- Overview of the Cisco 819 Integrated Services Router
- Wireless Device Overview
- Wireless Local Area Network
- 4G LTE Wireless WAN
- Basic Router Configuration
- Configuring Backup Data Lines and Remote Management
- Environment Monitoring
- Configuring the Serial Interface
- Configuring Security Features
- Configuring the Ethernet Switches
- Configuring PPP over Ethernet with NAT
- Configuring a LAN with DHCP and VLANs
- Configuring a VPN Using Easy VPN and an IPSec Tunnel
- Cisco IOS Software Basic Skills
- Concepts
- ROM Monitor
- Common Port Assignments
- Interface Ports
- Default Configuration
- Information Needed for Configuration
- Configuring Command-Line Access
Basic Router Configuration
This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup.
- Interface Ports
- Default Configuration
- Information Needed for Configuration
- Configuring Command-Line Access
- Configuring Global Parameters
- Configuring WAN Interfaces
- Configuring a Loopback Interface
- Configuring Static Routes
- Configuring Dynamic Routes
Note Individual router models may not support every feature described in this guide. Features that are not supported by a particular router are indicated whenever possible.
Note For instructions on how to configure the 4G LTE features on your Cisco 819 ISR, see the Cisco 4G LTE Software Installation Guide.
This chapter includes configuration examples and verification steps, as available.
For complete information on how to access global configuration mode, see the “Entering Global Configuration Mode” section.
Interface Ports
Table 5-1 lists the interfaces that are supported for each router and their associated port labels on the equipment.
|
|
|
---|---|---|
Note There are two labels for the associated antennas with the labels: Main and DIV/GPS.
Default Configuration
When you first boot up your Cisco router, some basic configuration has already been performed. All of the LAN and WAN interfaces have been created, console and vty ports are configured, and the inside interface for Network Address Translation (NAT) has been assigned. Use the show running-config command to view the initial configuration, as shown in the following example for a Cisco 819 ISR:
Information Needed for Configuration
You need to gather some or all of the following information, depending on your planned network scenario, before configuring your network:
– PPP client name that is assigned as your login name
– PPP authentication type: Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP)
– PPP password to access your Internet service provider (ISP) account
– DNS server IP address and default gateways
- If you are setting up a connection to a corporate network, you and the network administrator must generate and share the following information for the WAN interfaces of the routers:
– PPP authentication type: CHAP or PAP
– PPP client name to access the router
– PPP password to access the router
– Generate the addressing scheme for your IP network.
– Mode of operation (sync, async, bisync)
– Clock rate depending on the mode
– IP address depending on the mode
– You must have service availability on the Cisco 819 ISR from a carrier, and you must have network coverage where your router will be physically placed. For a complete list of supported carriers, see the data sheet at Cisco 3G Wireless Connectivity Solutions.
– You must subscribe to a service plan with a wireless service provider and obtain a SIM card.
– You must install the SIM card before configuring the 3G Cisco 819 ISR. For instructions on how to install the SIM card, see Cisco 800 Series RoutersConfiguring Cisco EHWIC and 880G for 3.7G (HSPA+)/3.5G (HSPA).
- You must install the required antennas before you configure the 3G for Cisco 819 ISR. See the following URLs for instructions on how to install the antennas:
– 3G-ANTM1919D—See Cisco Multiband Swivel-Mount Dipole Antenna (3G-ANTM1919D).
– 3G-ANTM1916-CM—See Cisco Multiband Omnidirectional Ceiling Mount Antenna (3G-ANTM1916-CM).
– 3G-AE015-R (Antenna Extension)—See Cisco Single-Port Antenna Stand for Multiband TNC Male-Terminated Portable Antenna (Cisco 3G-AE015-R).
– 3G-AE010-R (Antenna Extension)—See Cisco Single-Port Antenna Stand for Multiband TNC Male-Terminated Portable Antenna (Cisco 3G-AE015-R). This document applies to both 3G-AE015-R and 3G-AE010-R. The only difference between these two products is the length of the cable.
– 3G-ANTM-OUT-OM—See Cisco 3G Omnidirectional Outdoor Antenna (3G-ANTM-OUT-OM).
– 3G-ANTM-OUT-LP—See Cisco Multiband Omnidirectional Panel-Mount Antenna (3G-ANTM-OUT-LP).
– 3G-ACC-OUT-LA—See Cisco 3G Lightning Arrestor (3G-ACC-OUT-LA).
– 4G-ANTM-OM-CM—See Cisco 4G Indoor Ceiling-Mount Omnidirectional Antenna (4G-ANTM-OM-CM).
- You must check your LEDs for signal reception as described in Table 2-1 .
