Cisco 880 Series Integrated Services Router Software Configuration Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
Preface This preface describes the objectives, audience, organization, and conventions used in this guide, and describes related documents that have additional information.
Preface Organization This guide is organized into the following parts, chapters, and appendixes. Chapters Product Overview Provides a brief description of the router models and the available software features. Wireless Device Overview Provides an introduction to the wireless device on the router and its use in network configurations. Basic Router Configuration Provides procedures for configuring the basic parameters of the router.
Preface Tip Means the following information will help you solve a problem. The tips information might not be troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Preface To search a PDF document in Adobe Reader, use the basic Find toolbar (Ctrl+F) or the Full Reader Search window (Shift+Ctrl+F). Use the Find toolbar to find words or phrases within one specific document. Use the Full Reader Search window to search multiple PDF files simultaneously as well as change case sensitivity, and other options. Adobe Reader comes with online help with more information regarding searching PDF documents.
C H A P T E R 1 Product Overview This chapter provides an overview of the features available for the Cisco 880 series Integrated Service Router (ISR), and contains the following sections: • General Description, page 1-1 • Cisco 880 Series ISR, page 1-1 • Licensing, page 1-3 • 880 SKUs for next generation Cisco 880 Series ISR platforms, page 1-3 • Memory, page 1-5 • LED Overview, page 1-6 • Power Supply, page 1-7 General Description The Cisco 880 ISR provides Internet, VPN, data, and backup c
Chapter 1 Product Overview Cisco 880 Series ISR Table 1-1 gives the port configurations of the Cisco 880 series data routers. Table 1-1 Port Configurations of the Cisco 880 Series Data ISRs Model WAN Port C886VA-W-E-K9 ADSL2+ UR2 C887VAM-W-E-K9 ADSL2+ Annex M C887VA-W-A-K9 ADSL2+ Annex A C887VA-W-E-K9 ADSL2+ Annex A C881W-A-K9 FE C881W-E-K9 FE C881W-P-K9 FE Common Features Cisco 880 series ISRs support the following features: • 4-port 10/100 FE LAN Switch, page 1-2 • 802.
Chapter 1 Product Overview Licensing • Firewall • URL filtering Licensing The Cisco 880 ISR is shipped with licensed software installed. Software features may be upgraded and the software licenses may be managed through Cisco Licensing Manager. See Software Activation On Cisco Integrated Services Routers on Cisco.com for details. When you order a new router, you can specify the software image and feature set.
Chapter 1 Product Overview 880 SKUs for next generation Cisco 880 Series ISR platforms • 256 MB Flash • 4-port 10/100 Switch • 2-port PoE is a factory-configurable option • 1 port console/aux • 1 port external USB 2.0 • ADSL2+ Annex B • ISDN backup WAN • Real-time clock • Embedded WLAN antenna on wireless models C887VAM-W • 512 MB memory • 256 MB Flash • 4-port 10/100 Switch • 2-port PoE is a factory-configurable option • 1 port console/aux • 1 port external USB 2.
Chapter 1 Product Overview Memory • 4-port 10/100 Switch • 2-port PoE is a factory-configurable option • 10/100 FE WAN • 3G modem with Dual SIMM card slots • 1 port console/aux • 1 port external USB 2.0 • Real-time clock • Embedded WLAN antenna on wireless models • 512 MB memory • 256 MB Flash • 4-port 10/100 Switch • 2-port PoE is a facotry-configurable option • 1 port console/aux • 1 port external USB 2.
Chapter 1 Product Overview LED Overview LED Overview All LEDs are visible on the front of the chassis (bezel side). No LEDs are mounted on the I/O side.
Chapter 1 Product Overview LED Overview Table 1-3 LED Definition Summary by Interface (continued) LED Color Description Indication PWR Ok Green Power On OK, Rourter Off= no power Operational Steady on= normal operation Blink= boot up phase in ROM Monitor mode Wireless/LAN Green 2.
