, including global
parameter settings, routing protocols, interfaces, and command-line access. It also describes the default
configuration on startup.
Note
Individual router models may not support every feature described in this guide. Features that are not
supported by a particular router are indicated whenever possible.
This chapter includes configuration examples and verification steps, as available.
For complete information on how to access global configuration mode see Entering Global Configuration
Mode, page A-5 .
Interface Ports
Table 13: Supported Interfaces and Associated Port Labels for Cisco 860, 880 and 890 Series Router , on
page 18 lists the interfaces that are supported for Cisco 860, 880 and 890 series routers and their associated
port labels on the equipment.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
17
Interface Ports
Basic Router Configuration
Table 13: Supported Interfaces and Associated Port Labels for Cisco 860, 880 and 890 Series Router
WAN GE1Gigabit Ethernet WANCisco 866VAE-K9, 867VAE-K9
VDSL/ADSL OVER ISDNVDSL/ADSLoISDN WANCisco 866VAE, 866VAE-K9
VDSL/ADSL OVER POTSVDSL/ADSLoPOTS WANCisco 867VAE, 867VAE-K9
Cisco 800 Series Integrated Services Routers Software Configuration Guide
18
Basic Router Configuration
Table 14: Supported Interfaces and Port Labels for Cisco 810 Series ISR
Default Configuration
Port LabelInterfaceRouter
Default Configuration
When you first boot up your Cisco router, some basic configuration has already been performed. All of the
LAN and WAN interfaces have been created, console and vty ports are configured, and the inside interface
for Network Address Translation (NAT) has been assigned. Use the show running-config command to view
the initial configuration, as shown in the following example, for a Cisco 881W.
4-port Fast Ethernet LANCisco 819 Series Router
LAN, FE0–FE3
GE WAN 0Gigabit Ethernet WAN
SerialSerial
3G RSVDMini USB for 3G port Provisioning
CON/AUXConsole/Aux port
GE WAN 0Gigabit Ethernet WANCisco 812 Series Router
3G RSVDMini USB for 3G port Provisioning
CON/AUXConsole/Aux port
Router# show running-config
User Access Verification
Password:
Router> en
Password:
Router# show running-config
Building configuration...
Current configuration : 986 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$g4y5$NxDeM.0hON6YA51bcfGvN1
enable password ciscocisco
!
no aaa new-model
!
!
!
!
no ip routing
no ip cef
!
Cisco 800 Series Integrated Services Routers Software Configuration Guide
description Service Module interface to manage the embedded AP
ip unnumbered Vlan1
no cdp enable
arp timeout 0
!
ip route 0.0.0.0 0.0.0.0 10.1.1.1
!
!
no ip http server
no ip http secure-server
!
!
!
!
!
control-plane
!
!
line con 0
no modem enable
line aux 0
line vty 0 4
password cisco
login
transport input telnet ssh
!
scheduler max-task-time 5000
!
webvpn cef
end
Router#
Cisco 800 Series Integrated Services Routers Software Configuration Guide
20
Basic Router Configuration
Information Needed for Configuration
Gather the following information, depending on your planned network scenario, before configuring your
network:
If you are setting up an Internet connection, gather the following information:
•
PPP client name that is assigned as your login name
◦
PPP authentication type: Challenge Handshake Authentication Protocol (CHAP) or Password
◦
Authentication Protocol (PAP)
PPP password to access your ISP account
◦
DNS server IP address and default gateways
◦
If you are setting up a connection to a corporate network, you and the network administrator must
•
generate and share the following information for the WAN interfaces of the routers:
PPP authentication type: CHAP or PAP
◦
Information Needed for Configuration
PPP client name to access the router
◦
PPP password to access the router
◦
If you are setting up IP routing:
•
Generate the addressing scheme for your IP network.
◦
Determine the IP routing parameter information, including IP address and ATM permanent virtual
◦
circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual circuit
identifier (VCI), and traffic-shaping parameters.
Determine the number of PVCs that your service provider has given you, along with their VPIs
◦
and VCIs.
For each PVC, determine the type of AAL5 encapsulation supported. It can be one of the following:
◦
AAL5SNAP—This can be either routed RFC 1483 or bridged RFC 1483. For routed RFC 1483, the service
provider must provide you with a static IP address. For bridged RFC 1483, you may use DHCP to obtain your
IP address, or you may obtain a static IP address from your service provider.
AAL5MUX PPP—With this type of encapsulation, you need to determine the PPP-related configuration
items.
If you plan to connect over an ADSL or G.SHDSL line:
•
Order the appropriate line from your public telephone service provider.
◦
For ADSL lines—Ensure that the ADSL signaling type is DMT (also known as ANSI T1.413) or DMT Issue
2.
For G.SHDSL lines—Verify that the G.SHDSL line conforms to the ITU G.991.2 standard and supports
Annex A (North America) or Annex B (Europe).
If you are setting up 3G:
•
Cisco 800 Series Integrated Services Routers Software Configuration Guide
21
Information Needed for Configuration
You must have service availability on the Cisco 819 ISR from a carrier, and you must have network
◦
coverage where your router will be physically placed. For a complete list of supported carriers,
see the data sheet at Cisco 3G Wireless Connectivity Solutions.
You must subscribe to a service plan with a wireless service provider and obtain a SIM card.
◦
You must install the SIM card before configuring the 3G Cisco 819 ISR. For instructions on how
◦
to install the SIM card, see Cisco 800 Series see Configuring Cisco EHWIC and 880G for 3.7G
(HSPA+)/3.5G (HSPA)
You must install the required antennas before you configure the 3G for Cisco 819 ISR. See Table
◦
15: Instructions for Installing Antenna, on page 22 for instructions on how to install the antennas:
TNC Male-Terminated Portable Antenna (Cisco
3G-AE015-R). This document applies to both
3G-AE015-R and 3G-AE010-R. The only difference
between these two products is the length of the cable.
See Cisco 3G Omnidirectional Outdoor Antenna
(3G-ANTM-OUT-OM).
See Cisco Multiband Omnidirectional Panel-Mount
Antenna (3G-ANTM-OUT-LP).
See Cisco 3G Lightning Arrestor
(3G-ACC-OUT-LA).
4G-ANTM-OM-CM
See Cisco 4G Indoor Ceiling-Mount Omnidirectional
Antenna (4G-ANTM-OM-CM)
You must check your LEDs for signal reception as described in Table 2-1 .
•
◦
You should be familiar with the Cisco IOS software. See the Cisco IOS documentation beginning
◦
with Release 12.4(15)T or later for Cisco 3G support .
Cisco 800 Series Integrated Services Routers Software Configuration Guide
22
Basic Router Configuration
To configure your 3G data profile, you will need the username, password, and access point name
◦
(APN) from your service provider:
After collecting the appropriate information, perform a full configuration on your router beginning with the
tasks in Configuring Command-Line Access, on page 23.
If you plan to connect voice equipment, see Cisco IOS Voice Port Configuration Guide .
•
If you need to obtain or change software licenses, see Software Activation on Cisco Integrated Services
•
Routers and Cisco Integrated Service Routers G2 .
