Cisco 800 Configuration Guide

Cisco 800 Series Integrated Services Routers Software Configuration Guide

First Published: 2009-01-01
Last Modified: 2016-12-30
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
©
2009-16 Cisco Systems, Inc. All rights reserved.

CONTENTS

Preface
CHAPTER 1
Preface xxv
Audience xxv
Document Organization xxv
Document Conventions xxvii
Related Documentation xxviii
Obtaining Documentation and Submitting a Service Request xxix
Product Overview 1
Information About Cisco 800 Series ISRs 1
Cisco 860 Series ISRs 1
Features of Cisco 860 Series ISRs 2
4-port 10/100 FE LAN Switch of Cisco 860 Series ISRs 2
Security Features for Cisco 860 Series ISRs 2
802.11n Wireless LAN Option for Cisco 860 Series ISRs 2
Features of Cisco 860VAE Series ISRs 2
General Features of Cisco 860 VAE Series Routers 2
Interfaces of Cisco 860 VAE Series ISRs 4
IOS Images for Cisco 860 VAE Series ISRs 5
Cisco 880 Series ISRs 6
Models of Cisco 880 Series ISRs 7
Common Features of Cisco 880 Series ISRs 9
4-port 10/100 FE LAN Switch of Cisco 880 Series ISRs 9
802.11n Wireless LAN Option of Cisco 880 Series ISRs 9
Real-Time Clock of Cisco 880 Series ISRs 9
Security Features of Cisco 880 Series ISRs 9
Voice Features of Cisco 880 Series ISRs 9
Cisco 890 Series ISRs 10
Cisco 800 Series Integrated Services Routers Software Configuration Guide
iii
Contents
8-port 10/100 FE LAN Switch of Cisco 890 Series ISRs 10
802.11n Wireless LAN Option of Cisco 890 Series ISRs 11
Real-Time Clock of Cisco 890 Series ISRs 11
Security Features of Cisco 890 Series ISRs 11
Cisco 810 Series ISRs 11
Features of Cisco 812 Series ISRs 11
3G Features of Cisco 812 Series ISR 11
WLAN Features of Cisco 812 Series ISR 12
Dual Radio of Cisco 812 Series ISR 12
Cleanair Technology of Cisco 812 Series ISR 13
Dynamic Frequency Selection of Cisco 812 Series ISR 13
Platform Features of Cisco 812 Series ISR 13
TFTP with Ethernet WAN Interface Feature of Cisco 812 Series ISR 13
CHAPTER 2
SKU Information for Cisco 812 Series ISR 13
Features of Cisco 819 Series ISRs 13
3G Features of Cisco 819 Series ISRs 14
WLAN Features of Cisco 819 Series ISRs 14
4G LTE Features of Cisco 819 Series ISRs 14
Platform Features of Cisco 819 Series ISRs 15
Security Features of Cisco 819 Series ISRs 15
SKU Information for Cisco 819 Series ISRs 15
Licensing for Cisco 800 Series ISRs 15
Selecting Feature Sets for Cisco 800 Series ISRs 16
Basic Router Configuration 17
Basic Router Configuration 17
Interface Ports 17
Default Configuration 19
Information Needed for Configuration 21
Configuring Command-Line Access 23
Configuring Global Parameters 24
Configuring WAN Interfaces 25
Configuring a Fast Ethernet WAN Interface 25
Configuring the Media Type 26
Configuring a Gigabit Ethernet WAN Interface 27
Cisco 800 Series Integrated Services Routers Software Configuration Guide
iv
Contents
Configuring a V.92 Modem Interface 28
Configuring a VDSL2 WAN Interface 30
Configuring ADSL or VDSL on Cisco 860VAE and 880VA Multimode ISRs 32
Overview of Cisco 860VAE, 886VA, and 887VA Multimode ISRs 32
ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs 33
Configuring Seamless Rate Adaption 33
Configuring UBR+ 34
Configuring ADSL Mode 34
Configuring ADSL Auto Mode 34
Configuring CPE and Peer for ADSL Mode 35
Configuring the ATM CPE side 36
Configuring the ATM Peer side 37
ADSL Configuration Example 38
Verifying ADSL Configuration 40
Verifying CPE to Peer Connection for ADSL 41
Configuring VDSL Mode 41
Configuring VDSL Auto Mode 41
Configuring CPE and Peer for VDSL Mode 42
Configuring the VDSL CPE Side 42
Configuring the VDSL Peer Side 43
VDSL Configuration Example 44
Verifying VDSL Configuration 45
Verifying CPE to Peer Connection for VDSL 46
Enabling ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A
SKUs 46
Configuring ADSL2/2+ Annex M mode on Over POTS VDSL2/ADSL Multimode
Annex A SKUs. 46
Enabling Seamless Rate Adaption 47
Example Configuration: Seamless Rate Adaption 48
Configuring UBR+ 49
UBR+ Example 50
Troubleshooting 50
Configuring the Training Log Using the CLI 51
Capturing the Training Log 51
Halting the Training Log Capture 51
Cisco 800 Series Integrated Services Routers Software Configuration Guide
v
Contents
Displaying the Training Log Status and File Location 51
Configuring a G.SHDSL WAN Interface in ATM mode 52
Configuration Example: Configuring a G.SHDSL WAN Interface 55
Verifying G.SHDSL WAN Interface Configuration 55
Configuring a G.SHDSL WAN Interface in EFM mode 56
Configuring the Cellular Wireless WAN Interface 56
Prerequisites for Configuring the 3G Wireless Interface 56
Restrictions for Configuring the Cellular Wireless Interface 57
Data Account Provisioning 58
Verifying Signal Strength and Service Availability 58
Configuring a GSM Modem Data Profile 59
CDMA Modem Activation and Provisioning 60
Configuring a Cellular Interface 62
Configuring DDR 63
Configuring Data Dedicated Transmission Mode (DDTM) 66
Examples for Configuring Cellular Wireless Interfaces 66
Basic Cellular Interface Configuration 66
Tunnel over Cellular Interface Configuration 67
Configuring Dual SIM for Cellular Networks on Cisco 819 Series ISR 68
Configuring Router for Image and Config Recovery Using Push Button for Cisco 819
Series ISR Router 69
Output When Button Is Not Pushed: Example 70
Output When Button Is Pushed: Example 71
Push Button in WLAN AP 71
Configuring WAN Mode on Cisco 860VAE ISRs 71
Enabling WAN Mode 71
Displaying WAN Mode Configuration 72
Configuring the Fast Ethernet LAN Interfaces 74
Configuring the Wireless LAN Interface 74
Configuring a Loopback Interface 74
Configuration Example: Configuring a Loopback Interface 75
Verifying Configuration 75
Configuring Static Routes 76
Example 77
Verifying Static Routing Configuration 77
Cisco 800 Series Integrated Services Routers Software Configuration Guide
vi
Contents
Configuring Dynamic Routes 77
Configuring Routing Information Protocol 77
Example Configuration: Configuring Dynamic Routing Protocol 79
Verifying RIP Configuration 79
Configuring Enhanced Interior Gateway Routing Protocol 79
Example Configuration: EIGRP 80
Verifying EIGRP Configuration 81
CHAPTER 3
Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces 83
Configuring a Network Interface Device on the L3 Interface 83
Configuring the NID 84
Configuration Example 85
Verifying the NID Configuration 85
Troubleshooting the NID Configuration 86
Ethernet Data Plane Loopback 86
Restrictions for Configuring Ethernet Data Plane Loopback 87
Configuring External Ethernet Data Plane Loopback 88
Configuration Examples for Ethernet Data Plane Loopback 90
Verifying the Ethernet Data Plane Loopback Configuration 90
Troubleshooting the Ethernet Data Plane Loopback Configuration 91
CFM Support on Routed Port and Port MEP 92
Restrictions for Configuring Ethernet CFM 92
Configuring Ethernet CFM (Port MEP) 93
Configuration Example for Ethernet CFM (Port MEP) 95
Verifying the Ethernet CFM Configuration on a Port MEP 95
Configuring Ethernet CFM (Single-Tagged Packets) 97
Configuration Example for Ethernet CFM (Single-Tagged Packets) 99
Verifying the Ethernet CFM Configuration for Single-Tagged Packets 99
Configuring Ethernet CFM (Double-Tagged Packets) 101
Configuration Example for Ethernet CFM (Double-Tagged Packets) 104
Verififying the Ethernet CFM Configuration for Double-Tagged Packets 104
Troubleshooting Ethernet CFM Configuration 106
Support for Y.1731 Performance Monitoring on Routed Port (L3 Subinterface) 107
Frame Delay 107
Restrictions for Configuring Two-Way Delay Measurement 107
Cisco 800 Series Integrated Services Routers Software Configuration Guide
vii
Contents
Configuring Two-Way Delay Measurement 108
Configuration Examples for Two-Way Delay Measurement 109
Verifying Two-Way Delay Measurement Configuration 110
Troubleshooting Two-Way Delay Measurement Configuration 112
CHAPTER 4
CHAPTER 5
Configuring Power Management 115
Monitoring Power Usage with EnergyWise 115
Configuring Power-over-Ethernet 115
Enabling/Disabling Power-over-Ethernet 115
Verifying the Power-over-Ethernet Configuration on the Interface 116
Configuring Security Features 117
Authentication, Authorization, and Accounting 117
Configuring AutoSecure 118
Configuring Access Lists 118
Access Groups 119
Configuring Cisco IOS Firewall 119
Configuring Cisco IOS IPS 120
URL Filtering 120
Configuring VPN 121
Configuring a VPN over an IPSec Tunnel 123
CHAPTER 6
viii
Configuring the IKE Policy 123
Configuring Group Policy Information 125
Applying Mode Configuration to the Crypto Map 126
Enabling Policy Lookup 126
Configuring IPSec Transforms and Protocols 127
Configuring the IPSec Crypto Method and Parameters 128
Applying the Crypto Map to the Physical Interface 129
Creating a Cisco Easy VPN Remote Configuration 130
Configuring a Site-to-Site GRE Tunnel 133
Cisco ScanSafe 136
Configuring Secure Storage 137
Information About Secure Storage 137
Supported Platforms 137
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Enabling Secure Storage 138
Disabling Secure Storage 139
Verifying the Status of Encryption 140
Verifying the Platform Identity 140
Downgrading the Platform Image to an Older Version 141
CHAPTER 7
Configuring Backup Data Lines and Remote Management 143
Configuring Backup Interfaces 144
Configuring Cellular Dial-on-Demand Routing Backup 145
Configuring DDR Backup Using Dialer Watch 145
Configuring DDR Backup Using Floating Static Route 147
Cellular Wireless Modem as Backup with NAT and IPsec Configuration 148
Configuring Dial Backup and Remote Management Through the Console or Auxiliary Port 151
Example for specifying an IP address for the ATM interface through PPP and IPCP address
negotiation and dial backup 155
Configuring Data Line Backup and Remote Management Through the ISDN S/T Port 157
Configuring ISDN Settings 160
Configuring Aggregator and ISDN Peer Router 162
Configuring Gigabit Ethernet Failover Media 163
Configuring Auto-Detect 164
Configuring Third-Party SFPs 165
Example for Configuring Third-Party SFPs 168
CHAPTER 8
Configuring Ethernet Switches 169
Switch Port Numbering and Naming 169
Switch Port Mode 170
Restrictions for the FE Switch 170
Ethernet Switches 170
VLANs and VLAN Trunk Protocol 170
Inline Power 170
Configuring 802.1x Authentication 171
Configuring Spanning Tree Protocol 171
Spanning Tree Protocol 173
Cisco Discovery Protocol 173
Switched Port Analyzer 173
Cisco 800 Series Integrated Services Routers Software Configuration Guide
ix
Contents
IGMP Snooping 173
Storm Control 174
Overview of SNMP MIBs 174
BRIDGE-MIB for Layer 2 Ethernet Switching 174
MAC Address Notification 175
Configuring Ethernet Switches 176
Configuring VLANs 176
VLANs on the FE and GE Switch Ports 176
VLANs on the GE Port and GE ESW Port of Wireless APs 177
Configuring Layer 2 Interfaces 178
Configuring 802.1x Authentication 178
Configuring Spanning Tree Protocol 179
Configuring MAC Table Manipulation 179
CHAPTER 9
Configuring Cisco Discovery Protocol 180
Configuring the Switched Port Analyzer 180
Configuring Power Management on the Interface 180
Configuring IP Multicast Layer 3 Switching 181
Configuring IGMP Snooping 181
Configuring Per-Port Storm Control 181
Configuring Separate Voice and Data Subnets 182
Managing the Switch 182
Configuring Voice Functionality 183
Voice Ports 183
Analog and Digital Voice Port Assignments 184
Voice Port Configuration 184
Call Control Protocols 184
SIP 184
MGCP 185
H.323 185
Dial Peer Configuration 185
Other Voice Features 185
Real-Time Transport Protocols 185
Dual Tone Multi Frequency Relay 186
CODECs 186
Cisco 800 Series Integrated Services Routers Software Configuration Guide
x
Contents
SCCP-Controlled Analog Ports with Supplementary Features 186
Fax Services 187
Fax Pass-Through 187
Cisco Fax Relay 187
T.37 Store-and-Forward Fax 187
T.38 Fax Relay 187
Unified Survival Remote Site Telephony 187
Verification of Voice Configuration 188
CHAPTER 10
Configuring the Serial Interface 189
Configuring the Serial Interface 189
Legacy Protocol Transport 190
Configuring Serial Interfaces 191
Cisco HDLC Encapsulation 191
PPP Encapsulation 191
Multilink PPP 192
Keepalive Timer 193
Frame Relay Encapsulation 193
LMI on Frame Relay Interfaces 194
Configuring Serial Interfaces 194
Configuring a Synchronous Serial Interface 195
Specifying a Synchronous Serial Interface 195
Specifying Synchronous Serial Encapsulation 195
Configuring PPP 196
Configuring Bisync 196
Configuring Compression of HDLC Data 196
Using the NRZI Line-Coding Format 197
Enabling the Internal Clock 198
Inverting the Transmit Clock Signal 198
Setting Transmit Delay 199
Configuring DTR Signal Pulsing 199
Ignoring DCD and Monitoring DSR as Line Up/Down Indicator 200
Specifying the Serial Network Interface Module Timing 200
Specifying the Serial Network Interface Module Timing 201
Configuring Low-Speed Serial Interfaces 201
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xi
Contents
Half-Duplex DTE and DCE State Machines 201
Half-Duplex DTE State Machines 202
Half-Duplex DCE State Machines 203
Placing a Low-Speed Serial Interface in Constant-Carrier Mode 205
Tuning Half-Duplex Timers 206
Changing Between Synchronous and Asynchronous Modes 206
Changing Between Synchronous and Asynchronous Modes 207
Examples for Interface Enablement Configuration 208
Examples for Low-Speed Serial Interface 208
Examples for Synchronous or Asynchronous Mode 208
Example for Half-Duplex Timers 209
CHAPTER 11
Configuring Wireless Devices 211
Embedded IOS Wireless Access Points (for AP801/AP802/AP803) 211
Wireless LAN Overview 211
Software Modes for Wireless Devices 211
Management Options for Wireless Device 212
Root Access Point 212
Central Unit in an All-Wireless Network 213
Basic Wireless Configuration for Cisco 800 Series ISR 214
Starting a Wireless Configuration Session 215
Closing the Session 217
Configuring Wireless Settings 217
Cisco Express Setup 218
Cisco IOS Command Line Interface 218
Configuring the Radio 218
Configuring Wireless Security Settings 218
Configuring Authentication 218
xii
Configuring WEP and Cipher Suites 219
Configuring Wireless VLANs and Assigning SSIDs 219
Configuring Wireless Quality of Service 222
Configuring the Access Point in Hot Standby Mode 222
Upgrading to Cisco Unified Software 222
Preparing for the Upgrade 222
Secure an IP Address on the Access Point 222
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Example Configuration: Secure an IP Address on the Access Point 223
Confirm that the Mode Setting is Enabled 223
Performing the Upgrade 223
Troubleshooting an Upgrade or Reverting the AP to Autonomous Mode 224
Downgrading the Software on the Access Point 224
Recovering Software on the Access Point 224
Related Documentation 224
Configuring Radio Settings 227
Enabling the Radio Interface 227
Wireless Device Roles in a Radio Network 228
Configuring the Wireless Device Roles in a Radio Network 228
Configuring Dual-Radio Fallback 229
Radio Tracking 230
Fast Ethernet Tracking 230
MAC-Address Tracking 230
Overview of Radio Data Rates 230
Configuring Radio Data Rates 231
Configuration Example: Configuring Radio Data Rates 234
Configuring MCS Rates 234
Configuration Example: MCS Rates 235
Configuring Radio Transmit Power 235
Limiting the Power Level for Associated Client Devices 236
Configuring Radio Channel Settings 237
Configuring Wireless Channel Width 238
Enabling and Disabling World Mode 239
Enabling World Mode 239
Disabling and Enabling Short Radio Preambles 240
Disabling Short Radio Preambles 241
Transmit and Receive Antennas 241
Configuring Transmit and Recieve Antennas 242
Disabling and Enabling Aironet Extensions 242
Disabling Aironet Extensions 243
Ethernet Encapsulation Transformation Method 244
Configuring the Ethernet Encapsulation Transformation Method 244
Enabling and Disabling Public Secure Packet Forwarding 245
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xiii
Contents
Configuring Public Secure Packet Forwarding 245
Configuring Protected Ports 246
Beacon Period and the DTIM 247
Configuring the Beacon Period and the DTIM 247
RTS Threshold and Retries 248
Configuring RTS Threshold and Retries 248
Maximum Data Retries 249
Configuring the Maximum Data Retries 249
Configuring the Fragmentation Threshold 250
Configuring the Fragment Threshold 250
Enabling Short Slot Time for 802.11g Radios 251
Performing a Carrier Busy Test 251
Configuring VoIP Packet Handling 252
Administering the Wireless Device 252
Securing Access to the Wireless Device 252
Disabling the Mode Button Function 253
Dispaying the mode-button status 253
Preventing Unauthorized Access to Your Access Point 254
Protecting Access to Privileged EXEC Commands 254
Configuring Default Password and Privilege Level 254
Setting or Changing a Static Enable Password 255
Configuration Example: Changing a Static Enable Password 255
Protecting Enable and Enable Secret Passwords with Encryption 256
Configuration Example: Enable Secret Passwords 257
Configuring Username and Password Pairs 257
Configuring Multiple Privilege Levels 258
Configuring Multiple Privilege Levels 260
Controlling Access Point Access with RADIUS 260
RADIUS Configuration 261
Configuring RADIUS Login Authentication 261
xiv
Defining AAA Server Groups 262
Configuration Example: AAA Group 264
Configuring RADIUS Authorization for User Privileged Access and Network
Services 264
Displaying the RADIUS Configuration 266
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Controlling Access Point Access with TACACS+ 266
Default TACACS+ Configuration 266
Configuring TACACS+ Login Authentication 266
Configuring TACACS+ Authorization for Privileged EXEC Access and Network
Services 268
Displaying the TACACS+ Configuration 269
Administering the Access Point Hardware and Software 269
Administering the Wireless Hardware and Software 269
Resetting the Wireless Device to the Factory Default Configuration 269
Rebooting the Wireless Device 269
Monitoring the Wireless Device 270
Managing the System Time and Date 270
Understanding Simple Network Time Protocol 271
Configuring SNTP 271
Time and Date Manual Configuration 271
Example Configuration : Time and Date 274
Configuring a System Name and Prompt 274
Configuring a System Name 274
Understanding DNS 275
Creating a Banner 277
Configuring a Message-of-the-Day Login Banner 277
Example: Configuring a MOTD Banner 278
Configuring a Login Banner 279
Example Configuration: Login Banner 279
Administering Wireless Device Communication 279
Configuring Ethernet Speed and Duplex Settings 280
Configuring the Access Point for Wireless Network Management 280
Configuring the Access Point for Local Authentication and Authorization 281
Configuring the Authentication Cache and Profile 282
Example Configuration: Authentication Cache and Profile 283
Configuring the Access Point to Provide DHCP Service 285
Setting up the DHCP Server 285
Monitoring and Maintaining the DHCP Server Access Point 287
Configuring the Access Point for Secure Shell 288
Understanding SSH 288
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xv
Contents
Configuring SSH 288
Client ARP Caching 289
Understanding Client ARP Caching 289
Configuring Client ARP Caching 289
Configuring Multiple VLAN and Rate Limiting for Point-to-Multipoint
Bridging 290
Embedded AP860VAE Wireless Access Points (for 860VAE series routers) 290
Configuring WLAN (AP860VAE) 290
Configuring WLAN Using the Web-based Interface 291
Connecting to the Web-based WLAN Interface 291
Address for Accessing Web-based Interface 291
Subnet 291
Displaying Device Information 291
Displaying Connection Statistics 291
Configuring Access to the Web-based Interface 291
Configuring Basic Wireless Settings 292
Configuring Security 293
Configuring MAC Filtering 293
Configuring Advanced Wireless Settings 294
Station Information 296
Configuring the Password for Connecting to the Web-based Interface 296
Saving the Wireless LAN Configuration to a File 297
Loading a Wireless LAN Configuration File 297
Restoring the Default Configuration 297
Configuring WLAN Using the CLI-based Interface 297
WLAN CLI Interface 297
Displaying Command Information for WLAN CLI 298
Example : Displaying Command Information for WLAN CLI 298
Connecting to the WLAN CLI Interface 298
Example: Configuring a Loopback Interface 298
xvi
Example: Accessing WLAN CLI Using Telnet Through the Loopback
Interface 299
Exiting from the WLAN CLI Interface 299
Setting the IP Address for the Web-based Interface 299
Enabling and Disabling WLAN 300
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Configuring the Main SSID 300
Configuring Guest SSIDs 301
Enabling and Disabling Guest SSIDs 301
Hiding an Access Point 302
Enabling and Disabling Client Isolation 303
Enabling and Disabling WMM Advertise 304
Enabling and Disabling Wireless Multicast Forwarding (WMF) 305
Configuring the Global Maximum Number of Clients 305
Configuring the Maximum Number of Clients for an SSID 306
Configuring Authentication Options 307
Configuring Encryption Options 311
Configuring the MAC Address Filter Access List 313
Configuring the MAC Address Filter Mode 314
Configuring Radio Channel 315
Configuring 802.11n Options 316
Configuring the 54g Mode 318
Configuring the 54g Preamble Type 318
Configuring the 54g Rate 319
Configuring 54g Protection 320
Configuring the Multicast Rate 321
Configuring the Basic Rate 322
Configuring the Fragmentation Threshold 323
Configuring the RTS Threshold 323
Configuring the DTIM Interval 324
Configuring the Beacon Interval 324
Configuring the Radio Transmit Power 325
Configuring WMM Options 326
Displaying Current CLI Values and Keywords 326
Displaying Current Channel and Power Information 328
Displaying Current Associated Clients 330
Displaying the SSID to BSSID Mapping 330
Displaying the Tx/Rx Statistics 331
Displaying the BVI 1 Interface Details 332
Displaying Dot11Radio 0 Interface Information 332
Example: Displaying Dot11Radio 0 Interface Information 333
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xvii
Contents
Displaying Brief Details for All Interfaces 333
Displaying CPU Statistics 334
Example: Displaying CPU Statistics 334
Showing a Summary of Memory Usage 334
Pinging an Address 335
Changing the Administrator Password 335
Configuring the Number of Lines on Screen 336
4G LTE Support on Cisco 800 Series ISRs 336
How to Configure Cisco 800 Series 4G LTE ISRs 337
Configuration Examples for Cisco 800 Series 4G LTE ISRs 337
Example: Basic Cellular Configuration 337
Example: Dialer-Watch Configuration without External Dialer Interface 338
Example: Dialer-Persistent Configuration with External Dialer Interface 338
CHAPTER 12
Example: GRE Tunnel over Cellular Interface Configuration 338
Modem Firmware Upgrade 339
Troubleshooting 339
3G Support on Cisco 880G series ISRs 339
Configuring PPP over Ethernet with NAT 341
Overview 342
PPPoE 342
NAT 343
Configuration Tasks 343
Configure the Virtual Private Dialup Network Group Number 343
Configure Ethernet WAN Interfaces 344
Configure the Dialer Interface 345
Configure Network Address Translation 347
Configuration Example 350
Verifying Your Configuration 351
CHAPTER 13
xviii
Configuring PPP over ATM with NAT 353
Overview 353
Configure the Dialer Interface 355
Configure the ATM WAN Interface 357
Configure DSL Signaling Protocol 358
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Configuring ADSL 358
Verifying the Configuration 359
Configure Network Address Translation 360
Configuration Example 363
Verifying Your Configuration with NAT 364
CHAPTER 14
CHAPTER 15
Environmental and Power Management 365
Environmental and Power Management 365
Cisco EnergyWise Support 366
Configuring a LAN with DHCP and VLANs 367
Configuring a LAN with DHCP and VLANs 367
DHCP 368
VLANs 368
Configuring DHCP and VLANs 368
Configuring DHCP 368
Configuration Example: DHCP 370
Verifying Your DHCP Configuration 370
Configuring VLANs 371
Assigning a Switch Port to a VLAN 372
Verifying Your VLAN Configuration 372
CHAPTER 16
Configuring a VPN Using Easy VPN and an IPSec Tunnel 375
Configuring a VPN Using Easy VPN and an IPSec Tunnel 375
Configuring the IKE Policy 377
Configuring Group Policy Information 379
Applying Mode Configuration to the Crypto Map 380
Enabling Policy Lookup 381
Configuring IPSec Transforms and Protocols 382
Configuring the IPSec Crypto Method and Parameters 383
Applying the Crypto Map to the Physical Interface 384
Creating an Easy VPN Remote Configuration 385
Verifying Your Easy VPN Configuration 387
Configuration Examples for VPN and IPSec 387
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xix
Contents
CHAPTER 17
CHAPTER 18
CHAPTER 19
Configuring Cisco Multimode G.SHDSL EFM/ATM 389
Configuring VDSL2 Bonding and Single-Wire Pair 391
Restrictions 391
Configuring Bonding in Auto Mode 392
Configuring Bonding in VDSL2 Mode 392
Configuring a Single-Wire Pair on Line 0 393
Configuring a Single-Wire Pair on Line 1 394
Configuration Examples 395
Configuring Cisco IOx 397
Configuring Cisco IOx 397
Configuration Examples 399
Developer Mode with Ethernet 399
Stationary with Ethernet 400
Mobile with Cellular 401
CHAPTER 20
Cellular IP Address Type 402
Accessing the Web Interface of Local Manager 404
Configuring NTP Server 405
Configuring IOS NAT for Applications Installed using BRIDGE and NAT Networking
Modes 405
Configuring Guest Serial 406
Upgrading Cisco IOx 407
Troubleshooting 407
Deployment Scenarios 417
About the Deployment Scenarios 417
Enterprise Small Branch 418
Internet Service and IPSec VPN with 3G 419
SMB Applications 420
Enterprise Wireless Deployments with LWAPP 421
Enterprise Small Branch Office Deployment 422
CHAPTER 21
xx
Troubleshooting Cisco 800 Series Routers 423
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
Getting Started 423
Before Contacting Cisco or Your Reseller 423
ADSL Troubleshooting 424
SHDSL Troubleshooting 424
VDSL2 Troubleshooting 425
show interfaces Troubleshooting Command 425
ATM Troubleshooting Commands 427
ping atm interface Command 428
show atm interface Command 428
debug atm Commands 429
Guidelines for Using Debug Commands 429
debug atm errors Command 429
APPENDIX A
debug atm events Command 430
debug atm packet Command 431
Software Upgrade Methods 432
Recovering a Lost Password 432
Change the Configuration Register 432
Reset the Router 434
Reset the Password and Save Your Changes 435
Reset the Configuration Register Value 436
Enabling SIM Fast Switchover 437
Cisco Configuration Professional Express 438
Cisco IOS Software Basic Skills 439
Configuring the Router from a PC 439
Understanding Command Modes 440
Getting Help 442
Enable Secret Passwords and Enable Passwords 443
Entering Global Configuration Mode 444
Using Commands 444
Abbreviating Commands 445
Undoing Commands 445
Command-Line Error Messages 445
Saving Configuration Changes 446
Summary 446
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxi
Contents
APPENDIX B
Concepts 447
ADSL 447
SHDSL 448
Network Protocols 448
IP 448
Routing Protocol Options 448
RIP 449
Enhanced IGRP 449
PPP Authentication Protocols 449
PAP 450
CHAP 450
TACACS+ 451
Network Address Translation 451
Easy IP (Phase 1) 451
Easy IP (Phase 2) 452
Network Interfaces 452
Ethernet 452
ATM for DSL 453
PVC 453
Dialer Interface 453
Dial Backup 454
Backup Interface 454
Floating Static Routes 454
Dialer Watch 454
QoS 454
IP Precedence 455
PPP Fragmentation and Interleaving 455
CBWFQ 455
RSVP 456
Low Latency Queuing 456
Access Lists 456
APPENDIX C
xxii
ROM Monitor 457
Entering the ROM Monitor 457
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Contents
ROM Monitor Commands 458
ROM Monitor Commands for 860VAE ISRs 459
ROM Monitor Command Descriptions 459
TFTP support with Ethernet WAN interface 460
Disaster Recovery with TFTP Download 461
TFTP Download Command Variables 461
Required Variables 461
Optional Variables 462
Using the TFTP Download Command 462
Configuration Register 463
Changing the Configuration Register Manually 463
Changing the Configuration Register Using Prompts 464
Console Download 464
Error Reporting 465
ROM Monitor Debug Commands 466
Exiting the ROM Monitor 467
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxiii
Contents
xxiv
Cisco 800 Series Integrated Services Routers Software Configuration Guide

