Cisco 800M Series Integrated Services Routers Software Configuration Guide
Cisco 800M Series Integrated Services Routers Software Configuration Guide
Cisco 800M Series Integrated Services Routers Software Configuration Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Preface ix
Objectives ix
Audience ix
Organization ix
Conventions x
Related Documentation xi
Restrictions for Configuring 3G WWAN on the Cisco 800M Series ISR 3-21
This preface describes the objectives, audience, organization, conventions of this guide, and the
references that accompany this document set. The following sections are provided:
• Objectives, page ix
• Audience, page ix
• Organization, page ix
• Conventions, page x
• Related Documentation, page xi
• Obtaining Documentation and Submitting a Service Request, page xi
Objectives
This guide provides information about how to configure the various features of Cisco 800M Series
integrated services routers (ISRs).
Audience
This document is written for experienced technical workers who install, monitor, and troubleshoot
routers under a service contract, or who work for an information technology (IT) department.
Organization
This document is organized into the following chapters:
Chapter Description
Overview Provides an overivew of the hardware and software features of Cisco
800M Series ISRs.
Basic Router Describes how to perform the basic router configuration, interface
Configuration configuration, and routing configuration.
Configuring 3G Wireless Describes the configuration procedures for 3G Wireless WAN module on
WAN the Cisco 800M Series ISR.
Conventions
This document uses the following conventions:
Convention Indication
bold font Commands and keywords and user-entered text appear in bold font.
italic font Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[ ] Elements in square brackets are optional.
{x | y | z } Required alternative keywords are grouped in braces and separated by
vertical bars.
[x|y|z] Optional alternative keywords are grouped in brackets and separated by
vertical bars.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier font Terminal sessions and information the system displays appear in courier font.
< > Non-printing characters such as passwords are in angle brackets.
[ ] Default responses to system prompts are in square brackets.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Tip Means the following information will help you solve a problem.
Timesaver Means the described action saves time. You can save time by performing the action described in
the paragraph.
Warning Means reader be warned. In this situation, you might perform an action that could result in
bodily injury.
Related Documentation
In addition to the Cisco 800M Series ISR Software Configuration Guide (this document), the following
reference guides are included:
This chapter provides an overview of Cisco 800M Series integrated services routers (ISRs), and
information about how to configure the features and contains the following sections:
• Overview of the Cisco 800M Series ISR, page 1
• Cisco 800M Series ISR Models, page 2
• Cisco 800M Series ISR Features, page 3
Figure 1-1 explains a scenario where the Cisco 800M Series ISR is deployed to provide remote
connectivity from a small office to central office over secure VPN tunnels. In this scenario corporate
users use a separate VLAN than the Internet users.
Internet Internet
Access Only
ISP Corporate
Cisco 841M Campus
VPN
Tunnel
Headquarters
Management
Employee
372935
(Corporate
VPN Access)
The Cisco 800M Series ISR supports highly available and redundant WAN connection options and
allows you to easily migrate to different WAN connections. The Cisco 800M Series ISR has 2 WAN slots
that can host single port serial module or multi-mode 3G Wireless WAN module. The 3G Wireless WAN
module supports multiple 3G technologies on the same pluggable WAN interface and provides service
provider independence. These modules are field replaceable which provides flexibility and ease of
procurement.
Table 1-1 describes the pluggable WAN configuration modules available for Cisco 800M Series ISR
models.
The combination of WAN modules supported by the Cisco 800M Series ISR is given as follows:
• Multimode 3G Wireless WAN module in slot 0 and single port serial module in slot 1
• Single port serial module in slot 0 and multimode 3G Wireless WAN module in slot 1
• Single port serial module in slot 0 and single port serial module in slot 1
Note Only one 3G Wireless WAN module is supported at a time on the Cisco 800M Series ISR. If two 3G
Wireless WAN modules are present in the 800M Series ISR, the 3G Wireless WAN module in the second
slot will be powered down.
Table 1-2 summarizes the LAN and WAN interface options available for the Cisco 800M Series ISR
models.
Table 1-2 LAN and WAN Interfaces of the Cisco 800M Series ISRs
GE WAN
800M Series Models LAN Interfaces Interfaces Serial WAN 3G WAN
Cisco C841M-4X 4 Gigabit Ethernet 2 Gigabit Ethernet Single port Multimode 3G
LAN ports ports serial (GSM/CDMA)
This module provides basic configuration procedures for the Cisco 800M Series ISR and contains the
following sections.
• Configuring Global Parameters, page 5
• Configuring Gigabit Ethernet WAN Interfaces, page 6
• Configuring a Loopback Interface, page 7
• Configuring Command-Line Access, page 9
• Configuring Gigabit Ethernet LAN Interfaces, page 10
• Configuring Static Routes, page 11
• Configuring Dynamic Routes, page 13
• Configuring Image and Configuration Recovery Using the Push Button, page 16
• Configuring 800M Series ISR using Zero Touch Deployment, page 17
SUMMARY STEPS
1. configure terminal
2. hostname name
3. enable secret password
4. no ip domain-lookup
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode, when using the
console port.
Example:
Router> enable
Router# configure terminal
Step 2 hostname name Specifies the name for the router.
Example:
Router(config)# hostname Router
Step 3 enable secret password Specifies an encrypted password to prevent
unauthorized access to the router.
Example:
Router(config)# enable secret cr1ny5ho
SUMMARY STEPS
1. configure terminal
2. interface gigabitethernet slot/port
3. ip address ip-address mask
4. no shutdown
5. exit
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 2 interface gigabitethernet slot/port Enters the configuration mode for a Gigabit
Ethernet interface on the router.
Example: Note GigabitEthernet WAN Interfaces are
Router(config)# interface gigabitethernet 0/8 0/8 and 0/9 for Cisco C841M-8X ISR
and 0/4 to 0/5 for Cisco C841M-4X
Step 3 ip address ip-address mask Sets the IP address and subnet mask for the
specified GE interface.
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
SUMMARY STEPS
1. configure terminal
2. interface type number
3. ip address ip-address mask
4. exit
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 2 interface type number Enters configuration mode for the loopback
interface.
Example:
Router(config)# interface Loopback 0
Step 3 ip address ip-address mask Sets the IP address and subnet mask for the
loopback interface.
Example:
Router(config-if)# ip address 10.108.1.1
255.255.255.0
You can lso verify the loopback interface by using the ping command as shown in the following example.
Router# ping 200.200.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 200.200.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
SUMMARY STEPS
1. configure terminal
2. line [aux | console | tty | vty] line-number
3. password password
4. login
5. exec-timeout minutes [seconds]
6. line [aux | console | tty | vty] line-number
7. password password
8. login
9. end
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 2 line [aux | console | tty | vty] line-number Enters line configuration mode, and specifies the
type of line.
Example:
Router(config)# line console 0
Command Purpose
Step 3 password password Specifies a unique password for the console
terminal line.
Example:
Router(config)# password 5dr4Hepw3
Step 4 login Enables password verification at the terminal
login session.
Example:
Router(config-line)# login
Step 5 exec-timeout minutes [seconds] Sets the interval that the EXEC command
interpreter waits until user input is detected. The
Example: default is 10 minutes. You can also optionally add
Router(config-line)# exec-timeout 5 30 seconds to the interval value.
Step 6 line [aux | console | tty | vty] line-number Specifies a virtual terminal for remote console
access.
Example:
Router(config-line)# line vty 0 4
Step 7 password password Specifies a unique password for the virtual
terminal line.
Example:
Router(config-line)# password aldf2ad1
Step 8 login Enables password verifiation at the virtual
terminal login session.
Example:
Router(config-line)# login
Step 9 end Exits line configuration mode, and returns to
privileged EXEC mode.
Example:
Router(config-line)# endRouter#
SUMMARY STEPS
1. configure terminal
2. interface gigabitethernet slot/port
3. ip address ip-address mask
4. no shutdown
5. exit
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 2 interface gigabitethernet slot/port Enters the configuration mode for a Gigabit
Ethernet interface on the router.
Example: Note GigabitEthernet LAN Interfaces are
Router(config)# interface gigabitethernet 0/1 0/0 to 0/7 for Cisco C841M-8X ISR
and 0/0 to 0/3 for Cisco C841M-4X
ISR.
Step 3 ip address ip-address mask Sets the IP address and subnet mask for the
specified GE interface.
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
SUMMARY STEPS
1. configure terminal
2. ip route prefix mask {ip-address | interface-type interface-number [ip-address]}
3. end
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router# configure terminal
Step 2 ip route prefix mask {ip-address | interface-type Specifies the static route for the IP packets.
interface-number [ip-address]}
Example:
Router(config)# ip route 192.168.1.0
255.255.0.0 10.10.10.2
Verifying Configuration
To verify that you have properly configured static routing, enter the show ip route command and look
for static routes signified by the “S.”
You should see verification output similar to the following:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
SUMMARY STEPS
1. configure terminal
2. router rip
3. version {1 | 2}
4. network ip-address
5. no auto-summary
6. end
DETAILED STEPS
Command Task
Step 1 configure terminal Enters global configuration mode.
Example:
Router> configure terminal
Step 2 router rip Enters router configuration mode, and enables RIP
on the router.
Example:
Router(config)# router rip
Step 3 version {1 | 2} Specifies use of RIP version 1 or 2.
Example:
Router(config-router)# version 2
SUMMARY STEPS
1. configure terminal
2. router eigrp as-number
3. network ip-address
4. end
DETAILED STEPS
Command Purpose
Step 1 configure terminal Enters global configuration mode.
Example:
Router> configure terminal
Step 2 router eigrp as-number Enters router configuration mode, and enables
EIGRP on the router. The autonomous-system
Example: number identifies the route to other EIGRP routers
Router(config)# router eigrp 109 and is used to tag the EIGRP information.
Step 3 network ip-address Specifies a list of networks on which EIGRP is to
be applied, using the IP address of the network of
Example: directly connected networks.
Router(config)# network 192.145.1.0
Command Purpose
Step 4 end Exits router configuration mode, and enters
privileged EXEC mode.
Example:
Router(config-router)# end
Router#
• A valid configuration file in ASCII text with the filename extension .cfg
If the USB flash drive has multiple .cfg files, the router chooses the one with the highest index number
in the USB Flash drive. To avoid loading an incorrect .cfg file, ensure that there is only one .cfg file in
the USB flash drive.
