Cisco 850 Series and Cisco 870 Series
Access Routers Software
Configuration
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-5332-01
Guide
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick
Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified
Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation,
Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ
Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Pack et , PIX, Post-Routing, Pre-Routing,
ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO
are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0501R)
IMPLIED, INCLUDING, WITHOUT
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
Notes, Cautions, and Timesavers13
Command Conventions13
Related Documents14
Obtaining Documentation and Submitting a Service Request14
CHAPTER
1Basic Router Configuration1
Interface Port Labels1
Viewing the Default Configuration2
Information Needed for Configuration4
Configuring Basic Parameters5
Configure Global Parameters5
Configure Fast Ethernet LAN Interfaces6
Configure WAN Interfaces6
Configure the Fast Ethernet WAN Interface6
Configure the ATM WAN Interface7
Configure the Wireless Interface7
Configuring a Loopback Interface8
Configuration Example8
Verifying Your Configuration9
Configuring Command-Line Access to the Router9
Configuration Example11
Configuring Static Routes11
Configuration Example12
Verifying Your Configuration12
OL-5332-01
Configuring Dynamic Routes12
Configuring RIP13
Configuration Example14
Verifying Your Configuration14
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
3
Contents
Configuring Enhanced IGRP14
Configuration Example15
Verifying Your Configuration15
PART
2Configuring Your Router for Ethernet and DSL Access
CHAPTER
CHAPTER
CHAPTER
2Sample Network Deployments1
3Configuring PPP over Ethernet with NAT1
Configure the Virtual Private Dialup Network Group Number2
Configure the Fast Ethernet WAN Interfaces3
Configure the Dialer Interface4
Configure Network Address Translation6
Configuration Example8
Verifying Your Configuration9
4Configuring PPP over ATM with NAT1
Configure the Dialer Interface3
Configure the ATM WAN Interface5
Configure DSL Signaling Protocol6
Configuring ADSL6
Verify the Configuration7
Configuring SHDSL7
Verify the Configuration8
CHAPTER
CHAPTER
4
Configure Network Address Translation9
Configuration Example11
Verifying Your Configuration12
5Configuring a LAN with DHCP and VLANs1
Configure DHCP2
Configuration Example4
Verify Your DHCP Configuration4
Configure VLANs5
Assign a Switch Port to a VLAN6
Verify Your VLAN Configuration6
6Configuring a VPN Using Easy VPN and an IPSec Tunnel1
Configure the IKE Policy4
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Configure Group Policy Information5
Apply Mode Configuration to the Crypto Map6
Enable Policy Lookup6
Configure IPSec Transforms and Protocols7
Configure the IPSec Crypto Method and Parameters8
Apply the Crypto Map to the Physical Interface9
Create an Easy VPN Remote Configuration10
Verifying Your Easy VPN Configuration11
Configuration Example11
Contents
CHAPTER
CHAPTER
CHAPTER
7Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation1
Configure a VPN2
Configure the IKE Policy3
Configure Group Policy Information4
Enable Policy Lookup5
Configure IPSec Transforms and Protocols5
Configure the IPSec Crypto Method and Parameters6
Apply the Crypto Map to the Physical Interface7
Configure a GRE Tunnel8
Configuration Example9
8Configuring a Simple Firewall1
Configure Access Lists3
Configure Inspection Rules3
Apply Access Lists and Inspection Rules to Interfaces4
Configuration Example5
9Configuring a Wireless LAN Connection1
Configure the Root Radio Station2
Configure Bridging on VLANs4
Configure Radio Station Subinterfaces6
Configuration Example7
CHAPTER
PART
OL-5332-01
10Sample Configuration1
3Configuring Additional Features and Troubleshooting
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
5
Contents
CHAPTER
CHAPTER
CHAPTER
11Additional Configuration Options1
12Configuring Security Features1
Authentication, Authorization, and Accounting1
Configuring AutoSecure2
Configuring Access Lists2
Access Groups3
Guidelines for Creating Access Groups3
Configuring a CBAC Firewall3
Configuring Cisco IOS Firewall IDS4
Configuring VPNs4
13Configuring Dial Backup and Remote Management1
Dial Backup Feature Activation Methods1
Backup Interfaces2
Configuring Backup Interfaces2
Floating Static Routes2