Audience

Preface

This preface describes the audience, organization, and conventions of this guide, and describes related documents that have additional information. It contains the following sections:
Audience, page xxv
Document Organization, page xxv
Document Conventions, page xxvii
Related Documentation, page xxviii
Obtaining Documentation and Submitting a Service Request, page xxix
This guide provides an overview and explains how to configure the various features for the Cisco 810, Cisco 860, Cisco 880, and Cisco 890 series Integrated Services Routers (ISRs). Some information may not apply to your particular router model.
This guide is intended for Cisco equipment providers who are technically knowledgeable and familiar with Cisco routers and Cisco IOS software and features.
For warranty, service, and support information, see the Cisco One-Year Limited Hardware Warranty Terms section in the Readme First for the Cisco 800 Series Integrated Services Routers that was shipped with your router.

Document Organization

This document is organized into the following chapters:
Product Overview
DescriptionChapter
Provides a brief description of the router models and the available software features.
Provides procedures for configuring the basic parameters of the router.Basic Router Configuration
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxv
Document Organization
Preface
DescriptionChapter
Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces, on page 83
Configuring Power Management
Configuring Security Features
Configuring Backup Data Lines and Remote Management
Configuring Ethernet Switches
Configuring the Serial Interface
Configuring Wireless Devices
Provides procedures for configuring the network interface device functionality, Ethernet data plane loopback, IEEE connectivity fault management, and Y.1731 performance monitoring.
Provides the configuration of power management and Power-over-Ethernet (PoE).
Provides procedures for implementing the security features that can be configured on the router.
Provides procedures for configuring remote management functions and a backup data line connection.
Provides an overview of the configuration tasks for the 4-port Fast Ethernet switch on the router.
Provides references to the procedures for voice configuration.Configuring Voice Functionality
Provides information about WAN access and aggregation, Legacy protocol transport, and Dial Access Server.
Provides procedures for initial configuration of the wireless device, radio settings, WLAN, and administration of the wireless device. Also provides information about 4G LTE and 3G cellular networks.
Configuring PPP over Ethernet with NAT
Configuring PPP over ATM with NAT
Configuring a LAN with DHCP and VLANs
Configuring a VPN Using Easy VPN and an IPSec Tunnel
G.SHDSL EFM/ATM
Deployment Scenarios
Provides an overview of Point-to-Point Protocol over Ethernet (PPPoE) clients and network address translation (NAT)s that can be configured on the Cisco 860 and Cisco 880 series Integrated Services Routers (ISRs).
Provides an overview of Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) clients and network address translation (NAT) that can be configured on the Cisco 860 and Cisco 880 series Integrated Services Routers (ISRs).
Describes how the routers can use the Dynamic Host Configuration Protocol (DHCP) to enable automatic assignment of IP configurations for nodes on these networks.
Provides an overview of the creation of Virtual Private Networks (VPNs) that can be configured on the Cisco 860 and Cisco 880 series Integrated Services Routers (ISRs).
Describes the configuration of the Cisco Multimode 4-pair G.SHDSL.Configuring Cisco Multimode
Shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series ISRs.
xxvi
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Preface

Document Conventions

DescriptionChapter
Provides information to help isolate problems you might encounter.Troubleshooting Cisco 800 Series
Routers
Cisco IOS Software Basic Skills
Concepts
ROM Monitor
Document Conventions
This document uses the following conventions:
^ or Ctrl
Italic font
Provides information for how to use Cisco IOS software to configure your router.
Provides conceptual information that may be useful to Internet service providers or network administrators when they configure Cisco routers.
Provides information on how to use Ciscos ROM Monitor firmware.
DescriptionConvention
Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For example, the key combination ^D or Ctrl-D means that you hold down the Control key while you press the D key. (Keys are indicated in capital letters but are not case sensitive.)
Commands and keywords and user-entered text appear in bold font.bold font
Document titles, new or emphasized terms, and arguments for which you supply values are in italic font.
Courier font
...
|
[x | y]
{x | y}
Terminal sessions and information the system displays appear in courier font.
Bold Courier font indicates text that the user must enter.Bold Courier font
Elements in square brackets are optional.[x]
An ellipsis (three consecutive nonbolded periods without spaces) after a syntax element indicates that the element can be repeated.
A vertical line, called a pipe, indicates a choice within a set of keywords or arguments.
Optional alternative keywords are grouped in brackets and separated by vertical bars.
Required alternative keywords are grouped in braces and separated by vertical bars.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxvii

Related Documentation

Preface
DescriptionConvention
Note
[x {y | z}]
Nested set of square brackets or braces indicate optional or required choices within optional or required elements. Braces and a vertical bar within square brackets indicate a required choice within an optional element.
string
A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks.
Nonprinting characters such as passwords are in angle brackets.< >
Default responses to system prompts are in square brackets.[ ]
!, #
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
Reader Alert Conventions
This document uses the following conventions for reader alerts:
Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Tip
Means the following information will help you solve a problem.
Caution
Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
Timesaver
Means the described action saves time. You can save time by performing the action described in the paragraph.
Warning
Means reader be warned. In this situation, you might perform an action that could result in bodily injury.
Related Documentation
In addition to this document, the Cisco 810, Cisco 860, Cisco 880, and Cisco 890 series ISR documentation set includes the following documents:
xxviii
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Preface

Obtaining Documentation and Submitting a Service Request

Readme First for the Cisco 800 Series Integrated Services Routers.
Cisco 860, Cisco 880, and Cisco 890 Series Integrated Services Routers Hardware Installation Guide
Regulatory Compliance and Safety Information for Cisco 800 Series and SOHO Series Routers
Declarations of Conformity and Regulatory Information for Cisco Access Products with 802.11n Radios
Software Activation on Cisco Integrated Services Routers and Cisco Integrated Service Routers G2
You might also need to refer to the following documents:
Cisco System Manager Quick Start Guide
Cisco IOS Release 12.4 Quality of Service Solutions Configuration Guide
Cisco IOS Security Configuration Guide, Release 12.4
Cisco IOS Security Configuration Guide, Release 12.4T
Cisco IOS Security Command Reference, Release 12.4
Cisco IOS Security Command Reference, Release 12.4T
Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges, versions 12.4(10b) JA
and 12.3(8) JEC
Cisco Aironet 1240AG Access Point Support Documentation
Cisco 4400 Series Wireless LAN Controllers Support Documentation
LWAPP Wireless LAN Controllers
LWAPP Wireless LAN Access Points
Cisco IOS Release 12.4 Voice Port Configuration Guide
SCCP Controlled Analog (FXS) Ports with Supplementary Features in Cisco IOS Gateways
Cisco Software Activation Conceptual Overview
Cisco Software Activation Tasks and Commands
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly Whats New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the Whats New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
xxix
Obtaining Documentation and Submitting a Service Request
Preface
xxx
Cisco 800 Series Integrated Services Routers Software Configuration Guide
CHAPTER 1

Product Overview

This chapter provides an overview of the features available for the Cisco 810, Cisco 860, Cisco 880 and Cisco 890 series Integrated Services Routers (ISRs), and contains the following sections:
Information About Cisco 800 Series ISRs, page 1
Cisco 860 Series ISRs, page 1
Cisco 880 Series ISRs, page 6
Cisco 890 Series ISRs, page 10
Cisco 810 Series ISRs, page 11
Licensing for Cisco 800 Series ISRs, page 15

Information About Cisco 800 Series ISRs

The Cisco 860, Cisco 880, and Cisco 890 series ISRs provide Internet, VPN, voice, data, and backup capability to corporate teleworkers and remote and small offices of fewer than 20 users. These routers are capable of bridging and multiprotocol routing between LAN and WAN ports, and provide advanced features such as antivirus protection. In addition, the Cisco 860W, Cisco 880W, and Cisco 890W series ISRs incorporate an
802.11n wireless LAN option that allows the ISR to act as a wireless access point.
The Cisco 810 series ISRs provide Internet, VPN, data, and backup capability to corporate teleworkers and remote and small offices of fewer than 20 users and provides machine to machine connectivity. Under Cisco 810 series ISRs, there are two different series of routers available - Cisco 812 series ISRs and Cisco 819 series ISRs. The Cisco 812 ISRs support Gigabit Ethernet (GE), WAN connections over Cellular (3G) interface, and WLAN. The Cisco 819 ISRs are fixed-configuration data routers that provide four 10/100 Fast Ethernet (FE), 1 Gigabit Ethernet (GE), WAN connections over Serial and Cellular (3G, 4G) interfaces and WLAN.

Cisco 860 Series ISRs

The Cisco 860 series ISRs are fixed-configuration data routers that provide either a 10/100 Fast Ethernet (FE) or an ADSL2 over POTs WAN connection.
This section contains the following topics:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
1

Features of Cisco 860 Series ISRs

Features of Cisco 860 Series ISRs
The following features are supported on all Cisco 860 series ISRs:
4-port 10/100 FE LAN Switch of Cisco 860 Series ISRs
The 4-port 10/100 FE LAN switch provides four ports for connecting to 10/100BASE-T (10/100 Mbps) Fast Ethernet (FE) LANs or access points.
Security Features for Cisco 860 Series ISRs
The Cisco 860 Series ISRs provide the following security features:
IPsec
Firewall
Product Overview
802.11n Wireless LAN Option for Cisco 860 Series ISRs
The Cisco 861W ISR has an integrated 802.11b/g/n single radio module for wireless LAN connectivity. With this module, the router can then act as an access point in the local infrastructure.

Features of Cisco 860VAE Series ISRs

The following sections describe the features of the Cisco 860VAE series ISRs:
General Features of Cisco 860 VAE Series Routers
Table 1: General Features of Cisco 860VAE Series ISRs, on page 2 describes the general features of Cisco
860VAE series routers.
Table 1: General Features of Cisco 860VAE Series ISRs
Increased performance
BenefitFeature
Performance enables customers to take
advantage of broadband network speeds while running secure, concurrent data, voice, video, and wireless services.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
2
Product Overview
Features of Cisco 860VAE Series ISRs
BenefitFeature
Security and QoS with secure routers
State-of-the-art xDSL
ScanSafe web filtering
IPSec & Easy VPN with 10 tunnels.
BGP.
MAC filtering and port security.
QoS features include LLQ and WFQ.
NBAR and DiffServ.
State-of-the-art xDSL features, including latest
ADSL2+/VDSL2 standards.
Improved interoperability vs. various DSLAMs
deployed at WW SPs.
Protects network and staff from undesirable web
content
Increases productivity by limiting time spent on
recreational surfing
Optimizes network resources by reducing
bandwidth congestion
IPv6 support
WAN Diversity
Four-port 10/100-Mbps managed switch
1 GE port for secure routers
Monitors online activity with comprehensive
reporting
Supports latest IP addressing standards
GE + DSL multimode VDSL2 and ADSL 1, 2,
and 2+.
Multiple WAN options within the same box
allow consistent configuration across diverse deployments.
Connection of multiple devices within a
teleworker home or a small office, with the ability to designate a port as the network edge.
VLANs allow for secure segmentation of
network resources.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
3
Features of Cisco 860VAE Series ISRs
Product Overview
BenefitFeature
CON/AUX port
Real-time clock
Interfaces of Cisco 860 VAE Series ISRs
Table 2: Interfaces of the Cisco 860VAE Series ISRs, on page 4 describes the interfaces of the Cisco
860VAE series routers.
Table 2: Interfaces of the Cisco 860VAE Series ISRs
ModelsInterfaces
A single dual-purpose port provides direct
connection to a console or external modem for management or backup access points.
A built-in real-time clock maintains an accurate
date and time for applications that require an accurate time stamp, such as logging and digital certificates.
867VAE-K9866VAE-K9867VAE866VAE
xxxx4 FE1switch ports
1
FE = Fast Ethernet
2
GE = Gigabit Ethernet
Note
1 GE2switch port
xx
xxxx1 GE WAN port
1 VDSL/ADSL over
x
x
POTS port
x1 VDSL/ADSL over
x
ISDN port
The Cisco 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9 routers each have two WAN ports. Only one of the two ports can be active at any given time.
Table 3: Interfaces of the C860VAE Series ISRs, on page 5 describes the interfaces of the C860VAE series
routers.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
4
Product Overview
Features of Cisco 860VAE Series ISRs
Table 3: Interfaces of the C860VAE Series ISRs
ModelsInterfaces
C867VAE-K9C866VAE-K9C867VAE
xxx3 FE3switch ports
xxx2 GE4switch port
xxx1 GE WAN port
3
FE = Fast Ethernet
4
GE = Gigabit Ethernet
x1 VDSL/ADSL over
x
POTS port
1 VDSL/ADSL over
x
ISDN port
Table 4: Interfaces of the C860VAE-W Series ISRs, on page 5 describes the interfaces of the C860VAE
series routers.
Table 4: Interfaces of the C860VAE-W Series ISRs
ModelsInterfaces
C866VAE-W-E-K9
C867VAE
-W-E-K9
C867VAE
-W-A-K9
C867VAE
-POE-W-A-K9
xxxx3 FE5switch ports
xxxx2 GE6switch port
xxxx1 GE WAN port
1 VDSL/ADSL
over POTS port
x1 VDSL/ADSL
over ISDN port
5
FE = Fast Ethernet
6
GE = Gigabit Ethernet
IOS Images for Cisco 860 VAE Series ISRs
Table 5: IOS Images of the Cisco 860VAE Series ISRs, on page 6 describes the IOS images included in
Cisco 860VAE series routers.
xxx
Cisco 800 Series Integrated Services Routers Software Configuration Guide
5

Cisco 880 Series ISRs

Product Overview
Table 5: IOS Images of the Cisco 860VAE Series ISRs
ModelIOS Image
Cisco 867VAE-K9Cisco 867VAECisco 866VAE
xxc860vae-ipbasek9-mz
c860vae-advsecurityk9-mz
c860vae-advsecurityk9_npe-mz
Table 6: IOS Images of the C860VAE Series ISRs, on page 6 describes the IOS images included in Cisco
860VAE series routers.
Table 6: IOS Images of the C860VAE Series ISRs
ModelIOS Image
xc860vae-ipbasek9-mz
c860vae-advsecurityk9-mz
c860vae-advsecurityk9_npe-mz
x
x
C867VAE-K9C866VAE-K9C867VAE
xx
xx
Table 7: IOS Images of the C860VAE-W Series ISRs, on page 6 describes the IOS images included in
Cisco 860VAE series routers.
Table 7: IOS Images of the C860VAE-W Series ISRs
Cisco 880 Series ISRs
The Cisco 880 series ISRs are a family of fixed-configuration data and voice routers as described in the following sections:
ModelIOS Image
C866VAE-W-E-K9
C867VAE
-W-E-K9
C867VAE
-W-A-K9
C867VAE
-POE-W-A-K9
xxxxc860vaew-advsecurityk9-mz
xxxxc860vaew-advsecurityk9_npe-mz
Cisco 800 Series Integrated Services Routers Software Configuration Guide
6
Product Overview

Models of Cisco 880 Series ISRs

The Cisco 880 series ISRs have data and voice capabilities. Each router has one WAN port. In addition, routers supporting voice have either FXS (Foreign Exchange Station) or BRI voice ports. Data or voice backup ports are also available on most of the routers. The Cisco 880G routers come with a commercial third-generation (3G) wireless interface card that provides cellular backup. 802.11b/g/n option is available on all models.
Table 8: Port Configurations of the Cisco 880 Series Data ISRs , on page 7 gives the port configurations
of Cisco 880 series data ISRs.
Table 8: Port Configurations of the Cisco 880 Series Data ISRs
Models of Cisco 880 Series ISRs
BackupWAN PortModel
Data 3GData ISDN
FE881 and 881W
FE881-V
FE881G and 881GW
xADSL2oPOTS886 and 886W
ADSL2oPOTS886G and 886GW
xADSL2oPOTS887 and 887W
ADSL2oPOTS887G and 887GW
x
x
x
xxVDSL2oPOTS887-VA-V
xVDSL2oPOTS887V and 887VW
VDSL2oPOTS887VG and 887VGW
xG.SHDSL888 and 888W
G.SHDSL888G and 888GW
x
x
xEFM over G.SHDSL888E and 888EW
xMultimodeC888EA-K9
Table 9: Port Configurations of Cisco 880 Series Voice ISRs , on page 8 gives the port configurations of
Cisco 880 series voice ISRs.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
7
Models of Cisco 880 Series ISRs
Table 9: Port Configurations of Cisco 880 Series Voice ISRs
Product Overview
BackupFXS Voice PortsWAN PortModel
PSTN BRIPSTN FXO
x4FEC881SRST and
C881SRSTW
4G.SHDSLC888SRST and
x
C888SRSTW
C888ESRST and C888ERSTW
G.SHDSL
4EFM over
4
Table 10: Port Configurations of Cisco 880 Series Data and Voice ISRs , on page 8 gives the port
configurations of Cisco 881-V, Cisco887VA-V, and Cisco 887VA-V-W series ISRs.
Table 10: Port Configurations of Cisco 880 Series Data and Voice ISRs
WAN PortModel
BackupWLANPSTN BRIFXS Voice
Ports
Data (ISDN)PSTN FXO
24FEC881-V
24VDSL2/ADSL2C887VA-V
x24VDSL2/ADSL2C887VA-V-W
1
x
x
The Cisco 887 VA-V and Cisco 881-V routers give you the flexibility to use the FXS or BRI voice ports (The Cisco 881-V router also supports a backup FX0 port), but the number of concurrent calls that the router supports is limited by the codec complexity configuration. The router supports less calls when the codec complexity setting is configured for high complexity. Table 11: Number of Concurrent Calls Supported on
Cisco 880 Series Data and Voice ISRs, on page 8 shows the number of concurrent calls that is supported
on the router for each codec complexity setting. Configuring the codec complexity setting to support secure calls does not affect the numbers below.
Table 11: Number of Concurrent Calls Supported on Cisco 880 Series Data and Voice ISRs
High ComplexityMedium ComplexityFlexible ComplexityModel
689C881-V
688C887VA-V
688C887VA-V-W
Cisco 800 Series Integrated Services Routers Software Configuration Guide
8
Product Overview

Common Features of Cisco 880 Series ISRs

Cisco 880 series ISRs support the following features:
4-port 10/100 FE LAN Switch of Cisco 880 Series ISRs
This switch provides four ports for connecting to 10/100BASE-T FE LANs, access points, or IP phones. In addition, an upgrade is available that gives Power over Ethernet (PoE) on two of the ports to provide power to access points or phones.
802.11n Wireless LAN Option of Cisco 880 Series ISRs
The Cisco 880W series ISRs have an integrated 802.11b/g/n single radio module for wireless LAN connectivity. With this module, the router can act as an access point in the local infrastructure.
Common Features of Cisco 880 Series ISRs
Real-Time Clock of Cisco 880 Series ISRs
A real-time clock (RTC) provides date and time when the system is powered on. The RTC is used to verify the validity of the Certification Authority stored on the router.
Note
Cisco 881V Series Routers do not support BRI2 as a clock source. It supports only BRI1 as a clock source. If you configure BRI2 as a clock source, the router will show a LINK DOWN message.
Security Features of Cisco 880 Series ISRs
The Cisco 880 Series ISRs provide the following security features:
Intrusion Prevention System (IPS)
Dynamic Multipoint VPN (DMVPN)
IPsec
Quality of service (QoS)
Firewall
URL filtering

Voice Features of Cisco 880 Series ISRs

The Cisco 880 voice and data platforms (C880SRST, C880SRSTW, C881-V, C887 VA-V, and C887VA-V-W) support the following voice features:
Signaling protocols: Session Initiation Protocol (SIP), Media Gateway Control Protocol (MGCP), and
H323
Cisco 800 Series Integrated Services Routers Software Configuration Guide
9

Cisco 890 Series ISRs

Product Overview
Real-time transfer protocol (RTP), Cisco RTP (cRTP), and secure RTP (SRTP) for these signaling
protocols
Fax passthrough, Cisco fax relay, T37 fax store-and-forward, and T.38 fax relay (including T.38
gateway-controlled MGCP fax relay)
Dual tone multifrequency (DTMF) RelayOOB and RFC2833
Silence suppression/comfort noise
G.711 (a-law and u-law), G.729A, G.729AB, G.729, G.729B, G.726
Support of SRST failover to a Foreign Exchange Office (FXO) or BRI backup port connected to PSTN
in case of WAN failure on C880SRST and C880SRSTW.
Support for SRST and CME requires user license, but only a 5-user license is supported on C881-V,
C887VA-V, and C887VA-V-W routers.
Direct inward dialing (DID) on FXS
Cisco 890 Series ISRs
The Cisco 890 series ISRs are fixed-configuration data routers. These routers have a Gigabit Ethernet WAN port and data backup ports.
Table 12: Port Configurations of the Cisco 890 Series ISRs, on page 10 gives the port configurations for the
Cisco 890 Series ISRs.
Table 12: Port Configurations of the Cisco 890 Series ISRs
Data BackupWAN PortModel
xxGE891 and 891W
xGE892 and 892W
892F and 892F-W
7
GE copper port.
8
SFP port supports GE with fiber. For a complete list of SFPs supported, see the Cisco 892F ISR data sheet on Cisco.com.
8
xGE7or SFP
Some of the features supported on Cisco 890 series ISRs are given as follows:
ISDNV.92FE
x
x

8-port 10/100 FE LAN Switch of Cisco 890 Series ISRs

The 8-port 10/100 FE LAN switch provides eight ports for connecting to 10/100BASE-T FE LANs, access points, or IP phones. In addition, an upgrade is available that gives PoE on four of the ports to provide power to access points or phones.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
10
Product Overview

802.11n Wireless LAN Option of Cisco 890 Series ISRs

802.11n Wireless LAN Option of Cisco 890 Series ISRs
The Cisco 890W series ISRs have integrated 802.11b/g/n and 802.11a/n dual radio modules for wireless LAN connectivity. With these modules, the router can act as an access point in the local infrastructure.