- You should be familiar with the Cisco IOS software. See the Cisco IOS documentation beginning with Release 12.4(15)T or later for Cisco 3G support.
- To configure your 3G data profile, you will need the username, password, and access point name (APN) from your service provider:
After you have collected the appropriate information, you can perform a full configuration on your router, beginning with the tasks in the “Configuring Command-Line Access” section.
Configuring Command-Line Access
To configure parameters to control access to the router, perform the following steps, beginning in global configuration mode:
SUMMARY STEPS
1. line [aux | console | tty | vty] line-number
4. exec-timeout minutes [ seconds ]
DETAILED STEPS
Example
The following configuration shows the command-line access commands.
You do not need to input the commands marked “default.” These commands appear automatically in the configuration file generated when you use the show running-config command.
Configuring Global Parameters
To configure selected global parameters for your router, perform these steps:
SUMMARY STEPS
DETAILED STEPS
Configuring WAN Interfaces
Configure the WAN interface for your router using one of the following as appropriate:
- Configuring a Gigabit Ethernet WAN Interface
- Configuring the Cellular Wireless WAN Interface
- Configuring Dual SIM for Cellular Networks
- Configuring Router for Image and Config Recovery Using Push Button
- Configuring Router for Image and Config Recovery Using Push Button
Configuring a Gigabit Ethernet WAN Interface
To configure the Ethernet interface on a Cisco 819 ISR, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
DETAILED STEPS
Configuring the Cellular Wireless WAN Interface
The Cisco 819 ISRs provide a Third-Generation (3G) wireless interface for use over Global System for Mobile Communications (GSM) and code division multiple access (CDMA) networks. The interface is a 34-millimetre embedded mini express card.
Its primary application is WAN connectivity as a backup data link for critical data applications. However, the 3G wireless interface can also function as the router’s primary WAN connection.
To configure the 3G cellular wireless interface, follow these guidelines and procedures:
Prerequisites for Configuring the 3G Wireless Interface
The following are prerequisites to configuring the 3G wireless interface:
- You must have wireless service from a carrier, and you must have network coverage where your router will be physically placed. For a complete list of supported carriers, see the data sheet at:
- You must subscribe to a service plan with a wireless service provider and obtain a SIM card (GSM modem only) from the service provider.
- You must check your LEDs for signal strength, as described in Table 2-1 .
- You should be familiar with the Cisco IOS software. See Cisco IOS documentation beginning with Cisco IOS Release 12.4(15)XZ or later for Cisco 3G Wireless support.
- To configure your GSM data profile, you need the following information from your service provider:
- To configure your CDMA (CDMA only) data profile for manual activation, you need the following information from your service provider:
– Master Subsidy Lock (MSL) number
– Mobile Directory number (MDN)
– Mobile Station Identifier (MSID)
– Electronic Serial Number (ESN)
- Check the LED located on the front panel of the router for signal strength and other indications. Table 2-1 describes the 3G LEDs for the Cisco 819 ISR.
Restrictions for Configuring the Cellular Wireless Interface
The following restrictions apply to configuring the Cisco 3G wireless interface:
- A data connection can be originated only by the 3G wireless interface. Remote dial-in is not supported.
- Because of the shared nature of wireless communications, the experienced throughput varies depending on the number of active users or the amount of congestion in a given network.
- Cellular networks have higher latency than wired networks. Latency rates depend on the technology and carrier. Latency may be higher when there is network congestion.
- VoIP is currently not supported.
- Any restrictions that are part of the terms of service from your carrier also apply to the Cisco 3G wireless interface.
- Inserting a different type of modem from what was previously removed requires configuration changes and you must reload the system.
Data Account Provisioning
Note To provision your modem, you must have an active wireless account with a service provider. A SIM card must be installed in a GSM 3G wireless card.
Verifying Signal Strength and Service Availability
To verify the signal strength and service availability on your modem, use the following commands in privileged EXEC mode.
SUMMARY STEPS
DETAILED STEPS
Configuring a GSM Modem Data Profile
To configure or create a new modem data profile, enter the following command in privileged EXEC mode.
SUMMARY STEPS
1. cellular 0 gsm profile create <profile number> <apn> <authentication> <username> <password> ipv4
DETAILED STEPS
|
|
|
---|---|---|
Router# gsm profile create 2 <apn-name> chap username password ipv4 |
Creates a new modem data profile. See Table 5-2 for details about the command parameters. |
Table 5-2 lists the modem data profile parameters.
