The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This section describes how to power up the router and perform the initial configuration.
Warning: Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place. Statement 1029
Check the following items before powering up the router:
This procedure powers up the router and verifies that it has performed the initialization and self-test. When the procedure completes, the router is ready to configure. If you encounter problems while powering on the router, see the Troubleshooting page for the router on www.cisco.com.
For information about the ROM monitor and the bootstrap program, see Using the ROM Monitor in the software configuration guide for the router. For information about the configuration register, see Changing the Configuration Register Settings in the software configuration guide for the router.
Note: To view the boot sequence, you must establish console connection to the Cisco router before it powers up.
To power up your Cisco router:
1. Ensure that your PC is powered up and connected as described in Checklist for Power Up.
2. Make connectivity to the power blocks.
–SYS LED on the front of the chassis begins blinking green.
–Startup messages appear in your Console window. When the startup messages finish, the SYS LED appears solid green.
Caution: Do not press any keys on the keyboard until the messages stop and the SYS LED is solid green. Any keys pressed during this time are interpreted as the first command typed when the messages stop, which might cause the router to power off and start over. It takes a few minutes for the messages to stop.
If you encounter a problem during the power up process, see Troubleshooting on the www.cisco.com product page.
3. Use any of the following tools to perform the initial configuration.
–Cisco Configuration Professional Express
Note: We recommend using Cisco Configuration Professional Express to perform the initial configuration on the router because it provides a web-based graphical-user interface.
See Cisco Configuration Professional Express.
Cisco Setup Command Facility lets you configure the initial router settings through a configuration dialog. If you see the following messages, the router has booted and is ready for initial configuration using the setup command facility.
See Performing the Initial Configuration on the Router for additional information.
Note: If the system configuration dialog message does not appear, a default configuration file was installed on the router prior to shipping. See Using Cisco Configuration Professional Express to configure the router.
Use the Cisco Configuration Professional Express web-based application to configure the initial router settings. See Cisco Configuration Professional Express Quick Start Guide on www.cisco.com for detailed instructions.
Cisco Command Line Interface (CLI) lets you configure the initial router settings manually. If you see the following messages, the router has booted and is ready for initial configuration using the CLI. For how to use the CLI to configure the router, see Using Cisco IOS CLI—Manual Configuration.
Note: If the rommon 1>
prompt appears, your system has booted in ROM monitor mode. For information on the ROM monitor, see Using the ROM Monitor in the software configuration guide for the router.
The front-panel indicator LEDs described in Cisco CGR 2010 LED Indicators — Cable Side provide power, activity, and status information useful during power up.
Use the following tools to perform the initial configuration on the router:
The setup command facility prompts you to enter the information that is needed to configure a router quickly. The facility guides you through a initial configuration, including LAN and WAN interfaces. For more general information about the setup command facility, see the following document:
Configuration Fundamentals Configuration Guide, Cisco IOS Release 15M&T
This section explains how to configure a hostname for the router, set passwords, and configure an interface for communication with the management network.
Note: The following example and the user entries (in bold) are shown as examples only.
Note: If you make a mistake while using the setup command facility, you can exit and run the setup command facility again. Press Ctrl-C, and enter the setup command in privileged EXEC mode (Router#).
1. Enter the setup command facility by using one of the following methods:
–From the Cisco IOS CLI, enter the setup command in privileged EXEC mode:
You are now in the Setup Configuration Utility.
The following steps and the user entries (in bold) are shown as examples only.
Note: If you make a mistake while using the setup command facility, you can exit and run the setup command facility again. Press Ctrl-C, and enter the setup command at the privileged EXEC mode prompt (Router#). For more information on using the setup command facility, see the setup command in Cisco IOS Configuration Fundamentals Command Reference.
2. To proceed using the setup command facility, enter yes.
Basic management setup configures only enough connectivity.
3. Enter a hostname for the router (this example uses myrouter):
4. Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration.
5. Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration.
6. Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port:
7. Respond to the following prompts as appropriate for your network:
A summary of the available interfaces is displayed.
Note: The interface summary includes interface numbering, which is dependent on the router model and the installed modules and interface cards.
8. Select one of the available interfaces for connecting the router to the management network:
9. Respond to the following prompts as appropriate for your network:
The following configuration command script is created:
10. Respond to the following prompts. Select [ 2 ] to save the initial configuration:
When using the Cisco Setup, and after you have provided all the information requested by the facility, the final configuration appears. The facility prompts you to save the configuration.
To complete router configuration:
11. When the messages stop appearing on your screen, press Return to get the Router> prompt.
Note: If you see the next message, it means that no other routers were found on the network attached to the port.
12. The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed a initial router configuration. Nevertheless, this is not a complete configuration. At this point, you have two choices:
Run the setup command facility again, and create another configuration:
Modify the existing configuration or configure additional features by using the CLI:
Use Cisco Configuration Professional Express web-based application to configure the initial router settings. See Cisco Configuration Professional Express Quick Start Guide on www.cisco.com for detailed instructions.
For help with interface and port numbering, see Slot, Port, and Interface Information.
This section shows you how to access the command-line interface (CLI) to perform the initial configuration on the router.
If the system configuration dialog message does not appear, a default configuration file was installed on the router prior to shipping. See Using Cisco Configuration Professional Express to configure the router.
For help with interface and port numbering, see Slot, Port, and Interface Information.
To access the command-line interface (CLI) and perform the initial configuration on the router:
1. Enter the following answer when the system message appears on the router.
2. Press Return to terminate autoinstall and continue with manual configuration:
Several messages appear, ending with a line similar to the following:
3. Press Return to bring up the Router>
prompt.
4. Type enable to enter privileged EXEC mode:
The following tasks are either required or optional:
The hostname is used in CLI prompts and default configuration filenames. If you do not configure the router hostname, the router uses the factory-assigned default hostname “Router.”
Do not expect capitalization and lower casing to be preserved in the hostname. Uppercase and lowercase characters are treated as identical by many Internet software applications. It may seem appropriate to capitalize a name as you would ordinarily do, but conventions dictate that computer names appear in all lowercase characters. For more information, see the RFC 1178, Choosing a Name for Your Computer.
The name must also follow the rules for Advanced Research Projects Agency Network (ARPANET) hostnames. They must start with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names must be 63 characters or fewer. For more information, see the RFC 1035, Domain Names—Implementation and Specification.
This is a summary of the steps required to assign a router hostname:
4. Verify that the router prompt displays your new hostname.
|
|
|
---|---|---|
|
||
|
||
|
||
Verify that the router prompt displays your new hostname. |
||
|
To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, use either the enable password command or the enable secret command. Both commands accomplish the same thing—they allow you to establish an encrypted password that users must enter to access privileged EXEC (enable) mode.
We recommend that you use the enable secret command because it uses an improved encryption algorithm. Use the enable password command only if you boot an older version of the Cisco IOS software or if you boot older boot ROMs that do not recognize the enable secret command.
For more information, see the “Configuring Passwords and Privileges” chapter in Cisco IOS Security Configuration Guide. Also see Cisco IOS Password Encryption Facts and Cisco Guide to Harden Cisco IOS Devices.
If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.
This is a summary of the steps required to enable configure the enable secret command:
|
|
|
---|---|---|
|
||
|
||
|
(Optional) Sets a local password to control access to various privilege levels. |
|
|
Specifies an additional layer of security over the enable password command.
|
|
|
||
|
||
|
This section describes how to configure the console line idle privileged EXEC timeout. By default, the privileged EXEC command interpreter waits 10 minutes to detect user input before timing out.
When you configure the console line, you can also set communication parameters, specify autobaud connections, and configure terminal operating parameters for the terminal that you are using. For more information on configuring the console line, see Cisco IOS Configuration Fundamentals, “ Configuring Operating Characteristics for Terminals ”.
This is a summary of the steps required to configure the console line idle privileged EXEC timeout:
4. exec-timeout minutes [ seconds ]
The following example shows how to set the console idle privileged EXEC timeout to 2 minutes 30 seconds:
The following example shows how to set the console idle privileged EXEC timeout to 10 seconds:
This section shows how to assign an IP address and interface description to a Gigabit interface and an Ethernet interface on your router.
For comprehensive information on configuring Gigabit Ethernet interfaces, see Interface and Hardware Component Configuration Guide, Cisco IOS Release 15M&T.
For information on interface numbering, see the software configuration guide for your router.
This is a summary of the steps required to assign an IP address and interface description to a Gigabit interface and an Ethernet interface on your router:
4. interface { fastethernet | gigabitethernet } 0/ port
Configuring the GigabitEthernet Interface:
Sample output for the show ip interface brief command:
This section describes how to specify a default route with IP routing enabled. For alternative methods of specifying a default route, see Configuring a Gateway of Last Resort Using IP Commands.
The Cisco IOS software uses the gateway (router) of last resort if it does not have a better route for a packet and if the destination is not a connected network. This section describes how to select a network as a default route (a candidate route for computing the gateway of last resort). The way in which routing protocols propagate the default route information varies for each protocol.
For comprehensive configuration information about IP routing and IP routing protocols, see the documents under IP Routing in Configuration Guides on www.cisco.com.
You can configure integrated routing and bridging (IRB) so the router can route and bridge simultaneously. The router acts as an IP host on the network whether routing is enabled or not.
To read more about IRB, see the following URL:
http://www.cisco.com/en/US/tech/tk389/tk815/tk855/tsd_technology_support_sub-protocol_home.html
IP routing is automatically enabled in the Cisco IOS software. When IP routing is configured, the system uses a configured or learned route to forward packets, including a configured default route.
Note: This task section does not apply when IP routing is disabled. To specify a default route when IP routing is disabled, see Configuring a Gateway of Last Resort Using IP Commands on www.cisco.com.
A router might not be able to determine the routes to all other networks. To provide complete routing capability, the common practice is to use some routers as smart routers and give the remaining routers default routes to the smart router. (Smart routers have routing table information for the entire internetwork.) These default routes can be passed along dynamically, or can be configured into the individual routers.
Most dynamic interior routing protocols include a mechanism for causing a smart router to generate dynamic default information that is then passed along to other routers.