Configuring Command-Line Access
To configure parameters to control access to the router, perform the following steps, beginning in global
configuration mode:
SUMMARY STEPS
Configuring Command-Line Access
DETAILED STEPS
Step 1
Step 2
line [aux | console | tty | vty] line-number
1.
password password
2.
login
3.
exec-timeout minutes [seconds]
4.
line [aux | console | tty | vty] line-number
5.
password password
6.
login
7.
end
8.
line [aux | console | tty | vty] line-number
Example:
Router(config)# line console 0
password password
Example:
PurposeCommand or Action
Enters line configuration mode and specifies the type of line.
This example specifies a console terminal for access.
Specifies a unique password for the console terminal line.
Step 3
Router(config-line)# password 5dr4Hepw3
Enables password checking at terminal session login.login
Example:
Router(config-line)# login
Cisco 800 Series Integrated Services Routers Software Configuration Guide
23
Configuring Global Parameters
Basic Router Configuration
PurposeCommand or Action
Step 4
Step 5
Step 6
Step 7
Step 8
exec-timeout minutes [seconds]
Example:
Router(config-line)# exec-timeout 5 30
line [aux | console | tty | vty] line-number
Example:
Router(config-line)# line vty 0 4
password password
Example:
Router(config-line)# password aldf2ad1
Example:
Router(config-line)# login
end
Example:
Sets the time interval that the EXEC command interpreter waits
until user input is detected. The default is 10 minutes. Optionally,
add seconds to the interval value.
This example shows a timeout of 5 minutes and 30 seconds.
Entering a timeout of 0 0 specifies never to time out.
Specifies a virtual terminal for remote console access.
Specifies a unique password for the virtual terminal line.
Enables password checking at the virtual terminal session login.login
Exits line configuration mode, and returns to privileged EXEC
mode.
Router(config-line)# end
Configuring Global Parameters
To configure selected global parameters for your router, perform these steps:
SUMMARY STEPS
configure terminal
1.
hostname name
2.
enable secret password
3.
no ip domain-lookup
4.
DETAILED STEPS
Step 1
PurposeCommand or Action
Enters global configuration mode when using the console port.configure terminal
Cisco 800 Series Integrated Services Routers Software Configuration Guide
24
Basic Router Configuration
Example:
Example:
Router# configure terminal
Configuring WAN Interfaces
PurposeCommand or Action
If you are connecting to the router using a remote terminal, use
the following:
telnet router name or address
Login: login id
Password: *********
Router> enable
Step 2
Step 3
Step 4
hostname name
Example:
Example:
Router(config)# hostname Router
enable secret password
Example:
Example:
Router(config)# enable secret cr1ny5ho
no ip domain-lookup
Example:
Example:
Router(config)# no ip domain-lookup
Specifies the name for the router.
Specifies an encrypted password to prevent unauthorized access
to the router.
Disables the router from translating unfamiliar words (typos)
into IP addresses.
Configuring WAN Interfaces
Configure the WAN interface for your router using one of the following as appropriate:
Configuring a Fast Ethernet WAN Interface
To configure the Fast Ethernet interface on a Cisco 861 or 881 ISR, perform these steps, beginning in global
configuration mode:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
25
Configuring WAN Interfaces
SUMMARY STEPS
DETAILED STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
exit
4.
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Router(config)# interface fastethernet 4
ip address ip-address mask
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
exit
Example:
Router(config-if)# exit
What to Do Next
Enters the configuration mode for a Fast Ethernet WAN
interface on the router.
Sets the IP address and subnet mask for the specified Fast
Ethernet interface.
Enables the Ethernet interface, changing its state from
administratively down to administratively up.
Exits configuration mode for the Fast Ethernet interface and
returns to global configuration mode.
Note
Cisco IOS Release 15.1 (3) T introduces the batch command under the interface mode. You may notice
a reduced CPU utilization when interface batching is enabled because packets are processed in batches
resulting in more efficient cache usage.
Configuring the Media Type
Before configuring the Gigabit Ethernet interface on the Cisco 892F ISRs, you must first select the media
type as either SFP or RJ45.
To configure the media type, perform the following steps, begining in global configuration mode:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
26
Basic Router Configuration
SUMMARY STEPS
DETAILED STEPS
interface type number
1.
media-type {sfp | rj45}
2.
exit
3.
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
interface type number
Example:
Router(config)# interface gigabitethernet 0
Example:
Router(config-if)# media-type sfp
Example:
OR
Example:
Router(config-if)# media-type rj45
exit
Example:
Router(config-if)# exit
Enters the configuration mode for a Gigabit Ethernet WAN
interface on the router.
Specifies an SFP physical connection.media-type {sfp | rj45}
OR
Specifies an RJ-45 physical connection.
Exits configuration mode for the Gigabit Ethernet interface
and returns to global configuration mode.
Configuring a Gigabit Ethernet WAN Interface
To configure the Gigabit Ethernet (GE) WAN interface on a Cisco 891, 892, or 860VAE ISR, perform these
steps, beginning in global configuration mode:
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
exit
4.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
27
Configuring WAN Interfaces
DETAILED STEPS
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Router(config)# interface gigabitethernet 1
ip address ip-address mask
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
exit
Example:
Router(config-if)# exit
Example:
Router(config)#
Enters the configuration mode for a Gigabit Ethernet WAN
interface on the router.
Sets the IP address and subnet mask for the specified Gigabit
Ethernet interface.
Enables the Ethernet interface, changing its state from
administratively down to administratively up.
Exits configuration mode for the Gigabit Ethernet interface
and returns to global configuration mode.
Configuring a V.92 Modem Interface
The Cisco 891 ISR has a V.92 modem backup interface. To configure this interface, perform these steps,
beginning in global configuration mode:
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
encapsulation ppp
3.
dialer in-band
4.
dialer string dial-string
5.
dialer-group group-number
6.
async mode dedicated
7.
exit
8.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
28
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Example:
Router(config)# interface async 1
ip address ip-address mask
Example:
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
encapsulation ppp
Example:
Example:
Router(config-if)# encapsulation ppp
Enters the configuration mode for a V.92 WAN interface
(serial interface) on the router.
Sets the IP address and subnet mask for the specified V.92
interface.
Sets the encapsulation method to point-to-point protocol
(PPP) for the serial interface.
Specifies that dial-on-demand routing (DDR) is supported.dialer in-band
Step 5
Step 6
Example:
Example:
Router(config-if)# dialer in-band
dialer string dial-string
Example:
Example:
Router(config-if)# dialer string 102
dialer-group group-number
Example:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Specifies the string (telephone number) to be used when
placing a call from the interface.
Configures the interface to belong to a specific dialing
access group.
29
Configuring WAN Interfaces
Step 7
Step 8
Example:
Router(config-if)# dialer-group 1
async mode dedicated
Example:
Example:
Router(config-if)# async mode dedicated
exit
Example:
Basic Router Configuration
PurposeCommand or Action
Places the line into dedicated asynchronous mode using
Serial Line Internet Protocol (SLIP) or PPP encapsulation.
Exits configuration mode for the V.92 interface and returns
to global configuration mode.
Example:
Router(config-if)# exit
Example:
Router(config)#
Configuring a VDSL2 WAN Interface
The VDSL2 WAN interface is used on the Cisco 887V ISR platforms. Note that the VDSL2 WAN interface
uses Ethernet as the Layer 2 transport mechanism.