The Cisco 800M Series ISR uses second core and it is actively used in detecting USB flash drive if 3G
Wireless WAN module is present on the router. If 3G Wireless WAN module is not present, USB flash
drive is detected by the IOS. When 3G Wireless WAN module is present, USB detection is a bit delayed
for the Cisco 800M series ISR due to the delay in second core initialization. While system startup is in
progress and push button is pressed, a timer is started to check the completion of second core
initialization. For some reason if second core takes more time, system reports an error message and
continues the normal start up. After second core initialization router waits up to 10 seconds for USB
detection and then complete the configuration. In case the USB flash drive does not contain a
deployment configuration, router enters the configuration mode.
This chapter provides information about configuring the 3G Wireless WAN interface on Cisco 800M
Series ISRs and contains the following sections:
• Overview of 3G Wireless WAN, page 19
• 3G Wireless WAN Features Supported on Cisco 800M Series ISR, page 19
• Pre-requisites for Configuring 3G Wireless WAN on Cisco 800M Series ISRs, page 21
• Restrictions for Configuring 3G Wireless WAN on the Cisco 800M Series ISR, page 21
• Configuring GSM Mode on Cisco 800M Series ISRs, page 21
• Configuring CDMA Mode on Cisco 800M Series ISRs, page 28
• Configuration Examples, page 32
• Configuring Dual SIM for Cellular Networks, page 33
• Upgrading Modem Firmware, page 36
• Related Documents, page 37
Mode Frequency
GSM/GPRS/EDGE 850/900/1800/1900 MHz
WCDMA 800/850/1900/2100 MHz
CDMA (EVDO Rev A/ 1xRTT) 800/1900 MHz
Cisco 800M Series ISRs support the following 3G Wireless WAN features:
• Dual SIM
• SIM lock and unlock capabilities
• Multiple Profile
• Crash Dump Support
• Diagnostic Monitor Logging
• Firmware upgrade
• Entity MIB
Note Only one 3G module is supported at a time on the Cisco 800M Series Router. If two 3G modules are
present in the 800M Series Router, the 3G module in the second slot will be powered down.
Note To provision your modem, you must have an active wireless account with a service provider. A SIM card
must be installed in the GSM 3G wireless module.
Note In the configuration procedures given in this chapter, the unit argument identifies the router slot, WIC
slot, and port separated by slashes (0/0/0).
Command Purpose
cellular unit profile create profile-number apn Configures a new modem data profile.
authentication username password
• profile-number—Specifies a number for the
profile that you are creating. You can create
Example: up to 16 profiles.
Note For GSM, default data profile is profile1.
Router# cellular 0/0/0 profile create 3
apn.com chap GSM GSMPassword
• apn—Specifies the access point name. You
must get this information from your service
provider.
• authentication—Specifies the type of
authentication, for example, CHAP, PAP.
• username—Specifies the user name provided
by your service provider.
• password—Specifies the password provided
by your service provider.
Note For deleting a GSM data profile, use the cellular unit profile delete profile-number command.
Profile 1 = ACTIVE*
--------
PDP Type = IPv4
PDP address = 117.96.4.183
Access Point Name (APN) = airtelgprs.com
Authentication = None
Username:
Password:
Primary DNS address = 125.22.47.102
Secondary DNS address = 125.22.47.103
Profile 4 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = aircel.com
Authentication = CHAP
Username: aircell
Password: aircel
Profile 11 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = vodafone
Authentication = None
Username:
Password:
Profile 15 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = aircel.com
Authentication = CHAP
Username: aircell
Password: aircel
* - Default profile
SUMMARY STEPS
1. configure terminal
2. interface cellular unit
3. encapsulation slip
4. asynchronous mode interactive
5. ip address negotiated
DETAILED STEPS
Example:
Router# configure terminal
Step 2 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0/0/0
Step 3 encapsulation slip Specifies slip encapsulation for an interface
configured for dedicated asynchronous mode or
dial-on-demand routing.
Example:
Router(config-if)# encapsulation slip
Step 4 asynchronous mode interactive Returns a line from dedicated asynchronous network
mode to interactive mode, enabling the slip and ppp
commands in privileged EXEC mode.
Example:
Router(config-if)# asynchronous mode interactive
Step 5 ip address negotiated Specifies that the IP address for a particular
interface is dynamically obtained.
Example:
Router(config-if)# ip address negotiated
Note When the cellular interface requires a static IP address, the address may be configured as ip address
negotiated. Through IP Control Protocol (IPCP), the network ensures that the correct static IP address
is allocated to the device. If a tunnel interface is configured with the ip address unnumbered cellular
interface command, the actual static IP address must be configured under the cellular interface, in place
of ip address negotiated. For a sample cellular interface configuration, see the “Basic Cellular Interface
Configuration” section on page 3-32.
Configuring DDR
Perform these steps to configure dial-on-demand routing (DDR) for the cellular interface.
SUMMARY STEPS
1. configure terminal
2. interface cellular unit
3. dialer in-band
4. dialer idle-timeout seconds
5. dialer string string
6. dialer group number
7. exit
8. dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number |
access-group}
9. ip access-list access-list-number permit ip-source-address
10. line unit
11. script dialer regexp
12. exit
13. chat-script script-name ”” “AT!CALL profile-number#” TIMEOUT timeout-value “OK”
DETAILED STEPS
Example:
Router# configure terminal
Step 2 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0/0/0
Step 3 dialer in-band Enables DDR and configures the specified serial
interface for in-band dialing.
Example:
Router(config-if)# dialer in-band
Step 4 dialer idle-timeout seconds Specifies the duration of idle time, in seconds, after
which a line will be disconnected.
Example:
Router(config-if)# dialer idle-timeout 30
Step 5 dialer string string Specifies the number or string to dial. Use the name
of the chat script here.
Example:
Router(config-if)# dialer string multimode
Step 6 dialer-group number Specifies the number of the dialer access group to
which a specific interface belongs.
Example:
Router(config-if)# dialer-group 1
Example:
Router(config-if)# exit
Step 8 dialer-list dialer-group protocol protocol-name {permit | Creates a dialer list for traffic of interest and permits
deny | list access-list-number | access-group} access to an entire protocol.
Example:
Router(config)# dialer-list 1 protocol ip list 1
Step 9 ip access-list access-list-number permit ip-source-address Defines traffic of interest.
Example:
Router(config)# ip access list 1 permit any
Step 10 line unit Specifies the line configuration mode.
Example:
Router(config-line)# line 3
Step 11 script dialer regexp Specifies a default modem chat script.
Example:
Router(config-line)# script-dialer multimode
Step 12 exit Exits line configuration mode.
Example:
Router (config-line)# exit
Step 13 chat-script script-name ”” “AT!CALL” TIMEOUT Defines the Attention Dial Tone (ATDT) commands
timeout-value “OK” when the dialer is initiated.
Example:
Router(config)# chat-script multimode "" "AT!CALL"
TIMEOUT 60 "OK"
Step 14 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0
Step 15 dialer string string Specifies the dialer script (defined using the chat
script command).
Example:
Router(config)# dialer string multimode
• Floating Static Route—The route through the backup interface has an administrative distance that
is greater than the administrative distance of the primary connection route and therefore would not
be in the routing table until the primary interface goes down.
To configure a floating static default route on the secondary interface beginning in the global
configuration mode, perform the following tasks.
SUMMARY STEPS
1. configure terminal
2. ip route network-number network-mask {ip-address | interface} [administrative distance] [name
name]
DETAILED STEPS
Example:
Router# configure terminal
Step 2 ip route network-number network-mask {ip-address | Establishes a floating static route with the config-
interface} [administrative distance] [name name] ured administrative distance through the specified
interface.
Example: Note A higher administrative distance should be
Device(config-if)# ip route 209.165.200.225 configured for the route through the backup
255.255.255.224 Dialer 2 253 name name1 interface so that it is used only when the
primary interface is down.
SUMMARY STEPS
1. configure terminal
2. interface cellular unit
3. encapsulation slip
4. asynchronous mode interactive
5. ip address negotiated
DETAILED STEPS
Example:
Router# configure terminal
Step 2 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0/0/0
Step 3 encapsulation slip Specifies slip encapsulation for an interface
configured for dedicated asynchronous mode or
dial-on-demand routing.
Example:
Router(config-if)# encapsulation slip
Configuring DDR
Perform these steps to configure dial-on-demand routing (DDR) for the cellular interface.
SUMMARY STEPS
1. configure terminal
2. interface cellular unit
3. dialer in-band
4. dialer idle-timeout seconds
5. dialer string string
6. dialer group number
7. exit
8. dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number |
access-group}
9. ip access-list access-list-number permit ip-source-address
10. line unit
11. script dialer regexp
12. exit
13. chat-script script name ”” “AT!CALL profile-number#” TIMEOUT timeout-value “OK”
DETAILED STEPS
Example:
Router# configure terminal
Step 2 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0/0/0
Step 3 dialer in-band Enables DDR and configures the specified serial
interface for in-band dialing.
Example:
Router(config-if)# dialer in-band
Step 4 dialer idle-timeout seconds Specifies the duration of idle time, in seconds, after
which a line will be disconnected.
Example:
Router(config-if)# dialer idle-timeout 30
Step 5 dialer string string Specifies the number or string to dial. Use the name
of the chat script here.
Example:
Router(config-if)# dialer string multimode
Step 6 dialer-group number Specifies the number of the dialer access group to
which a specific interface belongs.
Example:
Router(config-if)# dialer-group 1
Step 7 exit Enters the global configuration mode.
Example:
Router(config-if)# exit
Step 8 dialer-list dialer-group protocol protocol-name {permit | Creates a dialer list for traffic of interest and permits
deny | list access-list-number | access-group} access to an entire protocol.
Example:
Router(config)# dialer-list 1 protocol ip list 1
Step 9 ip access-list access-list-number permit ip-source-address Defines traffic of interest.
Example:
Router(config)# ip access-list 1 permit any
Example:
Router(config-line)# line 0/0/0
Step 11 script dialer regexp Specifies a default modem chat script.
Example:
Router(config-line)# script-dialer multimode
Step 12 exit Exits line configuration mode.