Real-Time Clock of Cisco 890 Series ISRs

A real-time clock (RTC) provides date and time when the system is powered on. The RTC is used to verify the validity of the Certification Authority stored on the router.

Security Features of Cisco 890 Series ISRs

Cisco 890 Series ISRs provide the following security features:
Intrusion Prevention System (IPS)
Dynamic Multipoint VPN (DMVPN)
IPsec
Quality of service (QoS)
Firewall
URL filtering

Cisco 810 Series ISRs

This section provides information about the features supported by Cisco 810 series ISRs. In Cisco 810 series ISRs, there are two different series of routers available - Cisco 812 series ISRs and Cisco 819 series ISRs.
This section contains the following topics:

Features of Cisco 812 Series ISRs

This section lists the software, platform, and security features supported by the Cisco 812 Series ISRs.
Note
The WAAS Express feature is not supported. This feature will be supported for 3G and 4G interfaces with later IOS releases.
3G Features of Cisco 812 Series ISR
The 3rd Generation (3G) is a generation of standards for mobile technology that facilitates growth, increased in bandwidth, and supports more diverse applications. The following 3G features are supported in Cisco 812 series ISR.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
11
Features of Cisco 812 Series ISRs
Modem control and management
Asynchronous transport (AT) command set
Wireless Host Interface Protocol (WHIP)
Control and Status (CNS) for out-of-band modem control and status
Diagnostic Monitor (DM) logging
Account provisioning
Modem firmware upgrade
SIM locking and unlocking
MEP unlocking
OMA-DM activation, voice-initiated data callback
Dual SIM card slots
Link persistence
Product Overview
SMS Services
Global Positioning System (GPS) Services
3G MIB
WLAN Features of Cisco 812 Series ISR
A Wireless Local Area Network (WLAN) implements a flexible data communication system frequently augmenting rather than replacing a wired LAN within a building or campus. WLANs use radio frequency to transmit and receive data over the air, minimizing the need for wired connections.
Cisco 812 ISR supports the following WLAN features:
Dual Radio of Cisco 812 Series ISR
The Cisco 802 Access Points (AP802) is an integrated access point on Cisco 812 ISRs. The access point is a wireless LAN transceiver that acts as the connection point between wireless and wired networks or as the center point of a standalone wireless network. In large installations, the roaming functionality provided by multiple access points enables wireless users to move freely throughout the facility while maintaining uninterrupted access to the network.
AP802 Dual Radio contains two different types of wirelesss radio that can support connections on both 2.4 Ghz used by 802.11b, 802.11g, and 802.11n and 5 Ghz used by 802.11a and 802.11n.
All the WLAN traffic for Cisco 812 ISR passes through the Ethernet WAN or 3G interface. The AP802 Dual Radio is supported on the following SKUs:
C812G-CIFI+7-E-K9
C812G-CIFI+7-N-K9
C812G-CIFI-V-A-K9
C812G-CIFI-S-A-K9
Cisco 800 Series Integrated Services Routers Software Configuration Guide
12
Product Overview
Cleanair Technology of Cisco 812 Series ISR
The CleanAir is a new wireless technology that intelligently avoids Radio Frequency (RF) to protect 802.11n performance. For more information, see Cisco CleanAir Technology . This feature is supported in all SKUs that has WLAN support.
Dynamic Frequency Selection of Cisco 812 Series ISR
The Dynamic Frequency Selection (DFS) is the process of detecting radar signals that must be protected against 802.11a interference and upon detection switching the 802.11a operating frequency to one that is not interfering with the radar systems. Transmit Power Control (TPC) is used to adapt the transmission power based on regulatory requirements and range information.

Features of Cisco 819 Series ISRs

Note
The DFS functionality is disabled for FCC SKUs pending FCC certification. For more information, see
Dynamic Frequency Selection and IEEE 802.11h Transmit Power Control .
Platform Features of Cisco 812 Series ISR
For the complete list of Cisco 812 ISR platform features, see Platform Features.
TFTP with Ethernet WAN Interface Feature of Cisco 812 Series ISR
For more information on TFTP download, see Disaster Recovery with TFTP Download .
Note
The Cisco 812 ISR has a GE interface as the only Ethernet interface. Hence, the port number is automatically set at Rommon for TFTP connectivity.
SKU Information for Cisco 812 Series ISR
See the following link for SKUs available for Cisco 812 series ISR router:
http://www.cisco.com/en/US/docs/routers/access/800/812/hardware/install/guide/overview.html#wp1057240
SKU information for Cisco 812 series
Features of Cisco 819 Series ISRs
This section lists the software, platform, and security features supported by the Cisco 819 Series ISRs.
Note
The WAAS Express feature is not supported. This feature will be supported for 3G and 4G interfaces with later IOS releases.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
13
Features of Cisco 819 Series ISRs
3G Features of Cisco 819 Series ISRs
The following 3G features are supported by Cisco 819 series ISR routeres .
Modem control and management
Asynchronous transport (AT) command set
Wireless Host Interface Protocol (WHIP)
Control and Status (CNS) for out-of-band modem control and status
Diagnostic Monitor (DM) logging
Account provisioning
Modem firmware upgrade
SIM locking and unlocking
MEP unlocking
OMA-DM activation
Product Overview
Dual SIM card slots
Link persistence
SMS Services
Global Positioning System (GPS) Services
3G MIB
WLAN Features of Cisco 819 Series ISRs
Cisco 819 series ISRs support the following WLAN features:
Dual Radio
CleanAir Technology
Dynamic Frequency Selection
4G LTE Features of Cisco 819 Series ISRs
Cisco 819 series ISRs supports the following 4G LTE features:
IPv4 bearer
MIPv4, NEMOv4, RFC 3025
IPv4 subnet behind LTE UE interface
Evolved High-Rate Packet Data (EHRPD), which allows seamless handoff between 4G LTE and 3G
services (C819(H)G-4G-V-K9 only)
Seamless hand-off between LTE and EHRPD network (C819(H)G-4G-V-K9 only)
Cisco 800 Series Integrated Services Routers Software Configuration Guide
14
Product Overview
Support for UMTS service as a fallback option from LTE service (C819(H)G-4G-A-K9 and
C819(H)G-4G-G-K9 only)
Seamless handoff between LTE and UMTS service (C819(H)G-4G-A-K9 and C819(H)G-4G-G-K9
only)
Remote access to Qualcomm diagnostic monitor port
OTA-DM including wireless configuration FOTA (C819(HG-4G-V-K9 only)
Mini USB type 2 connector for modem provisioning
Platform Features of Cisco 819 Series ISRs
For the complete list of Cisco 819 Series ISRs platform features, see Platform Features for Cisco 819 ISRs .
Security Features of Cisco 819 Series ISRs
The Cisco 819 Series ISRs provide the following security features:

Licensing for Cisco 800 Series ISRs

Intrusion Prevention System (IPS)
Dynamic Multipoint VPN (DMVPN)
IPsec
Quality of service (QoS)
Firewall
URL filtering
SKU Information for Cisco 819 Series ISRs
See the following link for SKUs available for Cisco 819 series ISRs:
http://www.cisco.com/c/en/us/td/docs/routers/access/800/hardware/installation/guide/800HIG/ prodoverview.html#pgfId-1146483
Licensing for Cisco 800 Series ISRs
The Cisco 810, 860, Cisco 880, and Cisco 890 ISRs ship with licensed software installed. Software features may be upgraded and the software licenses may be managed through Cisco Licensing Manager . See Software
Activation On Cisco Integrated Services Routers and Cisco Integrated Service Routers G2 for details.
When you order a new router, you specify the software image and feature set that you want. The image and feature set are installed on your router before you receive it, so you do not need to purchase a software license. The router stores the software license file on the flash memory.
The Cisco 860VAE does not require licenses.Note
Cisco 800 Series Integrated Services Routers Software Configuration Guide
15

Selecting Feature Sets for Cisco 800 Series ISRs

Selecting Feature Sets for Cisco 800 Series ISRs
Some feature sets are bundled and offered with a software license that is installed on the hardware platforms. For a list of features available with a software license on the Cisco 810, Cisco 860, Cisco 880, and Cisco 890 platforms, see Cisco 812 Data Sheet Cisco 819 Data Sheet , Cisco 860 Data Sheet , Cisco 880 Data Sheet , and Cisco 890 Data Sheet . See Cisco IOS Software Activation Tasks and Commands for details about how
to activate and manage the software licenses.
Product Overview
Cisco 800 Series Integrated Services Routers Software Configuration Guide
16
CHAPTER 2

Basic Router Configuration

This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup.
Note
Individual router models may not support every feature described in this guide. Features that are not supported by a particular router are indicated whenever possible.
This chapter includes configuration examples and verification steps, as available.
For complete information on how to access global configuration mode, see the Entering Global Configuration
Mode section.
Basic Router Configuration, page 17

Basic Router Configuration

This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup.
Note
Individual router models may not support every feature described in this guide. Features that are not supported by a particular router are indicated whenever possible.
This chapter includes configuration examples and verification steps, as available.
For complete information on how to access global configuration mode see Entering Global Configuration
Mode, page A-5 .

Interface Ports

Table 13: Supported Interfaces and Associated Port Labels for Cisco 860, 880 and 890 Series Router , on page 18 lists the interfaces that are supported for Cisco 860, 880 and 890 series routers and their associated
port labels on the equipment.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
17
Interface Ports
Basic Router Configuration
Table 13: Supported Interfaces and Associated Port Labels for Cisco 860, 880 and 890 Series Router
Port LabelInterfaceRouter
LAN Ports
890 series
WAN Ports
881G, 881GW, 881-V
887VG, 887VGW
887VA-V, 887VA-V-W
Fast Ethernet LANCisco 860, Cisco 880, and Cisco
LAN, FE0–FE3
(no label)Wireless LAN
LAN, FE0-FE3Ethernet LANCisco 866VAE, 867VAE
LAN, GE0, FE0-FE3Ethernet LANCisco 866VAE-K9, 867VAE-K9
WAN, FE4Fast Ethernet WANCisco 861, 861W, 881, 881W,
ADSLoPOTSADSL2oPOTS WANCisco 867, 867W
ADSLoPOTSADSL2oISDN WANCisco 886, 886W, 886G, 886GW
ADSLoPOTSADSL2oPOTS WANCisco 887, 887W
VDSLoPOTSVDSL2oPOTS WANCisco 887V, Cisco887VW,
VDSL/ADSLoPOTSVDSL/ADSLoPOTS WANCisco 867VA, 887VA, 887VA-M,
G.SHDSLG.SHDSL WANCisco 888, 888W
FE8Fast Ethernet WANCisco 891, 892
WAN GE 0Gigabit Ethernet WAN
WAN GE0Gigabit Ethernet WANCisco 866VAE, 867VAE
WAN GE1Gigabit Ethernet WANCisco 866VAE-K9, 867VAE-K9
VDSL/ADSL OVER ISDNVDSL/ADSLoISDN WANCisco 866VAE, 866VAE-K9
VDSL/ADSL OVER POTSVDSL/ADSLoPOTS WANCisco 867VAE, 867VAE-K9
Cisco 800 Series Integrated Services Routers Software Configuration Guide
18
Basic Router Configuration
Table 14: Supported Interfaces and Port Labels for Cisco 810 Series ISR

Default Configuration

Port LabelInterfaceRouter
Default Configuration
When you first boot up your Cisco router, some basic configuration has already been performed. All of the LAN and WAN interfaces have been created, console and vty ports are configured, and the inside interface for Network Address Translation (NAT) has been assigned. Use the show running-config command to view the initial configuration, as shown in the following example, for a Cisco 881W.
4-port Fast Ethernet LANCisco 819 Series Router
LAN, FE0–FE3
GE WAN 0Gigabit Ethernet WAN
SerialSerial
3G RSVDMini USB for 3G port Provisioning
CON/AUXConsole/Aux port
GE WAN 0Gigabit Ethernet WANCisco 812 Series Router
3G RSVDMini USB for 3G port Provisioning
CON/AUXConsole/Aux port
Router# show running-config User Access Verification Password: Router> en Password: Router# show running-config Building configuration... Current configuration : 986 bytes ! version 12.4 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router ! boot-start-marker boot-end-marker ! enable secret 5 $1$g4y5$NxDeM.0hON6YA51bcfGvN1 enable password ciscocisco ! no aaa new-model ! ! ! ! no ip routing no ip cef !
Cisco 800 Series Integrated Services Routers Software Configuration Guide
19
Default Configuration
Basic Router Configuration
! ! ! ! multilink bundle-name authe ! ! archive
log config
hidekeys ! ! ! ! ! interface FastEthernet0 ! interface FastEthernet1
shutdown ! interface FastEthernet2
shutdown ! interface FastEthernet3
shutdown ! interface FastEthernet4
ip address 10.1.1.1 255.255.255.0
no ip route-cache
duplex auto
speed auto ! interface Vlan1
no ip address
no ip route-cache
shutdown ! interface wlan-ap0
description Service Module interface to manage the embedded AP
ip unnumbered Vlan1
no cdp enable
arp timeout 0 ! ip route 0.0.0.0 0.0.0.0 10.1.1.1 ! ! no ip http server no ip http secure-server ! ! ! ! ! control-plane ! ! line con 0
no modem enable line aux 0 line vty 0 4
password cisco
login
transport input telnet ssh ! scheduler max-task-time 5000 ! webvpn cef end Router#
Cisco 800 Series Integrated Services Routers Software Configuration Guide
20
Basic Router Configuration

Information Needed for Configuration

Gather the following information, depending on your planned network scenario, before configuring your network:
If you are setting up an Internet connection, gather the following information:
PPP client name that is assigned as your login name
PPP authentication type: Challenge Handshake Authentication Protocol (CHAP) or Password
Authentication Protocol (PAP)
PPP password to access your ISP account
DNS server IP address and default gateways
If you are setting up a connection to a corporate network, you and the network administrator must
generate and share the following information for the WAN interfaces of the routers:
PPP authentication type: CHAP or PAP
Information Needed for Configuration
PPP client name to access the router
PPP password to access the router
If you are setting up IP routing:
Generate the addressing scheme for your IP network.
Determine the IP routing parameter information, including IP address and ATM permanent virtual
circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual circuit identifier (VCI), and traffic-shaping parameters.
Determine the number of PVCs that your service provider has given you, along with their VPIs
and VCIs.
For each PVC, determine the type of AAL5 encapsulation supported. It can be one of the following:
AAL5SNAPThis can be either routed RFC 1483 or bridged RFC 1483. For routed RFC 1483, the service provider must provide you with a static IP address. For bridged RFC 1483, you may use DHCP to obtain your IP address, or you may obtain a static IP address from your service provider.
AAL5MUX PPPWith this type of encapsulation, you need to determine the PPP-related configuration items.
If you plan to connect over an ADSL or G.SHDSL line:
Order the appropriate line from your public telephone service provider.
For ADSL linesEnsure that the ADSL signaling type is DMT (also known as ANSI T1.413) or DMT Issue
2.
For G.SHDSL linesVerify that the G.SHDSL line conforms to the ITU G.991.2 standard and supports Annex A (North America) or Annex B (Europe).
If you are setting up 3G:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
21
Information Needed for Configuration
You must have service availability on the Cisco 819 ISR from a carrier, and you must have network
coverage where your router will be physically placed. For a complete list of supported carriers, see the data sheet at Cisco 3G Wireless Connectivity Solutions.
You must subscribe to a service plan with a wireless service provider and obtain a SIM card.
You must install the SIM card before configuring the 3G Cisco 819 ISR. For instructions on how
to install the SIM card, see Cisco 800 Series see Configuring Cisco EHWIC and 880G for 3.7G
(HSPA+)/3.5G (HSPA)
You must install the required antennas before you configure the 3G for Cisco 819 ISR. See Table
15: Instructions for Installing Antenna, on page 22 for instructions on how to install the antennas:
Table 15: Instructions for Installing Antenna
Basic Router Configuration
Instructions for Installig AntennaAntenna
3G-ANTM1919D
3G-ANTM1916-CM
3G-AE015-R (Antenna Extension)
3G-AE010-R (Antenna Extension)
3G-ANTM-OUT-OM
3G-ANTM-OUT-LP
3G-ACC-OUT-LA
See Cisco Multiband Swivel-Mount Dipole Antenna
(3G-ANTM1919D).
See Cisco Multiband Omnidirectional Ceiling Mount
Antenna (3G-ANTM1916-CM)
See Cisco Single-Port Antenna Stand for Multiband
TNC Male-Terminated Portable Antenna (Cisco 3G-AE015-R).
See Cisco Single-Port Antenna Stand for Multiband
TNC Male-Terminated Portable Antenna (Cisco 3G-AE015-R). This document applies to both
3G-AE015-R and 3G-AE010-R. The only difference between these two products is the length of the cable.
See Cisco 3G Omnidirectional Outdoor Antenna
(3G-ANTM-OUT-OM).
See Cisco Multiband Omnidirectional Panel-Mount
Antenna (3G-ANTM-OUT-LP).
See Cisco 3G Lightning Arrestor
(3G-ACC-OUT-LA).
4G-ANTM-OM-CM
See Cisco 4G Indoor Ceiling-Mount Omnidirectional
Antenna (4G-ANTM-OM-CM)
You must check your LEDs for signal reception as described in Table 2-1 .
You should be familiar with the Cisco IOS software. See the Cisco IOS documentation beginning
with Release 12.4(15)T or later for Cisco 3G support .
Cisco 800 Series Integrated Services Routers Software Configuration Guide
22
Basic Router Configuration
To configure your 3G data profile, you will need the username, password, and access point name
(APN) from your service provider:
After collecting the appropriate information, perform a full configuration on your router beginning with the tasks in Configuring Command-Line Access, on page 23.
If you plan to connect voice equipment, see Cisco IOS Voice Port Configuration Guide .
If you need to obtain or change software licenses, see Software Activation on Cisco Integrated Services
Routers and Cisco Integrated Service Routers G2 .