To configure VDSL2 on the Cisco 887V ISR, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
controller vdsl 0
1.
interface type number
2.
ip address ip-address mask
3.
shutdown
4.
no shutdown
5.
exit
6.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
30
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
controller vdsl 0
Example:
Example:
Router(config)# controller vdsl 0
interface type number
Example:
Example:
Router(config)# interface ethernet 0
Example:
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
shutdown
Example:
Enters controller configuration mode and the controller number.
Note
There is no need to configure any VDSL2 parameters
from CPE side. Any specific VDSL2 settings should
be set on the DSLAM side.
Enters the configuration mode for Ethernet Layer 2 transport on
the VDSL WAN interface on the router.
Sets the IP address and subnet mask for the interface.ip address ip-address mask
Disables the interface, changing its state from administratively
up to administratively down.
Step 5
Step 6
Example:
Router(config-if)# shutdown
no shutdown
Example:
Example:
Router(config-if)# no shutdown
exit
Example:
Enables the interface, changing its state from administratively
down to administratively up.
Exits configuration mode and returns to global configuration
mode.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
31
Configuring WAN Interfaces
PurposeCommand or Action
Example:
Router(config-if)# exit
Configuring ADSL or VDSL on Cisco 860VAE and 880VA Multimode ISRs
This section contains the following topics:
Overview of Cisco 860VAE, 886VA, and 887VA Multimode ISRs
The Cisco customer premise equipment (CPE) Cisco 866VAE, 867VAE, 866VAE-K9, 867VAE-K9, 886VA
and 887VA integrated services routers (ISRs) support asymmetric digital subscriber line (ADSL) 1/2/2+ and
very high speed digital subscriber line 2 (VDSL2) transmission modes, also called multimode.
Basic Router Configuration
Note
The 866VAE and 886VA support xDSL over ISDN. The 867VAE and 887VA support xDSL over a plain
old telephone system (POTS).
The default CPE operating mode is auto. Auto mode means that the CPE trains up to the mode configured on
the digital subscriber line access multiplexer (DSLAM), ADSL1/2/2+, or VDSL2.
The following examples assume the DSLAM is configured in either ADSL2+ mode or VDSL2 mode, and
the CPE is configured in auto mode.
Figure 1: Example Topology, on page 32 shows an ATM WAN or Ethernet WAN network topography.
Figure 1: Example Topology
Cisco 800 Series Integrated Services Routers Software Configuration Guide
32
Basic Router Configuration
Configuring WAN Interfaces
1
2Fast Ethernet LAN
interface or
Gigabit Ethernet LAN
interface
ATM WAN
interface—ADSL 1/2/2+
mode or
Ethernet WAN
Interface—VDSL2 mode
Note
A DSLAM in Layer 1 mode may be configured for auto mode. A DSLAM in Layer 2 mode must be
configured for ATM mode or packet transfer mode (PTM).
Cisco 886VA and 887VA allow a maximum of four permanent virtual circuits (PVCs).Note
Note
Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs allow a maximum of
two PVCs.
ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs
Annex M is an enhancement of the G.992.3 standard that doubles the upstream bandwidth by "borrowing"
32 additional tones from the downstream frequency range. This feature enables service providers to provision
symmetric data rates for ADSL2 and ADSL2+ services with data rates up to 2 Mbps.
Cisco IOS Release 15.2(1)T adds support for enabling Annex M data structures on Cisco 887VA platforms
and Annex A data structures on Cisco 887VA-M platforms. This features allows both Annex A and Annex
M structures to be run on the same platform with a performance tradeoff for the annex that is not optimized
for the device. With this feature implementation, the modes supported on Annex A platforms are the same as
the modes supported on Annex M platforms (887VA-M and EHWIC-1DSL-VA-M). When digital subscriber
line access multiplexer (DSLAM) supports Annex M, Annex M mode takes precedence over Annex A mode.
Note
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this
feature.
For information on configuring Annex M data structures on Annex A platforms, see the, Enabling ADSL2/2+
Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs, on page 46.
Configuring Seamless Rate Adaption
ADSL connections can be dropped due to a number of reasons, such as crosstalk, changes in noise margin,
temperature changes, or interference. ADSL2 addresses these problems by adapting the data rate in real-time.
Seamless rate adaptation (SRA) enables the ADSL2 system to change the data rate of the connection during
operation without any service interruption or bit errors.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
33
Configuring WAN Interfaces
These features are not currently available on the 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9.Note
For information on configuring SRA, see the Enabling Seamless Rate Adaption , on page 47.
Configuring UBR+
UBR is typically used for data communications applications, such as file transfer and email. UBR is a best
effort service and is the lowest class of service in the hierarchy. There are no guarantees to the actual bandwidth
allowed. Therefore, UBR virtual circuits (VCs) are susceptible to a large number of cell drops or a high cell
transfer delay as cells move from the source to the destination. UBR has no bounds on Cell Delay Variation
Tolerance (CDVT) and is only a best effort service.
UBR+ is a special ATM service class developed by Cisco. UBR defines only peak cell rate (PCR); however,
UBR+ defines a minimum guaranteed cell rate (MCR) and (on the switch) a cell delay variation tolerance
(CDVT).
Basic Router Configuration
Note
On Cisco IOS versions 15.2(1)T and later, UBR+ is compatable with Cisco Multimode 886VA and 887VA
routers.
These features are not currently available on the 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9.Note
For information on configuring UBR+, see the Configuring UBR+, on page 49.
Configuring ADSL Mode
Configuration tasks
Perform the following tasks to configure ADSL mode:
Configuring ADSL Auto Mode
Perform these steps to configure the DSL controller to auto mode, starting in global configuration mode.
Configure the DSLAM in ADSL 1/2/2+ mode prior to configuring the router.Note
Enters global configuration mode.configure terminal
Enters config mode for the VDSL controller.controller vdsl slot
Configures the operating mode. The default is auto and is
recommended.
Note
When configured in auto, the operating mode does not
appear in the show running command.
Example:
Router(config-controller)# operating mode
auto
Step 5
Example:
Example:
Router(config-controller)# end
Example:
Router#
Configuring CPE and Peer for ADSL Mode
When configuring for ADSL, the ATM main interface or ATM sub-interface must be configured with a PVC
and an IP address, perform a no shutdown command on the interface if needed.
Exits the configuration mode and enters EXEC mode.end
Note
A reload is required after changing mode between adsl
and vdsl for Cisco 866VAE, Cisco 867VAE, Cisco
866VAE-K9, and Cisco 867VAE-K9.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
35
Configuring WAN Interfaces
Configuring the ATM CPE side
Perform the following steps to configure the ATM CPE side, starting in global configuration mode.
Router(config-if-atm-vc)# protocol ip 30.0.0.1
broadcast
Enables the ATM0.1 point-to-point interface.interface atm0.1 point-to-point
Enters IP address and subnet mask.ip address ip-address mask
Creates or assigns a name to an ATM PVC and enters
the ATM virtual circuit configuration mode.
Configures a static map for an ATM PVC.protocol protocol {protocol-address [virtual-template] |
Exits the configuration mode and enters EXEC mode.end
Example:
Router(config-if-atm-vc)# end
ADSL Configuration Example
The following example shows a typical ADSL2+ configuration set to auto mode. Outputs in bold are critical.