Example:
Router (config-line)# exit
Step 13 chat-script script-name ”” “AT!CALL” TIMEOUT Defines the Attention Dial Tone (ATDT) commands
timeout-value “OK” when the dialer is initiated.
Example:
Router(config)# chat-script multimode "" "AT!CALL"
TIMEOUT 60 "OK"
Step 14 interface cellular unit Specifies the cellular interface.
Example:
Router(config)# interface cellular 0/0/0
Step 15 dialer string string Specifies the dialer script (defined using the chat
script command).
Example:
Router(config)# dialer string multimode
Configuration Examples
This section provides the following configuration examples:
• Basic Cellular Interface Configuration, page 32
• Tunnel over Cellular Interface Configuration, page 33
!
chat-script multimode "" "AT!CALL1" TIMEOUT 20 "OK"
interface Cellular0/0/0
ip address negotiated
encapsulation slip
load-interval 30
dialer in-band
dialer idle-timeout 0
dialer string multimode
dialer-group 1
no peer default ip address
async mode interactive
routing dynamic
ip route 0.0.0.0 0.0.0.0 Cellular0/0/0
dialer-list 1 protocol ip permit
line 3
script dialer multimode
modem InOut
no exec
transport input all
transport output all
interface Cellular0/0/0
bandwidth receive 1400000
ip address 23.23.0.1 255.255.0.0
ip nat outside
ip virtual-reassembly
encapsulation slip
no ip mroute-cache
dialer in-band
dialer idle-timeout 0
dialer string dial<carrier>
dialer-group 1
async mode interactive
! traffic of interest through the tunnel/cellular interface
ip route 10.10.0.0 255.255.0.0 Tunnel2
• Configure the SIM profile for slots 0 and 1 using the sim profile command.
• For auto-switch and fail over to work, configure the chat script without a specific profile number.
• If SIM profile is not configured, profile #1 is used by default.
• If fail over timer is not configured, the default failover timeout is 2 minutes.
• If SIM primary slot is not configured, the default primary SIM is slot 0.
Note Dual SIM feature is supported only when the same firmware image is used for both the SIM cards.
SUMMARY STEPS
1. configure terminal
2. controller cellular unit
3. sim primary slot
4. sim max-retry number
5. sim authenticate [0 | 7] pin slot {0 | 1}
6. failover timeout-period
7. sim profile number [ims number] slot {0 | 1}
DETAILED STEPS
Example:
Device# configure terminal
Step 2 controller cellular unit Enters the cellular controller configuration mode.
Example:
Device(config)# controller cellular 0/0
or
Device(config)# controller cellular 0/1
Step 3 sim primary slot (Optional) Enters either slot number 0 or 1 of the
primary SIM.
Example:
Device(config-controller)# sim primary slot 1
Step 4 sim max-retry number (Optional) Specifies the maximum number of fail
over retries from 1 to 65535. The default value is 10.
Example:
Device(config-controller)# gsm sim max-retry 20
Example:
Device(config-controller)# gsm sim authenticate 0
1234 slot 0
Step 6 failovertimer timeout-period (Optional) By default, the fail over time period is 2
minutes before the primary SIM switches over to the
secondary SIM if service becomes unavailable.
Example:
Device(config-controller)# failovertimer 6 Specify a fail over timeout value between 1 and 7
minutes before a switchover occurs.
Step 7 sim profile number slot {0 | 1} Applies the configured profile number to the SIM
and its slot number. The default (primary) slot is 0.
Example: You must also identify the primary and secondary
Device(config-controller)# sim profile 1 slot 0 SIM for the configured profile when two SIMs are
presented.
Note Before you start the modem crash dump, turn off the SIM switch over by configuring the sim max-retry
0 command.
Configuration Examples
Command Purpose
cellular sim {lock | unlock} Locks or unlocks the SIM.
cellular unit sim [lock | unlock] pin Locks or unlocks the SIM.
Note Before upgrading the modem to a new firmware version, please check if the new firmware version has
been certified by your wireless service provider. Using an uncertified firmware version on the modem
may impact the wireless service provider network adversely. See the following web link for the latest
certified firmware version for your carrier and IOS compatibility:
http://www.cisco.com/en/US/prod/routers/networking_solutions_products_genericcontent0900aecd806
01f7e.html
Command Description
show cellular unit microcode Displays the list firmware images available on the
modem.
cellular 0/0/0 microcode activate Activates the specified modem firmware.
firmware-id
Note Once you perform the modem firmware switching, you need to perform the modem power cycle using
test cellular unit modem-power-cycle command. To enable test commands, you should enter the
service internal command in global configuration mode.
This example shows displaying the list of firmware images using show cellular unit microcode
command and activating a specific firmware package using cellular microcode activate firmware-id
command.
Router# show cellular 0/1/0 microcode
Modem:
-------------
ID Carrier Technology Version Status
1 Verizon CDMA 02000007 INACTIVE
2 Generic UMTS 02010303 ACTIVE
3 Sprint CDMA 02010001 INACTIVE
4 China Telecom CDMA 02000001 INACTIVE
Related Documents
Topic Document Title
GSM Configuring Cisco EHWIC and 880G for 3.7G
(HSPA+)/3.5G (HSPA)
CDMA Configuring Cisco EHWIC and 880G for 3G
(EV-DO Rev A)
DM Log Collection and modem crashdump support Cisco 3G and 4G Serviceability Enhancement
User Guide
MIB MIB Locator Tool
• CISCO-ENTITY-VENDORTYPE-OID-MIB
• CISCO-WAN-3G-MIB
This chapter describes configuring the serial interface for Cisco 800M Series ISRs in the following
sections:
• Configuring the Serial Interface, page 39
• Features Supported by Serial Module, page 39
• Information About Configuring Serial Interfaces, page 41
• How to Configure Serial Interfaces, page 45
• Configuration Examples, page 47
– EIA-232
– EIA-449
– EIA-530
– EIA-530A
– V.35
– X.21
• Supports synchronous speed of up to 8 Mbps
• Supports asynchronous speed of up to 115.2 kbps
• Supports network clock synchronization
Cisco 800M Series ISRs use Cisco smart serial connectors. Information about the cables supported by
Cisco 800M Series ISRs are provided in Table 4-1.
Table 4-1 Smart Serial Cabling for Cisco 800M Series ISRs
Table 4-2 describes the LEDs on the Cisco 800M series serial WAN module.
Note Cisco HDLC is the default encapsulation type for the serial interfaces.
When the encapsulation on a serial interface is changed from HDLC to any other encapsulation type, the
configured serial subinterfaces on the main interface inherit the newly changed encapsulation and they
do not get deleted.
Cisco HDLC uses keepalives to monitor the link state, as described in the “Keepalive Timer” section on
page 4-43.
PPP Encapsulation
PPP is a standard protocol used to send data over synchronous serial links. PPP also provides a Link
Control Protocol (LCP) for negotiating properties of the link. LCP uses echo requests and responses to
monitor the continuing availability of the link.
Note When an interface is configured with PPP encapsulation, a link is declared down and full LCP
negotiation is re-initiated after five echo request (ECHOREQ) packets are sent without receiving an echo
response (ECHOREP).
PPP provides the following Network Control Protocols (NCPs) for negotiating properties of data
protocols that will run on the link:
• IP Control Protocol (IPCP) to negotiate IP properties
• Multiprotocol Label Switching control processor (MPLSCP) to negotiate MPLS properties
• Cisco Discovery Protocol control processor (CDPCP) to negotiate CDP properties
• IPv6CP to negotiate IP Version 6 (IPv6) properties
• Open Systems Interconnection control processor (OSICP) to negotiate OSI properties
PPP uses keepalives to monitor the link state, as described in the “Keepalive Timer” section on
page 4-43.
PPP supports the following authentication protocols, which require a remote device to prove its identity
before allowing data traffic to flow over a connection:
• Challenge Handshake Authentication Protocol (CHAP)—CHAP authentication sends a challenge
message to the remote device. The remote device encrypts the challenge value with a shared secret
and returns the encrypted value and its name to the local router in a response message. The local
router attempts to match the remote device’s name with an associated secret stored in the local
username or remote security server database; it uses the stored secret to encrypt the original
challenge and verify that the encrypted values match.
• Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)—MS-CHAP is the Microsoft
version of CHAP. Like the standard version of CHAP, MS-CHAP is used for PPP authentication; in
this case, authentication occurs between a personal computer using Microsoft Windows and a Cisco
router or access server acting as a network access server.
• Password Authentication Protocol (PAP)—PAP authentication requires the remote device to send a
name and a password, which are checked against a matching entry in the local username database
or in the remote security server database.
Use the ppp authentication command in interface configuration mode to enable CHAP, MS-CHAP, and
PAP on a serial interface.
Note Enabling or disabling PPP authentication does not effect the local router’s willingness to authenticate
itself to the remote device.
Multilink PPP
Multilink Point-to-Point Protocol (MLPPP) is supported on the Cisco 800M Series ISR serial interface.
MLPPP provides a method for combining multiple physical links into one logical link. The
implementation of MLPPP combines multiple PPP serial interfaces into one multilink interface. MLPPP
performs the fragmenting, reassembling, and sequencing of datagrams across multiple PPP links.
MLPPP provides the same features that are supported on PPP Serial interfaces with the exception of
QoS. It also provides the following additional features:
• Fragment sizes of 128, 256, and 512 bytes
• Long sequence numbers (24-bit)
• Lost fragment detection timeout period of 80 ms
• Minimum-active-links configuration option
• LCP echo request/reply support over multilink interface
• Full T1 and E1 framed and unframed links
Keepalive Timer
Cisco keepalives are useful for monitoring the link state. Periodic keepalives are sent to and received
from the peer at a frequency determined by the value of the keepalive timer. If an acceptable keepalive
response is not received from the peer, the link makes the transition to the down state. As soon as an
acceptable keepalive response is obtained from the peer or if keepalives are disabled, the link makes the
transition to the up state.
Note The keepalive command applies to serial interfaces using HDLC or PPP encapsulation. It does not apply
to serial interfaces using Frame Relay encapsulation.
For each encapsulation type, a certain number of keepalives ignored by a peer triggers the serial interface
to transition to the down state. For HDLC encapsulation, three ignored keepalives causes the interface
to be brought down. For PPP encapsulation, five ignored keepalives causes the interface to be brought
down. ECHOREQ packets are sent out only when LCP negotiation is complete (for example, when LCP
is open).
