Cisco 1800 Series Integrated Services
Router (Fixed) Software Installation Guide
Cisco Systems, Inc.
www.cisco.com
Cisco has more than 200 offices worldwide.
Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
Last Revised: February 19, 2014
Text Part Number: OL-6426-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required
to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If the equipment causes interference to radio or television reception, which can be
determined by turning the equipment off and on, users are encouraged to try to correct the interference by using one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority to operate the product.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco 1800 Series Integrated Services Router (Fixed) Software Installation Guide
Cisco Technical Support Website1-16
Submitting a Service Request1-17
Definitions of Service Request Severity1-17
Obtaining Additional Publications and Information1-18
Interface Port Labels1-1
Viewing the Default Configuration1-2
OL-6426-02
Information Needed for Configuration1-4
Configuring Basic Parameters1-5
Configure Global Parameters1-6
Configure Fast Ethernet LAN Interfaces1-6
Configure WAN Interfaces1-7
Configure the Fast Ethernet WAN Interface1-7
Configure the ATM WAN Interface1-8
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
3
Contents
Configure the Wireless Interface1-9
Configuring a Loopback Interface1-9
Configuration Example1-9
Verifying Your Configuration1-10
Configuring Command-Line Access to the Router1-10
Configuration Example1-12
Configuring Static Routes1-12
Configuration Example1-13
Verifying Your Configuration1-13
Configuring Dynamic Routes1-13
Configuring RIP1-14
Configuration Example1-15
Verifying Your Configuration1-15
Configuring Enhanced IGRP1-15
Configuration Example1-16
Verifying Your Configuration1-16
PART
2Configuring Your Router for Ethernet and DSL Access
CHAPTER
CHAPTER
2Sample Network Deployments2-1
3Configuring PPP over Ethernet with NAT3-1
Configure the Virtual Private Dialup Network Group Number3-2
Configure the Fast Ethernet WAN Interfaces3-3
Configure the Dialer Interface3-5
Configure Network Address Translation3-7
Configuration Example3-9
Verifying Your Configuration3-10
CHAPTER
4Configuring PPP over ATM with NAT4-1
Configure the Dialer Interface4-3
Configure the ATM WAN Interface4-5
Configure DSL Signaling Protocol4-6
Configuring ADSL4-6
Verify the Configuration4-7
Configuring SHDSL4-7
Verify the Configuration4-8
Configure Network Address Translation4-9
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
4
OL-6426-02
Configuration Example4-11
Verifying Your Configuration4-12
Contents
CHAPTER
5Configuring a LAN with DHCP and VLANs5-1
Configure DHCP5-2
Configuration Example5-3
Verify Your DHCP Configuration5-4
Configure VLANs5-5
Verify Your VLAN Configuration5-5
Switch Port Configurations5-7
VLAN Trunking Protocol (VTP)5-8
802.1x Authentication5-8
Layer 2 Interfaces5-9
MAC Table Manipulation5-9
Maximum Switched Virtual Interfaces (SVIs)5-9
Switched Port Analyzer (SPAN)5-9
IP Multicast Switching5-9
Per-Port Storm Control5-10
Fallback Bridging5-10
Separate Voice and Data Subnets5-10
IGMP Snooping5-10
CHAPTER
CHAPTER
6Configuring a VPN Using Easy VPN and an IPSec Tunnel6-1
Configure the IKE Policy6-3
Configure Group Policy Information6-4
Apply Mode Configuration to the Crypto Map6-5
Enable Policy Lookup6-6
Configure IPSec Transforms and Protocols6-6
Configure the IPSec Crypto Method and Parameters6-7
Apply the Crypto Map to the Physical Interface6-8
Create an Easy VPN Remote Configuration6-9
Verifying Your Easy VPN Configuration6-10
Configuration Example6-10
7Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation7-1
Configure a VPN7-3
Configure the IKE Policy7-3
Configure Group Policy Information7-4
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
5
Contents
Enable Policy Lookup7-5
Configure IPSec Transforms and Protocols7-6
Configure the IPSec Crypto Method and Parameters7-7
Apply the Crypto Map to the Physical Interface7-8
Configure a GRE Tunnel7-8
Configuration Example7-10
CHAPTER
8Configuring a Simple Firewall8-1
Configure Access Lists8-3