Number for the profile that you are creating. You can create up to 16 profiles. |
|
Access point name. You must get this information from the service provider. |
|
CDMA Modem Activation and Provisioning
Activation procedures may differ, depending upon your carrier. Consult your carrier and perform one of the following procedures as appropriate:
The following table lists the activation and provisioning processes supported by different wireless carriers.
|
|
---|---|
OTASP1 Activation |
|
IOTA2 for Data Profile refresh |
|
Note You must have valid mobile directory number (MDN), mobile subsidy lock (MSL), and mobile station identifier (MSID) information from your carrier before you start this procedure.
To configure a modem profile manually, use the following command, beginning in EXEC mode:
cellular unit cdma activate manual mdn msid msl
Besides being activated, the modem data profile is provisioned through the Internet Over the Air (IOTA) process. The IOTA process is initiated automatically when you use the cellular unit cdma activate manual mdn msid msl command.
The following is a sample output from this command:
The IOTA start and end must have “success” as the resulting output. If you receive an error message, you can run IOTA independently by using the cellular cdma activate iota command.
Your carrier may require periodic refreshes of the data profile. Use the following command to refresh the data profile:
Activating with Over-the-Air Service Provisioning
To provision and activate your modem using Over-the-Air Service Provisioning (OTASP), use the following command, beginning in EXEC mode.
router # cellular 0 cdma activate otasp phone_number
Note You need to obtain the phone number for use with this command from your carrier. The standard OTASP calling number is *22899.
The following is a sample output from this command:
Configuring a Cellular Interface
To configure the cellular interface, enter the following commands, beginning in privileged EXEC mode.
SUMMARY STEPS
5. ppp chap password 0 password
6. asynchronous mode interactiv e
Note The PPP Challenge Handshake Authentication Protocol (CHAP) authentication parameters that you use in this procedure must be the same as the username and password provided by your carrier and configured only under the GSM profile. CDMA does not require a username or password.
DETAILED STEPS
Note When the cellular interface requires a static IP address, the address may be configured as ip address negotiated. Through IP Control Protocol (IPCP), the network ensures that the correct static IP address is allocated to the device. If a tunnel interface is configured with the ip address unnumbered <cellular interface> command, the actual static IP address must be configured under the cellular interface, in place of ip address negotiated. For a sample cellular interface configuration, see the “Basic Cellular Interface Configuration” section.
Configuring DDR
Perform these steps to configure dial-on-demand routing (DDR) for the cellular interface.
SUMMARY STEPS
4. dialer idle-timeout seconds
8. dialer-list dialer-group protocol protocol-name {permit | deny | list access-list-number | access-group}
9. ip access-list < access list number> permit < ip source address >
13. chat-script <script name> ”” “ATDT*99*<profile number>#” TIMEOUT <timeout value> CONNECT
or
chat-script <script name> "" "ATDT*777*<profile number>#" TIMEOUT <timeout value> CONNECT
DETAILED STEPS
Examples for Configuring Cellular Wireless Interfaces
Basic Cellular Interface Configuration
The following example shows how to configure a gsm cellular interface to be used as a primary WAN connection. It is configured as the default route.
The following example shows how to configure a cdma cellular interface to be used as a primary WAN connection. It is configured as the default route.
Tunnel over Cellular Interface Configuration
The following example shows how to configure the static IP address when a tunnel interface is configured with the ip address unnumbered < cellular interface > command:
Configuration for 8705 modem
The following shows how to configure an HSPA+ modem:
Configuring Dual SIM for Cellular Networks
The Dual SIM feature implements auto-switch and failover between two cellular networks on a Cisco 819 ISR. This feature is enabled by default with SIM slot 0 being the primary slot and slot 1 being the secondary (failover) slot.
Note For instructions on how to configure the Dual SIM feature for 4G LTE cellular networks, see the Cisco 4G LTE Software Installation Guide.
You can configure the Dual SIM feature using the following commands:
|
|
|
---|---|---|
Specifies the maximum number of failover retries. The default value is 10. |
||
- For auto-switch and failover to work, configure the SIM profile for slots 0 and 1 using the gsm sim profile command.
- For auto-switch and failover to work, configure the chat script without a specific profile number.
- If no SIM profile is configured, profile #1 is used by default.
- If no GSM failover timer is configured, the default failover timeout is 2 minutes.
- If no GSM SIM primary slot is configured, the default primary SIM is slot 0.
The following example shows you how to set the SIM switchover timeout period to 3 minutes:
The following example shows you how to authenticate using an unencrypted pin:
router(config-controller)# gsm sim authenticate 0 1234 slot 0
The following example shows you how to set the maximum number of SIM switchover retries to 20:
router(config-controller)# gsm sim max-retry 20
The following example shows you how to set SIM slot 1 as the primary slot:
The following example shows you how to configure the SIM card in slot 0 to use profile 10:
Perform the following commands to manually switch the SIM:
|
|
|
---|---|---|
The following command forces the modem to connect to SIM1:
Configuring Router for Image and Config Recovery Using Push Button
A push button feature is available on the Cisco 819 ISR. The reset button on the front panel of the router enables this feature.