Configuring Floating Static Routes3
Dialer Watch4
Configuring Dialer Watch4
CHAPTER
Dial Backup Feature Limitations5
Configuration Example6
Configuring Dial Backup and Remote Management Through the Console or Auxiliary Port9
Configuration Tasks10
Configuration Example13
Configuring Dial Backup and Remote Management Through the ISDN S/T Port16
Configuration Tasks17
Configure ISDN Settings17
Configure the Aggregator and ISDN Peer Router20
14Troubleshooting1
Getting Started1
Before Contacting Cisco or Your Reseller1
ADSL Troubleshooting2
SHDSL Troubleshooting2
ATM Troubleshooting Commands2
ping atm interface Command3
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
6
OL-5332-01
show interface Command3
show atm interface Command5
debug atm Commands6
Guidelines for Using Debug Commands6
debug atm errors Command6
debug atm events Command7
debug atm packet Command8
Software Upgrade Methods9
Recovering a Lost Password9
Change the Configuration Register10
Reset the Router11
Reset the Password and Save Your Changes12
Reset the Configuration Register Value12
IP Precedence9
PPP Fragmentation and Interleaving9
CBWFQ10
RSVP10
Low Latency Queuing10
Access Lists11
CROM Monitor1
Entering the ROM Monitor1
ROM Monitor Commands2
Command Descriptions3
Disaster Recovery with TFTP Download3
TFTP Download Command Variables4
Required Variables4
Optional Variables5
Using the TFTP Download Command5
Configuration Register6
Changing the Configuration Register Manually6
Changing the Configuration Register Using Prompts6
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
8
OL-5332-01
Console Download7
Command Description8
Error Reporting8
Debug Commands8
Exiting the ROM Monitor10
Contents
APPENDIX
I
NDEX
DCommon Port Assignments1
OL-5332-01
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
9
Contents
10
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Preface
This software configuration guide provides instructions for using the Cisco command-line interface
(CLI) to configure features of the following Cisco
•Cisco 850 Series Routers
–
Cisco 851 Ethernet Access Router
–
Cisco 857 DSL Access Router
•Cisco 870 Series Routers
–
Cisco 871 Ethernet Access Router
–
Cisco 876, Cisco 877, and Cisco 878 DSL Access Routers
This preface describes the intended audience, the organization of this guide, and the text and command
conventions used throughout the guide. The preface includes the following topics:
•Audience
800 series routers:
Audience
NoteWe strongly recommend that network administrators with minimal familiarity with Cisco routers use the
•Organization
•Conventions
•Related Documents
•Obtaining Documentation and Submitting a Service Request
This guide is intended for network administrators whose backgrounds vary from having no or little
experience in configuring routers to having a high level of experience. You can use this guide in the
following situations:
•You have configured the software by using the Cisco Router Web Setup tool, and you want to
configure additional advanced software features by using the command-line interface (CLI).
•You want to configure the software using only the CLI.
Cisco Router and Security Device Manager (SDM)—a web-based configuration tool that allows you to
configure LAN and WAN interfaces, routing, Network Address Translation (NAT), firewalls, VPNs, and
other features on your router. To obtain the SDM release notes and other SDM documentation, go to
http://www.cisco.com/go/sdm and click the Technical Documentation link.
OL-5332-01
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
11
Organization
See the “Organization” section of this preface to help you decide which chapters contain the information
you need to configure your router.
Organization
This guide contains the following information:
Part 1: Getting Started
•Chapter 1, “Basic Router Configuration”—Describes how to configure basic router features and
Part 2: Configuring Your Router for Ethernet and DSL Access
•Chapter 2, “Sample Network Deployments”—Provides a road map for Part 2.
•Chapter 3, “Configuring PPP over Ethernet with NAT”—Provides instructions on how to configure
•Chapter 4, “Configuring PPP over ATM with NAT”—Provides instructions on how to configure
•Chapter 5, “Configuring a LAN with DHCP and VLANs”—Provides instructions on how to
•Chapter 6, “Configuring a VPN Using Easy VPN and an IPSec Tunnel”—Provides instructions on
Preface
interfaces.