Router# show running
Building configuration...
Current configuration : 1250 bytes
!
! Last configuration change at 02:07:09 UTC Tue Mar 16 2010
!
version 15.1
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
Cisco 800 Series Integrated Services Routers Software Configuration Guide
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
!
!
!
!
!
control-plane
!
Configuring WAN Interfaces
no ip address
shutdown
no fair-queue
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
no ip address
no atm ilmi-keepalive
ip address 30.0.0.1 255.255.255.0
pvc 15/32
protocol ip 30.0.0.2 broadcast
no ip address
Cisco 800 Series Integrated Services Routers Software Configuration Guide
39
Configuring WAN Interfaces
!
line con 0
no modem enable
line aux 0
line vty 0 4
login
transport input all
!
exception data-corruption buffer truncate
end
Verifying ADSL Configuration
Verify that the configuration is set properly by using the show controller vdsl 0 command from the privileged
EXEC mode. Outputs in bold are critical.
Router# show controller vdsl 0
Controller VDSL 0 is UP
Daemon Status:Up
Chip Vendor ID:'BDCM''BDCM'
Chip Vendor Specific:0x00000x6110
Chip Vendor Country:0xB5000xB500
Modem Vendor ID:'CSCO''BDCM'
Modem Vendor Specific: 0x46020x6110
Modem Vendor Country:0xB5000xB500
Serial Number Near:FHK1313227E 887-V2-K 15.1(20100
Serial Number Far:
Modem Version Near:15.1(20100426:193435) [changahn
Modem Version Far:0x6110
Modem Status:TC Sync (Showtime!)
DSL Config Mode:AUTO
Trained Mode:G.992.5 (ADSL2+) Annex A
TC Mode:ATM
Selftest Result:0x00
DELT configuration:disabled
DELT state:not running
Trellis:ONON
Line Attenuation:1.0 dB1.4 dB
Signal Attenuation:1.0 dB0.0 dB
Noise Margin:6.8 dB13.6 dB
Attainable Rate:25036 kbits/s1253 kbits/s
Actual Power:13.7 dBm12.3 dBm
Total FECS:00
Total ES:00
Total SES:00
Total LOSS:00
Total UAS:00
Total LPRS:00
Total LOFS:00
Total LOLS:00
Bit swap:1637
Full inits:32
Failed full inits:0
Short inits:0
Failed short inits:0
FirmwareSourceFile Name (version)
Enters config mode for the VDSL controller.controller vdsl slot
Configures the operating mode. The default is auto and is
recommended.
Note
When configured in auto, the operating mode does not
appear in the show running command.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
41
Configuring WAN Interfaces
Basic Router Configuration
PurposeCommand or Action
Step 3
Example:
Router(config-controller)# end
Router#
Configuring CPE and Peer for VDSL Mode
When configuring VDSL, configure the ethernet 0 interface and perform a no shutdown command on the
interface if needed. Start in the global configuration mode.
Configuring the VDSL CPE Side
Perform the following steps to configure the VDSL CPE side, starting in the global configuration mode.
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
end
4.
Exits the configuration mode and enters EXEC mode.end
Note
A reload is required after changing the mode on the Cisco
866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco
867VAE-K9.
DETAILED STEPS
Step 1
Step 2
Step 3
Example:
Router(config)# interface ethernet0
Example:
Router(config-if)# ip address 90.0.0.1
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
PurposeCommand or Action
Enters configuration mode for the Ethernet interface 0.interface type number
Enters the IP address and subnet mask.ip address ip-address mask
Enables the configuration changes to the ip address and
subnet mask.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
42
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 4
Example:
Router(config-if)# end
Configuring the VDSL Peer Side
Perform the following steps to configure the VDSL Peer side, starting in the global configuration mode.
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
end
4.
DETAILED STEPS
Step 1
Exits the configuration mode and enters EXEC mode.end
PurposeCommand or Action
Enters configuration mode for the Ethernet interface 0.interface type number
Step 2
Step 3
Step 4
Example:
Router(config)# interface ethernet0
Example:
Router(config-if)# ip address 90.0.0.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
Example:
Router(config-if)# end
Configures the IP address and subnet mask.ip address ip-address mask
Enables the configuration changes to the IP address and
subnet mask.
Exits the configuration mode and enters EXEC mode.end
Cisco 800 Series Integrated Services Routers Software Configuration Guide
43
Configuring WAN Interfaces
VDSL Configuration Example
The following example shows a typical output of a VDSL configuration. Outputs in bold are critical.
Router# show running
Building configuration...
Current configuration : 1250 bytes
!
! Last configuration change at 02:07:09 UTC Tue Mar 16 2010
!
version 15.1
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
no aaa new-model
memory-size iomem 10
ip source-route
!
!
!
!
ip cef
no ipv6 cef
!
!
!
!
license udi pid CISCO887-V2-K9 sn FHK1313227E
license boot module c880-data level advipservices
!
!
vtp domain cisco
vtp mode transparent
!
!
controller VDSL 0
!
vlan 2-4
!
!
!
!
!
interface Ethernet0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
!
!
!
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
!
exception data-corruption buffer truncate
end
Configuring WAN Interfaces
no ip address
no modem enable
login
transport input all
Verifying VDSL Configuration
Verify the configuration is set properly by using the show controller vdsl 0 command from privileged EXEC
mode. Outputs in bold are critical.
Router# show controller vdsl 0
Controller VDSL 0 is UP
Daemon Status:Up
Chip Vendor ID:'BDCM''BDCM'
Chip Vendor Specific:0x00000x0000
Chip Vendor Country:0xB5000xB500
Modem Vendor ID:'CSCO''BDCM'
Modem Vendor Specific: 0x46020x0000
Modem Vendor Country:0xB5000xB500
Serial Number Near:FHK1313227E 887-V2-K 15.1(20100
Serial Number Far:
Modem Version Near:15.1(20100426:193435) [changahn
Modem Version Far:0x0000
Modem Status:TC Sync (Showtime!)
DSL Config Mode:AUTO
Trained Mode:G.993.2 (VDSL2) Profile 12a
TC Mode:PTM
Selftest Result:0x00
DELT configuration:disabled
DELT state:not running
Trellis:ONOFF
Line Attenuation:1.0 dB0.0 dB
Signal Attenuation:1.0 dB0.0 dB
Noise Margin:12.0 dB9.5 dB
Attainable Rate:87908 kbits/s50891 kbits/s
Actual Power:13.5 dBm8.9 dBm
Per Band Status:D1D2D3U0U1U2U3
Line Attenuation(dB):0.92.3N/A7.22.97.0N/A
Signal Attenuation(dB): 0.92.3N/AN/A2.36.6N/A
Noise Margin(dB):14.59.3N/AN/AN/AN/AN/A
Total FECS:00
Total ES:00
Total SES:00
Total LOSS:00
XTU-R (DS)XTU-C (US)
Cisco 800 Series Integrated Services Routers Software Configuration Guide
45
Configuring WAN Interfaces
Total UAS:00
Total LPRS:00
Total LOFS:00
Total LOLS:00
Bit swap:10
Full inits:33
Failed full inits:0
Short inits:0
Failed short inits:0
FirmwareSourceFile Name (version)
Speed (kbps):084999048968
Previous Speed:02418401047
Reed-Solomon EC:0000
CRC Errors:0000
Header Errors:0000
Interleave (ms):0.006.000.000.00
Actual INP:0.000.000.000.00
Training Log : Stopped
Training Log Filename : flash:vdsllog.bin
Router#
Basic Router Configuration
DS Channel1DS Channel0US Channel1US Channel0
Verifying CPE to Peer Connection for VDSL
Ping the peer to confirm that CPE to peer configuration is setup correctly.