Configuring Command-Line Access

To configure parameters to control access to the router, perform the following steps, beginning in global configuration mode:
SUMMARY STEPS
Configuring Command-Line Access
DETAILED STEPS
Step 1
Step 2
line [aux | console | tty | vty] line-number
1.
password password
2.
login
3.
exec-timeout minutes [seconds]
4.
line [aux | console | tty | vty] line-number
5.
password password
6.
login
7.
end
8.
line [aux | console | tty | vty] line-number
Example:
Router(config)# line console 0
password password
Example:
PurposeCommand or Action
Enters line configuration mode and specifies the type of line.
This example specifies a console terminal for access.
Specifies a unique password for the console terminal line.
Step 3
Router(config-line)# password 5dr4Hepw3
Enables password checking at terminal session login.login
Example:
Router(config-line)# login
Cisco 800 Series Integrated Services Routers Software Configuration Guide
23

Configuring Global Parameters

Basic Router Configuration
PurposeCommand or Action
Step 4
Step 5
Step 6
Step 7
Step 8
exec-timeout minutes [seconds]
Example:
Router(config-line)# exec-timeout 5 30
line [aux | console | tty | vty] line-number
Example:
Router(config-line)# line vty 0 4
password password
Example:
Router(config-line)# password aldf2ad1
Example:
Router(config-line)# login
end
Example:
Sets the time interval that the EXEC command interpreter waits until user input is detected. The default is 10 minutes. Optionally, add seconds to the interval value.
This example shows a timeout of 5 minutes and 30 seconds. Entering a timeout of 0 0 specifies never to time out.
Specifies a virtual terminal for remote console access.
Specifies a unique password for the virtual terminal line.
Enables password checking at the virtual terminal session login.login
Exits line configuration mode, and returns to privileged EXEC mode.
Router(config-line)# end
Configuring Global Parameters
To configure selected global parameters for your router, perform these steps:
SUMMARY STEPS
configure terminal
1.
hostname name
2.
enable secret password
3.
no ip domain-lookup
4.
DETAILED STEPS
Step 1
PurposeCommand or Action
Enters global configuration mode when using the console port.configure terminal
Cisco 800 Series Integrated Services Routers Software Configuration Guide
24
Basic Router Configuration
Example:
Example:
Router# configure terminal