PPPoE with Network Address Translation (NAT) on your Cisco router.
PPPoA with Network Address Translation (NAT) on your Cisco router.
configure your Cisco router with multiple VLANs and to have it act as a DHCP server.
how to configure a virtual private network (VPN) with a secure IP tunnel using the Cisco Easy VPN.
•Chapter 7, “Configuring VPNs Using an IPSec Tunnel and Generic Routing
Encapsulation”—Provides instructions on how to configure a VPN with a secure IP tunnel and
generic routing encapsulation (GRE).
•Chapter 8, “Configuring a Simple Firewall”—Provides instructions on how to configure a basic
firewall on your Cisco router.
•Chapter 9, “Configuring a Wireless LAN Connection”—Provides instructions on how to configure
a wireless LAN connection on your Cisco router.
•Chapter 10, “Sample Configuration”—Presents a summary configuration example showing features
configured in the preceding chapters of this part of the guide.
Part 3: Configuring Additional Features and Troubleshooting
•Chapter 11, “Additional Configuration Options”—Provides a road map for Part 3.
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS
Ve r si o n 2.0.
14
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
P
ART
1
Getting Started
CHA P TER
1
Basic Router Configuration
This chapter provides procedures for configuring the basic parameters of your Cisco router, including
global parameter settings, routing protocols, interfaces, and command-line access. It also describes the
default configuration on startup.
NoteIndividual router models may not support every feature described throughout this guide. Features not
supported by a particular router are indicated whenever possible.
This chapter contains the following sections:
•Interface Port Labels
•Viewing the Default Configuration
•Information Needed for Configuration
•Configuring Basic Parameters
•Configuring Static Routes
•Configuring Dynamic Routes
•Configuring Enhanced IGRP
Each section includes a configuration example and verification steps, as available.
For complete information on how to access global configuration mode, see the “Entering Global
Configuration Mode” section in Appendix A, “Cisco IOS Basic Skills.” For more information on the
commands used in the following tables, see the Cisco IOS Release 12.3 documentation set.
Interface Port Labels
Table 1-1 lists the interfaces supported for each router and their associated port labels on the equipment.
Ta b l e 1-1Supported Interfaces and Associated Port Labels by Cisco Router
RouterInterfacePort Label
Cisco 851Fast Ethernet LAN LAN (top), FE0–FE3 (bottom)
OL-5332-01
Fast Ethernet WANWAN (top), FE4 (bottom)
Wireless LAN(no label)
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
1-1
Viewing the Default Configuration
Table 1-1Supported Interfaces and Associated Port Labels by Cisco Router (continued)
RouterInterfacePort Label
Cisco 871Fast Ethernet LAN FE0–FE3
Cisco 857Fast Ethernet LAN LAN (top), FE0–FE3 (bottom)
Cisco 876Fast Ethernet LAN LAN (top), FE0–FE3 (bottom)
Cisco 877Fast Ethernet LAN LAN (top), FE0–FE3 (bottom)
Cisco 878Fast Ethernet LAN FE0–FE3
Chapter 1 Basic Router Configuration
Fast Ethernet WANFE4
Wireless LANLEFT, RIGHT/PRIMARY
USB1–0
ATM WA NADSLoPOTS
Wireless LAN(no label)
ATM WA NADSLoISDN
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
ATM WA NADSLoPOTS
Wireless LANLEFT, RIGHT/PRIMARY
ATM WA NG.SHDSL
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
Viewing the Default Configuration
When you first boot up your Cisco router, some basic configuration has already been performed. All of
the LAN and WAN interfaces have been created, console and VTY ports are configured, and the inside
interface for Network Address Translation has been assigned. Use the show
to view the initial configuration, as shown in
Example 1-1Cisco 851 Default Configuration on Startup
Router# show running-config
Building configuration...
Current configuration : 1090 bytes
!
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
running-config command
Example 1-1.