Router# ping 30.0.0.2 rep 20
Type escape sequence to abort.
Sending 20, 100-byte ICMP Echos to 30.0.0.2, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!
Success rate is 100 percent (20/20), round-trip min/avg/max = 20/22/28 ms
Router#
Enabling ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs
This feature requires Cisco IOS Release 15.2(1)T or a later.Note
Note
Configuring ADSL2/2+ Annex M mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs.
SUMMARY STEPS
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this
feature.
enable
1.
configure terminal
2.
controller vdsl 0
3.
operating mode {adsl1 | adsl2 annex a | annex m | adsl2+ annex a | annex m] | ansi | auto| vdsl2}
4.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
46
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Router> enable
Example:
Router# configure terminal
operating mode {adsl1 | adsl2 annex
a | annex m | adsl2+ annex a | annex
m] | ansi | auto| vdsl2}
Example:
Router(config-controller)#
operating mode adsl2+ annex m
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Enters configuration mode for the VDSL controller.controller vdsl 0
asdl1—Configures operation in ITU G.992.1 Annex A full-rate mode.
adsl2—Configures operation in ADSL2 operating mode-ITU G.992.3 Annex A,
Annex L, and Annex M. If an Annex operating mode is not chosen, Annex A,
Annex L, and Annex M are enabled. The final mode is decided by negotiation with
the DSL access multiplexer (DSLAM).
adsl2+—Configures operation in ADSL2+ mode-ITU G.992.5 Annex A and
AnnexM. If an Annex A operating mode is not chosen, both Annex and Annex M
is enabled. The final mode is decided by negotiation with DSLAM.
ansi—Configures a router to operate in ANSI full-rate mode-ANSI T1.413.
auto—Default setting. Configures the router so that the DSLAM automatically
picks the DSL operating mode, in the sequence described in the "Usage Guidelines"
section. All supported modes are enabled.
vdsl2—Configures operation in ITU G.993.2 mode.
annex a, m—(Optional) If the annex option is not specified, both Annex A and
Annex M are enabled. The final mode is decided by negotiation with the Digital
Synchronous Line Access Multiplexer (DSLAM).
Enabling Seamless Rate Adaption
To enable SRA, perform the following steps.
SRA mode is disabled by default.Note
SRA requires Cisco IOS Release 15.2(1)T or a later release.Note
Cisco 800 Series Integrated Services Routers Software Configuration Guide
47
Configuring WAN Interfaces
SUMMARY STEPS
DETAILED STEPS
These features are not currently available on the Cisco 866VAE, 867VAE, 866VAE-K9, or 867VAE-K9.Note
enable
1.
configure terminal
2.
controller vdsl x/y/z
3.
sra
4.
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Router# enable
Example:
Router# configure terminal
controller vdsl x/y/z
Example:
Router(config)# controller vdsl 0/0/0
Example:
router(config-controller)# sra
Enables privileged EXEC mode.enable
Enter your password if prompted.
•
Enters global configuration mode.configure terminal
Enters controller configuration mode. Use the controller vdsl
command in global configuration mode. This command does not
have a no form.
x—Defines the network module.
y—Defines the slot number.
z—Defines the port number.
Enables SRA mode.sra
Use the no form of the command to disable SRA.
Example Configuration: Seamless Rate Adaption
The following example enables SRA on a VDSL line:
!
!
!
rotuer>enable
router# configure terminal
Cisco 800 Series Integrated Services Routers Software Configuration Guide
48
Basic Router Configuration
Enter configuration commands, one per line. End with CNTL/Z
router(config)# controller vdsl 0
router(config-controller)# sra
router(config-controller)# end
router#
!
!
!
Configuring UBR+
Perform the following steps to configure UBR+.
Configuring WAN Interfaces
Note
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
Router> enable
Step 2
Cisco IOS Release 15.2(1)T or a later release is required to run UBR+ on Cisco 886VA, 887VA, and
887VA-M routers.
These features are not currently available on the Cisco 866VAE, 867VAE, 866VAE-K9, or 867VAE-K9.Note
Configures unspecified bit rate (UBR) quality of service (QoS) and specifies the
output peak cell rate and output minimum guaranteed cell rate for an ATM
permanent virtual circuit (PVC), PVC range, switched virtual circuit (SVC),
virtual circuit (VC) class, or VC bundle member.
To remove the UBR+ parameters, use the no form of this command.
output-pcr—The output peak cell rate (PCR) in kbps.
output-mcr—The output minimum guaranteed cell rate in kbps.
input-pcr—(Optional for SVCs only) The input PCR in kbps. If this value is
omitted, the input-pcr equals the output-pcr.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
49
Configuring WAN Interfaces
UBR+ Example
The following example configures UBR+ PVC on a DSL line:
interface atm 0/0
pvc 4/100
ubr+ 2304 2304
The following example specifies the output-pcr argument for an ATM PVC to be 100000 kbps and the output-mcr
to be 3000 kbps:
Basic Router Configuration
PurposeCommand or Action
input-mcr—(Optional for SVCs only) The input minimum guaranteed cell rate
in kbps. If this value is omitted, the input-mcr equals the output-mcr.
Troubleshooting
pvc 1/32
ubr+ 100000 3000
The following example specifies the output-pcr, output-mcr, input-pcr, and input-mcr arguments for an ATM
SVC to be 10000 kbps, 3000 kbps, 9000 kbps, and 1000 kbps, respectively:
There are no new commands for checking traffic on the Cisco 886VA and 887VA. Some helpful commands
include the following show commands:
show interface Ethernet0
•
show interface ATM0
•
show interface summary
•
show controller vdsl 0
•
show controller atm0
•
show controller vdsl 0 datapath
•
show atm pvc
•
The “Cisco 860, Cisco 880, and Cisco 890 Series Integrated Services Routers Software Configuration Guide,
Troubleshooting” section may also be helpful.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
50
Basic Router Configuration
Configuring the Training Log Using the CLI
When you initiate the training log capture using the debug vdsl 0 training log on the Cisco 866VAE, Cisco
867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs, the training log file opens. Any messages that
are generated are buffered locally and are written to the training log file at 5k bytes per interval. The messages
are not written all at one time, as in previous software versions that supported the training log capture feature.
Configuring WAN Interfaces
Note
A maximum log capacity of 8MB (approximately 1 hour of capture) exists on the Cisco 866VAE, Cisco
867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs. Because of this capacity limitation, when the
entire log collection exceeds 8MB, the log capture is automatically terminated.
Note
Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs do not support the
continuous training log autostop feature.
Capturing the Training Log
By default the training log is saved to flash:vdsllog.bin.
