Cisco Router 800 Series Software Configuration Guide
Have a look at the manual Cisco Router 800 Series Software Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
7-11 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 7 Router Feature Configuration Configuring Basic Parameters For complete information on the ATM commands, refer to the Cisco IOS Release 12.0 documentation set. For more general information on ATM concepts, see Chapter 1, “Concepts.” AAL5SNAP Encapsulation Configuration Example The following example shows the ATM interface configuration for AAL5SNAP encapsulation. You do not need to enter the commands marked “default.” These commands appear automatically in the configuration file that is generated when you use the show running-config command. ! interface ATM0 ip address 200.200.100.1 255.255.255.0 no ip directed-broadcast (default) no atm ilmi-keepalive (default) pvc 8/35 encapsulation aal5snap protocol ip 200.200.100.254 broadcast ! Verifying Your Configuration To verify that you have properly configured the ATM interface with AAL5SNAP encapsulation, enter the show interface atm0 command. You should see a verification output like the example shown below. router#sh int atm0 ATM0 is up, line protocol is up Hardware is PQUICC_SAR (with Alcatel ADSL Module) Internet address is 1.1.1.1/24 MTU 1500 bytes, sub MTU 1500, BW 640 Kbit, DLY 80 usec, reliability 113/255. txload 1/255, rxload 1/255 Encapsulation aal5snap, loopback not set Keepalive not supported DTR is pulsed for 5 seconds on reset LCP Closed
Chapter 7 Router Feature Configuration Configuring Basic Parameters 7-12 Cisco 800 Series Software Configuration Guide 78-5372-06 AAL5MUX PPP Encapsulation Configuration Example The following example shows an ATM interface configuration for an AAL5MUX PPP encapsulation. You do not need to enter the commands marked “default.” These commands appear automatically in the configuration file generated when you use the show running-config command. ! interface ATM0 no ip directed-broadcast (default) no atm ilmi-keepalive (default) pvc 8/35 encapsulation aal5mux ppp dialer dialer pool-member 1 ! Verifying Your Configuration To verify that you have properly configured the ATM interface with AAL5MUX PPP encapsulation, enter the virtual-access 1 command. You should see a verification output like the example shown below. router#sh int virtual-access 1 Virtual-Access1 is up, line protocol is up Hardware is Virtual Access interface Interface is unnumbered. Using address of Dialer0 (2.2.2.1) MTU 1500 bytes, BW 100000 Kbit, DLY 100000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation PPP, loopback not set Virtual-access 1 is up means that the interface is up and running. If you see the output Virtual-access 1 is down, it means that the interface is “administratively down,” and the interface is configured with the shutdown command. To bring the interface up, you must enter the no shutdown command.
7-13 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 7 Router Feature Configuration Configuring Basic Parameters Configuring Command-Line Access to the Router Follow the steps below to configure parameters to control access to the router, beginning in global configuration mode. For complete information on the command line commands, refer to the Cisco IOS Release 12.0 documentation set. Configuration Example The following configuration shows the command-line access commands. You do not need to input the commands marked “default.” These commands appear automatically in the configuration file that is generated when you use the show running-config command. ! line con 0 exec-timeout 10 0 password 4youreyesonly Command Task Step 1line console 0Enter line configuration mode, and specify the console terminal line. Step 2password passwordSpecify a unique password on the line. Step 3loginEnable password checking at the terminal session login. Step 4exec-timeout 10 0Set the interval that the privileged EXEC command interpreter waits until user input is detected. Exec-timeout 10 0 is the default. Step 5line vty 0 4Specify a virtual terminal for remote console access. Step 6password passwordSpecify a unique password on the line. Step 7loginEnable password checking at virtual terminal session login. Step 8endExit line configuration mode, and return to privileged EXEC mode.