Chapter 1 Product Overview Power Supply Power Supply External 12V Power Supply Adapter The following power supplies are used accross Next generation Cisco 880 ISR platforms depending on SKU: • New grounded 12 V 30 W external desktop adapter for all 86x and 88x models. Connection to the chassis is with a single barrel connector. . On board 12V Power supply PoE ports powered from 12 VDC on motherboard. Power over Ethernet (PoE Inline Power Option) Inline power is a configurator option.
Chapter 1 Product Overview Images supported – advsecurity_npe Feature licenses: – ios-ips-ipdate Minimum software version needed to support AP802 Table 1-4 Software version needed for AP802 Software Minimum version Router IOS 15.1(4) M AP IOS (Autonomous mode) TBD AP IOS (unified mode) J.MR2 WLC J.MR2 WCS J.
Chapter 1 Product Overview Images supported Cisco 880 Series Integrated Services Router Software Configuration Guide 1-10 OL-22206-01
C H A P T E R 2 Wireless Device Overview Wireless devices (commonly configured as access points) provide a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals. When configured as a access point, the wireless device serves as the connection point between wireless and wired networks or as the center point of a stand-alone wireless network.
Chapter 2 Wireless Device Overview Management Options Management Options The wireless device runs its own version of Cisco IOS software that is separate from the Cisco IOS software operating on the router. You can configure and monitor the access point with several different tools: • Cisco IOS software CLI • Simple Network Management Protocol (SNMP) • Web-browser interface: http://cisco.com/en/US/docs/wireless/access_point/12.4_10b_JA/configuration/guide/scg12410b-c hap2-gui.
Chapter 2 Wireless Device Overview Network Configuration Examples Network Configuration Examples Setup the access point role in any of these common wireless network configurations. The access point default configuration is as a root unit connected to a wired LAN or as the central unit in an all-wireless network. Access points can also be configured as bridges and workgroup bridges. These roles require specific configurations, as defined in the following examples.
Chapter 2 Wireless Device Overview Network Configuration Examples Central Unit in an All-Wireless Network In an all-wireless network, an access point acts as a stand-alone root unit. The access point is not attached to a wired LAN; it functions as a hub linking all stations together. The access point serves as the focal point for communications, increasing the communication range of wireless users. Figure 2 shows an access point in an all-wireless network.
C H A P T E R 3 Basic Router Configuration This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup.
Chapter 3 Basic Router Configuration Interface Ports Interface Ports Table 3-1 lists the interfaces that are supported for each router and their associated port labels on the equipment.
Chapter 3 Basic Router Configuration Default Configuration no aaa new-model ! ! ! ! no ip routing no ip cef ! ! ! ! ! multilink bundle-name authe ! ! archive log config hidekeys ! ! ! ! ! interface FastEthernet0 ! interface FastEthernet1 shutdown ! interface FastEthernet2 shutdown ! interface FastEthernet3 shutdown ! interface FastEthernet4 ip address 10.1.1.1 255.255.255.
Chapter 3 Basic Router Configuration Information Needed for Configuration line con 0 no modem enable line aux 0 line vty 0 4 password cisco login transport input telnet ssh ! scheduler max-task-time 5000 ! webvpn cef end Router# Information Needed for Configuration You need to gather some or all of the following information, depending on your planned network scenario, before configuring your network: • If you are setting up an Internet connection, gather the following information: – PPP client name tha
Chapter 3 Basic Router Configuration Configuring Command-Line Access • If you plan to connect over an ADSL or G.SHDSL line: – Order the appropriate line from your public telephone service provider. For ADSL lines—Ensure that the ADSL signaling type is DMT (also known as ANSI T1.413) or DMT Issue 2. For G.SHDSL lines—Verify that the G.SHDSL line conforms to the ITU G.991.2 standard and supports Annex A (North America) or Annex B (Europe).
Chapter 3 Basic Router Configuration Configuring Command-Line Access Step 4 Command Purpose exec-timeout minutes [seconds] Sets the interval that the EXEC command interpreter waits until user input is detected. The default is 10 minutes. Optionally, add seconds to the interval value. Example: Router(config-line)# exec-timeout 5 30 Router(config-line)# Step 5 line [aux | console | tty | vty] line-number This example shows a timeout of 5 minutes and 30 seconds.