Use the keepalive command in interface configuration mode to set the frequency at which LCP sends
ECHOREQ packets to its peer. To restore the system to the default keepalive interval of 10 seconds, use
the keepalive command with the no keyword. To disable keepalives, use the keepalive disable
command. For both PPP and Cisco HDLC, a keepalive of 0 disables keepalives and is reported in the
show running-config command output as keepalive disable.
When LCP is running on the peer and receives an ECHOREQ packet, it responds with an ECHOREP
packet, regardless of whether keepalives are enabled on the peer.
Keepalives are independent between the two peers. One peer end can have keepalives enabled; the other
end can have them disabled. Even if keepalives are disabled locally, LCP still responds with ECHOREP
packets to the ECHOREQ packets it receives. Similarly, LCP also works if the period of keepalives at
each end is different.
Note The administrative state of a parent interface drives the state of the subinterface and its PVC. When the
administrative state of a parent interface or subinterface changes, so does the administrative state of any
child PVC configured under that parent interface or subinterface.
To configure Frame Relay encapsulation on serial interfaces, use the encapsulation (Frame Relay
VC-bundle) command.
Note Cisco encapsulation is required on serial main interfaces that are configured for MPLS. IETF
encapsulation is not supported for MPLS.
Before you configure Frame Relay encapsulation on an interface, you must verify that all prior
Layer 3 configuration is removed from that interface. For example, you must ensure that there is no IP
address configured directly under the main interface; otherwise, any Frame Relay configuration done
under the main interface will not be viable.
Note The default setting of the mtu command for a serial interface is 1504 bytes. Therefore, the default
numbers of PVCs supported on a serial interface configured with cisco LMI is 186.
Command Purpose
Router(config)# interface serial wic/slot/port Specifies the serial interface and enters interface configuration
mode.
Example:
Router# interface serial 0/0/0
Command Purpose
Router(config-if)# encapsulation {hdlc | frame-relay | ppp Configures synchronous serial encapsulation.
}
Example:
Router(config-if)# encapsulation ppp
Encapsulation methods are set according to the type of protocol or application you configure in the
Cisco IOS software.
For configuration examples, see the “Configuration Examples” section on page 4-47.
SUMMARY STEPS
1. physical-layer async
DETAILED STEPS
Note You cannot use the physical-layer async command for frame-relay encapsulation.
When you make a transition from asynchronous mode to synchronous mode in serial interfaces, the
interface state becomes down by default. You should then use the no shutdown option to bring the
interface up.
Configuration Examples
Router> enable
Router# configure terminal
Router(config)# hostname R2
R2(config)# username R1 password cisco
R2(config)# interface serial 0/0/0
R2(config-if)# encapsulation ppp
R2(config-if)# ppp authentication chap
R2(config-if)# exit
This example shows how to configure PPP encapsulation with PAP authentication.
Router> enable
Router# configure terminal
Router(config)# hostname R1
R1(config)# username R2 password cisco
R1(config)# interface serial 0/0/0
R1(config-if)# encapsulation ppp
R1(config-if)# ppp authentication PAP
R1(config-if)# ppp pap sent-username R1 password cisco
R1(config-if)# end
Router> enable
Router#configure terminal
Router(config)# hostname R2
R2(config)# username R1 password cisco
R2(config)# interface serial 0/0/0
R2(config-if)# encapsulation ppp
R2(config-if)# ppp authentication PAP
R2(config-if)# ppp pap sent-username R2 password cisco
R2(config-if)# end
Related Documents
Topic Document Title
PPP and Multilink PPP Configuring Media-Independent PPP and
Multilink PPP
Serial Interface Configuration Interface and Hardware Component
Configuration Guide, Cisco IOS Release
15M&T
Frame Relay Wide-Area Networking Configuration Guide:
Frame Relay, Cisco IOS Release 15M&T
This chapter gives an overview of configuration tasks for the Gigabit Ethernet (GE) switch on the
Cisco 800M Series ISR.
This chapter contains the following sections:
• Configuring VLANs, page 51
• Configuring VTP, page 52
• Configuring 802.1x Authentication, page 53
• Configuring Spanning Tree Protocol, page 54
• Configuring MAC Address Table Manipulation, page 56
• Configuring MAC Address Notification Traps, page 57
• Configuring the Switched Port Analyzer, page 57
• Configuring IGMP Snooping, page 58
• Configuring Per-Port Storm Control, page 59
• Configuring HSRP, page 60
• Configuring VRRP, page 61
Configuring VLANs
A VLAN is a switched network that is logically segmented by function, project team, or application,
without regard to the physical locations of the users. VLANs have the same attributes as physical LANs,
but you can group end stations even if they are not physically located on the same LAN segment. Any
switch port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and
flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets
destined for stations that do not belong to the VLAN must be forwarded through a router. A VLAN is a
switched network that is logically segmented by function, project team, or application, without regard
to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can
group end stations even if they are not physically located on the same LAN segment. Any switch port
can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to
end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations
that do not belong to the VLAN must be forwarded through a router.
For detailed information on VLANs, see the following web link:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/15-0_2_se/configurat
ion/guide/scg3750/swvlan.html
Configuring VTP
VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the
addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations
and configuration inconsistencies that can cause several problems, such as duplicate VLAN names,
incorrect VLAN-type specifications, and security violations.
Before you create VLANs, you must decide whether to use VTP in your network. Using VTP, you can
make configuration changes centrally on one or more switches and have those changes automatically
communicated to all the other switches in the network. Without VTP, you cannot send information about
VLANs to other switches.VTP is designed to work in an environment where updates are made on a single
switch and are sent through VTP to other switches in the domain. It does not work well in a situation
where multiple updates to the VLAN database occur simultaneously on switches in the same domain,
which would result in an inconsistency in the VLAN database.
You should understand the following concepts for configuring VTP.
• VTP domain: A VTP domain (also called a VLAN management domain) consists of one switch or
several interconnected switches or switch stacks under the same administrative responsibility
sharing the same VTP domain name. A switch can be in only one VTP domain. You make global
VLAN configuration changes for the domain.
• VTP server: In VTP server mode, you can create, modify, and delete VLANs, and specify other
configuration parameters (such as the VTP version) for the entire VTP domain. VTP servers
advertise their VLAN configurations to other switches in the same VTP domain and synchronize
their VLAN configurations with other switches based on advertisements received over trunk
links.VTP server is the default mode.
• VTP client: A VTP client behaves like a VTP server and transmits and receives VTP updates on its
trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on
another switch in the domain that is in server mode.
• VTP transparent: VTP transparent switches do not participate in VTP. A VTP transparent switch
does not advertise its VLAN configuration and does not synchronize its VLAN configuration based
on received advertisements. However, in VTP version 2 or version 3, transparent switches do
forward VTP advertisements that they receive from other switches through their trunk interfaces.
You can create, modify, and delete VLANs on a switch in VTP transparent mode.
The following example shows how to configure the switch as a VTP client:
Router# configure terminal
Router(config)# vtp mode client
Router(config)# exit
The following example shows how to configure the switch as VTP transparent:
Router# configure terminal
Router(config)# vtp mode transparent
Router# exit
• Authenticator—Router that controls the physical access to the network based on the authentication
status of the supplicant. The router acts as an intermediary between the supplicant and the
authentication server, requesting identity information from the supplicant, verifying that
information with the authentication server, and relaying a response to the supplicant. The router
includes the RADIUS client, which is responsible for encapsulating and decapsulating the EAP
frames and interacting with the authentication server.
For detailed information on how to configure 802.1x port-based authentication, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/sec-user-8021x-
15-mt-book/config-ieee-802x-pba.html
For a sample 802.1x authentication configuration see “Example: Enabling IEEE 802.1x and AAA on a
Switch Port”.
switch and MAC addresses, switch priority, port priority, and path cost. Spanning tree uses this
information to elect the root switch and root port for the switched network and the root port and
designated port for each switched segment.
When two ports on a switch are part of a loop, the spanning-tree port priority and path cost settings
control which port is put in the forwarding state and which is put in the blocking state. The spanning-tree
port priority value represents the location of a port in the network topology and how well it is located to
pass traffic. The path cost value represents the media speed.
For detailed configuration information on STP see the following link:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750/software/release/15-0_2_se/configurat
ion/guide/scg3750/swstp.html
For configuration examples, see “Example: Spanning Tree Protocol Configuration”.
The following example shows how to change the spanning-tree port cost of a Gigabit Ethernet interface.
If a loop occurs, spanning tree uses cost when selecting an interface to put in the forwarding state.
Router#configure terminal
Router(config)# interface gigabitethernet 0/2
Router(config-if)# spanning-tree cost 18
Router(config-if)# end
The following example shows configuring the bridge priority of VLAN 10 to 33792:
Router# configure terminal
Router(config)# spanning-tree vlan 10 priority 33792
Router(config)# end
The following example shows configuring the hello time for VLAN 10 being configured to 7 seconds.
The hello time is the interval between the generation of configuration messages by the root switch.
Router# configure terminal
Router(config)# spanning-tree vlan 10 hello-time 4
Router(config)# end
The following example shows configuring forward delay time. The forward delay is the number of
seconds an interface waits before changing from its spanning-tree learning and listening states to the
forwarding state.
Router# configure terminal
Router(config)# spanning-tree vlan 10 forward-time 21
Router(config)# end
The following example shows configuring maximum age interval for the spanning tree. The
maximum-aging time is the number of seconds a switch waits without receiving spanning-tree
configuration messages before attempting a reconfiguration.
Router# configure terminal
Router(config)# spanning-tree vlan 20 max-age 36
Router(config)# end
The following example shows the switch being configured as the root bridge for VLAN 10, with a
network diameter of 4.
Router# configure terminal
Router(config)# spanning-tree vlan 10 root primary diameter 4
Router(config)# exit
The following example shows creating a static entry in the MAC address table.
Router# configure terminal
Router(config)# mac-address-table static 0002.0003.0004 interface GigabitEthernet 0/2 vlan
3
Router(config)# end
The following example sets the maximum number of secure MAC addresses to 10.
Router(config)# end
This example shows how to enable the MAC notification trap when a MAC address is removed from this
interface.