Perform the following steps to use this feature:
Step 2 Press the reset button on the front panel of the router.
Step 3 Power up the sytem while holding down the reset button.
The system LED blinks four times indicating that the router has accepted the button push.
Using this button takes effect only during ROMMON initialization. During a warm reboot, pressing this button has no impact on performance. Table 5-4 shows the high level functionality when the button is pushed during ROMMON initialization.
Use the show platform command to display the current bootup mode for the router. The following sections show sample outputs when the button is not pushed and when the button is pushed.
Output When Button Is Not Pushed: Example
Output When Button Is Pushed: Example
Push Button in WLAN AP
When the push button on the front panel is pressed, WLAN AP will perform both image and configuration recovery.
To perform image recovery, WLAN will go into the boot loader so that the user can download the image from the bootloader prompt.
To perform configuration recovery, WLAN AP will overwrite the contents of flash:/config.txt with the contents of flash:/cpconfig-ap802.cfg file if available in flash drive. Otherwise, flash:/config.txt will be deleted.
Configuring the Fast Ethernet LAN Interfaces
The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default VLAN and are not configured with individual addresses. Access is provided through the VLAN. You may assign the interfaces to other VLANs if you want. For more information about creating VLANs, see the “Configuring the Ethernet Switches” section.
Configuring a Loopback Interface
The loopback interface acts as a placeholder for the static IP address and provides default routing information.
Perform these steps to configure a loopback interface, beginning in global configuration mode:
SUMMARY STEPS
DETAILED STEPS
Example
The loopback interface in this sample configuration is used to support Network Address Translation (NAT) on the virtual-template interface. This configuration example shows the loopback interface configured on the Fast Ethernet interface with an IP address of 200.200.100.1/24, which acts as a static IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address.
Verifying Configuration
To verify that you have properly configured the loopback interface, enter the show interface loopback command. You should see a verification output similar to the following example:
Another way to verify the loopback interface is to ping it:
Configuring Static Routes
Static routes provide fixed routing paths through the network. They are manually configured on the router. If the network topology changes, the static route must be updated with a new route. Static routes are private routes unless they are redistributed by a routing protocol.
Follow these steps to configure static routes, beginning in global configuration mode.
SUMMARY STEPS
1. ip route prefix mask { ip-address | interface-type interface-number [ ip-address ]}
DETAILED STEPS
|
|
|
---|---|---|
ip route prefix mask {ip-address | interface-type interface-number [ip-address]} |
Specifies the static route for the IP packets. For details about this command and about additional parameters that can be set, see Cisco IOS IP Routing: Protocol-Independent Command Reference. |
|
|
Exits router configuration mode and enters privileged EXEC mode. |
For general information on static routing, see the “Floating Static Routes” section.
Example
In the following configuration example, the static route sends out all IP packets with a destination IP address of 192.168.1.0 and a subnet mask of 255.255.255.0 on the Fast Ethernet interface to another device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured PVC.
You do not need to enter the command marked “(default).” This command appears automatically in the configuration file generated when you use the show running-config command.
Verifying Configuration
To verify that you have properly configured static routing, enter the show ip route command and look for static routes signified by the “S.”
You should see a verification output similar to the following:
Configuring Dynamic Routes
In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or topology. Changes in dynamic routes are shared with other routers in the network.
The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of these routing protocols on your router.
Configuring Routing Information Protocol
To configure the RIP routing protocol on the router, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
DETAILED STEPS
For general information on RIP, see the “RIP” section.
Example
The following configuration example shows RIP version 2 enabled in IP network 10.0.0.0 and 192.168.1.0.
To see this configuration, use the show running-config command from privileged EXEC mode.
Verifying Configuration
To verify that you have properly configured RIP, enter the show ip route command and look for RIP routes signified by “R.” You should see a verification output like the following example:
Configuring Enhanced Interior Gateway Routing Protocol
To configure Enhanced Interior Gateway Routing Protocol (EIGRP), perform these steps, beginning in global configuration mode:
SUMMARY STEPS
DETAILED STEPS
For general information on EIGRP concept, see the “Enhanced IGRP” section.
Example
The following configuration example shows the EIGRP routing protocol enabled in IP networks 192.145.1.0 and 10.10.12.115. The EIGRP autonomous system number is 109.
To see this configuration, use the show running-config command, beginning in privileged EXEC mode.
Verifying Configuration
To verify that you have properly configured IP EIGRP, enter the show ip route command and look for EIGRP routes indicated by “D.” You should see a verification output similar to the following: