Integrated services router with aim-vpn/bpii-plus integrated services router with aim-vpn/epii-plus fips 140-2 non proprietary security policy (29 pages)
Summary of Contents for Cisco 1812W - Integrated Services Router Wireless
Page 1
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-6426-02...
Page 2
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCSP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.;...
Configuring Basic Parameters Configure Global Parameters Configure Fast Ethernet LAN Interfaces Configure WAN Interfaces Configure the Fast Ethernet WAN Interface Configure the ATM WAN Interface Configure the Wireless Interface Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 4
Configure the ATM WAN Interface Configure DSL Signaling Protocol Configuring ADSL Verify the Configuration Configuring SHDSL Verify the Configuration Configure Network Address Translation Configuration Example Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration GuideCisco 1800 Series Integrated Services Routers (Fixed) OL-6426-02...
Page 5
Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation C H A P T E R Configure a VPN Configure the IKE Policy Configure Group Policy Information Enable Policy Lookup Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 6
Configuring Cisco IOS Firewall IDS Configuring VPNs Configuring Dial Backup and Remote Management C H A P T E R Dial Backup Feature Activation Methods Backup Interfaces Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration GuideCisco 1800 Series Integrated Services Routers (Fixed) OL-6426-02...
Page 7
Change the Configuration Register Reset the Router Reset the Password and Save Your Changes Reset the Configuration Register Value Managing Your Router with SDM Reference Information P A R T Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 9
Changing the Configuration Register Using Prompts Console Download Command Description Error Reporting Debug Commands Exiting the ROM Monitor Common Port Assignments A P P E N D I X N D E X Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 10
Contents Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration GuideCisco 1800 Series Integrated Services Routers (Fixed) OL-6426-02...
You can use this guide in the following situations: • You have configured the software by using the Cisco Router Web Setup tool, and you want to configure additional advanced software features by using the command-line interface (CLI). •...
Chapter 6 Configuring a VPN Using Easy VPN and an Provides instructions on how to configure a virtual private IPSec Tunnel network (VPN) with a secure IP tunnel using the Cisco Easy VPN. Chapter 7 Configuring VPNs Using an IPSec Tunnel...
Optional keywords and default responses to system prompts appear within square brackets. {x | x | x} A choice of keywords (represented by x) appears in braces separated by vertical bars. You must select one. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Cisco IOS software release installed on your router. Obtaining Documentation Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Documentation DVD Cisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit.
Register to receive security information from Cisco. • A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products_psirt_rss_feed.html...
Cisco TAC engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
Definitions of Service Request Severity To ensure that all service requests are reported in a standard format, Cisco has established severity definitions. Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Page 19
Preface Obtaining Additional Publications and Information iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies • learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions.
Page 20
Preface Obtaining Additional Publications and Information Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
C H A P T E R Basic Router Configuration This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also describes the default configuration on startup. Note that individual router models may not support every feature described throughout this guide.
1–0 Viewing the Default Configuration When you first boot up your Cisco router, some basic configuration has already been performed. All of the LAN and WAN interfaces have been created, console and VTY ports are configured, and the inside interface for Network Address Translation has been assigned. Use the show running-config command...
Page 25
FastEthernet3 no ip address shutdown interface FastEthernet4 no ip address shutdown interface FastEthernet5 no ip address shutdown interface FastEthernet6 no ip address shutdown interface FastEthernet7 no ip address shutdown Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Determine the number of PVCs that your service provider has given you, along with their VPIs – and VCIs. For each PVC determine the type of AAL5 encapsulation supported. It can be one of the – following: Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Configuring a Loopback Interface • Configuring Command-Line Access to the Router A configuration example is presented with each task to show the network configuration following completion of that task. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Example: Router(config)# no ip domain-lookup Router(config)# For complete information on the global parameter commands, see the Cisco IOS Release 12.3 documentation set. Configure Fast Ethernet LAN Interfaces The Fast Ethernet LAN interfaces on your router are automatically configured as part of the default VLAN and as such, they are not configured with individual addresses.
Configure the ATM WAN Interface • Configure the Fast Ethernet WAN Interface This procedure applies only to the Cisco 1811 and Cisco 1812 router models. Perform these steps to configure the Fast Ethernet interfaces, beginning in global configuration mode. Command...
Basic Router Configuration Configuring Basic Parameters Configure the ATM WAN Interface This procedure applies only to the Cisco 1801, Cisco 1802, and Cisco 1803 models. Perform these steps to configure the ATM interface, beginning in global configuration mode: Command Purpose...
The loopback interface acts as a placeholder for the static IP address and provides default routing information. For complete information on the loopback commands, see the Cisco IOS Release 12.3 documentation set. Perform these steps to configure a loopback interface:...
This example specifies a console terminal for Router(config)# line console 0 access. Router(config)# Step 2 password password Specifies a unique password for the console terminal line. Example: Router(config)# password 5dr4Hepw3 Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 1-10 OL-6426-02...