Configure Inspection Rules8-3
Apply Access Lists and Inspection Rules to Interfaces8-4
Configuration Example8-5
CHAPTER
9Configuring a Wireless LAN Connection9-1
Configure the Root Radio Station9-3
Configure Bridging on VLANs9-5
Configure Radio Station Subinterfaces9-6
Configuration Example9-7
CHAPTER
CHAPTER
PART
10Sample Configuration10-1
11Additional Configuration Options11-1
2Configuring Additional Features and Troubleshooting
CHAPTER
CHAPTER
6
12Configuring Security Features12-1
Authentication, Authorization, and Accounting12-1
Configuring AutoSecure12-2
Configuring Access Lists12-2
Access Groups12-3
Guidelines for Creating Access Groups12-3
Configuring a CBAC Firewall12-3
Configuring Cisco IOS Firewall IDS12-4
Configuring VPNs12-4
13Configuring Dial Backup and Remote Management13-1
Dial Backup Feature Activation Methods13-1
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Backup Interfaces13-1
Configuring Backup Interfaces13-2
Floating Static Routes13-2
Configuring Floating Static Routes13-3
Dialer Watch13-4
Configuring Dialer Watch13-4
Dial Backup Feature Limitations13-5
Configuration Example13-6
Configuring Dial Backup and Remote Management Through the ISDN S/T Port13-9
Configure ISDN Settings13-9
Configure the Aggregator and ISDN Peer Router13-12
Configuring Dial Backup and Remote Management Through a V.92 Modem13-13
Asynchronous Interface Configuration13-13
Line Configuration13-15
Contents
CHAPTER
14Troubleshooting14-1
Getting Started14-1
Before Contacting Cisco or Your Reseller14-1
ADSL Troubleshooting14-2
SHDSL Troubleshooting14-2
PortFast Troubleshooting14-2
ATM Troubleshooting Commands14-3
ping atm interface Command14-3
show interface Command14-3
show atm interface Command14-5
debug atm Commands14-6
Guidelines for Using Debug Commands14-6
debug atm errors Command14-6
debug atm events Command14-7
debug atm packet Command14-8
Software Upgrade Methods14-9
Recovering a Lost Password14-9
Change the Configuration Register14-10
Reset the Router14-11
Reset the Password and Save Your Changes14-12
Reset the Configuration Register Value14-12
OL-6426-02
Managing Your Router with SDM14-13
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
8
OL-6426-02
NATB-7
Easy IP (Phase 1)B-8
Easy IP (Phase 2)B-8
QoSB-9
IP PrecedenceB-9
PPP Fragmentation and InterleavingB-9
CBWFQB-10
RSVPB-10
Low Latency QueuingB-10
Access ListsB-11
Contents
APPENDIX
CROM MonitorC-1
Entering the ROM MonitorC-1
ROM Monitor CommandsC-2
Command DescriptionsC-3
Disaster Recovery with TFTP DownloadC-3
TFTP Download Command VariablesC-3
Required VariablesC-4
Optional VariablesC-4
Using the TFTP Download CommandC-5
Configuration RegisterC-6
Changing the Configuration Register ManuallyC-6
Changing the Configuration Register Using PromptsC-6
Console DownloadC-7
Command DescriptionC-7
Error ReportingC-8
Debug CommandsC-8
Exiting the ROM MonitorC-9
APPENDIX
I
NDEX
OL-6426-02
DCommon Port AssignmentsD-1
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
9
Contents
10
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Preface
This software configuration guide provides instructions for using the Cisco command-line interface
(CLI) to configure features of the following Cisco 1800 series integrated services fixed-configuration
routers:
• Cisco 1811 and Cisco 1812 Ethernet Access Routers
Audience
This preface describes the intended audience, the organization of this guide, and the text and command
conventions used throughout the guide. The preface includes the following topics:
• Audience
• Organization
• Conventions
• Related Documents
• Obtaining Documentation
• Documentation Feedback
• Obtaining Technical Assistance
• Obtaining Additional Publications and Information
This guide is intended for network administrators whose backgrounds vary from having no or little
experience in configuring routers to having a high level of experience. You can use this guide in the
following situations:
• You have configured the software by using the Cisco Router Web Setup tool, and you want to
configure additional advanced software features by using the command-line interface (CLI).
• You want to configure the software using only the CLI.