Router(config)# interface gigabitethernet 0/1
Router(config-if)# snmp trap mac-notification removed
Router(config-if)# end
The following example shows how to configure a gigabit ethernet interface as the destination for a SPAN
session:
Router# configure terminal
Router(config)# monitor session 1 destination gigabitethernet 0/2
Router(config)# end
The following example shows how to remove gigabit ethernet as a SPAN source for SPAN session 1:
Router# configure terminal
Router(config)# no monitor session 1 source gigabitethernet 0/1
Router(config)# end
The following example shows how to enable a static connection to a multicast router.
Router# configure terminal
Router(config)# ip igmp snooping vlan 1 mrouter interface gigabitethernet 0/1
Router# end
The following example shows how to add a port as a member of a multicast group. Ports normally join
multicast groups through the IGMP report message, but you can also statically configure a port as a
member of a multicast group.
Router# configure terminal
Router(config)# ip igmp snooping vlan 1 static 0100.5e02.0203 interface gigabitethernet
0/1
Router# end
Note In C800M platform, when you configure the storm-control action shutdown command, the state of the
port changes to administratively down. Use the no shutdown command to manually revert the state of
the port.
See the “Example: Per-Port Storm-Control” for a sample configuration on per-port storm control.
Configuring HSRP
The Hot Standby Router Protocol (HSRP) is Cisco's standard method of providing high network
availability by providing first-hop redundancy for IP hosts on an IEEE 802 LAN configured with a
default gateway IP address. HSRP routes IP traffic without relying on the availability of any single
router. It enables a set of router interfaces to work together to present the appearance of a single virtual
router or default gateway to the hosts on a LAN. When HSRP is configured on a network or segment, it
provides a virtual Media Access Control (MAC) address and an IP address that is shared among a group
of configured routers. HSRP allows two or more HSRP-configured routers to use the MAC address and
IP network address of a virtual router. The virtual router does not exist; it represents the common target
for routers that are configured to provide backup to each other. One of the routers is selected to be the
active router and another to be the standby router, which assumes control of the group MAC address and
IP address should the designated active router fail.
HSRP uses a priority mechanism to determine which HSRP configured device is to be the default active
device. To configure a device as the active device, you assign it a priority that is higher than the priority
of all the other HSRP-configured devices. The default priority is 100, so if you configure just one device
to have a higher priority, that device will be the default active device. In case of ties, the primary IP
addresses are compared, and the higher IP address has priority. If you do not use the standby preempt
interface configuration command in the configuration for a router, that router will not become the active
router, even if its priority is higher than all other routers.
For more information about configuring HSRP, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp
-hsrp.html
For a sample HSRP configuration, see “Example: Configuring HSRP”
Configuring VRRP
The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns
responsibility for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on
a multiaccess link to utilize the same virtual IP address. A VRRP router is configured to run the VRRP
protocol in conjunction with one or more other routers attached to a LAN. In a VRRP configuration, one
router is elected as the virtual router master, with the other routers acting as backups in case the virtual
router master fails.
An important aspect of the VRRP is VRRP router priority. Priority determines the role that each VRRP
router plays and what happens if the virtual router master fails. If a VRRP router owns the IP address of
the virtual router and the IP address of the physical interface, this router will function as a virtual router
master. Priority also determines if a VRRP router functions as a virtual router backup and the order of
ascendancy to becoming a virtual router master if the virtual router master fails. You can configure the
priority of each virtual router backup using the vrrp priority command.
By default, a preemptive scheme is enabled whereby a higher priority virtual router backup that becomes
available takes over for the virtual router backup that was elected to become virtual router master. You
can disable this preemptive scheme using the no vrrp preempt command. If preemption is disabled, the
virtual router backup that is elected to become virtual router master remains the master until the original
virtual router master recovers and becomes master again.
The virtual router master sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the virtual router master. The VRRP
advertisements are encapsulated in IP packets and sent to the IP Version 4 multicast address assigned to
the VRRP group. The advertisements are sent every second by default; the interval is configurable.
For more information on VRRP, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp
-vrrp.html
For a sample VRRP configuration, see “Example: Configuring VRRP”.
The Cisco 800M Series ISR provides the following security features:
• Configuring Authentication, Authorization, and Accounting, page 63
• Configuring Access Lists, page 64
• Configuring Cisco IOS IPS, page 65
• Configuring VPN, page 65
• Configuring Dynamic Multipoint VPN, page 83
• Configuring Group Encrypted Transport VPN, page 90
• Configuring SSL VPN, page 94
• Configuring FlexVPN, page 97
• Configuring Zone-Based Policy Firewall, page 103
• Configuring VRF-Aware Cisco Firewall, page 103
• Configuring Subscription-Based Cisco IOS Content Filtering, page 103
• Configuring On-Device Management for Security Features, page 104
• Related Documents, page 104
For information about configuring AAA services and supported security protocols, see the following
guide:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-mt/sec-usr-aaa-15-mt-
book.html
For more complete information on creating access lists, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/15-mt/sec-data-acl-15-m
t-book.html
Access Groups
An access group is a sequence of access list definitions bound together with a common name or number.
An access group is enabled for an interface during interface configuration. Use the following guidelines
when creating access groups:
• The order of access list definitions is significant. A packet is compared against the first access list
in the sequence. If there is no match (that is, if neither a permit nor a deny occurs), the packet is
compared with the next access list, and so on.
• All parameters must match the access list before the packet is permitted or denied.
• There is an implicit “deny all” at the end of all sequences.
For information on configuring and managing access groups, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_data_acl/configuration/15-mt/sec-data-acl-15-m
t-book/sec-create-ip-al-filter.html
Configuring VPN
A Virtual Private Network (VPN) connection provides a secure connection between two networks over
a public network such as the Internet. Cisco 800M Series ISRs support two types of VPNs: site-to-site
and remote access. Remote access VPNs are used by remote clients to log in to a corporate network.
Site-to-site VPNs connect branch offices to corporate offices. This section gives examples for site-to-site
and remote access VPNs.
3 4
2
Internet
121782
6
The Cisco Easy VPN client feature eliminates much of the tedious configuration work by implementing
the Cisco Unity Client protocol. This protocol allows most VPN parameters, such as internal IP
addresses, internal subnet masks, DHCP server addresses, Windows Internet Naming Service (WINS)
server addresses, and split-tunneling flags, to be defined at a VPN server, such as a Cisco VPN 3000
series concentrator that is acting as an IPSec server.
A Cisco Easy VPN server–enabled device can terminate VPN tunnels initiated by mobile and remote
workers who are running Cisco Easy VPN Remote software on PCs. Cisco Easy VPN server–enabled
devices allow remote routers to act as Cisco Easy VPN Remote nodes.
The Cisco Easy VPN client feature can be configured in one of two modes—client mode or network
extension mode. Client mode is the default configuration and allows only devices at the client site to
access resources at the central site. Resources at the client site are unavailable to the central site.
Network extension mode allows users at the central site (where the Cisco VPN 3000 series concentrator
is located) to access network resources on the client site.
After the IPSec server has been configured, a VPN connection can be created with minimal configuration
on an IPSec client. When the IPSec client initiates the VPN tunnel connection, the IPSec server pushes
the IPSec policies to the IPSec client and creates the corresponding VPN tunnel connection.
Note The Cisco Easy VPN client feature supports configuration of only one destination peer. If your
application requires creation of multiple VPN tunnels, you must manually configure the IPSec VPN and
Network Address Translation/Peer Address Translation (NAT/PAT) parameters on both the client and the
server.
3 6
2 4 5 7
Internet
121783
9
For more information about IPSec and GRE configuration, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-for-v
pns-w-ipsec-15-mt-book/sec-cfg-vpn-ipsec.html
Configuration Examples
Each example configures a VPN over an IPSec tunnel, using the procedure given in the “Configure a
VPN over an IPSec Tunnel” section on page 68. Then, the specific procedure for a remote access
configuration is given, followed by the specific procedure for a site-to-site configuration.
The examples shown in this chapter apply only to the endpoint configuration on the Cisco 800M Series
ISRs. Any VPN connection requires both endpoints to be properly configured in order to function. See
the software configuration documentation as needed to configure VPN for other router models.
VPN configuration information must be configured on both endpoints. You must specify parameters
such as internal IP addresses, internal subnet masks, DHCP server addresses, and Network Address
Translation (NAT).
• “Configure a VPN over an IPSec Tunnel” section on page 68
• “Create a Cisco Easy VPN Remote Configuration” section on page 77
• “Configure a Site-to-Site GRE Tunnel” section on page 80
SUMMARY STEPS
DETAILED STEPS
Step 3 hash {md5 | sha} Specifies the hash algorithm used in the IKE
policy.
Example: The example specifies the MD53 algorithm. The
Router(config-isakmp)# hash md5 default is SHA-14.
Step 4 authentication {rsa-sig | rsa-encr | pre-share} Specifies the authentication method used in the
IKE policy.
Example: The example specifies a pre-shared key.
Router(config-isakmp)# authentication
pre-share
SUMMARY STEPS
DETAILED STEPS
Step 2 key name Specifies the IKE pre-shared key for the group
policy.
Example:
Router(config-isakmp-group)# key
secret-password
Example:
Router(config-isakmp-group)# domain
company.com
Step 6 ip local pool {default | poolname} Specifies a local address pool for the group.
[low-ip-address [high-ip-address]]
For details about this command and additional
parameters that can be set, see Cisco IOS Dial
Example: Technologies Command Reference.
Router(config)# ip local pool dynpool
30.30.30.20 30.30.30.30
SUMMARY STEPS
DETAILED STEPS
Step 2 crypto map tag client configuration address Configures the router to reply to mode
[initiate | respond] configuration requests from remote clients.
Example:
Router(config)# crypto map dynmap client
configuration address respond
#
SUMMARY STEPS
1. aaa new-model
2. aaa authentication login {default | list-name} method1 [method2...]
3. aaa authorization {network | exec | commands level | reverse-access | configuration} {default |
list-name} [method1 [method2...]]
4. username name {nopassword | password password | password encryption-type
encrypted-password}
DETAILED STEPS
Example:
Router(config)# aaa new-model
Step 2 aaa authentication login {default | list-name} Specifies AAA authentication of selected users at
method1 [method2...] login, and specifies the method used.
This example uses a local authentication database.