Page 33
Exits line configuration mode, and returns to privileged EXEC mode. Example: Router(config)# end Router# For complete information about the command line commands, see the Cisco IOS Release 12.3 documentation set. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 1-11 OL-6426-02...
Example: Router(config)# end Router# For complete information on the static routing commands, see the Cisco IOS Release 12.3 documentation set. For more general information on static routing, see Appendix B, “Concepts.” Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide...
Changes in dynamic routes are shared with other routers in the network. The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of these routing protocols on your router.
Example: Router(config-router)# end Router# For complete information on the dynamic routing commands, see the Cisco IOS Release 12.3 documentation set. For more general information on RIP, see Appendix B, “Concepts.” Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide...
EIGRP on the router. The autonomous-system number identifies the route to other EIGRP routers Example: and is used to tag the EIGRP information. Router(config)# router eigrp 109 Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 1-15 OL-6426-02...
EXEC mode. Example: Router(config-router)# end Router# For complete information on the IP EIGRP commands, see the Cisco IOS Release 12.3 documentation set. For more general information on EIGRP concepts, see Appendix B, “Concepts.” Configuration Example The following configuration example shows the EIGRP routing protocol enabled in IP networks 192.145.1.0 and 10.10.12.115.
The Cisco 1811 and Cisco 1812 router models can be used in the Ethernet-based scenarios and the Cisco 1801, Cisco 1802, and Cisco 1803 router models can be used in the DSL-based scenarios.
Point at which NAT occurs Fast Ethernet WAN interface (outside interface for NAT) Cable modem or other server (for example, a Cisco 6400 server) that is connected to the Internet PPPoE session between the client and a PPPoE server Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide...
Ethernet interface, but each session must use a separate dialer interface and a separate dialer pool. A PPPoE session is initiated on the client side by the Cisco 1800 series router. An established PPPoE client session can be terminated in one of two ways: By entering the clear vpdn tunnel pppoe command.
Router(config)# Configure the Fast Ethernet WAN Interfaces In this scenario, the PPPoE client (your Cisco router) communicates over a 10/100-Mbps Ethernet interface on both the inside and the outside. The Cisco 1800 series integrated services fixed-configuration routers have a hardware limitation on the Note Fast Ethernet ports FE0 and FE1.
Page 46
Example: Router(config-if)# no shutdown Router(config-if)# Step 4 exit Exits configuration mode for the Fast Ethernet interface and returns to global configuration mode. Example: Router(config-if)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Cisco IOS Router(config-if)# Security Command Reference. Step 6 dialer pool number Specifies the dialer pool to use to connect to a specific destination subnetwork. Example: Router(config-if)# dialer pool 1 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 48
For details about this command and additional Example: parameters that can be set, see the Cisco IOS IP Router(config)# ip route 10.10.25.2 Command Reference, Volume 2; Routing 0.255.255.255 dialer 0 Protocols. Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Router(config-if)# ip nat inside parameters that can be set, as well as information Router(config-if)# about enabling static translation, see the Cisco IOS IP Command Reference, Volume 1 of 4: Addressing and Services. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 50
If you want to use NAT with a virtual-template interface, you must configure a loopback interface. See Note Chapter 1, “Basic Router Configuration,” for information on configuring a loopback interface. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Chapter 3 Configuring PPP over Ethernet with NAT Configuration Example For complete information on the NAT commands, see the Cisco IOS Release 12.3 documentation set. For more general information on NAT concepts, see Appendix B, “Concepts.” Configuration Example The following configuration example shows a portion of the configuration file for the PPPoE scenario described in this chapter.
Figure 4-1 shows a typical deployment scenario with a PPPoA client and NAT configured on the Cisco router. This scenario uses a single static IP address for the ATM connection. Figure 4-1 PPP over ATM with NAT Small business with multiple networked devices—desktops, laptop PCs, switches...
Page 54
A PPPoA session is initiated on the client side by the Cisco 1800 series router. NAT (represented as the dashed line at the edge of the Cisco router) signifies two addressing domains and the inside source address. The source list defines how the packet travels through the network.
Cisco IOS Security Command Reference. Step 6 dialer pool number Specifies the dialer pool to use to connect to a specific destination subnetwork. Example: Router(config-if)# dialer pool 1 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 56
Cisco IOS IP Router(config)# ip route 10.10.25.0 Command Reference, Volume 1 of 4: Routing 255.255.255.0 dialer 0 Protocols. Router(config)# Repeat these steps for any additional dialer interfaces or dialer pools needed. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Specifies the ATM interface as a member of a dialer profile dialing pool. The pool number must be in the range of 1–255. Example: Router(config-if-atm-vc)# dialer pool-member 1 Router(config-if-atm-vc)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Router(config)# Configure DSL Signaling Protocol DSL signaling must be configured on the ATM interface for connection to your ISP. The Cisco 1801 supports ADSL signaling over POTS, the Cisco 1802 supports ADSL signaling over ISDN, and the Cisco 1803 supports SHDSL signaling.