OL-6426-02
NoteWe strongly recommend that network administrators with minimal familiarity with Cisco routers use the
Cisco Router and Security Device Manager (SDM)—a web-based configuration tool that allows you to
configure LAN and WAN interfaces, routing, Network Address Translation (NAT), firewalls, VPNs, and
other features on your router. To obtain the SDM release notes and other SDM documentation, go to
http://www.cisco.com/go/sdm and click the Technical Documentation link.
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1
Organization
See the “Organization” section of this preface to help you decide which chapters contain the information
you need to configure your router.
Organization
Table 1 lists the topics covered by this guide.
Table 1Document Organization
ChapterTitleDescription
Chapter 1Basic Router ConfigurationDescribes how to configure basic router features and
interfaces.
Chapter 2Sample Network DeploymentsProvides a road map for possible network deployments.
Chapter 3Configuring PPP over Ethernet with NATProvides instructions on how to configure PPPoE with
Network Address Translation (NAT) on your Cisco router.
Chapter 4Configuring PPP over ATM with NATProvides instructions on how to configure PPPoA with
Network Address Translation (NAT) on your Cisco router.
Chapter 5Configuring a LAN with DHCP and VLANs Provides instructions on how to configure your Cisco router
with multiple VLANs and to act as a DHCP server.
Chapter 6Configuring a VPN Using Easy VPN and an
IPSec Tunnel
Chapter 7Configuring VPNs Using an IPSec Tunnel
and Generic Routing Encapsulation
Chapter 8Configuring a Simple FirewallProvides instructions on how to configure a basic firewall on
Chapter 9Configuring a Wireless LAN ConnectionProvides instructions on how to configure a wireless LAN.
Chapter 10Sample ConfigurationPresents a summary configuration example showing features
Chapter 11Additional Configuration OptionsProvides a road map for Part 3.
Chapter 14TroubleshootingProvides information on identifying and solving problems,
Appendix ACisco IOS Software Basic SkillsExplains what you need to know about Cisco IOS software
Appendix BConceptsProvides general concept explanations of features.
Appendix CROM MonitorDescribes the use of the ROM Monitor (ROMMON) utility.
Appendix DCommon Port AssignmentsDescribes the currently assigned Transmission Control
Index
Provides instructions on how to configure a virtual private
network (VPN) with a secure IP tunnel using the Cisco Easy
VPN.
Provides instructions on how to configure a VPN with a secure
IP tunnel and generic routing encapsulation (GRE).
your Cisco router.
configured in the preceding chapters of this part of the guide.
including firewall and VPN configuration.
Provides instructions on how to configure your Cisco router
for dial backup and remote management.
such as how to recover a lost software password.
before you begin to configure it.
Protocol (TCP) and User Datagram Protocol (UDP) port
numbers.
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
2
OL-6426-02
Conventions
This guide uses the conventions described in the following sections for instructions and information.
Notes, Cautions, and Timesavers
Notes, cautions and time-saving tips use the following conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this guide.
CautionThis caution symbol means reader be careful. In this situation, you might do something that could result
in equipment damage or loss of data.
Conventions
TimesaverThis symbol means the described action saves time.
Command Conventions
Table 2 describes the command syntax used in this guide.
Table 2Command Syntax Conventions
ConventionDescription
boldfaceCommands and keywords.
italicCommand input that is supplied by you.
[]Optional keywords and default responses to system
{x | x | x}A choice of keywords (represented by x) appears in
^ or CtrlRepresents the key labeled Control. For example,
screen font
boldface screen
font
prompts appear within square brackets.
braces separated by vertical bars. You must select
one.
when you read ^D or Ctrl-D, you should hold down
the Control key while you press the D key.
Examples of information displayed on the screen.
Examples of information that you must enter.
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
3
Related Documents
Related Documents
Table 3 lists publications that provide related information on these routers:
Table 3Related and Referenced Documents
Cisco ProductDocument Title
Cisco 1800 series
fixed-configuration routers
Cisco access router
wireless LAN
documentation
Network management
system
Cisco IOS softwareCisco IOS software documentation, all releases. See the documentation
Cisco 1811 and Cisco 1812 Integrated Services Router Cabling and
Installation
Cisco 1801, Cisco 1802, and Cisco 1803 Integrated Services Router
Cabling and Installation
Cisco 1800 Series Integrated Services Router (Fixed) Hardware
Installation Guide
Regulatory Compliance and Safety Information for Cisco 1800 Integrated
Services Routers (Fixed)
Cisco Modular Access Router Cable Specifications
Cisco Access Router Wireless Configuration Guide
Cisco access router antenna documentation
Declarations of Conformity and Regulatory Information for Cisco Access
Products with 802.11a/b/g and 802.11b/g Radios
Cisco Router and Security Device Manager (SDM) Quick Start Guide
Network management software documentation
for the Cisco IOS software release installed on your router.