Example: You could also use a RADIUS server for this. For
Router(config)# aaa authentication login details, see Cisco IOS Security Configuration
rtr-remote local Guide: Securing User Services, Release 15M&T
and Cisco IOS Security Command Reference.
Step 3 aaa authorization {network | exec | commands Specifies AAA authorization of all
level | reverse-access | configuration} {default | network-related service requests, including PPP,
list-name} [method1 [method2...]] and specifies the method of authorization.
Example:
Router(config)# aaa authorization network
rtr-remote local
Example:
Router(config)# username username1 password
0 password1
SUMMARY STEPS
DETAILED STEPS
Step 3 crypto ipsec security-association lifetime Specifies global lifetime values used when IPSec
{seconds seconds | kilobytes kilobytes} security associations are negotiated.
Example:
Router(config)# crypto ipsec
security-association lifetime seconds 86400
SUMMARY STEPS
DETAILED STEPS
Step 2 set transform-set transform-set-name Specifies which transform sets can be used with
[transform-set-name2...transform-set-name6] the crypto map entry.
Example:
Router(config-crypto-map)# set
transform-set vpn1
Example:
Router(config-crypto-map)# exit
Step 5 crypto map map-name seq-num [ipsec-isakmp] Creates a crypto map profile.
[dynamic dynamic-map-name] [discover]
[profile profile-name]
Example:
Router(config)# crypto map static-map 1
ipsec-isakmp dynamic dynmap
SUMMARY STEPS
DETAILED STEPS
Example:
Router(config-if)# crypto map static-map
Example:
Router(config-crypto-map)# exit
Where to Go Next
If you are creating a Cisco Easy VPN remote configuration, go to the “Create a Cisco Easy VPN Remote
Configuration” section on page 77.
If you are creating a site-to-site VPN using IPSec tunnels and GRE, go to the “Configure a Site-to-Site
GRE Tunnel” section on page 80.
SUMMARY STEPS
DETAILED STEPS
Step 2 group group-name key group-key Specifies the IPSec group and IPSec key value for
the VPN connection.
Example:
Router(config-crypto-ezvpn)# group
ezvpnclient key secret-password
Step 3 peer {ipaddress | hostname} Specifies the peer IP address or hostname for the
VPN connection.
Example: Note A hostname can be specified only when
Router(config-crypto-ezvpn)# peer the router has a DNS server available for
192.168.100.1
hostname resolution.
Example:
Router(config-crypto-ezvpn)# mode client
Example:
Router(config-crypto-ezvpn)# exit
Step 6 crypto isakmp keepalive seconds Enables dead peer detection messages. Time
between messages is given in seconds, with a
range of 10 to 3600.
Example:
Router(config-crypto-ezvpn)# crypto isakmp
keepalive 10
Step 8 crypto ipsec client ezvpn name [outside | inside] Assigns the Cisco Easy VPN remote configuration
to the WAN interface which causes the router to
automatically create the NAT or PAT1 and the
Example: access list configuration needed for the VPN
Router(config-if)# crypto ipsec client
ezvpn ezvpnclient outside
connection.
Example:
Router(config-crypto-ezvpn)# exit
Configuration Example
The following configuration example shows the EasyVPN client configuration.
!
aaa new-model
!
aaa authentication login rtr-remote local
aaa authorization network rtr-remote local
aaa session-id common
!
username username1 password 0 password1
!
crypto isakmp policy 1
encryption 3des
authentication pre-share
group 2
lifetime 480
!
crypto isakmp client configuration group rtr-remote
key secret-password
dns 10.50.10.1 10.60.10.1
domain company.com
pool dynpool
!
crypto ipsec transform-set vpn1 esp-3des esp-sha-hmac
!
crypto ipsec security-association lifetime seconds 86400
!
crypto dynamic-map dynmap 1
set transform-set vpn1
reverse-route
!
crypto map static-map 1 ipsec-isakmp dynamic dynmap
crypto map dynmap isakmp authorization list rtr-remote
crypto map dynmap client configuration address respond
interface vlan 1
crypto ipsec client ezvpn ezvpnclient inside
!
SUMMARY STEPS
DETAILED STEPS
Example:
Router(config-if)# ip address 10.62.1.193
255.255.255.252
Step 4 tunnel destination default-gateway-ip-address Specifies the destination endpoint of the router for
the GRE tunnel.
Example:
Router(config-if)# tunnel destination
192.168.101.1
Step 7 ip access-list {standard | extended} Enters ACL1 configuration mode for the named
access-list-name ACL that the crypto map uses.
Example:
Router(config)# ip access-list extended
vpnstatic1
Step 8 permit protocol source source-wildcard Specifies that only GRE traffic is permitted on the
destination destination-wildcard outbound interface.
Example:
Router(config-acl)# permit gre host
192.168.100.1 host 192.168.101.1
Example:
Router(config-acl)# exit
Configuration Example
The following configuration example shows a portion of the configuration file for a site-to-site VPN
using a GRE tunnel as described in the preceding sections.
!
aaa new-model
!
aaa authentication login rtr-remote local
aaa authorization network rtr-remote local
aaa session-id common
!
username username1 password 0 password1
!
interface tunnel 1
ip address 10.62.1.193 255.255.255.252
no cdp enable
!
! GE4 is the outside or Internet-exposed interface
interface Gigabitethernet 0/4
ip address 210.110.101.21 255.255.255.0
! acl 103 permits IPsec traffic from the corp. router as well as
! denies Internet-initiated traffic inbound.
ip access-group 103 in
ip nat outside
no cdp enable
crypto map to_corporate ! Applies the IPsec tunnel to the outside interface.
!
! Utilize NAT overload in order to make best use of the
! single address provided by the ISP.
ip nat inside source list 102 interface Gigabitethernet 0/1 overload
ip classless
ip route 0.0.0.0 0.0.0.0 210.110.101.1
no ip http server
!
!
! acl 102 associated addresses used for NAT.
access-list 102 permit ip 10.1.1.0 0.0.0.255 any
! acl 103 defines traffic allowed from the peer for the IPsec tunnel.
access-list 103 permit udp host 200.1.1.1 any eq isakmp
access-list 103 permit udp host 200.1.1.1 eq isakmp any
access-list 103 permit esp host 200.1.1.1 any
! Allow ICMP for debugging but should be disabled because of security implications.
access-list 103 permit icmp any any
access-list 103 deny ip any any ! Prevents Internet-initiated traffic inbound.
! acl 105 matches addresses for the IPsec tunnel to or from the corporate network.
access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255
no cdp run
interface Loopback0
ip address 2.2.2.2 255.255.255.255
!
interface Tunnel0
ip address 24.1.1.2 255.255.255.0
no ip redirects
ip mtu 1440
ip nhrp authentication ISA_KEY
ip nhrp map multicast 172.16.0.1
ip nhrp map 24.1.1.1 172.16.0.1
ip nhrp network-id 1
ip nhrp holdtime 120
ip nhrp nhs 24.1.1.1
ip nhrp registration timeout 30
ip nhrp shortcut
tunnel source GigabitEthernet0/9
tunnel mode gre multipoint
tunnel key 0
tunnel protection ipsec profile DMVPN-PROFILE
!
interface GigabitEthernet0/0
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface GigabitEthernet0/3
no ip address
!
interface GigabitEthernet0/4
no ip address
!
interface GigabitEthernet0/5
no ip address
!
interface GigabitEthernet0/6
no ip address
!
interface GigabitEthernet0/7
no ip address
!
interface GigabitEthernet0/8
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/9
ip address 172.15.0.1 255.255.255.0
duplex auto
speed auto
!
interface Vlan1
ip address 190.160.10.111 255.255.255.0
!
!
router eigrp 20
network 2.2.2.0 0.0.0.255
network 24.1.1.0 0.0.0.255
!
!
router eigrp 10
network 172.15.0.0 0.0.0.255
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 192.168.4.0 255.255.255.0 100.100.100.2
ip route 192.168.5.0 255.255.255.0 100.100.100.2
!
access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 102 permit ip 100.100.100.0 0.0.0.255 200.200.200.0 0.0.0.255
!
control-plane
!
!
line con 0
no modem enable
line vty 0 4
login
This configuration section shows the configuraton of 2900 Series ISR as hub.
2901_hub# show running-config
Building configuration...
lldp run
!
!
crypto isakmp policy 1
encr aes
hash sha256
authentication pre-share
group 2
crypto isakmp key ISA_KEY address 0.0.0.0
crypto isakmp keepalive 10 periodic
!
!
crypto ipsec transform-set DMVPN-TRANS-SET esp-aes 256 esp-sha-hmac
mode tunnel
!
crypto ipsec profile DMVPN-PROFILE
set security-association lifetime seconds 120
set transform-set DMVPN-TRANS-SET
!
!
interface Loopback0
ip address 1.1.1.1 255.255.255.255
ip ospf message-digest-key 1 md5 cisco
!
interface Loopback1
ip address 12.12.12.2 255.255.255.255
!
interface Loopback2
ip address 12.12.12.3 255.255.255.255
!
interface Loopback3
ip address 12.12.12.4 255.255.255.255
!
interface Loopback4
ip address 12.12.12.5 255.255.255.255
!
interface Tunnel0
ip address 24.1.1.1 255.255.255.0
no ip redirects
ip mtu 1440
no ip split-horizon eigrp 10
ip nhrp authentication ISA_KEY
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip nhrp shortcut
ip nhrp redirect
ip summary-address eigrp 20 192.168.0.0 255.255.0.0
tunnel source GigabitEthernet0/1
tunnel mode gre multipoint
tunnel key 0
tunnel protection ipsec profile DMVPN-PROFILE
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
ip address 192.168.5.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 172.16.0.1 255.255.255.0
ip ospf message-digest-key 1 md5 cisco
ip ospf priority 10
duplex auto
speed auto
!
interface GigabitEthernet0/1/0
switchport access vlan 2
no ip address
shutdown
!
interface GigabitEthernet0/1/1
switchport access vlan 10
no ip address
!
interface GigabitEthernet0/1/2
switchport access vlan 10
no ip address
!
interface GigabitEthernet0/1/3
switchport access vlan 20
no ip address
!
interface GigabitEthernet0/1/4
no ip address
!
interface GigabitEthernet0/1/5
switchport access vlan 10
no ip address
!
interface GigabitEthernet0/1/6
no ip address
!
interface GigabitEthernet0/1/7
no ip address
!
interface Vlan1
no ip address
!