To start the training log capture, use the debug vdsl 0 training log command.
Router# debug vdsl 0 training log
Router#
The following confirmation is displayed:
Training log generation started for VDSL 0
Halting the Training Log Capture
To stop the training log capture, use the no debug vdsl 0 training log command.
Router# no debug vdsl 0 training log
Router#
The following confirmation is displayed:
Training Log file for VDSL written to flash:vdsllog.bin
Displaying the Training Log Status and File Location
To display the training log status and file location, use the show controller vdsl 0 command.
Router# show controller vdsl 0
Router#
The following confirmation is displayed:
Controller VDSL 0 is UP
Daemon Status:NA
XTU-R (DS)XTU-C (US)
Chip Vendor ID:'BDCM''BDCM'
Cisco 800 Series Integrated Services Routers Software Configuration Guide
51
Configuring WAN Interfaces
Chip Vendor Specific:0x00000x938C
Chip Vendor Country:0xB5000xB500
Modem Vendor ID:'CSCO''BDCM'
Modem Vendor Specific: 0x46020x938C
Modem Vendor Country:0xB5000xB500
Serial Number Near:GMH1049001M 867VAE-K 15.1(20110
Serial Number Far:
Modem Version Near:15.1(20110422:230431) [suguraja
Modem Version Far:0x938C
Modem Status:TC Sync (Showtime!)
DSL Config Mode:AUTO
Trained Mode:G.992.5 (ADSL2+) Annex A
TC Mode:ATM
Selftest Result:0x00
DELT configuration:disabled
DELT state:not running
Trellis:ONON
Line Attenuation:0.0 dB0.0 dB
Signal Attenuation:0.0 dB0.0 dB
Noise Margin:16.0 dB14.6 dB
Attainable Rate:28516 kbits/s1222 kbits/s
Actual Power:7.0 dBm12.4 dBm
Total FECS:30
Total ES:00
Total SES:00
Total LOSS:00
Total UAS:147147
Total LPRS:00
Total LOFS:00
Total LOLS:00
Bit swap:00
Full inits:1
Failed full inits:0
Short inits:0
Failed short inits:0
ip address 2.15.15.26 255.255.255.0
!
ip forward-protocol nd
ip route 223.255.254.254 255.255.255.255 Vlan1
no ip http server
no ip http secure-server
!
Configuring WAN Interfaces
Verifying G.SHDSL WAN Interface Configuration
To verify that you have properly configured the router, enter the show running command and look for controller
DSL and interface ATM0 parameters.
Router# show running
Building configuration...
Current configuration : 1298 bytes
!
.......
!
controller DSL 0
mode atm
line-term cpe
line-mode 4-wire standard
dsl-mode shdsl symmetric annex B
line-rate 4608
!
!
interface ATM0
Cisco 800 Series Integrated Services Routers Software Configuration Guide
55
Configuring WAN Interfaces
ip address 10.10.10.1 255.255.255.0
no atm ilmi-keepalive
pvc 0/31
protocol ip 10.10.10.5 broadcast
encapsulation aal5snap
!
Configuring a G.SHDSL WAN Interface in EFM mode
To configure G.SHDSL on the Cisco 888E ISR, perform Configuring Cisco G.SHDSL EFM HWICs in Cisco
The Cisco 880 series and Cisco 810 series ISRs provide a third generation (3G) wireless interface for use over
Global System for Mobile Communications (GSM) and code division multiple access (CDMA) networks.
The interface is a 34-mm PCMCIA slot for Cisco 880 series.
Its primary application is WAN connectivity as a backup data link for critical data applications. However, the
3G wireless interface can also function as the primary WAN connection for the router.
To configure the 3G cellular wireless interface, follow these guidelines and procedures:
Basic Router Configuration
Prerequisites for Configuring the 3G Wireless Interface
The following are prerequisites to configuring the 3G wireless interface:
You must have wireless service from a carrier, and you must have network coverage where your router
•
will be physically placed. For a complete list of supported carriers, see the data sheet at:
You must subscribe to a service plan with a wireless service provider and obtain a SIM card (GSM
•
modem only) from the service provider.
You must check your LEDs for signal strength, as described in Table 16: Front Panel LED Signal
•
Strength Indications, on page 57.
You should be familiar with the Cisco IOS software, beginning with Cisco NX-OS Release 4.1 or later.
•
For Cisco 3G Wireless support, see the Cisco IOS documentation.
To configure your GSM data profile, you need the following information from your service provider:
•
Username
◦
Password
◦
Access point name (APN)
◦
To configure your CDMA data profile for manual activation, you need the following information from
•
your service provider:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
56
Basic Router Configuration
Table 16: Front Panel LED Signal Strength Indications
Master Subsidy Lock (MSL) number
◦
Mobile Directory number (MDN)
◦
Mobile Station Identifier (MSID)
◦
Electronic Serial Number (ESN)
◦
9
AmberP3G RSSI
Configuring WAN Interfaces
Signal StrengthLED ColorLED
No service available and no RSSI
detected
Solid green
Fast (16 Hz) blinking green
Slow (1 Hz) blinking green
Off
9
3G RSSI = 3G receive signal strength indication.
Restrictions for Configuring the Cellular Wireless Interface
The following restrictions apply to configuring the Cisco 3G wireless interface:
A data connection can be originated only by the 3G wireless interface. Remote dial-in is not supported.
•
Because of the shared nature of wireless communications, the experienced throughput varies depending
•
on the number of active users or the amount of congestion in a given network.
Cellular networks have higher latency than wired networks. Latency rates depend on the technology and
•
carrier. Latency may be higher when there is network congestion.
VoIP is not currently supported.
•
High RSSI (–69 dBm or higher)
Medium RSSI (–89 to –70 dBm)
Low to medium RSSI (–99 to –90
dBm), minimum level for a reliable
connection
Low RSSI (less than –100 dBm)
Any restrictions that are part of the terms of service from your carrier also apply to the Cisco 3G wireless
•
interface.
Cisco 880G ISR does not support online insertion and removal (OIR) of 3G modems. To replace a
•
modem with another modem of the same type, use the Cisco CLI to enter the shutdown command on
the cellular interface before you replace the modems. =
When a 3G modem is removed, the show interface cellular 0, show run, and show version command
•
outputs still display cellular interface related information. The show interface command displays the
following message, all other show commands have empty outputs.
3G Modem not inserted
Cisco 800 Series Integrated Services Routers Software Configuration Guide
57
Configuring WAN Interfaces
You can configure the cellular interface when the 3G modem is removed. However, the configuration
•
is not effective until the 3G modem is inserted. The following message is shown when trying to configure
the cellular interface while the modem is absent.
Router(config)# interface cellular 0
Warning: 3G Modem is not inserted
Configuration will not be effective until modem is inserted =
Inserting a different type of modem than was previously removed requires configuration changes and
•
you must reload the system.
Data Account Provisioning
Basic Router Configuration
Note
To provision your modem, you must have an active wireless account with a service provider. A SIM card
must be installed in a GSM 3G wireless card.
To provision your data account, follow these procedures:
Verifying Signal Strength and Service Availability
To verify the signal strength and service availability on your modem, use the following commands in privileged
EXEC mode.
This feature requires Cisco IOS Release 15.2(1)T or a later.Note
Note
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this
feature.