Chapter 7 Router Feature Configuration Configuring Bridging 7-14 Cisco 800 Series Software Configuration Guide 78-5372-06 login transport input none (default) stopbits 1 (default) line vty 0 4 password secret login ! Configuring Bridging Bridges are store-and-forward devices that use unique hardware addresses to filter traffic that would otherwise travel from one segment to another. You can configure the routers as pure bridges. Follow the steps below to configure bridging, beginning in global configuration mode. Command Task Step 1no ip routingDisable IP routing. Step 2bridge number protocol protocolSpecify the bridge protocol to define the type of Spanning-Tree Protocol (STP). Step 3interface ethernet 0Enter configuration mode for the Ethernet interface. Step 4bridge-group numberSpecify the bridge-group number to which the Ethernet interface belongs. Step 5no shutdownEnable the Ethernet interface. Step 6exitExit configuration mode for the Ethernet interface and the router. Step 7interface ATM 0Enter configuration mode for the ATM interface. Step 8dsl equipment-type {co | cpe} Configure the DSL equipment type, if applicable. Step 9dsl linerate {number | auto} Specify the G.SHDSL line rate, if applicable. The range of valid numbers is between 72 and 2312.
7-15 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 7 Router Feature Configuration Configuring Bridging For complete information on the bridging commands, refer to the Cisco IOS Release 12.0 documentation set. For more general concepts on bridging, see Chapter 1, “Concepts.” Configuration Example The following configuration example uses bridging with AAL5SNAP encapsulation. You do not need to enter the commands marked “default.” These commands appear automatically in the configuration file that is generated when you use the show running-config command. This configuration example shows the Ethernet and ATM interfaces configured. The Ethernet interface has IP addressing turned off for bridging, and IP directed broadcast is disabled, which prevents the translation of directed broadcasts to physical broadcasts. The bridge-group number to which the ATM interface is associated is set to 1. The ATM interface has a PVC of 8/35, and the encapsulation is set to AAL5SNAP. The IP address is disabled for bridging and the IP directed broadcast is disabled, which prevents the translation of directed broadcasts to physical broadcasts. The bridge protocol is set to 1 to define the STP. no ip routing ! interface Ethernet0 no ip address no ip directed-broadcast (default) Step 10dsl operating-mode gshdsl symmetric annex annexSet the G.SHDSL operating mode, if applicable, and select the G.991.2 annex. Step 11pvc vpi/vciCreate an ATM PVC for each end node with which the router communicates. Step 12encapsulation typeSpecify the encapsulation type for the PVC. Step 13bridge-group numberSpecify the bridge-group number to which the ATM interface belongs. Step 14no shutdownEnable the ATM interface. Step 15end Exit the configuration mode for the ATM interface. Command Task
Chapter 7 Router Feature Configuration Configuring Bridging 7-16 Cisco 800 Series Software Configuration Guide 78-5372-06 bridge-group 1 ! interface ATM0 no ip address no ip directed-broadcast (default) pvc 8/35 encapsulation aal5snap ! bridge-group 1 ! ip classless (default) ! bridge 1 protocol ieee ! end Verifying Your Configuration To verify that you have properly configured bridging, enter the show spanning-tree command. You should see a verification output like the example shown below. router#sh spanning-tree Bridge group 1 is executing the IEEE compatible Spanning Tree protocol Bridge Identifier has priority 32768, address 1205.9356.0000 Configured hello time 2, max age 20, forward delay 15 We are the root of the spanning tree Port Number size is 9 Topology change flag set, detected flag set Times: hold 1, topology change 35, notification 2 hello 2, max age 20, forward delay 15 Timers:hello 1, topology change 34, notification 0 bridge aging time 15 Port 2 (Ethernet0) of Bridge group 1 is forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 1205.9356.0000 Designated bridge has priority 32768, address 1205.9356.0000 Designated port is 2, path cost 0 Timers:message age 0, forward delay 0, hold 0 BPDU:sent 0, received 0 Port 3 (ATM0 RFC 1483) of Bridge group 1 is forwarding Port path cost 1562, Port priority 128
7-17 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 7 Router Feature Configuration Configuring Static Routing Designated root has priority 32768, address 1205.9356.0000 Designated bridge has priority 32768, address 1205.9356.0000 Designated port is 3, path cost 0 Timers:message age 0, forward delay 0, hold 0 BPDU:sent 0, received 0 Configuring Static Routing Static routes are routing information that you manually configure into the router. If the network topology changes, the static route must be updated with a new route. Static routes are private routes, unless they are redistributed by a routing protocol. Configuring static routing on the 800 series routers is optional. Follow the steps below to configure static routing, beginning in global configuration mode. For complete information on the static routing commands, refer to the Cisco IOS Release 12.0 documentation set. For more general information on static routing, see Chapter 1, “Concepts.” Configuration Example In the following configuration example, the static route is sending all IP packets with a destination of 1.0.0.0 and a subnet mask of 255.0.0.0 out on the ATM interface to another device with an IP address of 14.0.0.1. Specifically, the packets are being sent to the configured PVC. You do not need to enter the commands marked “default.” These commands appear automatically in the configuration file that is generated when you use the show running-config command. Command Task Step 1ip classlessSet up a best route for packets destined for networks unknown by the router. Step 2ip route network-number mask Specify the static route for the IP packets. Step 3endExit router configuration mode.
Chapter 7 Router Feature Configuration Configuring Dynamic Routing 7-18 Cisco 800 Series Software Configuration Guide 78-5372-06 ! ip classless (default) ip route 1.0.0.0 255.0.0.0 atm0 14.0.0.1 no ip http server (default) ! Verifying Your Configuration To verify that you have properly configured static routing, enter the show ip route command and look for static routes signified by the “S.” You should see a verification output like the example shown below. router#sh ip route Codes:C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is 0.0.0.0 to network 0.0.0.0 5* 2.0.0.0/24 is subnetted, 1 subnets C 2.2.2.0 is directly connected, Ethernet0/0 S* 0.0.0.0/0 is directly connected, Ethernet0/0 Configuring Dynamic Routing In dynamic routing, the network protocol adjusts the path automatically based on network traffic or topology. Changes in dynamic routing are shared with other routers in the network. The IP routing protocol can use the Routing Information Protocol (RIP) or the Enhanced Interior Gateway Routing Protocol (EIGRP) to learn routes dynamically. You can configure either one of these routing protocols.
7-19 Cisco 800 Series Software Configuration Guide 78-5372-06 Chapter 7 Router Feature Configuration Configuring Dynamic Routing Configuring RIP Follow the steps below to configure RIP routing protocol on the router, beginning in global configuration mode. For complete information on the dynamic routing commands, refer to the Cisco IOS Release 12.0 documentation set. For more general information on RIP, refer to Chapter 1, “Concepts.” Configuration Example The following configuration shows RIP version 2 enabled in IP network 10.10.10.0. You do not need to enter the commands marked “default.” These commands appear automatically in the configuration file that is generated when you use the show running-config command. ! router rip version 2 network 10.0.0.0 no auto-summary ! Command Task Step 1router ripEnter router configuration mode and enable RIP on the router. Step 2version 2Specify use of RIP version 2. Step 3network network-numberSpecify the network number for each directly connected network. Step 4no auto-summaryDisable automatic summarization of subnet routes into network-level routes. This allows subprefix routing information to transmit across classful network boundries. Step 5endExit router configuration mode.
Chapter 7 Router Feature Configuration Configuring IP EIGRP 7-20 Cisco 800 Series Software Configuration Guide 78-5372-06 Verifying Your Configuration To verify that you have properly configured RIP, enter the show ip route command and look for RIP routes signified by “R.” You should see a verification output like the following example. router#sh ip route Codes:C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set 2.0.0.0/24 is subnetted, 1 subnets C 2.2.2.0 is directly connected, Ethernet0/0 R 3.0.0.0/8 [120/1] via 2.2.2.1, 00:00:02, Ethernet0/0 Configuring IP EIGRP Follow the steps below to configure IP EIGRP, beginning in global configuration mode. Command Task Step 1router eigrp autonomous-systemEnter router configuration mode and enable EIGRP on the router. The autonomous-system number identifies the route to other EIGRP routers and is used to tag the EIGRP information. Step 2network network-numberSpecify the network number for each directly connected network. Step 3endExit router configuration mode.