!
router eigrp 10
network 172.16.0.0 0.0.0.255
!
!
router eigrp 20
network 1.1.1.0 0.0.0.255
network 24.1.1.0 0.0.0.255
network 192.168.5.0
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 100.100.100.0 255.255.255.0 150.150.150.2
ip route 192.168.3.0 255.255.255.0 150.150.150.2
ip route 192.168.4.0 255.255.255.0 150.150.150.2
ip route 200.200.200.0 255.255.255.0 150.150.150.2
!
!
control-plane
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
no aaa new-model
bsd-client server url https://cloudsso.cisco.com/as/token.oauth2
!
ip cef
no ipv6 cef
!
!
multilink bundle-name authenticated
!
cts logging verbose
license udi pid C841M-8X/K9 sn FOC18170PNJ
license accept end user agreement
license boot module c800m level advipservices
!
redundancy
!
crypto isakmp policy 100
encr aes
authentication pre-share
group 5
lifetime 3600
crypto isakmp key cisco address 192.168.1.2
!
crypto gdoi group gdoi
identity number 1234
server address ipv4 192.168.1.2
!
crypto map crypto 10 gdoi
set group gdoi
!
interface GigabitEthernet0/0
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface GigabitEthernet0/3
no ip address
!
interface GigabitEthernet0/4
no ip address
!
interface GigabitEthernet0/5
no ip address
!
interface GigabitEthernet0/6
no ip address
!
interface GigabitEthernet0/7
no ip address
!
interface GigabitEthernet0/8
ip address 10.1.3.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/9
ip address 192.168.3.2 255.255.255.0
duplex auto
speed auto
crypto map crypto
!
interface Vlan1
no ip address
!
!
router eigrp 1
network 10.1.3.0 0.0.0.255
network 192.168.3.0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
control-plane
!
line con 0
no modem enable
line vty 0 4
login
transport input none
!
scheduler allocate 20000 1000
!
end
This configuration section shows the configuration of Cisco 1900 Series ISR as KS.
1921_KS# show running-config
Building configuration...
Current configuration : 2019 bytes
!
version 15.3
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 1921_KS
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
!
!
ip cef
no ipv6 cef
!
multilink bundle-name authenticated
!
redundancy
!
crypto isakmp policy 100
encr aes
authentication pre-share
group 5
lifetime 3600
crypto isakmp key cisco address 0.0.0.0
!
interface Embedded-Service-Engine0/0
no ip address
shutdown
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 192.168.1.2 255.255.255.0
duplex auto
speed auto
crypto map crypto
!
interface Serial0/0/0
no ip address
shutdown
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
router eigrp 1
network 192.168.1.0
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
line vty 0 4
login
transport input all
!
scheduler allocate 20000 1000
!
end
redundancy
!
crypto vpn anyconnect sdflash:/webvpn/anyconnect-win-3.1.03103-k9.pkg sequence 1
!
interface Loopback10
ip address 100.100.100.100 255.255.255.255
!
interface GigabitEthernet0/0
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface GigabitEthernet0/3
no ip address
!
interface GigabitEthernet0/4
no ip address
!
interface GigabitEthernet0/5
no ip address
!
interface GigabitEthernet0/6
no ip address
!
interface GigabitEthernet0/7
no ip address
!
interface GigabitEthernet0/8
ip address 192.168.10.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/9
ip address 9.43.17.81 255.255.0.0
duplex auto
speed auto
!
interface Virtual-Template1
ip unnumbered GigabitEthernet0/8
ip virtual-reassembly in
!
interface Vlan1
no ip address
!
ip local pool IP_Pool 10.10.10.1 10.10.10.10
ip forward-protocol nd
no ip http server
no ip http secure-server
!
!
ip route 202.153.144.0 255.255.255.0 9.43.0.1
!
control-plane
!
line con 0
no modem enable
line vty 0 4
transport input none
!
scheduler allocate 20000 1000
!
Configuring FlexVPN
FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that
combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke
direct). FlexVPN offers a simple but modular framework that extensively uses the tunnel interface
paradigm while remaining compatible with legacy VPN implementations using crypto maps.
See the “Example: FlexVPN Configuration” section for a sample FlexVPN hub and spoke configuration.
For additional information about configuring FlexVPN, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-mt/sec-flex-vpn
-15-mt-book/sec-intro-ikev2-flex.html
aaa new-model
!
!
aaa authorization network FLEX local
!
!
ip cef
no ipv6 cef
!
!
multilink bundle-name authenticated
!
chat-script multimode "" "AT!CALL" TIMEOUT 20 "OK"
cts logging verbose
license udi pid C841M-4X/K9 sn FCW1839001E
!
redundancy
!
crypto ikev2 authorization policy FLEX
route set interface
!
!
!
crypto ikev2 keyring KEYRING
peer R1
address 172.16.0.1
pre-shared-key CISCO
!
!
!
crypto ikev2 profile default
match identity remote address 172.16.0.1 255.255.255.255
identity local key-id FLEX
authentication remote pre-share
authentication local pre-share
keyring local KEYRING
aaa authorization group psk list FLEX FLEX
!
!
!
controller Cellular 0/0
modem link-recovery rssi onset-threshold -110
modem link-recovery monitor-timer 20
modem link-recovery wait-timer 10
!
interface Loopback0
ip address 2.2.2.2 255.255.255.0
!
interface Tunnel0
ip address negotiated
tunnel source GigabitEthernet0/5
tunnel mode ipsec ipv4
tunnel destination 172.16.0.1
tunnel protection ipsec profile default
!
interface GigabitEthernet0/0
no ip address
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/2
no ip address
!
interface GigabitEthernet0/3
no ip address
!
interface GigabitEthernet0/4
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/5
ip address 172.16.0.2 255.255.255.0
duplex auto
speed auto
!
interface Cellular0/0/0
no ip address
encapsulation slip
dialer in-band
dialer string multimode
!
interface Serial0/1/0
no ip address
shutdown
clock rate 2000000
!
interface Vlan1
no ip address
!
!
router eigrp 1
network 0.0.0.0
passive-interface default
no passive-interface Tunnel0
!
ip forward-protocol nd
no ip http server
no ip http secure-server
!
control-plane
!
line con 0
no modem enable
line 2
no activation-character
no exec
transport preferred none
transport input all
stopbits 1
line 3
script dialer multimode
no exec
line vty 0 4
transport input none
!
scheduler allocate 20000 1000
!
end
This configuration section shows the configuration of 800M Series ISR as a spoke.
C3900# show running-config
Building configuration...
!
!
aaa session-id common
!
!
!
ip cef
no ipv6 cef
!
!
multilink bundle-name authenticated
!
!
voice-card 0
!
!
!
interface Loopback0
ip address 1.1.1.1 255.255.255.0
!
interface GigabitEthernet0/0
no ip address
duplex auto
speed auto
!
interface GigabitEthernet0/1
ip address 172.16.0.1 255.255.255.0
duplex auto
speed auto
!
interface GigabitEthernet0/2
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/3
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1/0
no ip address
!
interface FastEthernet0/1/1
no ip address
!
interface FastEthernet0/1/2
no ip address
!
interface FastEthernet0/1/3
no ip address
!
interface FastEthernet0/1/4
no ip address
!
interface FastEthernet0/1/5
no ip address
!
interface FastEthernet0/1/6
no ip address
!
interface FastEthernet0/1/7
no ip address
!
interface FastEthernet0/1/8
no ip address
!
interface Virtual-Template1 type tunnel
ip unnumbered Loopback0
tunnel source GigabitEthernet0/1
tunnel mode ipsec ipv4
tunnel protection ipsec profile default
!
interface Vlan1
no ip address
!
!
!
router eigrp 1
network 1.1.1.1 0.0.0.0
passive-interface default
no passive-interface Virtual-Template1
!
ip local pool POOL 192.168.0.1 192.168.0.10
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
!
!
nls resp-timeout 1
cpd cr-id 1
!
!
!
!
control-plane
!
!
gatekeeper
shutdown
!
!
!
line con 0
line aux 0
line vty 0 4
transport input all
!
scheduler allocate 20000 1000
!
end
Related Documents
Topic Document Title
DMVPN Dynamic Multipoint VPN Configuration Guide,
Cisco IOS Release 15M&T
GETVPN Cisco Group Encrypted Transport VPN
Configuration Guide, Cisco IOS Release
15M&T
SSL VPN SSL VPN Configuration Guide, Cisco IOS
Release 15M&T
FlexVPN FlexVPN and Internet Key Exchange Version 2
Configuration Guide, Cisco IOS Release
15M&T
IKE for IPSec VPNs Internet Key Exchange for IPsec VPNs
Configuration Guide, Cisco IOS Release
15M&T
This chapter provides information about configuring the Quality of Service (QoS) features on the Cisco
800M Series ISR and contains the following sections:
• Configuring Class Based Weighted Fair Queuing, page 105
• Configuring Low-Latency Queueing, page 106
• Configuring Class-Based Traffic Shaping, page 107
• Configuring Class-Based Traffic Policing, page 107
• Configuring Class-Based Weighted Random Early Detection, page 108
• Configuring QoS Hierarchical Queueing Framework, page 108
• Configuring Network-Based Application Recognition, page 108
• Configuring Resource Reservation Protocol, page 109
• Configuring Quality of Service for VPNs, page 109
• Configuring Per Tunnel QoS for DMVPN, page 110
• Configuring Layer 2 Auto QoS, page 110
Router(config-pmap-c)# fair-queue
Router(config)# interface serial 0/0/0
Router(config-if)# service-policy output policy1
Router(config-if)# exit
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_classn/configuration/15-mt/qos-classn-15-mt-b
ook/qos-classn-vpn.html
This chapter provides information about configuring the network management features for the Cisco
800M Series ISR and contains the following sections:
• Cisco Configuration Professional, page 111
• Cisco Configuration Professional Express, page 112
• Cisco Prime Infrastructure, page 112
• Embedded Event Manager, page 112
• Configuring IP SLAs, page 112
• Configuring Radius, page 113
• Configuring TACACS+, page 113
• Configuring SSH, page 113
• Configuring SNMP, page 114
• Configuring NetFlow, page 114
• Configuring Flexible NetFlow, page 114
• MIB Support, page 114
Configuring IP SLAs
IP Service Level Agreements (IP SLAs) allows Cisco customers to analyze IP service levels for IP
applications and services, to increase productivity, to lower operational costs, and to reduce the
frequency of network outages. IP SLAs uses active traffic monitoring--the generation of traffic in a
continuous, reliable, and predictable manner--for measuring network performance. Using IP SLAs,
service provider customers can measure and provide service level agreements, and enterprise customers
can verify service levels, verify outsourced service level agreements, and understand network
performance. IP SLAs can perform network assessments, verify quality of service (QoS), ease the
deployment of new services, and assist administrators with network troubleshooting. IP SLAs can be
accessed using the Cisco software commands or Simple Network Management Protocol (SNMP)
through the Cisco Round-Trip Time Monitor (RTTMON) and syslog Management Information Bases
(MIBs).