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
4
OL-6426-02
Documentation DVD
Cisco documentation and additional literature are available in a Documentation DVD package, which
may have shipped with your product. The Documentation DVD is updated regularly and may be more
current than printed documentation. The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product
number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/
Ordering Documentation
You can find instructions for ordering documentation at this URL:
• Report security vulnerabilities in Cisco products.
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
5
Obtaining Technical Assistance
• Obtain assistance with security incidents that involve Cisco products.
• Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product
Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you might have identified a
vulnerability in a Cisco product, contact PSIRT:
• Emergencies— security-alert@cisco.com
• Nonemergencies— psirt@cisco.com
TipWe encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one that has the most recent creation date in this public key server list:
In an emergency, you can also reach PSIRT by telephone:
• 1 877 228-7302
• 1 408 525-6532
Obtaining Technical Assistance
For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco
Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical
Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical
Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service
contract, contact your reseller.
Cisco Technical Support Website
The Cisco Technical Support Website provides online documents and tools for troubleshooting and
resolving technical issues with Cisco products and technologies. The website is available 24 hours a day,
365 days a year, at this URL:
http://www.cisco.com/techsupport
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
6
OL-6426-02
Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password.
If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
NoteUse the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support
Website by clicking the Tools & Resources link under Documentation & Tools.Choose Cisco Product
Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product
Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID
or model name; by tree view; or for certain products, by copying and pasting show command output.
Search results show an illustration of your product with the serial number label location highlighted.
Locate the serial number label on your product and record the information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3
and S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL:
Obtaining Technical Assistance
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You
and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your
business operation are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
7
Obtaining Additional Publications and Information
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.
• Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit
Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
• Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com
• Pack et magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet
• Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
• World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
8
OL-6426-02
P
ART
1
Getting Started
CHA PTER
1
Basic Router Configuration
This chapter provides procedures for configuring the basic parameters of your Cisco router, including
global parameter settings, routing protocols, interfaces, and command-line access. It also describes the
default configuration on startup. Note that individual router models may not support every feature
described throughout this guide. Features not supported by a particular router are indicated whenever
possible.
This chapter contains the following sections:
• Interface Port Labels
• Viewing the Default Configuration
• Information Needed for Configuration
• Configuring Basic Parameters
• Configuring Static Routes
• Configuring Dynamic Routes
• Configuring Enhanced IGRP
Each section includes a configuration example and verification steps, as available.
For complete information on how to access global configuration mode, see the “Entering Global
Configuration Mode” section in Appendix A, “Cisco IOS Basic Skills.” For more information on the
commands used in the following tables, see the Cisco IOS Release 12.3 documentation set.
Interface Port Labels
Table 1-1 lists the interfaces supported for each router and their associated port labels on the equipment.
Table 1-1Supported Interfaces and Associated Port Labels by Cisco Router
RouterInterfacePort Label
Cisco 1801Fast Ethernet LANs SWITCH and FE8–FE5 (top), FE x and
FE4–FE1 (bottom)
Fast Ethernet WANsFE0
ATM WANADSLoPOTS
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-1
Viewing the Default Configuration
Table 1-1Supported Interfaces and Associated Port Labels by Cisco Router (continued)
RouterInterfacePort Label
Cisco 1802Fast Ethernet LANs SWITCH and FE8–FE5 (top), FE x and
Cisco 1803Fast Ethernet LANs SWITCH and FE8–FE5 (top), FE x and
Cisco 1811Fast Ethernet LANs SWITCH and FE9–FE6 (top), FE x and
Cisco 1812Fast Ethernet LANs SWITCH and FE9–FE6 (top), FE x and
Chapter 1 Basic Router Configuration
FE4–FE1 (bottom)
Fast Ethernet WANsFE0
ATM WANADSLoISDN
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
FE4–FE1 (bottom)
Fast Ethernet WANsFE0
ATM WANG . SH D SL
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
FE5–FE2 (bottom)
Fast Ethernet WANsFE0–FE1
Wireless LANLEFT, RIGHT/PRIMARY
USB1–0
V. 9 2 M OD EM
FE5–FE2 (bottom)
Fast Ethernet WANsFE0–FE1
Wireless LANLEFT, RIGHT/PRIMARY
BRIISDN S/T
USB1–0
Viewing the Default Configuration
When you first boot up your Cisco router, some basic configuration has already been performed. All of
the LAN and WAN interfaces have been created, console and VTY ports are configured, and the inside
interface for Network Address Translation has been assigned. Use the show running-config command
to view the initial configuration, as shown in Example 1-1.