• dsl enable-training-log • See the Cisco IOS Wide-Area Networking Command Reference for details of these commands. Verify the Configuration You can verify that the configuration is set the way you want using the show dsl interface atm 0 command from privileged EXEC mode.
Example: Router(config-controller)# exit Router(config)# If you are integrating your Cisco router into a European network, please use one of the following Note commands: For CO mode, use the dsl dsl-mode shdsl symmetric annex {A | B | B-ANFP} command to choose annex B or B-ANFP.
You can configure NAT for either static or dynamic address translations. Perform these steps to configure the outside ATM WAN interface with dynamic NAT, beginning in global configuration mode: Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 62
Enables the configuration changes just made to the Ethernet interface. Example: Router(config-if)# no shutdown Router(config-if)# Step 6 exit Exits configuration mode for the Fast Ethernet interface. Example: Router(config-if)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 4-10 OL-6426-02...
Note Chapter 1, “Basic Router Configuration,” for information on configuring the loopback interface. For complete information on NAT commands, see the Cisco IOS Release 12.3 documentation set. For more general information on NAT concepts, see Appendix B, “Concepts.” Configuration Example The following configuration example shows a portion of the configuration file for a client in the PPPoA scenario described in this chapter.
Whenever you change server properties, you must reload the server with the configuration data from the Note Network Registrar database. VLANs The Cisco 1800 series integrated services routers (fixed) support eight Fast Ethernet ports on which you can configure VLANs. See the “Switch Port Configurations” section on page 5-7 for a description of the interfaces and features that can be configured on the switch ports and a link to a document containing the configuration procedures.
Router(config)# ip dhcp pool dpool1 Router(config-dhcp)# Step 5 network network-number [mask | prefix-length] Defines subnet number (IP) address for the DHCP address pool, optionally including the mask. Example: Router(config-dhcp)# network 10.10.0.0 255.255.255.0 Router(config-dhcp)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-03...
192.168.9.0 ip dhcp pool dpool1 import all network 10.10.0.0 255.255.255.0 default-router 10.10.10.10 dns-server 192.168.35.2 domain-name cisco.com ip domain name smallbiz.com ip name-server 192.168.11.12 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-03...
Switch Port Configurations Switch Port Configurations The 8 high speed Ethernet ports on the Cisco 1800 (fixed) integrated router supports 8 VLANs per port. To configure and verify VLANs on the switch ports see the the “Configure VLANs” section on page 5-5 and the “Verify Your VLAN Configuration”...
The 802.1x protocol supports authentication and full authentication, authorization, and accounting [AAA] and RADIUS modes with port VLAN ID (PVID) and voice VLAN ID (VVID); and with VLAN assignment with guest VLAN single and multi-host support on the Cisco 1800 (fixed) Configuration Series.
Switch Port Configurations Layer 2 Interfaces The integrated switch ports support Layer 2 switching across Ethernet ports based on Cisco IOS Catalyst Software. They support simultaneous, parallel connections between Layer 2 Ethernet segments. Switched connections between Ethernet segments last only for the duration of the packet. Different connections can be made for different segments for the next packet.
Separate Voice and Data Subnets For ease of network administration and increased scalability, network managers can configure the switch ports to support Cisco IP phones such that the voice and data traffic reside on separate subnets. IGMP Snooping By default, IGMP Snooping is globally enabled on the switch ports. When globally enabled or disabled, it is also enabled or disabled on all VLAN interfaces.
The example in this chapter illustrates the configuration of a remote access VPN that uses the Cisco Easy VPN and an IPSec tunnel to configure and secure the connection between the remote client and the corporate network.
Page 76
Cisco Unity Client protocol. This protocol allows most VPN parameters, such as internal IP addresses, internal subnet masks, DHCP server addresses, WINS server addresses, and split-tunneling flags, to be defined at a VPN server, such as a Cisco VPN 3000 series concentrator that is acting as an IPSec server.
The example specifies a pre-shared key. Router(config-isakmp)# authentication pre-share Router(config-isakmp)# Step 5 group {1 | 2 | 5} Specifies the Diffie-Hellman group to be used in an IKE policy. Example: Router(config-isakmp)# group 2 Router(config-isakmp)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Router(config-isakmp-group)# dns 10.50.10.1 Internet Naming Service (WINS) servers Router(config-isakmp-group)# for the group by using the wins command. Step 4 domain name Specifies group domain membership. Example: Router(config-isakmp-group)# domain company.com Router(config-isakmp-group)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
During IKE negotiations, the peers search in multiple transform sets for a transform that is the same at both peers. When such a transform set is found, it is selected and applied to the protected traffic as a part of both peers’ configurations. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Router(config)# crypto dynamic-map dynmap 1 Router(config-crypto-map)# Step 2 set transform-set transform-set-name Specifies which transform sets can be used with [transform-set-name2...transform-set-name6] the crypto map entry. Example: Router(config-crypto-map)# set transform-set vpn1 Router(config-crypto-map)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Command or Action Purpose Step 1 interface type number Enters the interface configuration mode for the interface to which you want the crypto map applied. Example: Router(config)# interface fastethernet 0 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
The following configuration example shows a portion of the configuration file for the VPN and IPSec tunnel described in this chapter. aaa new-model aaa authentication login rtr-remote local aaa authorization network rtr-remote local aaa session-id common username Cisco password 0 Cisco Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 6-10 OL-6426-02...
Page 86
Chapter 6 Configuring a VPN Using Easy VPN and an IPSec Tunnel Configuration Example Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 6-12 OL-6426-02...
C H A P T E R Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation The Cisco 1800 series integrated services fixed-configuration routers support the creation of virtual private networks (VPNs). Cisco routers and other broadband devices provide high-performance connections to the Internet, but many applications also require the security of VPN connections which perform a high level of authentication and which encrypt the data between two particular endpoints.
Page 88
VPN configuration information must be configured on both endpoints; for example, on your Cisco router and at the remote user, or on your Cisco router and on another router. You must specify parameters, such as internal IP addresses, internal subnet masks, DHCP server addresses, and Network Address Translation (NAT).
(SHA-1). Step 4 authentication {rsa-sig | rsa-encr | pre-share} Specifies the authentication method used in the IKE policy. Example: The example uses a pre-shared key. Router(config-isakmp)# authentication pre-share Router(config-isakmp)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 90
(DNS) server for the group. Example: You may also want to specify Windows Note Router(config-isakmp-group)# dns 10.50.10.1 Internet Naming Service (WINS) servers Router(config-isakmp-group)# for the group by using the wins command. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 91
Example: You could also use a RADIUS server for this. See Router(config)# aaa authentication login Cisco IOS Security Configuration Guide rtr-remote local Cisco IOS Security Command Reference Router(config)# details. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 92
Specifies global lifetime values used when {seconds seconds | kilobytes kilobytes} negotiating IPSec security associations. See the Cisco IOS Security Command Reference Example: for details. Router(config)# crypto ipsec security-association lifetime seconds 86400 Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 94
Creates a tunnel interface and enters interface configuration mode. Example: Router(config)# interface tunnel 1 Router(config-if)# Step 2 ip address ip-address mask Assigns an address to the tunnel. Example: Router(config-if)# 10.62.1.193 255.255.255.252 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 95
Specifies that only GRE traffic is permitted on the destination destination-wildcard outbound interface. Example: Router(config-acl)# permit gre host 192.168.100.1 host 192.168.101.1 Router(config-acl)# Step 9 exit Returns to global configuration mode. Example: Router(config-acl)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 96
1 ipsec-isakmp ! associates all crypto values and peering address for the ipsec tunnel. set peer 200.1.1.1 set transform-set set1 match address 105 interface vlan 1 ! VLAN 1 is the internal home network Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 7-10 OL-6426-02...
Page 97
103 deny ip any any ! prevents internet initiated traffic inbound. ! acl 105 matches addresses for the ipsec tunnel to/from the corporate network. access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255 no cdp run Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 7-11 OL-6426-02...
Page 98
Chapter 7 Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation Configuration Example Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 7-12 OL-6426-02...
Page 99
C H A P T E R Configuring a Simple Firewall The Cisco 1800 integrated services routers support network traffic filtering by means of access lists. The router also supports packet inspection and dynamic temporary access lists by means of Context-Based Access Control (CBAC).
Page 100
In the configuration example that follows, the firewall is applied to the outside WAN interface (FE0) on the Cisco 1811 or Cisco 1812 and protects the Fast Ethernet LAN on FE2 by filtering and inspecting all traffic entering the router on the Fast Ethernet WAN interface FE1. Note that in this example, the network traffic originating from the corporate network, network address 10.1.1.0, is considered safe traffic and...
Page 101
Router(config)# ip inspect name firewall rtsp Router(config)# ip inspect name firewall h323 Router(config)# ip inspect name firewall netshow Router(config)# ip inspect name firewall ftp Router(config)# ip inspect name firewall sqlnet Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 102
Assigns the defined ACLs to the outside access-list-name} {in | out} interface on the router. Example: Router(config-if)# ip access-group 103 in Router(config-if)# Step 6 exit Returns to global configuration mode. Example: Router(config-if)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 103
103 deny ip any any ! prevents internet initiated traffic inbound. ! acl 105 matches addresses for the ipsec tunnel to/from the corporate network. access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255 no cdp run Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 104
Chapter 8 Configuring a Simple Firewall Configuration Example Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 105
VLAN 1 VLAN 2 In the configuration example that follows, a remote user is accessing the Cisco 1800 series integrated services router using a wireless connection. Each remote user has his own VLAN. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide...
Page 106
Authentication Protocol [PEAP]) can use the access point. This command is not supported on Note bridges. See the Cisco IOS Commands for Access Points and Bridges document for more details. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 107
(Optional) Specifies the Request to Send (RTS) threshold or the number of times to send a request before determining the wireless LAN is Example: unreachable. Router(config-if)# rts threshold 2312 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 108
Enters interface configuration mode. We want to set up bridging on the VLANs, so the Example: example enters the VLAN interface Router(config)# interface vlan 1 configuration mode. Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 109
Example: Router(config)# interface dot11radio 0.1 Router(config-subif)# Step 2 description string Provides a description of the subinterface for the administrative user. Example: Router(config-subif)# description Cisco open Router(config-subif)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 111
2 bridge-group 2 spanning-disabled interface Vlan3 no ip address bridge-group 3 bridge-group 3 spanning-disabled interface BVI1 ip address 10.0.1.1 255.255.255.0 interface BVI2 ip address 10.0.2.1 255.255.255.0 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 112
Chapter 9 Configuring a Wireless LAN Connection Configuration Example interface BVI3 ip address 10.0.3.1 255.255.255.0 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 113
10.0.1.1 auth-port 1812 acct-port 1813 aaa authentication login eap_methods group rad_eap aaa session-id common ip subnet-zero ip cef vpdn enable vpdn-group 1 request-dialin protocol pppoe interface dialer 1 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 10-1 OL-6426-02...
Page 114
FastEthernet0 ip address 192.1.12.2 255.255.255.0 no ip directed-broadcast (default) ip nat outside ip access-group 103 in no cdp enable crypto ipsec client ezvpn ezvpnclient outside crypto map static-map Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 10-2 OL-6426-02...
Page 115
6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0 rts threshold 2312 power local cck 50 power local ofdm 30 channel 2462 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 10-3 OL-6426-02...
Page 116
3 spanning-disabled interface BVI1 ip address 10.0.1.1 255.255.255.0 interface BVI2 ip address 10.0.2.1 255.255.255.0 interface BVI3 ip address 10.0.3.1 255.255.255.0 ip classless ip http server no ip http secure-server Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 10-4 OL-6426-02...
Page 117
0 transport preferred all transport output all line vty 0 4 password cisco123 transport preferred all transport input all transport output all Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 10-5 OL-6426-02...
To verify that a specific feature is compatible with your router, you can use the Software Advisor tool. Note You can access this tool at www.cisco.com > Technical Support & Documentation > Tools & Resources with your Cisco username and password.
Page 123
C H A P T E R Configuring Security Features This chapter gives an overview of authentication, authorization, and accounting (AAA), the primary Cisco framework for implementing selected security features that can be configured on the Cisco 1800 integrated services fixed-configuration routers. Note Individual router models may not support every feature described throughout this guide.
Page 124
{source | source-wildcard | any} Extended ip access-list extended name followed by {permit | deny} protocol {source-addr [source-mask] | any}{destination-addr [destination-mask] | any} Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 12-2 OL-6426-02...
For more complete information on creating access lists, see the “Access Control Lists: Overview and Guidelines” section of the Cisco IOS Release 12.3 Security Configuration Guide. Configuring a CBAC Firewall Context-Based Access Control (CBAC) lets you configure a stateful firewall where packets are inspected internally and the state of network connections is monitored.
Cisco IOS Firewall IDS identifies 59 of the most common attacks using “signatures” to detect patterns of misuse in network traffic. It acts as an in-line intrusion detection sensor, watching packets and sessions as they flow through the router, scanning each to match any of the IDS signatures.
Page 127
WAN downtime. Dial backup is inactive by default, and must be configured to be active. Dial backup and remote management functions are configured through the ISDN S/T port of the Cisco 1812, Cisco 1801, Cisco 1802, and Cisco 1803 routers. These functions are configured through the V.92 modem port of the Cisco 1811 router.
(DLCI) is inactive. Floating static routes are also encapsulation independent. When static routes are configured, the primary interface protocol must go down in order to activate the Note floating static route. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-2 OL-6426-02...
Page 129
IP address of the backup interface. Example: Router(config)# ip route 0.0.0.0 0.0.0.0 192.168.2.2 150 Router(config)# Note When dynamic routing is activated, the floating static route depends upon routing protocol convergence times. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-3 OL-6426-02...
{ip-address | interface-type Assigns the primary route. 22.0.0.2 is the peer IP interface-number [ip-address]} [distance] address of the primary interface. Example: Router(config)# ip route 0.0.0.0 0.0.0.0 22.0.0.2 Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-4 OL-6426-02...
Page 131
The following limitation exists for the dial backup feature: bridging is not supported over console or auxiliary port backup interfaces. Table 13-1 summarizes dial backup support and limitations for the Cisco 1800 series integrated services fixed-configuration routers. Table 13-1 Dial Backup Feature Support and Limitations Summary...
Page 132
1 isdn switch-type basic-net3 interface ATM0 backup interface BRI0 no ip address no atm ilmi-keepalive pvc 1/40 encapsulation aal5snap pppoe-client dial-pool-number 2 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-6 OL-6426-02...
Page 133
BRI0 no ip address encapsulation ppp dialer pool-member 1 isdn switch-type basic-net3 interface ATM0 no ip address no atm ilmi-keepalive pvc 1/40 encapsulation aal5snap pppoe-client dial-pool-number 2 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-7 OL-6426-02...
Page 134
BRI0 no ip address encapsulation ppp dialer pool-member 1 isdn switch-type basic-net3 interface ATM0 no ip address no atm ilmi-keepalive pvc 1/40 encapsulation aal5snap pppoe-client dial-pool-number 2 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-8 OL-6426-02...
Page 135
Configuring Dial Backup and Remote Management Through the ISDN S/T Port The Cisco 1812, Cisco 1801, Cisco 1802, and Cisco 1803 routers use the ISDN S/T port for dial backup and remote management. Perform the following tasks to configure dial backup and remote management...
Page 136
Enters global configuration mode. Example: Router(config-if)# exit Router(config)# Step 7 interface dialer dialer-rotary-group-number Creates a dialer interface (numbered 0–255) and enters into interface configuration mode. Example: Router(config)# interface dialer 0 Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-10 OL-6426-02...
Page 137
1. Router(config)# dialer-list 1 protocol ip For details about this command and additional permit parameters that can be set, see the Cisco IOS Dial Router(config)# Technologies Command Reference. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-11 OL-6426-02...
Page 138
Configuring Dial Backup and Remote Management Through the ISDN S/T Port Configure the Aggregator and ISDN Peer Router The aggregator is typically a concentrator router where your Cisco router ATM PVC terminates. In the configuration example shown below, the aggregator is configured as a PPPoE server to correspond with the Cisco 876 router configuration example that is given in this chapter.
Page 139
Router(config-if)# ip unnumbered FastEthernet 2 Router(config-if)# Step 3 encapsulation encapsulation-type Sets the encapsulation type to PPP for the interface. Example: Router(config-if)# encapsulation ppp Router(config-if)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-13 OL-6426-02...
Page 140
Example: Router(config-if)# peer default ip address pool pool123 Router(config-if)# Step 9 exit Exits asynchronous interface configuration, and enters global configuration mode. Example: Router(config-if)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-14 OL-6426-02...
Page 141
We recommend all for use with the dial Note Example: backup feature. Router(config-line)# transport input all Router(config-line)# Step 5 exit Exits line configuration mode, and enters global configuration mode. Example: Router(config-line)# exit Router(config)# Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-15 OL-6426-02...
Page 142
Chapter 13 Configuring Dial Backup and Remote Management Configuring Dial Backup and Remote Management Through a V.92 Modem Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 13-16 OL-6426-02...
Chassis type and serial number Maintenance agreement or warranty information • • Type of software and version number Date you received the hardware • • Brief description of the problem Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-1 OL-6426-02...
Page 144
• The DSLAM supports discrete multi-tone (DMT) Issue 2. • The ADSL cable that you connect to the Cisco router must be 10BASE-T Category 5, unshielded twisted-pair (UTP) cable. Using regular telephone cable can introduce line errors. SHDSL Troubleshooting Symmetrical high-data-rate digital subscriber line (SHDSL) is available on the Cisco 1803 router model.
Page 145
Example 14-2 shows sample command output. Example 14-2 Viewing the Status of Selected Interfaces Router# show interface atm 0 ATM0 is up, line protocol is up Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-3 OL-6426-02...
Page 146
• The ATM line is down, possibly because the ADSL cable is disconnected or because the wrong type of cable is connected to the ATM port. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-4 OL-6426-02...
Page 147
Max. Datagram Size: 4528 PLIM Type: ADSL - 4608Kbps Upstream, DMT, TX clocking: LINE 0 input, 0 output, 0 IN fast, 0 OUT fast Avail bw = 4608 Config. is ACTIVE Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-5 OL-6426-02...
Description ATM interface Interface number. Always 0 for the Cisco 1800 fixed-configuration routers. AAL enabled Type of AAL enabled. The Cisco 1800 fixed-configuration routers support AAL5. Maximum VCs Maximum number of virtual connections this interface supports. Current VCCs Number of active virtual channel connections (VCCs).
Page 150
01:23:48:ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD 01:23:48:ABCD ABCD ABCD ABCD ABCD 01:23:48: Table 14-3 describes some of the fields shown in the debug atm packet command output. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-8 OL-6426-02...
Page 151
Several methods are available for upgrading software on the Cisco 1800 series integrated services fixed-configuration routers, including: Copy the new software image to flash memory over the LAN or WAN while the existing Cisco IOS • software image is operating.
Page 152
If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to [email protected].
Page 153
If you are recovering an enable secret password, it is not displayed in the show startup-config command output. Complete the password recovery process by performing the steps in the following “Reset the Password and Save Your Changes” section. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-11 OL-6426-02...
Page 154
To return to the configuration being used before you recovered the lost enable password, do not Note save the configuration changes before rebooting the router. Reboot the router, and enter the recovered password. Step 4 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-12 OL-6426-02...
Page 155
Managing Your Router with SDM Managing Your Router with SDM The Cisco SDM tool is a free software configuration utility, supporting the Cisco 1800 series integrated services fixed-configuration routers. It includes a web-based GUI that offers the following features: Simplified setup •...
Page 156
Chapter 14 Troubleshooting Managing Your Router with SDM Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide 14-14 OL-6426-02...
A P P E N D I X Cisco IOS Software Basic Skills Understanding how to use Cisco IOS software can save you time when you are configuring your router. If you need a refresher, take a few minutes to read this appendix.
Cisco IOS commands. For example, you can use the interface type number command only from global configuration mode. The following Cisco IOS command modes are hierarchical. When you begin a router session, you are in user EXEC mode. User EXEC •...
Page 161
To exit to privileged from global EXEC mode, enter the configuration mode. end command, or press Ctrl-Z. To enter subinterface • configuration mode, specify a subinterface with the interface command. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Dialer parameters and statistics exception exception information To redisplay a command you previously entered, press the Up Arrow key. You can continue to press the Up Arrow key for more commands. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 163
Privileged EXEC mode is indicated by the # in the prompt. You can now make changes to your router configuration. Step 3 Enter the configure terminal command to enter global configuration mode: Router# configure terminal Router(config)# You can now make changes to your router configuration. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Cisco IOS Software Basic Skills Using Commands Using Commands This section provides some tips about entering Cisco IOS commands at the command-line interface (CLI). Abbreviating Commands You only have to enter enough characters for the router to recognize the command as unique. This...
Building configuration... router# Summary Now that you have reviewed some Cisco IOS software basics, you can begin to configure your router. Remember: You can use the question mark (?) and arrow keys to help you enter commands. •...
Page 166
Appendix A Cisco IOS Software Basic Skills Where to Go Next Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 167
Concepts This appendix contains conceptual information that may be useful to Internet service providers or network administrators when they configure Cisco routers. To review some typical network scenarios, Chapter 2, “Sample Network Deployments.” For information on additional details or configuration topics, see Chapter 11, “Additional Configuration Options.”...
Page 168
(RIP), a dynamic distance-vector routing protocol. RIP is described in more detail in the following subsections. Routing Protocol Options Routing protocols include the following: Routing Information Protocol (RIP) • Enhanced Interior Gateway Routing Protocol (Enhanced IGRP) • Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 169
RIP, see the Cisco IOS Release 12.3 documentation set. Enhanced IGRP Enhanced IGRP is an advanced Cisco proprietary distance-vector and link state routing protocol, which means it uses a metric more sophisticated than distance (hop count) for route selection. Enhanced IGRP uses a metric based on a successor, which is a neighboring router that has a least-cost path to a destination that is guaranteed not to be part of a routing loop.
Page 170
PAP uses a two-way handshake to verify the passwords between routers. To illustrate how PAP works, imagine a network topology in which a remote office Cisco router is connected to a corporate office Cisco router. After the PPP link is established, the remote office router repeatedly sends a configured username and password until the corporate office router accepts the authentication.
TACACS+ Cisco 1800 fixed-configuration routers support the Terminal Access Controller Access Control System Plus (TACACS+) protocol through Telnet. TACACS+ is a Cisco proprietary authentication protocol that provides remote access authentication and related network security services, such as event logging. User passwords are administered in a central database rather than in individual routers.
Page 172
Dial Backup Dial backup provides protection against WAN downtime by allowing a user to configure a backup modem line connection. The following can be used to bring up the dial backup feature in Cisco IOS software: Backup Interface •...
Page 173
The translation function is compatible with standard routing; the feature is required only on the router connecting the inside network to the outside domain. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 174
WAN interface IP address from a central server and to enable all remote hosts to access the Internet using this single registered IP address. Because Easy IP (Phase 1) uses existing port-level multiplexed NAT functionality within Cisco IOS software, IP addresses on the remote LAN are invisible to the Internet.
Interleaving provides the delay bounds for delay-sensitive voice packets on a slow link that is used for other best-effort traffic. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 176
PPP to define how data is managed; RSVP or IP Precedence is used to give priority to voice packets. There are two levels of queueing; ATM queues and Cisco IOS queues. CBWFQ is applied to Cisco IOS queues. A first-in-first-out (FIFO) Cisco IOS queue is automatically created when a PVC is created. If you use CBWFQ to create classes and attach them to a PVC, a queue is created for each class.
ACK or RST bits are set. (Set ACK or RST bits indicate that the packet is not the first in the session and the packet therefore belongs to an established session.) This filter criterion would be part of an access list applied permanently to an interface. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide B-11 OL-6426-02...
Page 178
Appendix B Concepts Access Lists Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide B-12 OL-6426-02...
Page 179
You can use the ROM monitor to perform certain configuration tasks, such as recovering a lost password or downloading software over the console port. If there is no Cisco IOS software image loaded on the router, the ROM monitor runs the router.
Page 180
Reboots the router with the new configuration register value. The router remains in ROM monitor and does not boot the Cisco IOS software. As long as the configuration value is 0x0, you must manually boot the operating system from the console. See the boot command in the “Command...
Cisco IOS software, you can load new software while in ROM monitor mode. This section describes how to load a Cisco IOS software image from a remote TFTP server to the router flash memory. Use the tftpdnld command only for disaster recovery, because it erases all existing data in flash memory before downloading a new software image to the router.
Page 182
2—Detailed progress is displayed during the file download process; for example: Initializing interface. • Interface link state up. • ARPing for 1.4.0.1 • ARP reply for 1.4.0.1 received. MAC • address 00:00:0c:07:ac:01 Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 183
The router begins to download the new file. If you mistakenly entered yes, you can enter Ctrl-C or Break to stop the transfer before the flash memory is erased. Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 184
The virtual configuration register is in nonvolatile RAM (NVRAM) and has the same functionality as other Cisco routers. You can view or modify the virtual configuration register from either the ROM monitor or the operating system software. Within the ROM monitor, you can change the configuration register by entering the register value in hexadecimal format, or by allowing the ROM monitor to prompt you for the setting of each bit.
Page 185
CompactFlash memory module or to main memory for execution (image files only). Use console download when you do not have access to a TFTP server. If you are using a PC to download a Cisco IOS image over the router console port at 115,200 bps, ensure Note that the PC serial port is using a 16550 universal asynchronous transmitter/receiver (UART).
Page 186
Debug Commands Most ROM monitor debugging commands are functional only when Cisco IOS software has crashed or is halted. If you enter a debugging command and Cisco IOS crash information is not available, you see the following error message: "xxx: kernel context state is invalid, can not proceed."...
Page 187
NVRAM size: 192 KB Exiting the ROM Monitor You must set the configuration register to a value from 0x2 to 0xF for the router to boot a Cisco IOS image from flash memory upon startup or reloading. The following example shows how to reset the configuration register and cause the router to boot a Cisco IOS image stored in flash memory: rommon 1 >...
Page 188
Appendix C ROM Monitor Exiting the ROM Monitor Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide C-10 OL-6426-02...
Page 189
NICNAME Who is LOGIN Login Host Protocol DOMAIN Domain name server BOOTPS Bootstrap Protocol Server BOOTPC Bootstrap Protocol Client TFTP Trivial File Transfer Protocol – Any private dial-out service Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 190
UNIX remote execution (control) TCP—rlogin TCP—UNIX remote login UDP—rwho UDP—UNIX broadcast name service TCP—rsh TCP—UNIX remote shell UDP—syslog UDP—system log Printer UNIX line printer remote spooling Routing Information Protocol Timed Time server Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide OL-6426-02...
Page 191
See ARP ADSL configuring ordering overview backup interfaces troubleshooting for dial backup activation aggregator b command configuring b flash command boot commands Asymmetric Digital Line Subscriber Line bridging Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-1 OL-6426-02...
Page 192
6, 9 ROM monitor debugging firewall undoing global parameters command variables GRE tunnel listing group policy TFTP download IKE policy committed access rate inspection rules for firewalls See CAR Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-2 OL-6426-02...
Page 193
15 to 16 IP address assignment overview 2, 3 DHCP and Easy IP (Phase 2) enable password DHCP server recovering configuration example setting configuring as enable secret password Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-3 OL-6426-02...
Page 195
See also Easy IP (Phase 1) network address translation See NAT LAN with DHCP and VLANs network configuration, preparing for configuring Network Control Protocols Layer 2 interfaces See NCP Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-5 OL-6426-02...
Page 196
1 to 2 remote access VPN authentication protocols with Easy VPN and IPSec tunnel 3 to 4 fragmentation remote management Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-6 OL-6426-02...
Page 197
5, 6 show controllers dsl command show dsl interface atm command port numbers, currently assigned 1 to 2 show interface command undoing commands site-to-site VPN Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-7 OL-6426-02...
Page 198
VLAN trunking protocol (VTP) VPDN VPNs configuration example configuration tasks 2, 3 configuring 1, 4 WAN interfaces configuring 7, 3, 5 wireless LAN configuration example configuration tasks Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide IN-8 OL-6426-02...