1-2
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 1 Basic Router Configuration
no aaa new-model
ip subnet-zero
!
ip cef
ip ips po max-events 100
no ftp-server write-enable
!
interface FastEthernet0
no ip address
shutdown
!
interface FastEthernet1
no ip address
shutdown
!
interface FastEthernet2
no ip address
shutdown
!
interface FastEthernet3
no ip address
shutdown
!
interface FastEthernet4
no ip address
duplex auto
speed auto
!
interface Dot11Radio0
no ip address
shutdown
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0
54.0
rts threshold 2312
station-role root
!
interface Vlan1
no ip address
!
ip classless
!
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
transport preferred all
transport output all
line vty 0 4
login
transport preferred all
transport input all
transport output all
!
end
Viewing the Default Configuration
OL-5332-01
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
1-3
Information Needed for Configuration
Information Needed for Configuration
You need to gather some or all of the following information, depending on your planned network
scenario, prior to configuring your network
•If you are setting up an Internet connection, gather the following information:
–
Point-to-Point Protocol (PPP) client name that is assigned as your login name
PPP password to access your Internet service provider (ISP) account
–
DNS server IP address and default gateways
•If you are setting up a connection to a corporate network, you and the network administrator must
generate and share the following information for the WAN interfaces of the routers:
–
PPP authentication type: CHAP or PAP
–
PPP client name to access the router
–
PPP password to access the router
•If you are setting up IP routing:
–
Generate the addressing scheme for your IP network.
Chapter 1 Basic Router Configuration
–
Determine the IP routing parameter information, including IP address, and ATM permanent
virtual circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual
circuit identifier (VCI), and traffic shaping parameters.
–
Determine the number of PVCs that your service provider has given you, along with their VPIs
and VCIs.
–
For each PVC determine the type of AAL5 encapsulation supported. It can be one of the
following:
AAL5SNAP—This can be either routed RFC 1483 or bridged RFC 1483. For routed RFC 1483,
the service provider must provide you with a static IP address. For bridged RFC 1483, you may
use DHCP to obtain your IP address, or you may obtain a static IP address from your service
provider.
AAL5MUX PPP—With this type of encapsulation, you need to determine the PPP-related
configuration items.
•If you plan to connect over an ADSL or G.SHDSL line:
–
Order the appropriate line from your public telephone service provider.
For ADSL lines—Ensure that the ADSL signaling type is DMT (also called ANSI T1.413) or
DMT Issue 2.
For G.SHDSL lines—Verify that the G.SHDSL line conforms to the ITU G.991.2 standard and
supports Annex A (North America) or Annex B (Europe).
Once you have collected the appropriate information, you can perform a full configuration on
your router, beginning with the tasks in the
“Configuring Basic Parameters” section.
1-4
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 1 Basic Router Configuration
Configuring Basic Parameters
To configure the router, perform one or more of these tasks:
•Configure Global Parameters
•Configure Fast Ethernet LAN Interfaces
•Configure WAN Interfaces
•Configuring a Loopback Interface
•Configuring Command-Line Access to the Router
A configuration example is presented with each task to show the network configuration following
completion of that task.
Configure Global Parameters
Perform these steps to configure selected global parameters for your router:
Configuring Basic Parameters
Step 1
Step 2
Step 3
Step 4
CommandPurpose
configure terminal
Enters global configuration mode, when using the
console port.
Disables the router from translating unfamiliar
words (typos) into IP addresses.
Example:
Router(config)# no ip domain-lookup
Router(config)#
OL-5332-01
For complete information on the global parameter commands, see the Cisco IOS Release 12.3
documentation set.
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
1-5
Configuring Basic Parameters
Configure Fast Ethernet LAN Interfaces
The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default
VLAN and as such, they are not configured with individual addresses. Access is afforded through the
VLAN. You may assign the interfaces to other VLANs if desired. For more information about creating
VLANs, see
Chapter 5, “Configuring a LAN with DHCP and VLANs.”
Configure WAN Interfaces
The Cisco 851 and Cisco 871 routers each have one Fast Ethernet interface for WAN connection. The
857, Cisco 877, and Cisco 878 routers each have one ATM interface for WAN connection.
Cisco
Based on the router model you have, configure the WAN interface(s) using one of the following
procedures:
•Configure the Fast Ethernet WAN Interface
•Configure the ATM WAN Interface
Chapter 1 Basic Router Configuration
Configure the Fast Ethernet WAN Interface
This procedure applies only to the Cisco 851 and Cisco 871 router models. Perform these steps to
configure the Fast Ethernet interface, beginning in global configuration mode:
Router(config-int)# no shutdown
Router(config-int)#
exit
Example:
Router(config-int)# exit
Router(config)#
Identifies and enters the configuration mode for an
ATM interface.