NoteIf you are unable to view the initial configuration and you get a No Password Set error message, you
must reset the initial password. For details, see the “Recovering a Lost Password” section in Chapter 14,
“Troubleshooting”.
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-2
OL-6426-02
Chapter 1 Basic Router Configuration
Example 1-1Cisco 1812 Default Configuration on Startup
version 12.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
no aaa new-model
ip subnet-zero
!
ip cef
!
ip ips po max-events 100
no ftp-server write-enable
!
interface BRI0
no ip address
shutdown
!
interface FastEthernet0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet1
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet2
no ip address
shutdown
!
interface FastEthernet3
no ip address
shutdown
!
interface FastEthernet4
no ip address
shutdown
!
interface FastEthernet5
no ip address
shutdown
!
interface FastEthernet6
no ip address
shutdown
!
interface FastEthernet7
no ip address
shutdown
!
Viewing the Default Configuration
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-3
Information Needed for Configuration
interface FastEthernet8
no ip address
shutdown
!
interface FastEthernet9
no ip address
shutdown
!
interface Vlan1
no ip address
!
ip classless
!
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
line aux 0
line vty 0 4
!
no scheduler allocate
end
Chapter 1 Basic Router Configuration
Information Needed for Configuration
You need to gather some or all of the following information, depending on your planned network
scenario, prior to configuring your network
• If you are setting up an Internet connection, gather the following information:
–
Point-to-Point Protocol (PPP) client name that is assigned as your login name
PPP password to access your Internet service provider (ISP) account
–
DNS server IP address and default gateways
• If you are setting up a connection to a corporate network, you and the network administrator must
generate and share the following information for the WAN interfaces of the routers:
–
PPP authentication type: CHAP or PAP
–
PPP client name to access the router
–
PPP password to access the router
• If you are setting up IP routing:
–
Generate the addressing scheme for your IP network.
–
Determine the IP routing parameter information, including IP address, and ATM permanent
virtual circuits (PVCs). These PVC parameters are typically virtual path identifier (VPI), virtual
circuit identifier (VCI), and traffic shaping parameters.
1-4
–
Determine the number of PVCs that your service provider has given you, along with their VPIs
and VCIs.
–
For each PVC determine the type of AAL5 encapsulation supported. It can be one of the
following:
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter 1 Basic Router Configuration
AAL5SNAP—This can be either routed RFC 1483 or bridged RFC 1483. For routed RFC 1483,
the service provider must provide you with a static IP address. For bridged RFC 1483, you may
use DHCP to obtain your IP address, or you may obtain a static IP address from your service
provider.
AAL5MUX PPP—With this type of encapsulation, you need to determine the PPP-related
configuration items.
• If you plan to connect over an ADSL or G.SHDSL line:
–
Order the appropriate line from your public telephone service provider.
For ADSL lines—Ensure that the ADSL signaling type is DMT (also called ANSI T1.413) or
DMT Issue 2.
For G.SHDSL lines—Verify that the G.SHDSL line conforms to the ITU G.991.2 standard and
supports Annex A (North America) or Annex B (Europe).
Once you have collected the appropriate information, you can perform a full configuration on
your router, beginning with the tasks in the “Configuring Basic Parameters” section.
Configuring Basic Parameters
Configuring Basic Parameters
To configure the router, perform one or more of these tasks:
• Configure Global Parameters
• Configure Fast Ethernet LAN Interfaces
• Configure WAN Interfaces
• Configuring a Loopback Interface
• Configuring Command-Line Access to the Router
A configuration example is presented with each task to show the network configuration following
completion of that task.
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-5
Configuring Basic Parameters
Configure Global Parameters
Perform these steps to configure selected global parameters for your router:
Disables the router from translating unfamiliar
words (typos) into IP addresses.
Example:
Router(config)# no ip domain-lookup
Router(config)#
For complete information on the global parameter commands, see the Cisco IOS Release 12.3
documentation set.