For more information on configuring IP SLAs, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-b
ook/qos-plcshp-class-plc.html
Configuring Radius
The RADIUS security system is a distributed client/server system that secures networks against
unauthorized access. In the Cisco implementation, RADIUS clients run on Cisco devices and send
authentication requests to a central RADIUS server that contains all user authentication and network
service access information.
For more information about configuring Radius, see the following web link
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_rad/configuration/15-mt/sec-usr-rad-15-mt-
book/sec-cfg-radius.html
Configuring TACACS+
TACACS+ is a security application that provides centralized validation of users attempting to gain access
to a device or network access server. TACACS+ services are maintained in a database on a TACACS+
daemon running, typically, on a UNIX or Windows NT workstation.
TACACS+ provides for separate and modular authentication, authorization, and accounting facilities.
TACACS+ allows for a single access control server (the TACACS+ daemon) to provide each
service--authentication, authorization, and accounting--independently. Each service can be tied into its
own database to take advantage of other services available on that server or on the network, depending
on the capabilities of the daemon. The goal of TACACS+ is to provide a methodology for managing
multiple network access points from a single management service.
For more information about configuring TACACS+, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_tacacs/configuration/15-mt/sec-usr-tacacs-1
5-mt-book/sec-cfg-tacacs.html
Configuring SSH
Secure Shell (SSH) runs on top of a reliable transport layer and provides strong authentication and
encryption capabilities.SSH provides a means to securely access and securely execute commands on
another computer over a network.
For more information about configuring SSH see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-mt/sec-usr-ssh-15-mt-
book/sec-usr-ssh-sec-shell.html
Configuring SNMP
Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message
format for communication between SNMP managers and agents. SNMP provides a standardized
framework and a common language that is used for monitoring and managing devices in a network.
For more information about configuring SNMP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/15-mt/snmp-15-mt-book/nm-sn
mp-cfg-snmp-support.html
Configuring NetFlow
NetFlow is a Cisco IOS application that provides statistics on packets flowing through the routing
devices in the network. It is emerging as a primary network accounting and security technology.
NetFlow identifies packet flows for both ingress and egress IP packets. It does not involve any
connection-setup protocol, either between routers or to any other networking device or end station.
NetFlow does not require any change externally--either to the packets themselves or to any networking
device. NetFlow is completely transparent to the existing network, including end stations and application
software and network devices like LAN switches. Also, NetFlow capture and export are performed
independently on each internetworking device; NetFlow need not be operational on each router in the
network.
For more information about configuring NetFlow, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book.html
MIB Support
The Cisco 800M series ISR supports the MIBs supported by Cisco 800 series ISRs. The following MIBs
are modified for Cisco 800M series ISR:
• CISCO-PRODUCTS-MIB
• OLD-CISCO-CHASSIS-MIB
• ENTITY-MIB
• IF-MIB
• CISCO-IF-EXTENSION-MIB
• CISCO-LICENSE-MGMT-MIB
• CISCO-WAN-3G-MIB
• CISCO-ENVMON-MIB
• CISCO-FLASH-MIB
This chapter provides information about configuring IP addressing and IP services features for the Cisco
800M Series ISR and contains the following sections:
• Configuring DHCP, page 117
• Configuring DNS, page 118
• Configuring NAT, page 118
• Configuring NHRP, page 118
• Configuring BFD, page 120
• Configuring RIP, page 119
• Configuring BGP, page 119
• Configuring OSPF, page 119
• Configuring BGP, page 119
• Configuring Performance Routing v3, page 120
• Configuring Multi VRF, page 121
• Configuring IPv6 Features, page 121
Configuring DHCP
Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol (BOOTP), which
provides the framework for passing configuration information to hosts on a TCP/IP network. DHCP adds
the capability to automatically allocate reusable network addresses and configuration options to Internet
hosts. DHCP consists of two components: a protocol for delivering host-specific configuration
parameters from a DHCP server to a host and a mechanism for allocating network addresses to hosts.
DHCP is built on a client/server model, where designated DHCP server hosts allocate network addresses
and deliver configuration parameters to dynamically configured hosts. DHCP provides a framework for
passing configuration information dynamically to hosts on a TCP/IP network. A DHCP client is an
Internet host that uses DHCP to obtain configuration parameters such as an IP address.A DHCP relay
agent is any host that forwards DHCP packets between clients and servers. Relay agents are used to
forward requests and replies between clients and servers when they are not on the same physical subnet.
For more information on configuring DHCP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dhcp/configuration/15-mt/dhcp-15-mt-book.
html
Configuring DNS
The Domain Name System (DNS) is a distributed database in which you can map host names to IP
addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated
hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the
connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the
process of converting names to addresses.
For more information about configuring DNS, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dns/configuration/15-mt/dns-15-mt-book/dns
-config-dns.html
Configuring NAT
Network Address Translation (NAT) enables private IP inter networks that use nonregistered IP
addresses to connect to the Internet. NAT operates on a device, usually connecting two networks, and
translates the private (not globally unique) addresses in the internal network into legal addresses before
packets are forwarded onto another network. NAT can be configured to advertise to the outside world
only one address for the entire network. This ability provides additional security by effectively hiding
the entire internal network behind that one address.NAT is also used at the enterprise edge to allow
internal users access to the Internet and to allow Internet access to internal devices such as mail servers
For more information on configuring NAT, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_nat/configuration/15-mt/nat-15-mt-book/iad
nat-addr-consv.html
Configuring NHRP
Next Hop Resolution Protocol (NHRP) is an Address Resolution Protocol (ARP)-like protocol that
dynamically maps a non-broadcast multiaccess (NBMA) network. With NHRP, systems attached to an
NBMA network can dynamically learn the NBMA (physical) address of the other systems that are part
of that network, allowing these systems to directly communicate.
NHRP is a client and server protocol where the hub is the Next Hop Server (NHS) and the spokes are
the Next Hop Clients (NHCs). The hub maintains an NHRP database of the public interface addresses
of each spoke. Each spoke registers its real address when it boots and queries the NHRP database for
real addresses of the destination spokes to build direct tunnels.
For more information on configuring NHRP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-b
ook/qos-plcshp-class-plc.html
Configuring RIP
Routing Information Protocol (RIP) is a commonly used routing protocol in small to medium TCP/IP
networks. It is a stable protocol that uses a distance-vector algorithm to calculate routes.
For more information on configuring RIP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/qos_plcshp/configuration/15-mt/qos-plcshp-15-mt-b
ook/qos-plcshp-class-plc.html
Configuring EIGRP
Enhanced Interior Gateway Routing Protocol (EIGRP) is an enhanced version of the Interior Gateway
Routing Protocol (IGRP) developed by Cisco. The convergence technology of EIGRP is based on an
algorithm called the Diffusing Update Algorithm (DUAL). The algorithm guarantees loop-free operation
at every instant throughout a route computation and allows all devices involved in a topology change to
synchronize. Devices that are not affected by topology changes are not involved in recomputations.
For more information about configuring EIGRP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_eigrp/configuration/15-mt/ire-15-mt-book/ir
e-enhanced-igrp.html
Configuring OSPF
Open Shortest Path First (OSPF) is an Interior Gateway Protocol (IGP) developed by the OSPF working
group of the Internet Engineering Task Force (IETF). OSPF was designed expressly for IP networks
and it supports IP subnetting and tagging of externally derived routing information. OSPF also allows
packet authentication and uses IP multicast when sending and receiving packets.
For more information about configuring OSPF, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_tacacs/configuration/15-mt/sec-usr-tacacs-1
5-mt-book/sec-cfg-tacacs.html
Configuring BGP
Border Gateway Protocol (BGP) is an interdomain routing protocol designed to provide loop-free
routing between separate routing domains that contain independent routing policies (autonomous
systems). The Cisco software implementation of BGP version 4 includes support for 4-byte autonomous
system numbers and multiprotocol extensions to allow BGP to carry routing information for IP multicast
routes and multiple Layer 3 protocol address families including IP Version 4 (IPv4), IP Version 6 (IPv6),
Virtual Private Networks Version 4 (VPNv4), Connectionless Network Services (CLNS), and Layer 2
VPN (L2VPN).
For more information about configuring BGP, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_ssh/configuration/15-mt/sec-usr-ssh-15-mt-
book/sec-usr-ssh-sec-shell.html
Configuring IP Multicast
IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of
information simultaneously to potentially thousands of businesses and homes. Applications that take
advantage of multicast include video conferencing, corporate communications, distance learning, and
distribution of software, stock quotes, and news.IP multicast routing enables a host (source) to send
packets to a group of hosts (receivers) anywhere within the IP network by using a special form of IP
address called the IP multicast group address. The sending host inserts the multicast group address into
the IP destination address field of the packet and IP multicast routers and multilayer switches forward
incoming IP multicast packets out all interfaces that lead to the members of the multicast group. Any
host, regardless of whether it is a member of a group, can send to a group. However, only the members
of a group receive the message.
For more information about configuring PfRv3, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_pim/configuration/imc-pim-15-mt-book.htm
l
Configuring BFD
Bidirectional Forwarding Detection (BFD) provides a consistent failure detection method for network
administrators, in addition to fast forwarding path failure detection. Because the network administrator
can use BFD to detect forwarding path failures at a uniform rate, rather than the variable rates for
different routing protocol hello mechanisms, network profiling and planning will be easier, and
reconvergence time will be consistent and predictable.
For more information about configuring BFD, see the following web link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_bfd/configuration/15-mt/irb-15-mt-book/irb
-bi-fwd-det.html