Cisco Systems OL-31454-01 manual

Page 2

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following information is for FCC compliance of Class B devices: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.

However, there is no guarantee that interference will not occur in a particular installation. If the equipment causes interference to radio or television reception, which can be determined by turning the equipment off and on, users are encouraged to try to correct the interference by using one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/TV technician for help.

Modifications to this product not authorized by Cisco could void the FCC approval and negate your authority to operate the product.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

No combinations are authorized or intended under this document.

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

© 2011–2014 Cisco Systems, Inc. All rights reserved.

Image 2
Contents Cisco 2010 Connected Grid Router Hardware Installation Guide Page N T E N T S Attaching Rack-Mount Brackets to Cisco CGR 2010 Routers Configuring the Router Verifying the Initial Configuration Objectives AudienceChapter Title Description OrganizationConventions Convention IndicationBewaar Deze Instructies Aviso Instruções Importantes DE Segurança Warnung Wichtige SicherheitshinweiseAvvertenza Importanti Istruzioni Sulla Sicurezza Spara Dessa Anvisningar GEM Disse Anvisninger Xiii Xiv Obtaining Documentation and Submitting a Service Request Searching for Cisco DocumentsXvi Chassis Views A P T E RHardware Features Overview of the Router Hardware FeaturesLocating Chassis Features and Functions Do not Remove During Network OperationGrwic Installation Options AUXGigabit Ethernet Ports Built-in Interface PortsGigabit Ethernet Ports SFP PortsGrid Router WAN Interface Cards Removable and Interchangeable Modules and CardsUSB Console Port Model Description Power SuppliesMemory Hot Swap Internal RPS1 Dual DC2Real-Time Clock LED IndicatorsSlot, Port, and Interface Information PSU 1 OK LEDColor Description SYSConsole EN ACTPSU USB CONGE 0/0 Link SpecificationsSlot OL-31454-01 Preparing for Router Installation Safety Recommendations Safety with Electricity Preventing Electrostatic Discharge DamageRouter Environmental Requirements General Site RequirementsRack Requirements Console and Auxiliary Port Considerations Power Guidelines and RequirementsNetwork Cabling Specifications Console Port ConnectionsUSB Serial Console Port Preparing for Network ConnectionsAuxiliary Port Connections Serial Connections Configuring Serial ConnectionsEthernet Connections Serial DTE or DCE DevicesDevice Type Gender Typical Devices Signaling Standards SupportedDistance Limitations Asynchronous/Synchronous Serial Module Baud Rates 56000 102 16.4 1544000 T1Task Verified by Date Installation ChecklistCreating a Site Log Preparing for Router Installation Creating a Site Log OL-31454-01 Installing and Connecting the Router OL-31454-01 Slot and Port Numbers CLI Console AccessWhat you Need to Know Before You Begin Unpacking the RouterCisco CGR 2010 router can only be mounted in a rack Installing the Router in a RackRack-Mounting the Chassis Attaching Rack-Mount Brackets to Cisco CGR 2010 Routers PSU OK PWR-150W-HVMounting the Router in a Rack Mounting screwsModel Description Voltage Range Power-Supply ModulesConnecting AC Power Power-Input Terminal Designations Connecting AC Power Using Tie Wraps with the Strain Relief MechanismConnecting DC Power 10 Stripping the Input Power Source Wire Connecting DC Power 11 Using Tie Wraps with the Strain Relief Mechanism 12 CGR 2010 Power Terminal Cover Protecting the Terminal Block from ExposureReplacing the Cisco CGR 2010 Router Power Supply Shutting Off PowerReplacing Power Supplies and Redundant Power Supplies Serial RJ-45 EIA RJ-45 Connecting to a Console Terminal or ModemPort Type Cable Section Connecting to the Serial Port with Microsoft Windows Connecting to the Console Port with Mac OS Connect the OS X USB port to the routerConnecting to the Console Port with Linux To Disconnect the OS X USB Console from the Terminal WindowInstalling the Cisco Microsoft Windows XP USB Driver Installing the Cisco Microsoft Windows 2000 USB DriverUsing the Add Remove Programs Utility Uninstalling the Cisco Microsoft Windows USB DriverInstalling the Cisco Microsoft Windows Vista USB Driver Uninstalling the Cisco Microsoft Windows Vista USB Driver Using the Setup.exe ProgramConnecting to the Auxiliary Port AUXConnecting WAN and LAN Interfaces Connection Procedures and PrecautionsPort or Connection Port Type, Color1 Cable Ports and CablingAuxiliary and Console Ports Pin Signal Input/Output Identify a Rollover Cable6shows the RJ-45 rolled console cable pinouts Signal PinConsole Port Connection to a PC Console RJ-45 to RJ-45 Console Port Signaling and Cabling with a DB-9 AdapterSignal RJ-45 Pin DB-9 Pin Port DTE Rollover CableRJ-45 to Console DB-25 Console Port Signaling and Cabling with a DB-25 Adapter8shows the pinout descriptions for the DB-25 connections 9provides the pinout description for the modem connection Auxiliary Port Signaling and Cabling Using a DB-25 AdapterAuxiliary Port Connection to a Modem RJ-45 Cable Type Adapter Alternative Terminal and Modem Connections10describes the alternative terminal and modem connections Port EIA-232 DCE Ft m Female DB-25 Cable Type Length Connector TypeCAB-HD4-232FC CAB-HD4-232MTRS-232 DB-25 Cable Pinouts Pin Signal Direction DescriptionPinouts for the Synchronous/Asynchronous Cables Ltst RS-232 DB-9 Cable PinoutsRXC TxceRS-232 RJ-45 Cable Pinouts Pin Signal DescriptionSignal Ground Transmit DataThis section covers the following topics Powering up the RouterChecklist for Power Up Power Up Procedure Cisco Setup Command FacilityPerforming the Initial Configuration on the Router Verifying the Power Supply Side LED IndicationsBasic management setup configures only enough connectivity Using the Cisco Setup Command FacilityTo proceed using the setup command facility, enter yes Enter a hostname for the router this example uses myrouterFollowing configuration command script is created Summary of the available interfaces is displayedCompleting the Configuration User prompt is displayedUsing Cisco Configuration Professional Express Using Cisco IOS CLI-Manual ConfigurationPress Return to bring up the Router prompt Configuring the Router HostnameType enable to enter privileged Exec mode Following tasks are either required or optionalRestrictions Configuring the Enable and Enable Secret PasswordsCommand or Action Purpose ExampleBoot older boot ROMs that do not recognize the enable Optional Sets a local password to control access to variousBoot an older image of the Cisco IOS software or if you Secret commandConfiguring the Console Idle Privileged Exec Timeout Verify that you properly configured the idle privileged Configuring Gigabit and FastEthernet InterfacesDisplays the running configuration file Exec timeoutOptional Adds a description to an interface configuration Configuration modeSoftware configuration guide Description helps you remember what is attached toConfiguring the GigabitEthernet Interface Example Specifying a Default Route or Gateway of Last ResortConfiguring IP Routing and IP Protocols Sample Output for the show ip interface brief CommandGateway of Last Resort Default RoutesDefault Network Selects a network as a candidate route for computing Enables IP routingEstablishes a static route Gateway of last resortSpecifying a Default Route Example Sample Output for the show ip route CommandMake sure that you configure all vty lines on your Starts the line configuration command collection mode forVirtual terminal lines vty for remote console access Line vty ? commandLines for remote access Configuring the Auxiliary LineVerify that you properly configured the virtual terminal What to Do NextAuxiliary line Verifying Network ConnectivityPrerequisites Diagnoses initial network connectivity Connected host for each configured interface toTo test the vty line password, perform this step from a To verify connectivity, ping the next hop router orSaves the running configuration to the startup Saving Your Router ConfigurationSaving Backup Copies of Configuration and System Image ConfigurationCopying the Startup Configuration to a Tftp Server Example Copying from Flash Memory to a Tftp Server ExampleVerifying the Initial Configuration NvramInstalling and Upgrading Internal Modules Installing and Upgrading Internal Modules Safety Warnings Removing a Compact Flash Memory Card PSU OKRemoving the Compact Flash Cover Installing a Compact Flash Memory Card Compact Flash Memory Card Slot in Cisco CGRInstalling SFP Modules Laser Safety GuidelinesRemoving SFP Modules Connect the network cable to the SFP moduleDisconnecting SFP Latch Mechanisms Installing Grid Router WAN Interface Cards Installing Single-Wide GRWICsInstalling Double-Wide GRWICs Proper Installation of Multiple GRWICsRemoving the Slot Divider From the CGR 2010 Router 11 Installing the Switch Module in the CGR 2010 Router 12 The Double-Wide Grwic Installed in the CGR 2010 Router OL-31454-01

