Cisco Systems C819GUK9, C819HG4GVK9 manual

Page 2

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

Cisco 819 Series Integrated Services Routers Software Configuration Guide © 2013 Cisco Systems, Inc. All rights reserved.

Image 2 Cisco Systems C819GUK9, C819HG4GVK9 manual
Contents Americas Headquarters Text Part Number OL-23590-02 September 2Page N T E N T S Data Account Provisioning Configuring a Cellular Interface Specifying a Synchronous Serial Interface Create a Cisco Easy VPN Remote Configuration NAT Getting Help TACACS+ OL-23590-02 Product Overview General Description1shows the Cisco 819HG ISR SKU Information New Features3G Features Security Features Wlan FeaturesPlatform Features Wireless Device Overview ScanSafeColor Description Tftp support with Ethernet WAN interfaceLEDs Rssi Router# show controllers cellular Dual-Radio Wireless Local Area NetworkWlan Features Dynamic Frequency Selection CleanAir TechnologyImages Supported LEDsWlan LED OL-23590-02 4G LTE Wireless WAN OL-23590-02 Basic Router Configuration Router Interface Port Label Default ConfigurationInterface Ports Information Needed for Configuration OL-23590-02 Configuring Command-Line Access Line aux console tty vty line-number Password password LoginCommand Purpose ExampleExits line configuration mode and returns to Enables password checking at the virtual terminalSession login Privileged Exec modeConfiguring Global Parameters No shutdown Exit Configuring WAN InterfacesConfiguring a Gigabit Ethernet WAN Interface Configuring the Cellular Wireless WAN Interface ExamplePrerequisites for Configuring the 3G Wireless Interface Restrictions for Configuring the Cellular Wireless InterfaceCommand or Action Purpose Data Account ProvisioningDetails about the command parameters Shows the radio signal strengthSignal strength, the network security, and so on Displays the cellular gps informationManual Activation 2lists the modem data profile parametersActivation and Provisioning Process Carrier Cellular unit cdma activate manual mdn msid mslRouter # cellular 0 cdma activate otasp phonenumber Activating with Over-the-Air Service ProvisioningCellular cdma activate iota Configuring a Cellular Interface Configuring DDR Interface cellular Dialer string stringSpecifies the number of the dialer access group to Enters global configuration modeEnables DDR and configures the specified serial Enters the global configuration modeExits line configuration mode Specifies the line configuration mode. It is alwaysSpecifies a default modem chat script Configures this line for GSMExamples for Configuring Cellular Wireless Interfaces This section provides the following configuration examplesTunnel over Cellular Interface Configuration Following shows how to configure an HSPA+ modemConfiguring Dual SIM for Cellular Networks Command Syntax DescriptionCellular GSM SIM Perform the following commands to manually switch the SIMFollowing command forces the modem to connect to SIM1 Locks or unlocks the SIMRommon Behavior IOS Behavior Output When Button Is Not Pushed ExampleOutput When Button Is Pushed Example Push Button in Wlan AP Configuring a Loopback InterfaceConfiguring the Fast Ethernet LAN Interfaces Verifying Configuration Router# show interface loopbackConfiguring Static Routes Another way to verify the loopback interface is to ping itExample Configuring Dynamic RoutesVerifying Configuration Router rip Version 1 Configuring Routing Information ProtocolCommand Task No auto-summary EndConfiguring Enhanced Interior Gateway Routing Protocol Router eigrp as-numberEigrp on the router. The autonomous-system Enters router configuration mode and enablesBe applied, using the IP address of the network Number identifies the route to other Eigrp routersOL-23590-02 819 Yes Configuring Backup Data Lines and Remote ManagementConfiguring Backup Interfaces Assigns an interface as the secondary or backup Enters interface configuration mode forInterface for which you want to configure backup Be configured to back up a serial 0 interfaceConfigure terminal Configuring Cellular Dial-on-Demand Routing BackupConfiguring DDR Backup Using Dialer Watch Dialer watch group group-numberUsing the chat script command Enables dialer watch on the backup interfaceDo not use the access list permit all command to Specifies the interfaceConfiguring DDR Backup Using Floating Static Route No aaa new-model Source-interface Dialer2 Line vty 0 4 login Scheduler max-task-time Webvpn cef end Dial Backup and Remote Management Through the Auxiliary Port Ip name-server server-address Ip dhcp pool name Exit Sample commands that you can use in Dhcp Enters Dhcp pool configuration mode. The nameConfigure the Dhcp address pool. For Pool configuration mode, see the ExampleEnters configuration mode for the line interface Enters configuration mode for the auxiliary Switches the port from console to auxiliary portExits the configure interface mode Enables hardware signal flow controlPpp authentication pap callin PC IP address behind CPE OL-23590-02 Environmental and Power Management Router# show environmentEnvironmental and Power Management Cisco EnergyWise Support Cisco EnergyWise SupportConfiguring the Serial Interface WAN ConcentrationLegacy Protocol Transport Configuring Serial InterfacesProduct Number Cable Type Length Connector Type PPP Encapsulation Information About Configuring Serial InterfacesCisco Hdlc Encapsulation Keepalive Timer Multilink PPPFrame Relay Encapsulation LMI on Frame Relay Interfaces How to Configure Serial InterfacesConfiguring a Synchronous Serial Interface This section contains the following tasksSpecifying Synchronous Serial Encapsulation Configures synchronous serial encapsulationSpecifying a Synchronous Serial Interface Signals Configuring PPPConfigures an Sdlc interface for half-duplex mode Encapsulation hdlc Compress stac Configuring Compression of Hdlc DataUsing the Nrzi Line-Coding Format Nrzi-encodingTransmit-clock-internal Inverting the Transmit Clock SignalEnabling the Internal Clock Invert txclock Invert rxclockIgnoring DCD and Monitoring DSR as Line Up/Down Indicator Setting Transmit DelayConfiguring DTR Signal Pulsing Specifying the Serial Network Interface Module Timing Dce-terminal-timing enableConfigures the DCE to use Scte from the DTE Ignore-dcdSpecifies timing configuration to invert TXC clock Dte-invert-txcConfiguring Low-Speed Serial Interfaces Understanding Half-Duplex DTE and DCE State MachinesHalf-Duplex DCE State Machines Half-Duplex DCE Transmit State Machine Places a low-speed serial interface Constant-carrier modeNo half-duplex controlled-carrier Physical-layer sync async Sdlc cts-delay Sdlc rts-timeoutChanging Between Synchronous and Asynchronous Modes Returns the interface to its default mode, which is Configuration ExamplesInterface Enablement Configuration Examples No physical-layerLow-Speed Serial Interface Examples Synchronous or Asynchronous Mode ExamplesHalf-Duplex Timers Example Configuring Security Features Authentication, Authorization, and AccountingConfiguration Commands Configuring AutoSecureConfiguring Access Lists ACL TypeConfiguring Cisco IOS Firewall Access GroupsURL Filtering Configuring Cisco IOS IPSConfiguring VPN Remote Access VPN VPN client-Cisco 819 ISR Site-to-Site VPNBranch office containing multiple LANs and VLANs Corporate office networkConfigure the IKE Policy Configuration ExamplesConfigure a VPN over an IPSec Tunnel Command or Action Purpose Configure Group Policy Information Domain name ExitFor details about this command and additional Apply Mode Configuration to the Crypto MapExits IKE group policy configuration mode Specifies a local address pool for the groupEnable Policy Lookup Crypto ipsec profile profile-name Configure IPSec Transforms and ProtocolsConfigure the IPSec Crypto Method and Parameters See Cisco IOS Security Command Reference for Crypto map map-name Exit Where to Go NextApply the Crypto Map to the Physical Interface Crypto ipsec client ezvpn name outside inside Exit Create a Cisco Easy VPN Remote ConfigurationCrypto ipsec client ezvpn name Configuration Example Configure a Site-to-Site GRE Tunnel Creates a tunnel interface and enters interface Returns to global configuration mode No cdp run Restrictions for the FE Switch Configuring the Ethernet SwitchesSwitch Port Numbering and Naming 10-1Information About Ethernet Switches Igmp Snooping Switched Port AnalyzerOverview of Snmp MIBs Storm ControlMIBs MIBs Link BRIDGE-MIB for Layer 2 Ethernet SwitchingRouterconfig#snmp-server community public RW 10-4MAC Address Notification 10-5VLANs on the FE Ports How to Configure Ethernet SwitchesConfiguring VLANs 10-6VLANs on the GE Port Configuring Layer 2 InterfacesSwitchport mode dynamic desirable Comand Purpose10-8 Configuring 802.1x AuthenticationConfiguring Spanning Tree Protocol Port Security Configuring MAC Table ManipulationConfiguring Cisco Discovery Protocol 10-9Configuring Igmp Snooping Configuring the Switched Port AnalyzerConfiguring IP Multicast Layer 3 Switching Configuring Per-Port Storm ControlConfiguring Fallback Bridging 10-11Managing the Switch 10-12Configuring PPP over Ethernet with NAT 11-1PPPoE Configuration TasksConfigure the Virtual Private Dialup Network Group Number 11-2Configure the Fast Ethernet WAN Interfaces 11-3Configure the Dialer Interface 11-4Ip address negotiated Ip mtu bytes 11-5Configure Network Address Translation 11-6Ip nat inside outside No shutdown Exit 11-711-8 Configuration Example 11-911-10 Verifying Your Configuration 11-1111-12 Configuring a LAN with Dhcp and VLANs 12-112-2 Configure DhcpVLANs Detailed Steps 12-3Verify Your Dhcp Configuration 12-412-5 Configure VLANsVlan ? Example Assign a Switch Port to a VlanSwitchport access vlan vlan-id End 12-6Verify Your Vlan Configuration 12-712-8 Router# vlan databaseRouter# show vlan-switch 12-912-10 Configuring a VPN Using Easy VPN and an IPSec Tunnel 13-1VPN client-Cisco 819 ISRs Cisco Easy VPNRemote, networked users VPN server-Easy VPN serverConfigure the IKE Policy 13-3Lifetime seconds Exit For the group by using the wins command Configure Group Policy InformationInternet Naming Service Wins servers 13-5Apply Mode Configuration to the Crypto Map 13-613-7 Enable Policy LookupLogin, and specifies the method used 13-8 Configure IPSec Transforms and ProtocolsConfigure the IPSec Crypto Method and Parameters 13-9 13-10 Create an Easy VPN Remote ConfigurationApply the Crypto Map to the Physical Interface Mode client network-extension network extension plus Exit 13-1113-12 Verifying Your Easy VPN ConfigurationFollowing example verifies your easy vpn connection 13-13 13-14 Configuring the Router from a PC Cisco IOS Software Basic SkillsUnderstanding Command Modes PC Operating System Terminal Emulation SoftwareUser Exec Begin a session with To exit to user Exec Use this mode toGlobal Enter the configure As interface atmRouter Enter one of the router Configuration mode Routing protocol AppropriateGetting Help Router rip-fromYou can now make changes to your router configuration Enable Secret Passwords and Enable PasswordsEntering Global Configuration Mode Undoing Commands Using CommandsAbbreviating Commands Command-Line Error MessagesSummary Saving Configuration ChangesWhere to Go Next OL-18906-02 Concepts Network ProtocolsProtocol Ideal Topology Metric Routing Updates Routing Protocol OptionsPPP Authentication Protocols Enhanced IgrpEthernet ChapFloating Static Routes Dial BackupBackup Interface Dialer WatchEasy IP Phase QoS IP Precedence PPP Fragmentation and InterleavingAccess Lists Low Latency QueuingOL-18906-02 ROM Monitor Configure terminal Enters global configuration modeConfig-reg Resets the configuration register Entering the ROM MonitorReload ROM Monitor CommandsExits global configuration mode Prompt increments with each new lineCommand Description Command DescriptionsDisaster Recovery with Tftp Download Required Variables Tftp Download Command VariablesVariable Command Optional Variables Using the Tftp Download CommandConfigures how the router displays file Examples You will see an output similar to the followingType Embedded AP s Appendix C ROM Monitor Configuration Register Appendix C ROM Monitor Configuration RegisterChanging the Configuration Register Manually Changing the Configuration Register Using PromptsCommand Description Console DownloadContext-Displays processor context for example Debug CommandsError Reporting Exiting the ROM Monitor Appendix C ROM Monitor Exiting the ROM MonitorCommon Port Assignments Port Keyword DescriptionProcedure Call Any private RJE serviceISO-Transport Service Access Point Authentication service
Related manuals
Manual 84 pages 8.63 Kb