Chapter 3 Basic Router Configuration Configuring Global Parameters Configuring Global Parameters To configure selected global parameters for your router, perform these steps: SUMMARY STEPS 1. configure terminal 2. hostname name 3. enable secret password 4. no ip domain-lookup DETAILED STEPS Step 1 Command Purpose configure terminal Enters global configuration mode, when using the console port.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces Configuring a Fast Ethernet WAN Interface To configure the Fast Ethernet interface on a Cisco 861 or 881 ISR, perform these steps, beginning in global configuration mode: SUMMARY STEPS 1. interface type number 2. ip address ip-address mask 3. no shutdown 4. exit DETAILED STEPS Step 1 Command Purpose interface type number Enters the configuration mode for a Fast Ethernet WAN interface on the router.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces 4. shutdown 5. no shutdown 6. exit DETAILED STEPS Step 1 Command Purpose controller vdsl 0 Enters controller configuration mode and the controller number. Example: Note Router# config t Router(config)# controller vdsl 0 Step 2 interface type number There is no need to configure any VDSL2 parameters from CPE side. Any specific VDSL2 settings should be set on the DSLAM side.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces The following examples assume the DSLAM is configured in either ADSL2+ mode or VDSL2, and the CPE is configured in auto mode. Figure 3-1 shows an ATM WAN or Ethernet WAN network topography. Figure 3-1 Note Note Example Topology A DSLAM in Layer 1 mode may be configured for auto mode. A DSLAM in Layer 2 mode must be configured for ATM mode or packet transfer mode (PTM).
Chapter 3 Basic Router Configuration Configuring WAN Interfaces • Verifying CPE to Peer Connection for ADSL Configuring ADSL Auto Mode Perform these steps to configure the DSL controller to auto mode, starting in global configuration mode. Note Configure the DSLAM in ADSL 1/2//2+ mode prior to configuring the router. SUMMARY STEPS 1. controller vdsl slot 2. operating mode {auto|adsl1|adsl2|adsl2+|vdsl2|ansl} 3.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces Configuring the ATM CPE SIDE Perform the following steps to configure the ATM CPE side, starting in global configuration mode. SUMMARY STEPS 1. interface type number 2. no shutdown 3. interface atm0.1 point-to-point 4. ip address ip-address mask 5. ppvc [name] vpi/vci 6. protocol protocol {protocol-address [virtual-template] | inarp} [[no] broadcast | disable-check-subnet | [no] enable-check-subnet] 7.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces Command Step 6 Purpose protocol protocol {protocol-address Configures a static map for an ATM [virtual-template] | inarp} [[no] PVC. broadcast | disable-check-subnet | [no] enable-check-subnet] Example: Router (config-if-atm-vc) # protocol ip 30.0.0.2 broadcast Step 7 end Exits the configuration mode and enters EXEC mode.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces license boot module c880-data level adviperservices ! ! vtp domain cisco vtp mode transparet ! ! controller VDSL 0 ! vlan 2-4 ! ! ! ! ! interface Ethernet 0 no ip address shutdown no fair-queue ! interface BRI0 no ip address encapsulation hdlc shutdown isdn termintation multidrop ! interface ATM0 no ip address no atm ilmi-keepalive ! interface ATM0.1 point-to-point ip address 30.0.0.1 255.255.255.0 pvc 15/32 protocol ip 30.0.0.
Chapter 3 Basic Router Configuration Configuring WAN Interfaces login transport input all ! exception data-corruption buffer truncate end Verifying ADSL Configuration Verify that the configuration is set properly by using the show controller vdsl 0 command from the privileged EXEC mode. Outputs in bold are critical.
Chapter 3 Basic Router Configuration Configuring the Fast Ethernet LAN Interfaces Firmware -------VDSL Source -----embedded Modem FW Version: Modem PHY Version: Speed (kbps): Previous Speed: Total Cells: User Cells: Reed-solomon EC: CRC Errors: Header Errors: Interleave (ms): Actual INP: Filename (version) -----------------VDSL_LINUX_DEV_01212008 (1) 100426_1053-4.02L.03.A2pv6C030f.d22j A2pv6C030f.d22j DS Channel1 0 0 0 0 0 0 0 0.00 0.00 DS Channel0 24184 24176 317070460 0 0 0 0 0.08 0.