Configuring WAN Interfaces

PurposeCommand or Action
If you are connecting to the router using a remote terminal, use the following:
telnet router name or address
Login: login id
Password: *********
Router> enable
Step 2
Step 3
Step 4
hostname name
Example:
Example:
Router(config)# hostname Router
enable secret password
Example:
Example:
Router(config)# enable secret cr1ny5ho
no ip domain-lookup
Example:
Example:
Router(config)# no ip domain-lookup
Specifies the name for the router.
Specifies an encrypted password to prevent unauthorized access to the router.
Disables the router from translating unfamiliar words (typos) into IP addresses.
Configuring WAN Interfaces
Configure the WAN interface for your router using one of the following as appropriate:
Configuring a Fast Ethernet WAN Interface
To configure the Fast Ethernet interface on a Cisco 861 or 881 ISR, perform these steps, beginning in global configuration mode:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
25
Configuring WAN Interfaces
SUMMARY STEPS
DETAILED STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
exit
4.
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Router(config)# interface fastethernet 4
ip address ip-address mask
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
exit
Example:
Router(config-if)# exit
What to Do Next
Enters the configuration mode for a Fast Ethernet WAN interface on the router.
Sets the IP address and subnet mask for the specified Fast Ethernet interface.
Enables the Ethernet interface, changing its state from administratively down to administratively up.
Exits configuration mode for the Fast Ethernet interface and returns to global configuration mode.
Note
Cisco IOS Release 15.1 (3) T introduces the batch command under the interface mode. You may notice a reduced CPU utilization when interface batching is enabled because packets are processed in batches resulting in more efficient cache usage.
Configuring the Media Type
Before configuring the Gigabit Ethernet interface on the Cisco 892F ISRs, you must first select the media type as either SFP or RJ45.
To configure the media type, perform the following steps, begining in global configuration mode:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
26
Basic Router Configuration
SUMMARY STEPS
DETAILED STEPS
interface type number
1.
media-type {sfp | rj45}
2.
exit
3.
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
interface type number
Example:
Router(config)# interface gigabitethernet 0
Example:
Router(config-if)# media-type sfp
Example:
OR
Example:
Router(config-if)# media-type rj45
exit
Example:
Router(config-if)# exit
Enters the configuration mode for a Gigabit Ethernet WAN interface on the router.
Specifies an SFP physical connection.media-type {sfp | rj45}
OR
Specifies an RJ-45 physical connection.
Exits configuration mode for the Gigabit Ethernet interface and returns to global configuration mode.
Configuring a Gigabit Ethernet WAN Interface
To configure the Gigabit Ethernet (GE) WAN interface on a Cisco 891, 892, or 860VAE ISR, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
exit
4.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
27
Configuring WAN Interfaces
DETAILED STEPS
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Router(config)# interface gigabitethernet 1
ip address ip-address mask
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
exit
Example:
Router(config-if)# exit
Example:
Router(config)#
Enters the configuration mode for a Gigabit Ethernet WAN interface on the router.
Sets the IP address and subnet mask for the specified Gigabit Ethernet interface.
Enables the Ethernet interface, changing its state from administratively down to administratively up.
Exits configuration mode for the Gigabit Ethernet interface and returns to global configuration mode.
Configuring a V.92 Modem Interface
The Cisco 891 ISR has a V.92 modem backup interface. To configure this interface, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
encapsulation ppp
3.
dialer in-band
4.
dialer string dial-string
5.
dialer-group group-number
6.
async mode dedicated
7.
exit
8.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
28
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
interface type number
Example:
Example:
Router(config)# interface async 1
ip address ip-address mask
Example:
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
encapsulation ppp
Example:
Example:
Router(config-if)# encapsulation ppp
Enters the configuration mode for a V.92 WAN interface (serial interface) on the router.
Sets the IP address and subnet mask for the specified V.92 interface.
Sets the encapsulation method to point-to-point protocol (PPP) for the serial interface.
Specifies that dial-on-demand routing (DDR) is supported.dialer in-band
Step 5
Step 6
Example:
Example:
Router(config-if)# dialer in-band
dialer string dial-string
Example:
Example:
Router(config-if)# dialer string 102
dialer-group group-number
Example:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
Specifies the string (telephone number) to be used when placing a call from the interface.
Configures the interface to belong to a specific dialing access group.
29
Configuring WAN Interfaces
Step 7
Step 8
Example:
Router(config-if)# dialer-group 1
async mode dedicated
Example:
Example:
Router(config-if)# async mode dedicated
exit
Example:
Basic Router Configuration
PurposeCommand or Action
Places the line into dedicated asynchronous mode using Serial Line Internet Protocol (SLIP) or PPP encapsulation.
Exits configuration mode for the V.92 interface and returns to global configuration mode.
Example:
Router(config-if)# exit
Example:
Router(config)#
Configuring a VDSL2 WAN Interface
The VDSL2 WAN interface is used on the Cisco 887V ISR platforms. Note that the VDSL2 WAN interface uses Ethernet as the Layer 2 transport mechanism.
To configure VDSL2 on the Cisco 887V ISR, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
controller vdsl 0
1.
interface type number
2.
ip address ip-address mask
3.
shutdown
4.
no shutdown
5.
exit
6.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
30
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
controller vdsl 0
Example:
Example:
Router(config)# controller vdsl 0
interface type number
Example:
Example:
Router(config)# interface ethernet 0
Example:
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
shutdown
Example:
Enters controller configuration mode and the controller number.
Note
There is no need to configure any VDSL2 parameters from CPE side. Any specific VDSL2 settings should be set on the DSLAM side.
Enters the configuration mode for Ethernet Layer 2 transport on the VDSL WAN interface on the router.
Sets the IP address and subnet mask for the interface.ip address ip-address mask
Disables the interface, changing its state from administratively up to administratively down.
Step 5
Step 6
Example:
Router(config-if)# shutdown
no shutdown
Example:
Example:
Router(config-if)# no shutdown
exit
Example:
Enables the interface, changing its state from administratively down to administratively up.
Exits configuration mode and returns to global configuration mode.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
31
Configuring WAN Interfaces
PurposeCommand or Action
Example:
Router(config-if)# exit
Configuring ADSL or VDSL on Cisco 860VAE and 880VA Multimode ISRs
This section contains the following topics:
Overview of Cisco 860VAE, 886VA, and 887VA Multimode ISRs
The Cisco customer premise equipment (CPE) Cisco 866VAE, 867VAE, 866VAE-K9, 867VAE-K9, 886VA and 887VA integrated services routers (ISRs) support asymmetric digital subscriber line (ADSL) 1/2/2+ and very high speed digital subscriber line 2 (VDSL2) transmission modes, also called multimode.
Basic Router Configuration
Note
The 866VAE and 886VA support xDSL over ISDN. The 867VAE and 887VA support xDSL over a plain old telephone system (POTS).
The default CPE operating mode is auto. Auto mode means that the CPE trains up to the mode configured on the digital subscriber line access multiplexer (DSLAM), ADSL1/2/2+, or VDSL2.
The following examples assume the DSLAM is configured in either ADSL2+ mode or VDSL2 mode, and the CPE is configured in auto mode.
Figure 1: Example Topology, on page 32 shows an ATM WAN or Ethernet WAN network topography.
Figure 1: Example Topology
Cisco 800 Series Integrated Services Routers Software Configuration Guide
32
Basic Router Configuration
Configuring WAN Interfaces
1
2Fast Ethernet LAN
interface or
Gigabit Ethernet LAN interface
ATM WAN interfaceADSL 1/2/2+ mode or
Ethernet WAN InterfaceVDSL2 mode
Note
A DSLAM in Layer 1 mode may be configured for auto mode. A DSLAM in Layer 2 mode must be configured for ATM mode or packet transfer mode (PTM).
Cisco 886VA and 887VA allow a maximum of four permanent virtual circuits (PVCs).Note
Note
Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs allow a maximum of two PVCs.
ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs
Annex M is an enhancement of the G.992.3 standard that doubles the upstream bandwidth by "borrowing" 32 additional tones from the downstream frequency range. This feature enables service providers to provision symmetric data rates for ADSL2 and ADSL2+ services with data rates up to 2 Mbps.
Cisco IOS Release 15.2(1)T adds support for enabling Annex M data structures on Cisco 887VA platforms and Annex A data structures on Cisco 887VA-M platforms. This features allows both Annex A and Annex M structures to be run on the same platform with a performance tradeoff for the annex that is not optimized for the device. With this feature implementation, the modes supported on Annex A platforms are the same as the modes supported on Annex M platforms (887VA-M and EHWIC-1DSL-VA-M). When digital subscriber line access multiplexer (DSLAM) supports Annex M, Annex M mode takes precedence over Annex A mode.
Note
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this feature.
For information on configuring Annex M data structures on Annex A platforms, see the, Enabling ADSL2/2+
Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs, on page 46.
Configuring Seamless Rate Adaption
ADSL connections can be dropped due to a number of reasons, such as crosstalk, changes in noise margin, temperature changes, or interference. ADSL2 addresses these problems by adapting the data rate in real-time. Seamless rate adaptation (SRA) enables the ADSL2 system to change the data rate of the connection during operation without any service interruption or bit errors.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
33
Configuring WAN Interfaces
These features are not currently available on the 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9.Note
For information on configuring SRA, see the Enabling Seamless Rate Adaption , on page 47.
Configuring UBR+
UBR is typically used for data communications applications, such as file transfer and email. UBR is a best effort service and is the lowest class of service in the hierarchy. There are no guarantees to the actual bandwidth allowed. Therefore, UBR virtual circuits (VCs) are susceptible to a large number of cell drops or a high cell transfer delay as cells move from the source to the destination. UBR has no bounds on Cell Delay Variation Tolerance (CDVT) and is only a best effort service.
UBR+ is a special ATM service class developed by Cisco. UBR defines only peak cell rate (PCR); however, UBR+ defines a minimum guaranteed cell rate (MCR) and (on the switch) a cell delay variation tolerance (CDVT).
Basic Router Configuration
Note
On Cisco IOS versions 15.2(1)T and later, UBR+ is compatable with Cisco Multimode 886VA and 887VA routers.
These features are not currently available on the 866VAE, 867VAE, 866VAE-K9, and 867VAE-K9.Note
For information on configuring UBR+, see the Configuring UBR+, on page 49.
Configuring ADSL Mode
Configuration tasks
Perform the following tasks to configure ADSL mode:
Configuring ADSL Auto Mode
Perform these steps to configure the DSL controller to auto mode, starting in global configuration mode.
Configure the DSLAM in ADSL 1/2/2+ mode prior to configuring the router.Note
SUMMARY STEPS
enable
1.
configure terminal
2.
controller vdsl slot
3.
operating mode {auto | adsl1 | adsl2 | adsl2+ | vdsl2 | ansi}
4.
end
5.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
34
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Router> enable
Example:
Router# configure terminal
Example:
Example:
Router(config)# controller vdsl 0
operating mode {auto | adsl1 | adsl2 | adsl2+ | vdsl2 | ansi}
Example:
Enables privileged EXEC mode.enable
Enter your password if prompted.
Enters global configuration mode.configure terminal
Enters config mode for the VDSL controller.controller vdsl slot
Configures the operating mode. The default is auto and is recommended.
Note
When configured in auto, the operating mode does not appear in the show running command.
Example:
Router(config-controller)# operating mode auto
Step 5
Example:
Example:
Router(config-controller)# end
Example:
Router#
Configuring CPE and Peer for ADSL Mode
When configuring for ADSL, the ATM main interface or ATM sub-interface must be configured with a PVC and an IP address, perform a no shutdown command on the interface if needed.
Exits the configuration mode and enters EXEC mode.end
Note
A reload is required after changing mode between adsl and vdsl for Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
35
Configuring WAN Interfaces
Configuring the ATM CPE side
Perform the following steps to configure the ATM CPE side, starting in global configuration mode.
SUMMARY STEPS
1.
2.
3.
4.
5.
6.
7.
DETAILED STEPS
Basic Router Configuration
interface type number
no shutdown
interface atm0.1 point-to-point
ip address ip-address mask
pvc [name] vpi/vci
protocol protocol {protocol-address [virtual-template] | inarp} [[no] broadcast | disable-check-subnet | [no] enable-check-subnet]
end
Step 1
Step 2
Step 3
Step 4
Step 5
interface type number
Example:
Router(config)# interface atm0
no shutdown
Example:
Router(config-if)# no shutdown
Example:
Router(config-if)# interface ATM0.1 point-to-point
Example:
Router(config-subif)#
Example:
Router(config-subif)# ip address 30.0.0.1
255.255.255.0
pvc [name] vpi/vci
Example:
PurposeCommand or Action
Enters configuration mode for the ATM WAN interface (ATM0).
Enables the configuration changes to the ATM interface.
Enables ATM0.1 point-to-point interface.interface atm0.1 point-to-point
Enters IP address and subnet mask.ip address ip-address mask
Creates or assigns a name to an ATM PVC and enters the ATM virtual circuit configuration mode.
Router(config-subif)# pvc 13/32
Cisco 800 Series Integrated Services Routers Software Configuration Guide
36
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 6
inarp} [[no] broadcast | disable-check-subnet | [no] enable-check-subnet]
Example:
Router(config-if-atm-vc)# protocol ip 30.0.0.2 broadcast
Step 7
end
Example:
Router(config-if-atm-vc)# end Router#
Configuring the ATM Peer side
Perform the following steps to configure the ATM peer side, starting in global configuration mode.
SUMMARY STEPS
1.
2.
3.
4.
5.
6.
7.
Configures a static map for an ATM PVC.protocol protocol {protocol-address [virtual-template] |
Exits the configuration mode and enters EXEC mode.
interface type number
no shutdown
interface atm0.1 point-to-point
ip address ip-address mask
pvc [name] vpi/vci
protocol protocol {protocol-address [virtual-template] | inarp} [[no] broadcast | disable-check-subnet | [no] enable-check-subnet]
end
DETAILED STEPS
Step 1
Step 2
interface type number
Example:
Router(config)# interface atm0
no shutdown
Example:
Router(config-if)# no shutdown
PurposeCommand or Action
Enters configuration mode for the ATM WAN interface (ATM0).
Enables the configuration changes to the ATM interface.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
37
Configuring WAN Interfaces
Basic Router Configuration
PurposeCommand or Action
Step 3
Step 4
Step 5
Step 6
Step 7
Example:
Router(config-if)# interface ATM0.1 point-to-point
Example:
Router(config-subif)# ip address 30.0.0.2
255.255.255.0
pvc [name] vpi/vci
Example:
Router(config-subif)# pvc 13/32
inarp} [[no] broadcast | disable-check-subnet | [no] enable-check-subnet]
Example:
Router(config-if-atm-vc)# protocol ip 30.0.0.1 broadcast
Enables the ATM0.1 point-to-point interface.interface atm0.1 point-to-point
Enters IP address and subnet mask.ip address ip-address mask
Creates or assigns a name to an ATM PVC and enters the ATM virtual circuit configuration mode.
Configures a static map for an ATM PVC.protocol protocol {protocol-address [virtual-template] |
Exits the configuration mode and enters EXEC mode.end
Example:
Router(config-if-atm-vc)# end
ADSL Configuration Example
The following example shows a typical ADSL2+ configuration set to auto mode. Outputs in bold are critical.
Router# show running Building configuration... Current configuration : 1250 bytes ! ! Last configuration change at 02:07:09 UTC Tue Mar 16 2010 ! version 15.1 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router ! boot-start-marker boot-end-marker ! !
Cisco 800 Series Integrated Services Routers Software Configuration Guide
38
Basic Router Configuration
no aaa new-model memory-size iomem 10 ip source-route ! ! ! ! ip cef no ipv6 cef ! ! ! ! license udi pid CISCO887-V2-K9 sn FHK1313227E license boot module c880-data level advipservices ! ! vtp domain cisco vtp mode transparent ! ! controller VDSL 0 ! vlan 2-4 ! ! ! ! ! interface Ethernet0
! interface BRI0
! interface ATM0
! interface ATM0.1 point-to-point
! ! interface FastEthernet0 ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3 ! interface Vlan1
! ip forward-protocol nd no ip http server no ip http secure-server ! ! ! ! ! ! ! control-plane !
Configuring WAN Interfaces
no ip address shutdown no fair-queue
no ip address encapsulation hdlc shutdown isdn termination multidrop
no ip address no atm ilmi-keepalive
ip address 30.0.0.1 255.255.255.0 pvc 15/32
protocol ip 30.0.0.2 broadcast
no ip address
Cisco 800 Series Integrated Services Routers Software Configuration Guide
39
Configuring WAN Interfaces
! line con 0
no modem enable line aux 0 line vty 0 4
login
transport input all ! exception data-corruption buffer truncate end
Verifying ADSL Configuration
Verify that the configuration is set properly by using the show controller vdsl 0 command from the privileged EXEC mode. Outputs in bold are critical.
Router# show controller vdsl 0 Controller VDSL 0 is UP Daemon Status: Up
Chip Vendor ID: 'BDCM' 'BDCM' Chip Vendor Specific: 0x0000 0x6110 Chip Vendor Country: 0xB500 0xB500 Modem Vendor ID: 'CSCO' 'BDCM' Modem Vendor Specific: 0x4602 0x6110 Modem Vendor Country: 0xB500 0xB500 Serial Number Near: FHK1313227E 887-V2-K 15.1(20100 Serial Number Far: Modem Version Near: 15.1(20100426:193435) [changahn Modem Version Far: 0x6110 Modem Status: TC Sync (Showtime!) DSL Config Mode: AUTO Trained Mode: G.992.5 (ADSL2+) Annex A TC Mode: ATM Selftest Result: 0x00 DELT configuration: disabled DELT state: not running Trellis: ON ON Line Attenuation: 1.0 dB 1.4 dB Signal Attenuation: 1.0 dB 0.0 dB Noise Margin: 6.8 dB 13.6 dB Attainable Rate: 25036 kbits/s 1253 kbits/s Actual Power: 13.7 dBm 12.3 dBm Total FECS: 0 0 Total ES: 0 0 Total SES: 0 0 Total LOSS: 0 0 Total UAS: 0 0 Total LPRS: 0 0 Total LOFS: 0 0 Total LOLS: 0 0 Bit swap: 163 7 Full inits: 32 Failed full inits: 0 Short inits: 0 Failed short inits: 0 Firmware Source File Name (version)
-------- ------ ------------------­VDSL embedded VDSL_LINUX_DEV_01212008 (1) Modem FW Version: 100426_1053-4.02L.03.A2pv6C030f.d22j Modem PHY Version: A2pv6C030f.d22j
Speed (kbps): 0 24184 0 1047 Previous Speed: 0 24176 0 1047 Total Cells: 0 317070460 0 13723742 User Cells: 0 0 0 0 Reed-Solomon EC: 0 0 0 0 CRC Errors: 0 0 0 0 Header Errors: 0 0 0 0 Interleave (ms): 0.00 0.08 0.00 13.56
Basic Router Configuration
XTU-R (DS) XTU-C (US)
DS Channel1 DS Channel0 US Channel1 US Channel0
Cisco 800 Series Integrated Services Routers Software Configuration Guide
40
Basic Router Configuration
Actual INP: 0.00 0.00 0.00 1.80 Training Log : Stopped Training Log Filename : flash:vdsllog.bin
Verifying CPE to Peer Connection for ADSL
Ping the peer to confirm that CPE to peer configuration is set up correctly.
Router# ping 30.0.0.2 rep 20 Type escape sequence to abort. Sending 20, 100-byte ICMP Echos to 30.0.0.2, timeout is 2 seconds: !!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (20/20), round-trip min/avg/max = 20/22/28 ms Router#
Configuring VDSL Mode
Configuration tasks
Perform the following tasks to configure VDSL mode:
Configuring WAN Interfaces
Configuring VDSL Auto Mode
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
Router(config)# controller vdsl 0
Step 2
operating mode {auto | adsl1 | adsl2 | adsl2+ | vdsl2 | ansi}
Example:
Router(config-controller)# operating mode
auto
Perform the following steps to configure the DSL controller to auto mode, starting in global configuration mode.
Configure the DSLAM in VDSL2 mode prior to configuring the router.Note
controller vdsl slot
1.
operating mode {auto | adsl1 | adsl2 | adsl2+ | vdsl2 | ansi}
2.
end
3.
PurposeCommand or Action
Enters config mode for the VDSL controller.controller vdsl slot
Configures the operating mode. The default is auto and is recommended.
Note
When configured in auto, the operating mode does not appear in the show running command.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
41
Configuring WAN Interfaces
Basic Router Configuration
PurposeCommand or Action
Step 3
Example:
Router(config-controller)# end Router#
Configuring CPE and Peer for VDSL Mode
When configuring VDSL, configure the ethernet 0 interface and perform a no shutdown command on the interface if needed. Start in the global configuration mode.
Configuring the VDSL CPE Side
Perform the following steps to configure the VDSL CPE side, starting in the global configuration mode.
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
end
4.
Exits the configuration mode and enters EXEC mode.end
Note
A reload is required after changing the mode on the Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9.
DETAILED STEPS
Step 1
Step 2
Step 3
Example:
Router(config)# interface ethernet0
Example:
Router(config-if)# ip address 90.0.0.1
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
PurposeCommand or Action
Enters configuration mode for the Ethernet interface 0.interface type number