Configure Fast Ethernet LAN Interfaces
The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default
VLAN and as such, they are not configured with individual addresses. Access is afforded through the
VLAN. You may assign the interfaces to other VLANs if desired. For more information about creating
VLANs, see Chapter 5, “Configuring a LAN with DHCP and VLANs.”
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-6
OL-6426-02
Chapter 1 Basic Router Configuration
Configure WAN Interfaces
The Cisco 1811 and Cisco 1812 routers each have two Fast Ethernet interfaces for WAN connection. The
Cisco 1801, Cisco 1802, and Cisco 1803 routers each have one ATM interface for WAN connection.
Based on the router model you have, configure the WAN interface(s) using one of the following
procedures:
• Configure the Fast Ethernet WAN Interface
• Configure the ATM WAN Interface
Configure the Fast Ethernet WAN Interface
This procedure applies only to the Cisco 1811 and Cisco 1812 router models. Perform these steps to
configure the Fast Ethernet interfaces, beginning in global configuration mode.
Enters the configuration mode for a Fast
Ethernet WAN interface on the router.
NoteFast Ethernet WAN ports are numbered
0–1 on the Cisco 1800 series routers.
Step 2
ip address ip-address mask
Sets the IP address and subnet mask for the
specified Fast Ethernet interface.
Example:
Router(config-int)# ip address 192.1.12.2
255.255.255.0
Router(config-int)#
Step 3
no shutdown
Enables the Ethernet interface, changing its
state from administratively down to
administratively up.
Exits interface configuration mode and returns
Step 4
Example:
Router(config-int)# no shutdown
Router(config-int)#
exit
to global configuration mode.
Example:
Router(config-int)# exit
Router(config)#
Repeat these steps for the other Fast Ethernet WAN interface if desired.
NoteDue to a limitation on the internal transceiver of the on-board layer-3 Fast Ethernet interfaces available
on Cisco 1812 Ethernet Access Routers, configuring the interface with a speed of 10 Mbps may cause
some CRC errors to appear on the interface. This is an expected behavior of the Cisco 1812 routers
on-board layer-3 Fast Ethernet interface.
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-7
Configuring Basic Parameters
Configure the ATM WAN Interface
This procedure applies only to the Cisco 1801, Cisco 1802, and Cisco 1803 models.
Perform these steps to configure the ATM interface, beginning in global configuration mode:
Router(config-int)# no shutdown
Router(config-int)#
exit
Example:
Router(config-int)# exit
Router(config)#
Enters interface configuration mode.
Sets the IP address and subnet mask for the ATM
interface.
Enables the ATM 0 interface.
Exits interface configuration mode and returns to
global configuration mode.
1-8
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter 1 Basic Router Configuration
Configure the Wireless Interface
The wireless interface enables connection to the router through a wireless LAN connection. For more
information about configuring a wireless connection, see Chapter 9, “Configuring a Wireless LAN
Connection” and the Cisco Access Router Wireless Configuration Guide.
Configuring a Loopback Interface
The loopback interface acts as a placeholder for the static IP address and provides default routing
information.
For complete information on the loopback commands, see the Cisco IOS Release 12.3
documentation set.
Perform these steps to configure a loopback interface:
The loopback interface in this sample configuration is used to support Network Address Translation
(NAT) on the virtual-template interface. This configuration example shows the loopback interface
configured on the Fast Ethernet interface with an IP address of 200.200.100.1/24, which acts as a static
IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address.
!
interface loopback 0
ip address 200.200.100.1 255.255.255.0 (static IP address)
ip nat outside
!
interface Virtual-Template1
ip unnumbered loopback0
no ip directed-broadcast
ip nat outside
Sets the IP address and subnet mask for the
loopback interface.
Exits configuration mode for the loopback
interface and returns to global configuration
mode.
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
1-9
Configuring Basic Parameters
Verifying Your Configuration
To verify that you have properly configured the loopback interface, enter the show interface loopback
command. You should see verification output similar to the following example.
Router# show interface loopback 0
Loopback0 is up, line protocol is up
Hardware is Loopback
Internet address is 200.200.100.1/24
MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation LOOPBACK, loopback not set
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/0, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 output buffer failures, 0 output buffers swapped out
Chapter 1 Basic Router Configuration
Another way to verify the loopback interface is to ping it:
Router# ping 200.200.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 200.200.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Configuring Command-Line Access to the Router
Perform these steps to configure parameters to control access to the router, beginning in global
configuration mode: