Preparing for Installation
This chapter describes the general equipment, safety, and site preparation requirements for installing the ISA and the ISM.
This chapter contains the following sections:
•Software and Hardware Requirements and Compatibility
•Compliance with U.S. Export Laws and Regulations Regarding Encryption
Required Tools and Equipment
You need the following tools and parts to install an ISA or ISM. If you need additional equipment, contact a service representative for ordering information.
•SA-ISA(=) service adapter or SM-ISM(=) service module
•Number 2 Phillips screwdriver
•Your own electrostatic discharge (ESD)-prevention equipment or the disposable grounding wrist strap included with all upgrade kits, field-replaceable units (FRUs), and spares
•Antistatic mat
•Antistatic container
Software and Hardware Requirements and Compatibility
Table 2-1 lists the recommended minimum Cisco IOS software release required to use the ISA/ISM in supported router or switch platforms.
Note The Cisco 7100 series VPN routers do not support an ISM and an ISA in the same chassis. The Cisco 7200 series routers do not support the ISM.
The ISA and the ISM are the same board, but differ in their outside appearance.
Note The Cisco IOS Release 12.1 Mainline does not support the ISA/ISM.
Software Compatibility
To check the minimum software requirements of Cisco IOS software with the hardware installed on your router, Cisco maintains the Software Advisor tool on Cisco.com. Registered Cisco Direct users can access the Software Advisor at:http://www.cisco.com/cgi-bin/Support/CompNav/Index.pl. This tool does not verify whether modules within a system are compatible, but it does provide the minimum Cisco IOS software requirements for individual hardware modules or components.
Note Access to this tool is limited to users with Cisco.com login accounts.
Interoperability Between ISA/ISM and VAM
Note The Cisco 7100 series routers support ISM and the SA-VAM; the Cisco 7200 series routers support ISA and SA-VAM; and the Cisco 7200 series routers support two ISAs in the same chassis.
Table 2-2 describes the interoperability between ISA and VAM. You can use ISA with VAM, provided you observe the following conditions:
•The system supports two ISAs in the same Cisco7200 series router chassis. If one ISA is enabled at system bootup, and a second ISA is added later, the second ISA becomes active immediately, and depending on the configuration, the system attempts to load-balance between the two ISAs.
•If ISA and VAM are in the chassis at system bootup, the Cisco 7200 series router supports the newer version, in this case, VAM, provided the Cisco IOS Release supports VAM; and the ISA remains inactive.
•If ISA and VAM are in the chassis at system bootup, and the encryption mppe command is in the router's running configuration, then both ISA and VAM are enabled at system bootup. The ISA card supports MPPE, and the VAM supports ISAKMP/IPSec.
Note The ISA does not support MSCHAP-v2.
•You can enable encryption mppe by following the steps in "Configuring IPSec" section.
•To disable MPPE on an ISA card, use the no encryption mppe command. This disables the ISA.To disable a card, use the no crypto engine accelerator type slot/port (port-adapter-slot-number/ interface-port-number) command.
Safety Guidelines
This section provides safety guidelines that you should follow when working with any equipment that connects to electrical power or telephone wiring.
Safety Warnings
Safety warnings appear throughout this publication in procedures that, if performed incorrectly, might harm you. A warning symbol precedes each warning statement.
.
Electrical Equipment Guidelines
Follow these basic guidelines when working with any electrical equipment:
•Before beginning any procedures requiring access to the chassis interior, locate the emergency power-off switch for the room in which you are working.
•Disconnect all power and external cables before moving a chassis.
•Do not work alone when potentially hazardous conditions exist.
•Never assume that power has been disconnected from a circuit; always check.
•Do not perform any action that creates a potential hazard to people or makes the equipment unsafe; carefully examine your work area for possible hazards such as moist floors, ungrounded power extension cables, and missing safety grounds.
Preventing Electrostatic Discharge Damage
Electrostatic discharge (ESD) damage, which can occur when electronic cards or components are improperly handled, results in complete or intermittent failures. Port adapters and processor modules comprise printed circuit boards that are fixed in metal carriers. Electromagnetic interference (EMI) shielding and connectors are integral components of the carrier. Although the metal carrier helps to protect the board from ESD, use a preventive antistatic strap during handling.
Following are guidelines for preventing ESD damage:
•Always use an ESD wrist or ankle strap and ensure that it makes good skin contact.
•Connect the equipment end of the strap to an unfinished chassis surface.
•When installing a component, use any available ejector levers or captive installation screws to properly seat the bus connectors in the backplane or midplane. These devices prevent accidental removal, provide proper grounding for the system, and help to ensure that bus connectors are properly seated.
•When removing a component, use any available ejector levers or captive installation screws to release the bus connectors from the backplane or midplane.
•Handle carriers by available handles or edges only; avoid touching the printed circuit boards or connectors.
•Place a removed board component-side-up on an antistatic surface or in a static shielding container. If you plan to return the component to the factory, immediately place it in a static shielding container.
•Avoid contact between the printed circuit boards and clothing. The wrist strap only protects components from ESD voltages on the body; ESD voltages on clothing can still cause damage.
•Never attempt to remove the printed circuit board from the metal carrier.
Compliance with U.S. Export Laws and Regulations Regarding Encryption
This product performs encryption and is regulated for export by the U.S. government. Persons exporting any item out of the United States by either physical or electronic means must comply with the Export Administration Regulations as administered by the U.S. Department of Commerce, Bureau of Export Administration. See http://www.bxa.doc.gov/ for more information.
Certain "strong" encryption items can be exported outside the United States depending upon the destination, end user, and end use. See http://www.cisco.com/wwl/export/crypto/ for more information about Cisco-eligible products, destinations, end users, and end uses.
Check local country laws prior to export to determine import and usage requirements as necessary. See http://www.kub.nl/faculteiten/frw/outdated.html as one possible, unofficial source of international encryption laws.