SUMMARY STEPS
show cellular 0 network
1.
show cellular 0 hardware
2.
show cellular 0 connection
3.
show cellular 0 radio
4.
show cellular 0 profile
5.
show cellular 0 security
6.
show cellular 0 all
7.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
58
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
show cellular 0 network
Example:
Router# show cellular 0 network
Example:
Router# show cellular 0 hardware
Example:
Router# show cellular 0 connection
Example:
Router# show cellular 0 radio
Example:
Router# show cellular 0 profile
show cellular 0 security
Example:
Displays information about the carrier network, cell site, and
available service.
Displays the cellular modem hardware information.show cellular 0 hardware
Displays the current active connection state and data statistics.show cellular 0 connection
Shows the radio signal strength.show cellular 0 radio
Note
The RSSI should be better than –90 dBm for steady
and reliable connection.
Shows information about the modem data profiles created.show cellular 0 profile
Shows the security information for the modem, such as SIM
and modem lock status.
Router# show cellular 0 security
Step 7
show cellular 0 all
Example:
Router# show cellular 0 all
Configuring a GSM Modem Data Profile
To configure or create a new modem data profile, enter the cellular 0 gsm profile create <profile number>
<apn> <authentication> <username> <password> command in privileged EXEC mode. See Table 17:
Modem Data Profile Parameters , on page 60 for details about the command parameters.
Shows consolidated information about the modem. The profiles
that were created, the radio signal strength, the network
security, and so on.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
59
Configuring WAN Interfaces
Table 17: Modem Data Profile Parameters , on page 60 lists the modem data profile parameters.
Table 17: Modem Data Profile Parameters
Basic Router Configuration
profile number
apn
authentication
username
password
CDMA Modem Activation and Provisioning
Activation procedures may differ, depending upon your carrier. Consult your carrier, and perform one of the
following procedures as appropriate:
Manual activation
•
Activation using over the air service provisioning
•
Table 18: CDMA Modem Activation and Provisioning, on page 60 lists the activation and provisioning
processes supported by different wireless carriers.
Table 18: CDMA Modem Activation and Provisioning
Number for the profile that you are creating. You can
create up to 16 profiles.
Access point name. You must get this information
from your service provider.
Type of authentication, for example, CHAP, PAP.
Username provided by your service provider.
Password provided by your service provider.
10
OTASP = Over the Air Service Provisioning.
11
IOTA = Internet Over the Air.
Manual Activation
Note
You must have valid mobile directory number (MDN), mobile subsidy lock (MSL), and mobile station
identifier (MSID) information from your carrier before you start this procedure.
To configure a modem profile manually, use the following command, beginning in EXEC mode:
cellular 0 cdma activate manual mdn msid sid nid msl
CarrierActivation and Provisioning Process
SprintManual Activation using MDN, MSID, MSL
Verizon WirelessOTASP10Activation
SprintIOTA11for Data Profile refresh
Cisco 800 Series Integrated Services Routers Software Configuration Guide
60
Basic Router Configuration
Besides being activated, the modem data profile is provisioned through the Internet Over the Air (IOTA)
process. The IOTA process is initiated automatically when you use the cellular cdma activate manual command.
The following is a sample output from this command:
router# cellular 0 cdma activate manual 1234567890 1234567890 1234 12 12345
NAM 0 will be configured and will become Active
Modem will be activated with following Parameters
MDN :1234567890; MSID :1234567890; SID :1234; NID 12:
Checking Current Activation Status
Modem activation status: Not Activated
Begin Activation
Account activation - Step 1 of 5
Account activation - Step 2 of 5
Account activation - Step 3 of 5
Account activation - Step 4 of 5
Account activation - Step 5 of 5
Secure Commit Result: Succeed
Done Configuring - Resetting the modem
The activation of the account is Complete
Waiting for modem to be ready to start IOTA
Beginning IOTA
router#
*Feb 6 23:29:08.459: IOTA Status Message Received. Event: IOTA Start, Result: SUCCESS
*Feb 6 23:29:08.459: Please wait till IOTA END message is received
*Feb 6 23:29:08.459: It can take up to 5 minutes
*Feb 6 23:29:27.951: OTA State = SPL unlock, Result = Success
*Feb 6 23:29:32.319: OTA State = Parameters committed to NVRAM, Result = Success
*Feb 6 23:29:40.999: Over the air provisioning complete; Result:Success
*Feb 6 23:29:41.679: IOTA Status Message Received. Event: IOTA End, Result: SUCCESS
The IOTA start and end must have “success” as the resulting output. If you receive an error message, you can
run IOTA independently by using the cellular cdma activate iota command.
Your carrier may require periodic refreshes of the data profile. Use the following command to refresh the data
profile:
cellular cdma activate iota
Configuring WAN Interfaces
Note
Activating with Over-the-Air Service Provisioning
To provision and activate your modem using Over-the-Air Service Provisioning (OTASP), use the following
command, beginning in EXEC mode.
You need to obtain the phone number for use with this command from your carrier. The standard OTASP
calling number is *22899.
The following is a sample output from this command:
router# cellular 0 cdma activate otasp *22899
Beginning OTASP activation
OTASP number is *22899
steelers_c881G#
OTA State = SPL unlock, Result = Success
router#
OTA State = PRL downloaded, Result = Success
OTA State = Profile downloaded, Result = Success
OTA State = MDN downloaded, Result = Success
OTA State = Parameters committed to NVRAM, Result = Success
Over the air provisioning complete; Result:Success
Cisco 800 Series Integrated Services Routers Software Configuration Guide
61
Configuring WAN Interfaces
Configuring a Cellular Interface
To configure the cellular interface, enter the following commands, beginning in privileged EXEC mode.
Basic Router Configuration
Note
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
Router# configure terminal
Step 2
The PPP Challenge Handshake Authentication Protocol (CHAP) authentication parameters that you use
in this procedure must be the same as the username and password provided by your carrier and configured
only under the GSM profile. CDMA does not require a username or password.
configure terminal
1.
interface cellular 0
2.
encapsulation ppp
3.
ppp chap hostname host
4.
ppp chap password 0 password
5.
asynchronous mode interactive
6.
ip address negotiated
7.
PurposeCommand or Action
Enters global configuration mode from the terminal.configure terminal
Specifies the cellular interface.interface cellular 0
Step 3
Step 4
62
Example:
Router (config)# interface cellular 0
encapsulation ppp
Specifies PPP encapsulation for an interface configured for
dedicated asynchronous mode or dial-on-demand routing (DDR).
Example:
Router (config-if)# encapsulation ppp
ppp chap hostname host
Defines an interface-specific Challenge Handshake
Authentication Protocol (CHAP) hostname. This must match
Example:
Router (config-if)# ppp chap hostname
host@wwan.ccs
Cisco 800 Series Integrated Services Routers Software Configuration Guide
the username given by the carrier. Applies to GSM only.