OL-31454-01 specifications

Cisco Systems OL-31454-01 refers to a specific configuration guide for Cisco networking equipment, which serves an essential role in helping IT professionals understand how to deploy and manage their networking hardware efficiently. This document is particularly relevant for those working with Cisco routers and switches, highlighting various features, technologies, and best practices in network management.

A core feature of Cisco Systems OL-31454-01 is its focus on enhancing network performance and reliability. The systems typically include advanced Quality of Service (QoS) mechanisms, ensuring that critical applications receive the necessary bandwidth and performance even during peak usage times. This is crucial for enterprises that rely on uninterrupted access to applications and services.

The guide also discusses technologies such as VLANs (Virtual Local Area Networks), which allow network administrators to segment networks for improved performance and security. By isolating traffic within different VLANs, organizations can mitigate congestion and enhance overall network efficiency.

Another critical aspect of OL-31454-01 is its in-depth look at security features. Cisco networking solutions typically come equipped with integrated security protocols, such as IPsec for Virtual Private Networks (VPNs) and advanced threat detection mechanisms. This layered approach to security helps protect sensitive data from unauthorized access and cyber threats.

Furthermore, the guide emphasizes the importance of automation and programmability in modern networks. Utilizing Cisco's software-defined networking (SDN) capabilities, network engineers can automate various tasks, reducing the potential for human error and freeing up valuable resources. The integration of tools like Cisco DNA Center provides a unified network management platform, enhancing visibility and control across the entire network.

In addition to these features, Cisco Systems OL-31454-01 outlines various compatibility options with existing technologies and infrastructure. The guide ensures that IT teams can seamlessly integrate new hardware into their current networks without significant overhauls, facilitating a more efficient transition.

Overall, OL-31454-01 serves as a comprehensive resource for deploying and managing Cisco systems, offering valuable insights into essential features, technologies, and best practices that can significantly enhance an organization's networking capabilities.