Chapter 3 Basic Router Configuration Configuring a Loopback Interface Configuring a Loopback Interface The loopback interface acts as a placeholder for the static IP address and provides default routing information. To configure a loopback interface perform these steps, beginning in global configuration mode: SUMMARY STEPS 1. interface type number 2. ip address ip-address mask 3.
Chapter 3 Basic Router Configuration Configuring Static Routes Verifying Configuration To verify that you have properly configured the loopback interface, enter the show interface loopback command. You should see verification output similar to the following example. Router# show interface loopback 0 Loopback0 is up, line protocol is up Hardware is Loopback Internet address is 200.200.100.
Chapter 3 Basic Router Configuration Configuring Static Routes DETAILED STEPS Step 1 Command Purpose ip route prefix mask {ip-address | interface-type interface-number [ip-address]} Specifies the static route for the IP packets. Example: For details about this command and about additional parameters that can be set, see the Cisco IOS IP Routing Protocols Command Reference. Router(config)# ip route 192.168.1.0 255.255.0.0 10.10.10.
Chapter 3 Basic Router Configuration Configuring Dynamic Routes Configuring Dynamic Routes In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or topology. Changes in dynamic routes are shared with other routers in the network. The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically.
Chapter 3 Basic Router Configuration Configuring Dynamic Routes Step 4 Command Task no auto-summary Disables automatic summarization of subnet routes into network-level routes. This allows subprefix routing information to pass across classful network boundaries. Example: Router(config-router)# no auto-summary Router(config-router)# Step 5 end Exits router configuration mode, and enters privileged EXEC mode.
Chapter 3 Basic Router Configuration Configuring Dynamic Routes Configuring Enhanced Interior Gateway Routing Protocol To configure Enhanced Interior Gateway Routing Protocol (EIGRP) perform these steps, beginning in global configuration mode SUMMARY STEPS 1. router eigrp as-number 2. network ip-address 3. end :DETAILED STEPS Step 1 Command Purpose router eigrp as-number Enters router configuration mode, and enables EIGRP on the router.
Chapter 3 Basic Router Configuration Configuring Dynamic Routes i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set C D 10.0.0.0/24 is subnetted, 1 subnets 10.108.1.0 is directly connected, Loopback0 3.0.0.0/8 [90/409600] via 2.2.2.
Chapter 3 Basic Router Configuration Configuring Dynamic Routes Cisco 880 Series Integrated Services Router Software Configuration Guide 3-24 OL-22206-01
C H A P T E R 4 Basic Wireless Device Configuration This chapter describes how to configure the autonomous wireless device on the following Integrated Services Router (ISR) • Cisco 880 Series Note To upgrade the autonomous software to Cisco Unified software on the embedded wireless device, see the “Upgrading to Cisco Unified Software” section on page 4-9 for instructions. The wireless device is embedded and does not have an external console port for connections.
Chapter 4 Basic Wireless Device Configuration Starting a Wireless Configuration Session Starting a Wireless Configuration Session Note Before you configure the wireless settings in the router’s setup, you must follow these steps to open a session between the router and the access point. Enter the following commands in global configuration mode on the router’s Cisco IOS CLI. SUMMARY STEPS 1. interface wlan-ap0 2. ip address subnet mask 3. no shutdown 4. interface vlan1 5.
Chapter 4 Basic Wireless Device Configuration Starting a Wireless Configuration Session Step 4 Command Purpose interface vlan1 Specifies the virtual LAN interface for data communication on the internal Gigabit Ethernet 0 (GE0) port to other interfaces. Example: router(config-if)# interface vlan1 Step 5 ip address subnet mask • All the switch ports inherit the default vlan1 interface on the Cisco 880 Series ISR. Specifies the interface IP address and subnet mask.
Chapter 4 Basic Wireless Device Configuration Configuring Wireless Settings Configuring Wireless Settings Note If you are configuring the wireless device for the first time, you must start a configuration session between the access point and the router before you attempt to configure the basic wireless settings. See the “Starting a Wireless Configuration Session” section on page 4-2. Configure the wireless device with the tool that matches the software on the device.
Chapter 4 Basic Wireless Device Configuration Configuring Wireless Settings Cisco IOS Command Line Interface To configure the Autonomous wireless device, use the Cisco IOS CLI tool and perform these tasks: • Configuring the Radio, page 4-5 • Configuring Wireless Security Settings, page 4-5 • Configuring Wireless Quality of Service, page 4-8 (Optional) Configuring the Radio Configure the radio parameters on the wireless device to transmit signals in autonomous or Cisco Unified mode.
Chapter 4 Basic Wireless Device Configuration Configuring Wireless Settings For details about setting up the wireless device in this role, see Using the Access Point as a Local Authenticator at: http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/SecurityLocalAuthent.html Configuring WEP and Cipher Suites Wired Equivalent Privacy (WEP) encryption scrambles the data transmitted between wireless devices to keep the communication private.
Chapter 4 Basic Wireless Device Configuration Configuring Wireless Settings Read Without VLANs, encryption settings (WEP and ciphers) apply to an interface, such as the 2.4-GHz radio, and you cannot use more than one encryption setting on an interface. For example, when you create an SSID with static WEP with VLANs disabled, you cannot create additional SSIDs with WPA authentication because the SSIDs use different encryption settings.
Chapter 4 Basic Wireless Device Configuration Configuring Wireless Settings Table 4-1 Types of SSID Security (continued) Security Type 1 EAP authentication Description Security Features Enabled 2 This option enables 802.1X authentication (such as LEAP , Mandatory 802.1X authentication. Client PEAP3, EAP-TLS4, EAP-FAST5, EAP-TTLS6, EAP-GTC7, devices that associate using this SSID must perform 802.1X authentication. EAP-SIM8, and other 802.
Chapter 4 Basic Wireless Device Configuration Configuring the Access Point in Hot Standby Mode Configuring the Access Point in Hot Standby Mode In hot standby mode, an access point is designated as a backup for another access point. The standby access point is placed near the access point that it monitors and is configured exactly like the monitored access point.
Chapter 4 Basic Wireless Device Configuration Upgrading to Cisco Unified Software Secure an IP Address on the Access Point Secure an IP address on the access point so it that can communicate with the WLC and download the Unified image upon boot up. The host router provides the access point DHCP server functionality through the DHCP pool. Then the access point communicates with the WLC and setup option 43 for the controller IP address in the DHCP pool configuration.
Chapter 4 Basic Wireless Device Configuration Upgrading to Cisco Unified Software Note If the service-module wlan-ap 0 bootimage unified command does not work successfully, check whether the software license is still eligible.
Chapter 4 Basic Wireless Device Configuration Related Documentation Recovering Software on the Access Point To recover the image on the access point, use the service-module wlan-ap0 reset bootloader command in global configuration mode. This command returns the access point to the bootloader for manual image recovery. Caution Use this command with caution. It does not provide an orderly shutdown and consequently may impact file operations that are in progress.
Chapter 4 Basic Wireless Device Configuration Related Documentation Table 4-2 Autonomous Cisco Documentation (continued) Network Design Links Hot Standby Access Points This document describes how to configure your wireless device as a hot standby unit. http://www.cisco.com/en/US/docs/routers/access/wireless/software/guide/R olesHotStandby.html Configuring Wireless VLANs This document describes how to configure an access point to operate with the VLANs set up on a wired LAN. http://www.cisco.
Chapter 4 Basic Wireless Device Configuration Related Documentation Table 4-3 Cisco Unified Documentation (continued) Network Design Links LWAPP Wireless LAN Access Points http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6306/prod_ white_paper0900aecd802c18ee_ps6366_Products_White_Paper.html Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges, versions 12.4(10b) JA and 12.3(8) JEC http://www.cisco.com/en/US/docs/wireless/access_point/12.