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 5
Step 6
Step 7
ppp chap password 0 password
Example:
Router (config-if)# ppp chap password 0
cisco
asynchronous mode interactive
Example:
Router (config-if)# asynchronous mode
interactive
ip address negotiated
Example:
Router (config-if)# ip address negotiated
What to Do Next
Note
When the cellular interface requires a static IP address, the address may be configured as ip address
negotiated. Through IP Control Protocol (IPCP), the network ensures that the correct static IP address is
allocated to the device. If a tunnel interface is configured with the ip address unnumbered cellular interface
command, the actual static IP address must be configured under the cellular interface, in place of ip address
negotiated. For a sample cellular interface configuration, see the Basic Cellular Interface Configuration,
on page 66.
Defines an interface-specific CHAP password. This must match
the password given by the carrier.
Returns a line from dedicated asynchronous network mode to
interactive mode, enabling the slip and ppp commands in
privileged EXEC mode.
Specifies that the IP address for a particular interface is obtained
via PPP and IPCP address negotiation.
Configuring DDR
Perform these steps to configure dial-on-demand routing (DDR) for the cellular interface.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Specifies the cellular interface.interface cellular 0
Example:
Router (config)# interface cellular 0
Step 15
dialer string string
Example:
Router (config)# dialer string gsm
Configuring Data Dedicated Transmission Mode (DDTM)
On CDMA modems, data transmission is disrupted by incoming voice calls if data dedicated transmission
mode (DDTM) is disabled. You can enable DDTM mode so the modem ignores incoming voice calls.
To enable DDTM on a CDMA modem, use the cdma ddtm command in configuration mode.
This command is enabled by default. You can disable this feature by using the no cdma ddtm command.
Note
When DDTM is enabled, only voice calls are blocked for the MC5728v modems. On the AC597E and
MC5725 and MC 5727, incoming SMS messages are also blocked.
Specifies the dialer script (defined using the chat script
command).
Examples for Configuring Cellular Wireless Interfaces
This section provides the following configuration examples:
Basic Cellular Interface Configuration
The following example shows how to configure a gsm cellular interface to be used as a primary WAN
connection. It is configured as the default route.
ppp chap password 0 cisco
!
ip route 0.0.0.0 0.0.0.0 Cellular0
!
!
access-list 1 permit any
dialer-list 1 protocol ip list 1
!
line 3
exec-timeout 0 0
script dialer cdma
login
modem InOut
Tunnel over Cellular Interface Configuration
The following example shows how to configure the static IP address when a tunnel interface is configured
with the ip address unnumbered <cellular interface > command:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
67
Configuring WAN Interfaces
no ppp lcp fast-start
ppp chap hostname <hostname>*** gsm only ***
ppp chap password 0 <password>
ppp ipcp dns request
! traffic of interest through the tunnel/cellular interface
ip route 10.10.0.0 255.255.0.0 Tunnel2
Configuring Dual SIM for Cellular Networks on Cisco 819 Series ISR
The Dual SIM feature implements auto-switch and failover between two cellular networks on a Cisco 819
ISR. This feature is enabled by default with SIM slot 0 being the primary slot and slot 1 being the secondary
(failover) slot.
Basic Router Configuration
Note
For instructions on how to configure the Dual SIM feature for 4G LTE cellular networks, see the Cisco
4G LTE Software Installation Guide .
You can configure the Dual SIM feature using the following commands:
DescriptionSyntaxCommand
gsm failovertimer
gsm sim authenticate
gsm failovertimer <1-7>
gsm sim authenticate <0,7>
Sets the failover timer in minutes.
Verifies the SIM CHV1 code.
<pin> slot <0-1>
gsm sim max-retry
gsm sim max-retry <0-65535>
Specifies the maximum number of
failover retries. The default value
is 10.
gsm sim primary slot
gsm sim primary slot <0-1>
Modifies the primary slot
assignment.
gsm sim profile
gsm sim profile <1-16> slot
Configures the SIM profile.
<0-1>
Note the following:
For auto-switch and failover to work, configure the SIM profile for slots 0 and 1 using the gsm sim
•
profile command.
For auto-switch and failover to work, configure the chat script without a specific profile number.
•
If no SIM profile is configured, profile #1 is used by default.
•
If no GSM failover timer is configured, the default failover timeout is 2 minutes.
•
If no GSM SIM primary slot is configured, the default primary SIM is slot 0.
•
The following example shows you how to set the SIM switchover timeout period to 3 minutes:
router(config-controller)# gsm failovertimer 3
The following example shows you how to authenticate using an unencrypted pin:
Perform the following commands to manually switch the SIM:
Configuring WAN Interfaces
DescriptionSyntaxCommand
cellular GSM SIM
cellular GSM SIM {lock |
Locks or unlocks the SIM.
unlock}
gsm sim
cellular <unit> gsm sim [lock
Locks or unlocks the gsm SIM.
| unlock] <pin>
gsm sim unblock
cellular <unit> gsm sim
Unblocks the gsm SIM.
unblock <puk> <newpin>
gsm sim change-pin
cellular <unit> gsm sim
Changes the PIN of the SIM.
change-pin <oldpin> <newpin>
gsm sim activate slot
cellular <unit> gsm sim
Activates the GSM SIM.
activate slot <slot_no>
The following command forces the modem to connect to SIM1:
Router# cellular
0
gsm sim activate
slot 1
Configuring Router for Image and Config Recovery Using Push Button for Cisco 819 Series
ISR Router
A push button feature is available on the Cisco 819 ISR. The reset button on the front panel of the router
enables this feature.
Perform the following steps to use this feature:
SUMMARY STEPS
Unplug power.
1.
Press the reset button on the front panel of the router.
2.
Power up the sytem while holding down the reset button.
3.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
69
Configuring WAN Interfaces
DETAILED STEPS
Basic Router Configuration
Step 1
Step 2
Step 3
Unplug power.
Press the reset button on the front panel of the router.
Power up the sytem while holding down the reset button.
The system LED blinks four times indicating that the router has accepted the button push.
What to Do Next
Using this button takes effect only during ROMMON initialization. During a warm reboot, pressing this button
has no impact on performance. Table 19: Push Button Functionality during ROMMON Initialization, on page
70 shows the high level functionality when the button is pushed during ROMMON initialization.
Table 19: Push Button Functionality during ROMMON Initialization
IOS BehaviorROMMON Behavior
Boots using default baud rate.
•
Performs auto-boot.
•
If the configuration named *.cfg is available in nvram
storage or flash storage, IOS will perform a backup
of the original configuration and will boot up using
this configuration.
Loads the *.default image if available on
•
compact flash
Note
You can only have one configuration file
with *.cfg option. Having more than one file
Note
If no *.default image is available, the
will result in uncertain operational behavior.
ROMMON will boot up with the first Cisco
Examples of names for default images:
IOS image on flash.
c800-universalk9-mz.SPA.default,
c-800-universalk9_npe-mz.151T.default,
image.default
Note
You can only have one configuration file
with *.cfg option. Having more than one file
will result in uncertain operational behavior.
Use the show platform command to display the current bootup mode for the router. The following sections
show sample outputs when the button is not pushed and when the button is pushed.
Output When Button Is Not Pushed: Example
router# show platform boot-record
Platform Config Boot Record :
============================
Configuration Register at boot time : 0x0
Reset Button Status at Boot Time: Not Pressed
Startup-config Backup Status at Boot: No Status
Startup-config(backup file)location : No Backup
Cisco 800 Series Integrated Services Routers Software Configuration Guide
70
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.