If a router has an interface that is directly connected to the specified default network, the dynamic routing protocols running on the router generates or sources a default route. In the case of RIP, the router advertises the pseudonetwork 0.0.0.0. In the case of IGRP, the network itself is advertised and flagged as an exterior route.
A router that is generating the default for a network also may need a default of its own. One way a router can generate its own default is to specify a static route to the network 0.0.0.0 through the appropriate device.
When default information is being passed along through a dynamic routing protocol, no further configuration is required. The system periodically scans its routing table to choose the optimal default network as its default route. In the case of RIP, there is only one choice, network 0.0.0.0. In the case of IGRP, there might be several networks that can be candidates for the system default. The Cisco IOS software uses both administrative distance and metric information to determine the default route (gateway of last resort). The selected default route appears in the gateway of last resort display of the show ip route EXEC command.
If dynamic default information is not being passed to the software, candidates for the default route are specified with the ip default-network global configuration command. In this usage, the ip default-network command takes an unconnected network as an argument. If this network appears in the routing table from any source (dynamic or static), it is flagged as a candidate default route and is a possible choice as the default route.
If the router has no interface on the default network, but does have a route to it, it considers this network as a candidate default path. The route candidates are examined and the best one is chosen, based on administrative distance and metric. The gateway to the best default path becomes the gateway of last resort.
This is a summary of the steps required to specify a default route with IP routing enabled
4. ip route dest-prefix mask next-hop-ip-address [ admin-distance ] [ permanent ]
5. ip default-network network-number
or
ip route dest-prefix mask next-hop-ip-address
Sample output for the show ip route command:
Virtual terminal (vty) lines are used to allow remote access to the router. This section shows you how to configure the virtual terminal lines with a password, so that only authorized users can remotely access the router.
The router has five virtual terminal lines by default. However, you can create additional virtual terminal lines as described in Cisco IOS Terminal Services Configuration Guide.
Line passwords and password encryption is described in the User Security Configuration Guide, Cisco IOS Release 15MT.
Note: To secure the vty lines with an access list, see Security Configuration Guide: Context-Based Access Control Firewall, Cisco IOS Release 15M&T and Cisco IOS Password Encryption Facts.
These are the required summary steps to allow remote access to the router:
3. line vty line-number [ ending-line-number ]
8. From another network device, attempt to open a Telnet session to the router.
The following example shows how to configure virtual terminal lines with a password:
After you configure the vty lines, follow these steps:
This section describes how to enter line configuration mode for the auxiliary line. How you configure the auxiliary line depends on your particular implementation of the auxiliary (AUX) port. See Configuring a Modem on the AUX Port for EXEC Dialin Connectivity.
These are the required summary steps to enter line configuration mode for the auxiliary line
Note: See the tech notes and sample configurations to configure the line for your particular implementation of the AUX port.
This section describes how to verify network connectivity for your router.
These are the required summary steps to verify network connectivity for your router:
2. ping [ ip-address | hostname ]
3. telnet { ip-address | hostname }
|
|
|
---|---|---|
|
||
ping [ ip-address | hostname ] |
||
telnet { ip-address | hostname } |
Sample output for the ping command when you ping the IP address 192.168.7.27:
Sample output for the ping command when you ping the IP hostname donald:
This section describes how to avoid losing your configuration at the next system reload or power cycle by saving the running configuration to the startup configuration in NVRAM. The NVRAM provides 256 KB of storage on the router.
These are the required summary steps to avoid losing your configuration at the next system reload:
2. copy running-config startup-config
|
|
|
---|---|---|
|
||
copy running-config startup-config |
Saves the running configuration to the startup configuration. |
To aid file recovery and minimize downtime in case of file corruption, we recommend that you save backup copies of the startup configuration file and the Cisco IOS software system image file on a server.
These are the required summary steps to aid file recovery and minimize downtime:
2. copy nvram:startup-config { ftp: | rcp: | tftp: }
4. copy {flash0 | flash1}: { ftp: | rcp: | tftp: }
|
|
|
---|---|---|
|
||
copy nvram:startup-config { ftp: | rcp: | tftp: } |
||
|
Displays the layout and contents of a flash memory file system. |
|
copy {flash0 | flash1}: { ftp: | rcp: | tftp: } |
Copying the Startup Configuration to a TFTP Server:
The following example shows the startup configuration being copied to a TFTP server:
Copying from Flash Memory to a TFTP Server:
The following example shows the use of the show {flash0 | flash1}: command in privileged EXEC mode to determine the name of the system image file, and the use of the copy {flash0|flash1}: tftp: command in privileged EXEC mode to copy the system image to a TFTP server. The router uses the default username and password.
Note: To avoid losing work you have completed, be sure to save your configuration occasionally as you proceed. Use the copy running-config startup-config command to save the configuration to NVRAM.
Enter the following commands in the Cisco IOS to verify the initial configuration on the router:
When you have completed and verified the initial configuration, the specific features and functions are ready to be configured. See the Cisco Connected Grid Router 2010 Software Configuration Guide.
Note: If you need help with the interface and port numbering, see Slot, Port, and Interface Information.