Sets the IP address and subnet mask for the ATM
interface.
Enables the ATM 0 interface.
Exits configuration mode for the ATM interface
and returns to global configuration mode.
Configure the Wireless Interface
The wireless interface enables connection to the router through a wireless LAN connection. For more
information about configuring a wireless connection, see
Connection,” and the Cisco Access Router Wireless Configuration Guide.
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 9, “Configuring a Wireless LAN
1-7
Configuring Basic Parameters
Configuring a Loopback Interface
The loopback interface acts as a placeholder for the static IP address and provides default routing
information.
For complete information on the loopback commands, see the Cisco IOS Release 12.3
set.
Step 1
documentation
Perform these steps to configure a loopback interface:
Enters configuration mode for the loopback
interface.
Step 2
ip address ip-address mask
Example:
Router(config-int)# ip address 10.108.1.1
255.255.255.0
Router(config-int)#
Step 3
exit
Example:
Router(config-int)# exit
Router(config)#
Configuration Example
The loopback interface in this sample configuration is used to support Network Address Translation
(NAT) on the virtual-template interface. This configuration example shows the loopback interface
configured on the Fast Ethernet interface with an IP address of 10.10.10.100/24, which acts as a static
IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address.
!
interface loopback 0
ip address 10.10.10.100 255.255.255.0 (static IP address)
ip nat outside
!
interface Virtual-Template1
ip unnumbered loopback0
no ip directed-broadcast
ip nat outside
!
Sets the IP address and subnet mask for the
loopback interface.
Exits configuration mode for the loopback
interface and returns to global configuration
mode.
1-8
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 1 Basic Router Configuration
Verifying Your Configuration
To verify that you have properly configured the loopback interface, enter the show interface loopback
command. You should see verification output similar to the following example.
Router# show interface loopback 0
Loopback0 is up, line protocol is up
Hardware is Loopback
Internet address is 10.10.10.100/24
MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation LOOPBACK, loopback not set
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/0, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out
Configuring Basic Parameters
Another way to verify the loopback interface is to ping it:
Router# ping 10.10.10.100
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.10.10.100, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Configuring Command-Line Access to the Router
Perform these steps to configure parameters to control access to the router, beginning in global
configuration mode.
Enters line configuration mode, and specifies the
type of line.
This example specifies a console terminal for
access.
Specifies a unique password for the console
terminal line.
OL-5332-01
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
1-9
Configuring Basic Parameters
CommandPurpose
Step 3
login
Example:
Router(config)# login
Router(config)#
Chapter 1 Basic Router Configuration
Enables password checking at terminal session
login.
Step 4
Step 5
Step 6
Step 7
exec-timeout minutes [seconds]
Example:
Router(config)# exec-timeout 5 30
Router(config)#
line [aux | console | tty | vty] line-number
Example:
Router(config)# line vty 0 4
Router(config)#
password password
Example:
Router(config)# password aldf2ad1
Router(config)#
login
Example:
Router(config)# login
Router(config)#
Sets the interval that the EXEC command
interpreter waits until user input is detected. The
default is 10 minutes. Optionally, add seconds to
the interval value.
This example shows a timeout of 5 minutes and
30
seconds. Entering a timeout of 0 0 specifies
never to time out.
Specifies a virtual terminal for remote console
access.
Specifies a unique password for the virtual
terminal line.
Enables password checking at the virtual terminal
session login.
1-10
Step 8
end
Exits line configuration mode, and returns to
privileged EXEC mode.
Example:
Router(config)# end
Router#
For complete information about the command line commands, see the Cisco IOS Release 12.3
documentation set.
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 1 Basic Router Configuration
Configuration Example
The following configuration shows the command-line access commands.
You do not need to input the commands marked “default.” These commands appear automatically in the
configuration file generated when you use the show running-config command.
!
line con 0
exec-timeout 10 0
password 4youreyesonly
login
transport input none (default)
stopbits 1 (default)
line vty 0 4
password secret
login
!
Configuring Static Routes
Configuring Static Routes
Step 1
Step 2
Static routes provide fixed routing paths through the network. They are manually configured on the
router. If the network topology changes, the static route must be updated with a new route. Static routes
are private routes unless they are redistributed by a routing protocol. Configuring static routes on the
850 and Cisco 870 series routers is optional.
Cisco
Perform these steps to configure static routes, beginning in global configuration mode:
CommandPurpose
ip route prefix mask {ip-address | interface-type
interface-number [ip-address]}
Example:
Router(config)# ip route 192.168.1.0
255.255.0.0 10.10.10.2
Router(config)#
end
Specifies the static route for the IP packets.
For details about this command and additional
parameters that can be set, see the
Cisco IOS IP
Command Reference, Volume 2 of 4: Routing
Protocols.
Exits router configuration mode, and enters
privileged EXEC mode.
Example:
Router(config)# end
Router#
For complete information on the static routing commands, see the Cisco IOS Release 12.3
documentation set. For more general information on static routing, see
Appendix B, “Concepts.”
OL-5332-01
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
1-11
Configuring Dynamic Routes
Configuration Example
In the following configuration example, the static route sends out all IP packets with a destination IP
address of 192.168.1.0 and a subnet mask of 255.255.255.0 on the Fast Ethernet interface to another
device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured PVC.
You do not need to enter the commands marked “(default).” These commands appear automatically in
the configuration file generated when you use the show running-config command.
!
ip classless (default)
ip route 192.168.1.0 255.255.255.0 10.10.10.2!
Verifying Your Configuration
To verify that you have properly configured static routing, enter the show ip route command and look
for static routes signified by the “S.”
You should see verification output similar to the following example.
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Chapter 1 Basic Router Configuration
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 1 subnets
C 10.108.1.0 is directly connected, Loopback0
S* 0.0.0.0/0 is directly connected, FastEthernet0
Configuring Dynamic Routes
In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or
topology. Changes in dynamic routes are shared with other routers in the network.
The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced
Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of
these routing protocols on your router.
1-12
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Chapter 1 Basic Router Configuration
Configuring RIP
Perform these steps to configure the RIP routing protocol on the router, beginning in global
configuration mode:
Router(config-router)# no auto-summary
Router(config-router)#
end
Example:
Router(config-router)# end
Router#
Specifies use of RIP version 1 or 2.
Specifies a list of networks on which RIP is to be
applied, using the address of the network of
directly connected networks.
Disables automatic summarization of subnet routes
into network-level routes. This allows subprefix
routing information to pass across classful network
boundaries.
Exits router configuration mode, and enters
privileged EXEC mode.
OL-5332-01
For complete information on the dynamic routing commands, see the Cisco IOS Release 12.3
documentation set. For more general information on RIP, see
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
Appendix B, “Concepts.”
1-13
Configuring Enhanced IGRP
Configuration Example
The following configuration example shows RIP version 2 enabled in IP network 10.0.0.0 and
192.168.1.0.
Execute the show running-config command from privileged EXEC mode to see this configuration.
!
router rip
version 2
network 10.0.0.0
network 192.168.1.0
no auto-summary
!
Verifying Your Configuration
To verify that you have properly configured RIP, enter the show ip route command and look for RIP
routes signified by “R.” You should see a verification output like the example shown below.
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Chapter 1 Basic Router Configuration
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 1 subnets
C 10.108.1.0 is directly connected, Loopback0
R 3.0.0.0/8 [120/1] via 2.2.2.1, 00:00:02, Ethernet0/0
Configuring Enhanced IGRP
Perform these steps to configure Enhanced IGRP (EIGRP), beginning in global configuration mode:
CommandPurpose
Step 1
router eigrp as-number
Example:
Router(config)# router eigrp 109
Router(config)#
Enters router configuration mode, and enables
EIGRP on the router. The autonomous-system
number identifies the route to other EIGRP routers
and is used to tag the EIGRP information.
1-14
Cisco 850 Series and Cisco 870 Series Access Routers Software Configuration Guide
OL-5332-01
Loading...
+ 166 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.