Enters the IP address and subnet mask.ip address ip-address mask
Enables the configuration changes to the ip address and subnet mask.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
42
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 4
Example:
Router(config-if)# end
Configuring the VDSL Peer Side
Perform the following steps to configure the VDSL Peer side, starting in the global configuration mode.
SUMMARY STEPS
interface type number
1.
ip address ip-address mask
2.
no shutdown
3.
end
4.
DETAILED STEPS
Step 1
Exits the configuration mode and enters EXEC mode.end
PurposeCommand or Action
Enters configuration mode for the Ethernet interface 0.interface type number
Step 2
Step 3
Step 4
Example:
Router(config)# interface ethernet0
Example:
Router(config-if)# ip address 90.0.0.2
255.255.255.0
no shutdown
Example:
Router(config-if)# no shutdown
Example:
Router(config-if)# end
Configures the IP address and subnet mask.ip address ip-address mask
Enables the configuration changes to the IP address and subnet mask.
Exits the configuration mode and enters EXEC mode.end
Cisco 800 Series Integrated Services Routers Software Configuration Guide
43
Configuring WAN Interfaces
VDSL Configuration Example
The following example shows a typical output of a VDSL configuration. Outputs in bold are critical.
Router# show running Building configuration... Current configuration : 1250 bytes ! ! Last configuration change at 02:07:09 UTC Tue Mar 16 2010 ! version 15.1 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname Router ! boot-start-marker boot-end-marker ! ! no aaa new-model memory-size iomem 10 ip source-route ! ! ! ! ip cef no ipv6 cef ! ! ! ! license udi pid CISCO887-V2-K9 sn FHK1313227E license boot module c880-data level advipservices ! ! vtp domain cisco vtp mode transparent ! ! controller VDSL 0 ! vlan 2-4 ! ! ! ! ! interface Ethernet0
ip address 30.0.0.1 255.255.255.0
no fair-queue ! interface BRI
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop ! interface ATM0
no ip address
shutdown ! ! interface FastEthernet0 ! interface FastEthernet1 !
Basic Router Configuration
Cisco 800 Series Integrated Services Routers Software Configuration Guide
44
Basic Router Configuration
interface FastEthernet2 ! interface FastEthernet3 ! interface Vlan1
! ip forward-protocol nd no ip http server no ip http secure-server ! ! ! ! ! ! ! control-plane ! ! line con 0
line aux 0 line vty 0 4
! exception data-corruption buffer truncate end
Configuring WAN Interfaces
no ip address
no modem enable
login transport input all
Verifying VDSL Configuration
Verify the configuration is set properly by using the show controller vdsl 0 command from privileged EXEC mode. Outputs in bold are critical.
Router# show controller vdsl 0 Controller VDSL 0 is UP Daemon Status: Up
Chip Vendor ID: 'BDCM' 'BDCM' Chip Vendor Specific: 0x0000 0x0000 Chip Vendor Country: 0xB500 0xB500 Modem Vendor ID: 'CSCO' 'BDCM' Modem Vendor Specific: 0x4602 0x0000 Modem Vendor Country: 0xB500 0xB500 Serial Number Near: FHK1313227E 887-V2-K 15.1(20100 Serial Number Far: Modem Version Near: 15.1(20100426:193435) [changahn Modem Version Far: 0x0000 Modem Status: TC Sync (Showtime!) DSL Config Mode: AUTO Trained Mode: G.993.2 (VDSL2) Profile 12a TC Mode: PTM Selftest Result: 0x00 DELT configuration: disabled DELT state: not running Trellis: ON OFF Line Attenuation: 1.0 dB 0.0 dB Signal Attenuation: 1.0 dB 0.0 dB Noise Margin: 12.0 dB 9.5 dB Attainable Rate: 87908 kbits/s 50891 kbits/s Actual Power: 13.5 dBm 8.9 dBm Per Band Status: D1 D2 D3 U0 U1 U2 U3 Line Attenuation(dB): 0.9 2.3 N/A 7.2 2.9 7.0 N/A Signal Attenuation(dB): 0.9 2.3 N/A N/A 2.3 6.6 N/A Noise Margin(dB): 14.5 9.3 N/A N/A N/A N/A N/A Total FECS: 0 0 Total ES: 0 0 Total SES: 0 0 Total LOSS: 0 0
XTU-R (DS) XTU-C (US)
Cisco 800 Series Integrated Services Routers Software Configuration Guide
45
Configuring WAN Interfaces
Total UAS: 0 0 Total LPRS: 0 0 Total LOFS: 0 0 Total LOLS: 0 0 Bit swap: 1 0 Full inits: 33 Failed full inits: 0 Short inits: 0 Failed short inits: 0 Firmware Source File Name (version)
-------- ------ ------------------­VDSL embedded VDSL_LINUX_DEV_01212008 (1) Modem FW Version: 100426_1053-4.02L.03.A2pv6C030f.d22j Modem PHY Version: A2pv6C030f.d22j
Speed (kbps): 0 84999 0 48968 Previous Speed: 0 24184 0 1047 Reed-Solomon EC: 0 0 0 0 CRC Errors: 0 0 0 0 Header Errors: 0 0 0 0 Interleave (ms): 0.00 6.00 0.00 0.00 Actual INP: 0.00 0.00 0.00 0.00 Training Log : Stopped Training Log Filename : flash:vdsllog.bin Router#
Basic Router Configuration
DS Channel1 DS Channel0 US Channel1 US Channel0
Verifying CPE to Peer Connection for VDSL
Ping the peer to confirm that CPE to peer configuration is setup correctly.
Router# ping 30.0.0.2 rep 20 Type escape sequence to abort. Sending 20, 100-byte ICMP Echos to 30.0.0.2, timeout is 2 seconds: !!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (20/20), round-trip min/avg/max = 20/22/28 ms Router#
Enabling ADSL2/2+ Annex M Mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs
This feature requires Cisco IOS Release 15.2(1)T or a later.Note
Note
Configuring ADSL2/2+ Annex M mode on Over POTS VDSL2/ADSL Multimode Annex A SKUs.
SUMMARY STEPS
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this feature.
enable
1.
configure terminal
2.
controller vdsl 0
3.
operating mode {adsl1 | adsl2 annex a | annex m | adsl2+ annex a | annex m] | ansi | auto| vdsl2}
4.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
46
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Router> enable
Example:
Router# configure terminal
operating mode {adsl1 | adsl2 annex a | annex m | adsl2+ annex a | annex m] | ansi | auto| vdsl2}
Example:
Router(config-controller)# operating mode adsl2+ annex m
Enables privileged EXEC mode.enable
Enter your password if prompted.
Enters global configuration mode.configure terminal
Enters configuration mode for the VDSL controller.controller vdsl 0
asdl1Configures operation in ITU G.992.1 Annex A full-rate mode.
adsl2Configures operation in ADSL2 operating mode-ITU G.992.3 Annex A, Annex L, and Annex M. If an Annex operating mode is not chosen, Annex A, Annex L, and Annex M are enabled. The final mode is decided by negotiation with the DSL access multiplexer (DSLAM).
adsl2+Configures operation in ADSL2+ mode-ITU G.992.5 Annex A and AnnexM. If an Annex A operating mode is not chosen, both Annex and Annex M is enabled. The final mode is decided by negotiation with DSLAM.
ansiConfigures a router to operate in ANSI full-rate mode-ANSI T1.413.
autoDefault setting. Configures the router so that the DSLAM automatically picks the DSL operating mode, in the sequence described in the "Usage Guidelines" section. All supported modes are enabled.
vdsl2Configures operation in ITU G.993.2 mode.
annex a, m(Optional) If the annex option is not specified, both Annex A and Annex M are enabled. The final mode is decided by negotiation with the Digital Synchronous Line Access Multiplexer (DSLAM).
Enabling Seamless Rate Adaption
To enable SRA, perform the following steps.
SRA mode is disabled by default.Note
SRA requires Cisco IOS Release 15.2(1)T or a later release.Note
Cisco 800 Series Integrated Services Routers Software Configuration Guide
47
Configuring WAN Interfaces
SUMMARY STEPS
DETAILED STEPS
These features are not currently available on the Cisco 866VAE, 867VAE, 866VAE-K9, or 867VAE-K9.Note
enable
1.
configure terminal
2.
controller vdsl x/y/z
3.
sra
4.
Basic Router Configuration
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Example:
Router# enable
Example:
Router# configure terminal
controller vdsl x/y/z
Example:
Router(config)# controller vdsl 0/0/0
Example:
router(config-controller)# sra
Enables privileged EXEC mode.enable
Enter your password if prompted.
Enters global configuration mode.configure terminal
Enters controller configuration mode. Use the controller vdsl command in global configuration mode. This command does not have a no form.
xDefines the network module.
yDefines the slot number.
zDefines the port number.
Enables SRA mode.sra
Use the no form of the command to disable SRA.
Example Configuration: Seamless Rate Adaption
The following example enables SRA on a VDSL line:
! ! ! rotuer>enable router# configure terminal
Cisco 800 Series Integrated Services Routers Software Configuration Guide
48
Basic Router Configuration
Enter configuration commands, one per line. End with CNTL/Z router(config)# controller vdsl 0 router(config-controller)# sra router(config-controller)# end router# ! ! !
Configuring UBR+
Perform the following steps to configure UBR+.
Configuring WAN Interfaces
Note
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
Router> enable
Step 2
Cisco IOS Release 15.2(1)T or a later release is required to run UBR+ on Cisco 886VA, 887VA, and 887VA-M routers.
These features are not currently available on the Cisco 866VAE, 867VAE, 866VAE-K9, or 867VAE-K9.Note
enable
1.
configure terminal
2.
ubr+ output-pcr output-mcr [input-pcr] [input-mcr]
3.
PurposeCommand or Action
Enables privileged EXEC mode.enable
Enter your password if prompted.
Enters global configuration mode.configure terminal
Step 3
Example:
Router# configure terminal
ubr+ output-pcr output-mcr [input-pcr] [input-mcr]
Example:
Router(config-if-vc)# ubr+ 10000
3000 9000 1000
Configures unspecified bit rate (UBR) quality of service (QoS) and specifies the output peak cell rate and output minimum guaranteed cell rate for an ATM permanent virtual circuit (PVC), PVC range, switched virtual circuit (SVC), virtual circuit (VC) class, or VC bundle member.
To remove the UBR+ parameters, use the no form of this command.
output-pcrThe output peak cell rate (PCR) in kbps.
output-mcrThe output minimum guaranteed cell rate in kbps.
input-pcr(Optional for SVCs only) The input PCR in kbps. If this value is omitted, the input-pcr equals the output-pcr.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
49
Configuring WAN Interfaces
UBR+ Example
The following example configures UBR+ PVC on a DSL line:
interface atm 0/0
pvc 4/100
ubr+ 2304 2304
The following example specifies the output-pcr argument for an ATM PVC to be 100000 kbps and the output-mcr to be 3000 kbps:
Basic Router Configuration
PurposeCommand or Action
input-mcr(Optional for SVCs only) The input minimum guaranteed cell rate in kbps. If this value is omitted, the input-mcr equals the output-mcr.
Troubleshooting
pvc 1/32
ubr+ 100000 3000
The following example specifies the output-pcr, output-mcr, input-pcr, and input-mcr arguments for an ATM SVC to be 10000 kbps, 3000 kbps, 9000 kbps, and 1000 kbps, respectively:
svc lion nsap 47.0091.81.000000.0040.0B0A.2501.ABC1.3333.3333.05
ubr+ 10000 3000 9000 1000
There are no new commands for checking traffic on the Cisco 886VA and 887VA. Some helpful commands include the following show commands:
show interface Ethernet0
show interface ATM0
show interface summary
show controller vdsl 0
show controller atm0
show controller vdsl 0 datapath
show atm pvc
The “Cisco 860, Cisco 880, and Cisco 890 Series Integrated Services Routers Software Configuration Guide,
Troubleshootingsection may also be helpful.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
50
Basic Router Configuration
Configuring the Training Log Using the CLI
When you initiate the training log capture using the debug vdsl 0 training log on the Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs, the training log file opens. Any messages that are generated are buffered locally and are written to the training log file at 5k bytes per interval. The messages are not written all at one time, as in previous software versions that supported the training log capture feature.
Configuring WAN Interfaces
Note
A maximum log capacity of 8MB (approximately 1 hour of capture) exists on the Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs. Because of this capacity limitation, when the entire log collection exceeds 8MB, the log capture is automatically terminated.
Note
Cisco 866VAE, Cisco 867VAE, Cisco 866VAE-K9, and Cisco 867VAE-K9 ISRs do not support the continuous training log autostop feature.
Capturing the Training Log
By default the training log is saved to flash:vdsllog.bin.
To start the training log capture, use the debug vdsl 0 training log command.
Router# debug vdsl 0 training log Router#
The following confirmation is displayed:
Training log generation started for VDSL 0
Halting the Training Log Capture
To stop the training log capture, use the no debug vdsl 0 training log command.
Router# no debug vdsl 0 training log Router#
The following confirmation is displayed:
Training Log file for VDSL written to flash:vdsllog.bin
Displaying the Training Log Status and File Location
To display the training log status and file location, use the show controller vdsl 0 command.
Router# show controller vdsl 0 Router#
The following confirmation is displayed:
Controller VDSL 0 is UP
Daemon Status: NA
XTU-R (DS) XTU-C (US)
Chip Vendor ID: 'BDCM' 'BDCM'
Cisco 800 Series Integrated Services Routers Software Configuration Guide
51
Configuring WAN Interfaces
Chip Vendor Specific: 0x0000 0x938C Chip Vendor Country: 0xB500 0xB500 Modem Vendor ID: 'CSCO' 'BDCM' Modem Vendor Specific: 0x4602 0x938C Modem Vendor Country: 0xB500 0xB500 Serial Number Near: GMH1049001M 867VAE-K 15.1(20110 Serial Number Far: Modem Version Near: 15.1(20110422:230431) [suguraja Modem Version Far: 0x938C
Modem Status: TC Sync (Showtime!) DSL Config Mode: AUTO Trained Mode: G.992.5 (ADSL2+) Annex A TC Mode: ATM Selftest Result: 0x00 DELT configuration: disabled DELT state: not running Trellis: ON ON Line Attenuation: 0.0 dB 0.0 dB Signal Attenuation: 0.0 dB 0.0 dB Noise Margin: 16.0 dB 14.6 dB Attainable Rate: 28516 kbits/s 1222 kbits/s Actual Power: 7.0 dBm 12.4 dBm Total FECS: 3 0 Total ES: 0 0 Total SES: 0 0 Total LOSS: 0 0 Total UAS: 147 147 Total LPRS: 0 0 Total LOFS: 0 0 Total LOLS: 0 0 Bit swap: 0 0
Full inits: 1 Failed full inits: 0 Short inits: 0 Failed short inits: 0
Firmware Source File Name (version)
-------- ------ ------------------­VDSL embedded (0)
Modem FW Version: 23a Modem PHY Version: A2pv6C032b.d23a
Speed (kbps): 0 24543 0 1020 Previous Speed: 0 0 0 0 Total Cells: 0 87837567 0 3652502 User Cells: 0 0 0 0 Reed-Solomon EC: 0 3 0 0 CRC Errors: 0 0 0 0 Header Errors: 0 0 0 0 Interleave (ms): 0.00 15.00 0.00 3.76 Actual INP: 0.00 57.00 0.00 0.50
Training Log : Stopped Training Log Filename : flash:vdsllog.bin
Basic Router Configuration
DS Channel1 DS Channel0 US Channel1 US Channel0
Configuring a G.SHDSL WAN Interface in ATM mode
Perform the following steps to configure G.SHDSL on the Cisco 888 ISR perform these steps, beginning in global configuration mode.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
52
Basic Router Configuration
SUMMARY STEPS
controller dsl slot/port
1.
mode atm
2.
line-term cpe
3.
line-mode 4 wire standard
4.
line-rate {auto | rate}
5.
interface atm interface-number
6.
ip-address ip-address
7.
load-interval seconds
8.
no atm ilmi-keepalive [seconds]
9.
pvc [name] vpi/vci
10.
protocol protocol protocol-address broadcast
11.
encapsulation [encapsulation-type]
12.
Configuring WAN Interfaces
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
controller dsl slot/port
Example:
Router(config)# controller dsl 0
Example:
Router(config-ctrl)# mode atm
Example:
Router(config-ctrl)# line-term cpe
Example:
Router(config-ctrl)# line-mode 4 wire standard
line-rate {auto | rate}
Example:
Router(config-ctrl)# line-rate 4608
PurposeCommand or Action
Enters controller configuration mode and the controller number.
Enables ATM encapsulation and creates logical ATM interface 0.mode atm
Enables CPE.line-term cpe
Enables 4 wire operation.line-mode 4 wire standard
Specifies the DSL line rate for the SHDSL port. The range is 192 to 2312 kbps. The default is auto (negotiated between the SHDSL port and the DSLAM).
Note
If different DSL line rates are configured at opposite ends of the DSL uplink, the actual DSL line rate is always the lower rate.
Note
The maximum peak cell rate is 8 kbps less than the line rate.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
53
Configuring WAN Interfaces
Basic Router Configuration
PurposeCommand or Action
Step 6
Step 7
Step 8
Step 9
Step 10
interface atm interface-number
Example:
Router(config-ctrl)# interface atm0
ip-address ip-address
Example:
Router(config-ctrl)# ip-address IP-address
load-interval seconds
Example:
Router(config-ctrl)# load-interval 3
no atm ilmi-keepalive [seconds]
Example:
Router(config-ctrl)# no atm ilmi-keepalive0
pvc [name] vpi/vci
Example:
Router(config-ctrl)# pvc 0/35
Enters ATM configuration mode for interface ATM 0.
Assigns an IP address to the DSL ATM interface.
Assigns a load interval value.
Disables Integrated Local Management Interface (ILMI) keepalives.
If you enable ILMI keepalives without specifying the number of seconds, the default time interval is 3 seconds.
Enters atm-virtual-circuit (interface-atm-vc) configuration mode, and configures a new ATM PVC by assigning a name (optional) and VPI/VCI numbers.
The default traffic shaping is UBR; the default encapsulation is AAL5+LLC/SNAP.
Step 11
Step 12
protocol protocol protocol-address broadcast
Example:
Router(config-ctrl)# protocol ip
10.10.10.2 broadcast
encapsulation [encapsulation-type]
Example:
Router(config-ctrl)# encapsulation aal5snap
Enables IP connectivity and creates a point-to-point IP address for the VC.
Configures the ATM adaptation layer (AAL) and encapsulation type.
Use the aal2 keyword for AAL2
Use the aal5ciscoppp keyword for Cisco PPP over AAL5
Use the aal5mux keyword for AAL5+MUX
Use the aal5nlpid keyword for AAL5+NLPID
Use the aal5snap keyword for AAL5+LLC/SNAP (the
default)
Cisco 800 Series Integrated Services Routers Software Configuration Guide
54
Basic Router Configuration
Configuration Example: Configuring a G.SHDSL WAN Interface
The following configuration example shows a 4-wire standard G.SHDSL configuration.
! controller DSL 0
mode atm line-term cpe line-mode 4-wire standard dsl-mode shdsl symmetric annex B
line-rate 4608 ! interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop ! ! interface ATM0
ip address 10.10.10.1 255.255.255.0
no atm ilmi-keepalive
pvc 0/35
protocol ip 10.10.10.2 broadcast encapsulation aal5snap
! ! interface FastEthernet0 ! interface FastEthernet1 ! interface FastEthernet2 ! interface FastEthernet3
shutdown ! interface Vlan1
ip address 2.15.15.26 255.255.255.0 ! ip forward-protocol nd ip route 223.255.254.254 255.255.255.255 Vlan1 no ip http server no ip http secure-server !
Configuring WAN Interfaces
Verifying G.SHDSL WAN Interface Configuration
To verify that you have properly configured the router, enter the show running command and look for controller DSL and interface ATM0 parameters.
Router# show running Building configuration...
Current configuration : 1298 bytes !
.......
! controller DSL 0
mode atm
line-term cpe
line-mode 4-wire standard
dsl-mode shdsl symmetric annex B
line-rate 4608 ! ! interface ATM0
Cisco 800 Series Integrated Services Routers Software Configuration Guide
55
Configuring WAN Interfaces
ip address 10.10.10.1 255.255.255.0 no atm ilmi-keepalive pvc 0/31
protocol ip 10.10.10.5 broadcast encapsulation aal5snap
!
Configuring a G.SHDSL WAN Interface in EFM mode
To configure G.SHDSL on the Cisco 888E ISR, perform Configuring Cisco G.SHDSL EFM HWICs in Cisco
Routers at:
http://www.cisco.com/en/US/docs/routers/access/interfaces/software/feature/guide/GSHDSL_EFM_ HWICS.html
Configuring the Cellular Wireless WAN Interface
The Cisco 880 series and Cisco 810 series ISRs provide a third generation (3G) wireless interface for use over Global System for Mobile Communications (GSM) and code division multiple access (CDMA) networks. The interface is a 34-mm PCMCIA slot for Cisco 880 series.
Its primary application is WAN connectivity as a backup data link for critical data applications. However, the 3G wireless interface can also function as the primary WAN connection for the router.
To configure the 3G cellular wireless interface, follow these guidelines and procedures:
Basic Router Configuration
Prerequisites for Configuring the 3G Wireless Interface
The following are prerequisites to configuring the 3G wireless interface:
You must have wireless service from a carrier, and you must have network coverage where your router
will be physically placed. For a complete list of supported carriers, see the data sheet at:
http://www.cisco.com/en/US/prod/routers/networking_solutions_products_ genericcontent0900aecd80601f7e.html
You must subscribe to a service plan with a wireless service provider and obtain a SIM card (GSM
modem only) from the service provider.
You must check your LEDs for signal strength, as described in Table 16: Front Panel LED Signal
Strength Indications, on page 57.
You should be familiar with the Cisco IOS software, beginning with Cisco NX-OS Release 4.1 or later.
For Cisco 3G Wireless support, see the Cisco IOS documentation.
To configure your GSM data profile, you need the following information from your service provider:
Username
Password
Access point name (APN)
To configure your CDMA data profile for manual activation, you need the following information from
your service provider:
Cisco 800 Series Integrated Services Routers Software Configuration Guide
56
Basic Router Configuration
Table 16: Front Panel LED Signal Strength Indications
Master Subsidy Lock (MSL) number
Mobile Directory number (MDN)
Mobile Station Identifier (MSID)
Electronic Serial Number (ESN)
9
AmberP3G RSSI
Configuring WAN Interfaces
Signal StrengthLED ColorLED
No service available and no RSSI detected
Solid green
Fast (16 Hz) blinking green
Slow (1 Hz) blinking green
Off
9
3G RSSI = 3G receive signal strength indication.
Restrictions for Configuring the Cellular Wireless Interface
The following restrictions apply to configuring the Cisco 3G wireless interface:
A data connection can be originated only by the 3G wireless interface. Remote dial-in is not supported.
Because of the shared nature of wireless communications, the experienced throughput varies depending
on the number of active users or the amount of congestion in a given network.
Cellular networks have higher latency than wired networks. Latency rates depend on the technology and
carrier. Latency may be higher when there is network congestion.
VoIP is not currently supported.
High RSSI (–69 dBm or higher)
Medium RSSI (–89 to –70 dBm)
Low to medium RSSI (–99 to –90 dBm), minimum level for a reliable connection
Low RSSI (less than –100 dBm)
Any restrictions that are part of the terms of service from your carrier also apply to the Cisco 3G wireless
interface.
Cisco 880G ISR does not support online insertion and removal (OIR) of 3G modems. To replace a
modem with another modem of the same type, use the Cisco CLI to enter the shutdown command on the cellular interface before you replace the modems. =
When a 3G modem is removed, the show interface cellular 0, show run, and show version command
outputs still display cellular interface related information. The show interface command displays the following message, all other show commands have empty outputs.
3G Modem not inserted
Cisco 800 Series Integrated Services Routers Software Configuration Guide
57
Configuring WAN Interfaces
You can configure the cellular interface when the 3G modem is removed. However, the configuration
is not effective until the 3G modem is inserted. The following message is shown when trying to configure the cellular interface while the modem is absent.
Router(config)# interface cellular 0 Warning: 3G Modem is not inserted Configuration will not be effective until modem is inserted =
Inserting a different type of modem than was previously removed requires configuration changes and
you must reload the system.
Data Account Provisioning
Basic Router Configuration
Note
To provision your modem, you must have an active wireless account with a service provider. A SIM card must be installed in a GSM 3G wireless card.
To provision your data account, follow these procedures:
Verifying Signal Strength and Service Availability
To verify the signal strength and service availability on your modem, use the following commands in privileged EXEC mode.
This feature requires Cisco IOS Release 15.2(1)T or a later.Note
Note
Cisco 867VAE and 867VAE-K9 require Cisco IOS Release 15.1(4)M2 or 15.2(2)T or later to use this feature.
SUMMARY STEPS
show cellular 0 network
1.
show cellular 0 hardware
2.
show cellular 0 connection
3.
show cellular 0 radio
4.
show cellular 0 profile
5.
show cellular 0 security
6.
show cellular 0 all
7.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
58
Basic Router Configuration
DETAILED STEPS
Configuring WAN Interfaces
PurposeCommand or Action
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
show cellular 0 network
Example:
Router# show cellular 0 network
Example:
Router# show cellular 0 hardware
Example:
Router# show cellular 0 connection
Example:
Router# show cellular 0 radio
Example:
Router# show cellular 0 profile
show cellular 0 security
Example:
Displays information about the carrier network, cell site, and available service.
Displays the cellular modem hardware information.show cellular 0 hardware
Displays the current active connection state and data statistics.show cellular 0 connection
Shows the radio signal strength.show cellular 0 radio
Note
The RSSI should be better than –90 dBm for steady and reliable connection.
Shows information about the modem data profiles created.show cellular 0 profile
Shows the security information for the modem, such as SIM and modem lock status.
Router# show cellular 0 security
Step 7
show cellular 0 all
Example:
Router# show cellular 0 all
Configuring a GSM Modem Data Profile
To configure or create a new modem data profile, enter the cellular 0 gsm profile create <profile number> <apn> <authentication> <username> <password> command in privileged EXEC mode. See Table 17:
Modem Data Profile Parameters , on page 60 for details about the command parameters.
Example
Router# cellular 0 gsm profile create 3 apn.com chap GSM GSMPassword
Shows consolidated information about the modem. The profiles that were created, the radio signal strength, the network security, and so on.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
59
Configuring WAN Interfaces
Table 17: Modem Data Profile Parameters , on page 60 lists the modem data profile parameters.
Table 17: Modem Data Profile Parameters
Basic Router Configuration
profile number
apn
authentication
username
password
CDMA Modem Activation and Provisioning
Activation procedures may differ, depending upon your carrier. Consult your carrier, and perform one of the following procedures as appropriate:
Manual activation
Activation using over the air service provisioning
Table 18: CDMA Modem Activation and Provisioning, on page 60 lists the activation and provisioning
processes supported by different wireless carriers.
Table 18: CDMA Modem Activation and Provisioning
Number for the profile that you are creating. You can create up to 16 profiles.
Access point name. You must get this information from your service provider.
Type of authentication, for example, CHAP, PAP.
Username provided by your service provider.
Password provided by your service provider.
10
OTASP = Over the Air Service Provisioning.
11
IOTA = Internet Over the Air.
Manual Activation
Note
You must have valid mobile directory number (MDN), mobile subsidy lock (MSL), and mobile station identifier (MSID) information from your carrier before you start this procedure.
To configure a modem profile manually, use the following command, beginning in EXEC mode:
cellular 0 cdma activate manual mdn msid sid nid msl
CarrierActivation and Provisioning Process
SprintManual Activation using MDN, MSID, MSL
Verizon WirelessOTASP10Activation
SprintIOTA11for Data Profile refresh
Cisco 800 Series Integrated Services Routers Software Configuration Guide
60
Basic Router Configuration
Besides being activated, the modem data profile is provisioned through the Internet Over the Air (IOTA) process. The IOTA process is initiated automatically when you use the cellular cdma activate manual command.
The following is a sample output from this command:
router# cellular 0 cdma activate manual 1234567890 1234567890 1234 12 12345 NAM 0 will be configured and will become Active Modem will be activated with following Parameters MDN :1234567890; MSID :1234567890; SID :1234; NID 12: Checking Current Activation Status Modem activation status: Not Activated Begin Activation Account activation - Step 1 of 5 Account activation - Step 2 of 5 Account activation - Step 3 of 5 Account activation - Step 4 of 5 Account activation - Step 5 of 5 Secure Commit Result: Succeed Done Configuring - Resetting the modem The activation of the account is Complete Waiting for modem to be ready to start IOTA Beginning IOTA router# *Feb 6 23:29:08.459: IOTA Status Message Received. Event: IOTA Start, Result: SUCCESS *Feb 6 23:29:08.459: Please wait till IOTA END message is received *Feb 6 23:29:08.459: It can take up to 5 minutes *Feb 6 23:29:27.951: OTA State = SPL unlock, Result = Success *Feb 6 23:29:32.319: OTA State = Parameters committed to NVRAM, Result = Success *Feb 6 23:29:40.999: Over the air provisioning complete; Result:Success *Feb 6 23:29:41.679: IOTA Status Message Received. Event: IOTA End, Result: SUCCESS
The IOTA start and end must have successas the resulting output. If you receive an error message, you can run IOTA independently by using the cellular cdma activate iota command.
Your carrier may require periodic refreshes of the data profile. Use the following command to refresh the data profile:
cellular cdma activate iota
Configuring WAN Interfaces
Note
Activating with Over-the-Air Service Provisioning
To provision and activate your modem using Over-the-Air Service Provisioning (OTASP), use the following command, beginning in EXEC mode.
router # cellular 0 cdma activate otasp phone_number
You need to obtain the phone number for use with this command from your carrier. The standard OTASP calling number is *22899.
The following is a sample output from this command:
router# cellular 0 cdma activate otasp *22899 Beginning OTASP activation OTASP number is *22899 steelers_c881G# OTA State = SPL unlock, Result = Success router# OTA State = PRL downloaded, Result = Success OTA State = Profile downloaded, Result = Success OTA State = MDN downloaded, Result = Success OTA State = Parameters committed to NVRAM, Result = Success Over the air provisioning complete; Result:Success
Cisco 800 Series Integrated Services Routers Software Configuration Guide
61
Configuring WAN Interfaces
Configuring a Cellular Interface
To configure the cellular interface, enter the following commands, beginning in privileged EXEC mode.
Basic Router Configuration
Note
SUMMARY STEPS
DETAILED STEPS
Step 1
Example:
Router# configure terminal
Step 2
The PPP Challenge Handshake Authentication Protocol (CHAP) authentication parameters that you use in this procedure must be the same as the username and password provided by your carrier and configured only under the GSM profile. CDMA does not require a username or password.
configure terminal
1.
interface cellular 0
2.
encapsulation ppp
3.
ppp chap hostname host
4.
ppp chap password 0 password
5.
asynchronous mode interactive
6.
ip address negotiated
7.
PurposeCommand or Action
Enters global configuration mode from the terminal.configure terminal
Specifies the cellular interface.interface cellular 0
Step 3
Step 4
62
Example:
Router (config)# interface cellular 0
encapsulation ppp
Specifies PPP encapsulation for an interface configured for dedicated asynchronous mode or dial-on-demand routing (DDR).
Example:
Router (config-if)# encapsulation ppp
ppp chap hostname host
Defines an interface-specific Challenge Handshake Authentication Protocol (CHAP) hostname. This must match
Example:
Router (config-if)# ppp chap hostname host@wwan.ccs
Cisco 800 Series Integrated Services Routers Software Configuration Guide
the username given by the carrier. Applies to GSM only.
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 5
Step 6
Step 7
ppp chap password 0 password
Example:
Router (config-if)# ppp chap password 0 cisco
asynchronous mode interactive
Example:
Router (config-if)# asynchronous mode interactive
ip address negotiated
Example:
Router (config-if)# ip address negotiated
What to Do Next
Note
When the cellular interface requires a static IP address, the address may be configured as ip address negotiated. Through IP Control Protocol (IPCP), the network ensures that the correct static IP address is allocated to the device. If a tunnel interface is configured with the ip address unnumbered cellular interface command, the actual static IP address must be configured under the cellular interface, in place of ip address negotiated. For a sample cellular interface configuration, see the Basic Cellular Interface Configuration,
on page 66.
Defines an interface-specific CHAP password. This must match the password given by the carrier.
Returns a line from dedicated asynchronous network mode to interactive mode, enabling the slip and ppp commands in privileged EXEC mode.
Specifies that the IP address for a particular interface is obtained via PPP and IPCP address negotiation.
Configuring DDR
Perform these steps to configure dial-on-demand routing (DDR) for the cellular interface.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
63
Configuring WAN Interfaces
SUMMARY STEPS
Basic Router Configuration
configure terminal
1.
interface cellular 0
2.
dialer in-band
3.
dialer idle-timeout seconds
4.
dialer string string
5.
dialer-group number
6.
exit
7.
dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number | access-group}
8.
ip access-list access list number permit ip source address
9.
line 3
10.
script dialer regexp
11.
exit
12.
For GSM:
13.
interface cellular 0
14.
dialer string string
15.
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Example:
Router# configure terminal
Example:
Router (config)# interface cellular 0
dialer in-band
Example:
Router (config-if)# dialer in-band
dialer idle-timeout seconds
Example:
Router (config-if)# dialer idle-timeout 30
PurposeCommand or Action
Enters global configuration mode.configure terminal
Specifies the cellular interface.interface cellular 0
Enables DDR and configures the specified serial interface for in-band dialing.
Specifies the duration of idle time, in seconds, after which a line is disconnected.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
64
Basic Router Configuration
Configuring WAN Interfaces
PurposeCommand or Action
Step 5
Step 6
Step 7
Step 8
Step 9
dialer string string
Example:
Router (config-if)# dialer string gsm
dialer-group number
Example:
Router (config-if)# dialer-group 1
Example:
Router (config-if)# exit
dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number | access-group}
Example:
Router (config)# dialer-list 1 protocol ip list 1
Example:
Specifies the number or string to dial. Use the name of the chat script here.
Specifies the number of the dialer access group to which a specific interface belongs.
Enters the global configuration mode.exit
Creates a dialer list for traffic of interest and permits access to an entire protocol.
Defines traffic of interest.ip access-list access list number permit ip source address
Step 10
Step 11
Step 12
Step 13
Router (config)# ip access list 1 permit any
Example:
Router (config-line)# line 3
Example:
Router (config-line)# script-dialer gsm
Example:
Router (config-line)# exit
Example:
chat-script script name ”” “ATDT*99* profile number#
TIMEOUT timeout value CONNECT
Specifies the line configuration mode. It is always 3.line 3
Specifies a default modem chat script.script dialer regexp
Exits line configuration mode.exit
Configures the line for GSM.For GSM:
Configures the line for CDMA.
Defines the Attention Dial Tone (ATDT) commands when the dialer is initiated.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
65
Configuring WAN Interfaces
Step 14
Basic Router Configuration
PurposeCommand or Action
Example:
For CDMA:
Example:
chat-script script name "" "ATDT*777* profile
number#" TIMEOUT timeout value CONNECT
Example:
Router (config)# chat-script gsm "" "ATDT*98*2#" TIMEOUT 60 "CONNECT
Specifies the cellular interface.interface cellular 0
Example:
Router (config)# interface cellular 0
Step 15
dialer string string
Example:
Router (config)# dialer string gsm
Configuring Data Dedicated Transmission Mode (DDTM)
On CDMA modems, data transmission is disrupted by incoming voice calls if data dedicated transmission mode (DDTM) is disabled. You can enable DDTM mode so the modem ignores incoming voice calls.
To enable DDTM on a CDMA modem, use the cdma ddtm command in configuration mode.
This command is enabled by default. You can disable this feature by using the no cdma ddtm command.
Note
When DDTM is enabled, only voice calls are blocked for the MC5728v modems. On the AC597E and MC5725 and MC 5727, incoming SMS messages are also blocked.
Specifies the dialer script (defined using the chat script command).
Examples for Configuring Cellular Wireless Interfaces
This section provides the following configuration examples:
Basic Cellular Interface Configuration
The following example shows how to configure a gsm cellular interface to be used as a primary WAN connection. It is configured as the default route.
chat-script gsm "" "ATDT*98*2#" TIMEOUT 60 "CONNECT
Cisco 800 Series Integrated Services Routers Software Configuration Guide
66
Basic Router Configuration
! interface Cellular0
! ip route 0.0.0.0 0.0.0.0 Cellular0 ! ! access-list 1 permit any dialer-list 1 protocol ip list 1 ! line 3
The following example shows how to configure a cdma cellular interface to be used as a primary. It is configured as the default route.
Configuring WAN Interfaces
ip address negotiated
encapsulation ppp
dialer in-band
dialer string gsm
dialer-group 1
async mode interactive
ppp chap hostname cisco@wwan.ccs
ppp chap password 0 cisco
ppp ipcp dns request
exec-timeout 0 0
script dialer gsm
login
modem InOut
chat-script cdma "" "ATDT#777" TIMEOUT 60 "CONNECT ! interface Cellular0
ip address negotiated
encapsulation ppp
dialer in-band
dialer string cdma
dialer-group 1
async mode interactive
ppp chap password 0 cisco ! ip route 0.0.0.0 0.0.0.0 Cellular0 ! ! access-list 1 permit any dialer-list 1 protocol ip list 1 ! line 3
exec-timeout 0 0
script dialer cdma
login
modem InOut
Tunnel over Cellular Interface Configuration
The following example shows how to configure the static IP address when a tunnel interface is configured with the ip address unnumbered <cellular interface > command:
interface Tunnel2
ip unnumbered Cellular0
tunnel source Cellular0
tunnel destination 128.107.248.254 interface Cellular0
bandwidth receive 1400000
ip address 23.23.0.1 255.255.0.0
ip nat outside
ip virtual-reassembly
encapsulation ppp
no ip mroute-cache
dialer in-band
dialer idle-timeout 0
dialer string dial<carrier>
dialer-group 1
async mode interactive
Cisco 800 Series Integrated Services Routers Software Configuration Guide
67
Configuring WAN Interfaces
no ppp lcp fast-start ppp chap hostname <hostname> *** gsm only *** ppp chap password 0 <password> ppp ipcp dns request ! traffic of interest through the tunnel/cellular interface
ip route 10.10.0.0 255.255.0.0 Tunnel2
Configuring Dual SIM for Cellular Networks on Cisco 819 Series ISR
The Dual SIM feature implements auto-switch and failover between two cellular networks on a Cisco 819 ISR. This feature is enabled by default with SIM slot 0 being the primary slot and slot 1 being the secondary (failover) slot.
Basic Router Configuration
Note
For instructions on how to configure the Dual SIM feature for 4G LTE cellular networks, see the Cisco
4G LTE Software Installation Guide .
You can configure the Dual SIM feature using the following commands:
DescriptionSyntaxCommand
gsm failovertimer
gsm sim authenticate
gsm failovertimer <1-7>
gsm sim authenticate <0,7>
Sets the failover timer in minutes.
Verifies the SIM CHV1 code.
<pin> slot <0-1>
gsm sim max-retry
gsm sim max-retry <0-65535>
Specifies the maximum number of failover retries. The default value is 10.
gsm sim primary slot
gsm sim primary slot <0-1>
Modifies the primary slot assignment.
gsm sim profile
gsm sim profile <1-16> slot
Configures the SIM profile.
<0-1>
Note the following:
For auto-switch and failover to work, configure the SIM profile for slots 0 and 1 using the gsm sim
profile command.
For auto-switch and failover to work, configure the chat script without a specific profile number.
If no SIM profile is configured, profile #1 is used by default.
If no GSM failover timer is configured, the default failover timeout is 2 minutes.
If no GSM SIM primary slot is configured, the default primary SIM is slot 0.
The following example shows you how to set the SIM switchover timeout period to 3 minutes:
router(config-controller)# gsm failovertimer 3
The following example shows you how to authenticate using an unencrypted pin:
router(config-controller)# gsm sim authenticate 0 1234 slot 0
Cisco 800 Series Integrated Services Routers Software Configuration Guide
68
Basic Router Configuration
The following example shows you how to set the maximum number of SIM switchover retries to 20:
router(config-controller)# gsm sim max-retry 20
The following example shows you how to set SIM slot 1 as the primary slot:
router(config-controller)# gsm sim primary slot 1
The following example shows you how to configure the SIM card in slot 0 to use profile 10:
router(config-controller)# gsm sim profile 10 slot 0
Perform the following commands to manually switch the SIM:
Configuring WAN Interfaces
DescriptionSyntaxCommand
cellular GSM SIM
cellular GSM SIM {lock |
Locks or unlocks the SIM.
unlock}
gsm sim
cellular <unit> gsm sim [lock
Locks or unlocks the gsm SIM.
| unlock] <pin>
gsm sim unblock
cellular <unit> gsm sim
Unblocks the gsm SIM.
unblock <puk> <newpin>
gsm sim change-pin
cellular <unit> gsm sim
Changes the PIN of the SIM.
change-pin <oldpin> <newpin>
gsm sim activate slot
cellular <unit> gsm sim
Activates the GSM SIM.
activate slot <slot_no>
The following command forces the modem to connect to SIM1:
Router# cellular 0
gsm sim activate slot 1
Configuring Router for Image and Config Recovery Using Push Button for Cisco 819 Series ISR Router
A push button feature is available on the Cisco 819 ISR. The reset button on the front panel of the router enables this feature.
Perform the following steps to use this feature:
SUMMARY STEPS
Unplug power.
1.
Press the reset button on the front panel of the router.
2.
Power up the sytem while holding down the reset button.
3.
Cisco 800 Series Integrated Services Routers Software Configuration Guide
69
Configuring WAN Interfaces
DETAILED STEPS
Basic Router Configuration
Step 1 Step 2 Step 3
Unplug power.
Press the reset button on the front panel of the router.
Power up the sytem while holding down the reset button. The system LED blinks four times indicating that the router has accepted the button push.
What to Do Next
Using this button takes effect only during ROMMON initialization. During a warm reboot, pressing this button has no impact on performance. Table 19: Push Button Functionality during ROMMON Initialization, on page
70 shows the high level functionality when the button is pushed during ROMMON initialization.
Table 19: Push Button Functionality during ROMMON Initialization
IOS BehaviorROMMON Behavior
Boots using default baud rate.
Performs auto-boot.
If the configuration named *.cfg is available in nvram storage or flash storage, IOS will perform a backup of the original configuration and will boot up using this configuration.
Loads the *.default image if available on
compact flash
Note
You can only have one configuration file with *.cfg option. Having more than one file
Note
If no *.default image is available, the
will result in uncertain operational behavior.
ROMMON will boot up with the first Cisco
Examples of names for default images:
IOS image on flash.
c800-universalk9-mz.SPA.default,
c-800-universalk9_npe-mz.151T.default,
image.default
Note
You can only have one configuration file with *.cfg option. Having more than one file will result in uncertain operational behavior.
Use the show platform command to display the current bootup mode for the router. The following sections show sample outputs when the button is not pushed and when the button is pushed.
Output When Button Is Not Pushed: Example
router# show platform boot-record Platform Config Boot Record : ============================ Configuration Register at boot time : 0x0 Reset Button Status at Boot Time : Not Pressed Startup-config Backup Status at Boot: No Status Startup-config(backup file)location : No Backup
Cisco 800 Series Integrated Services Routers Software Configuration Guide
70
Loading...