Home > Cisco > Router > Cisco Router 826 Routers Software Configuration Guide

Cisco Router 826 Routers Software Configuration Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 826 Routers Software Configuration Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							  
    4-35
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring ATM OAM F5 Continuity Check Support
    Command Mode
    Privileged EXEC.
    Example Output
    The following example output of the debug atm oam cc command records activity beginning with the 
    entry of the oam-pvc manage cc command, and ending with the entry of the no oam-pvc manage cc 
    command. The ATM 0 interface was specified, and the “both” segment direction was specified. The 
    output shows an activation request sent and confirmed, a series of CC cells sent by the routers on each 
    end of the segment, and a deactivation request and confirmation.
    router# debug atm oam cc interface atm0
    Generic ATM:
      ATM OAM CC cells debugging is on
    router#
    00:15:05: CC ACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM
    Type:8 OAM Func:1 Direction:3 CTag:5
    00:15:05: CC ACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell
    Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:5
    00:15:06: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1
    00:15:07: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
    00:15:08: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:09: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:10: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:11: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:12: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:13: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:14: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:15: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:16: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:17: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:18: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:19: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4 
    00:15:19: CC DEACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM
    Type:8 OAM Func:1 Direction:3 CTag:6
    00:15:19: CC DEACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM Cell
    Type:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6
    The following table describes significant fields.
    Field Description
    00:15:05 Time stamp.
    CC ACTIVATE MSG 
    (ATM0)Message type and interface.
    0Source.
    1Sink.
    VC 1/40 Virtual circuit identifier.
    Direction:3 Indication of the direction in which the cells are 
    traveling. 1 indicates local router is sink. 2 indicates 
    local router is source. 3 indicates both routers 
    operate as source and sink. 
    						
    							  
    4-36
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring RADIUS Support
    Configuring RADIUS Support
    Remote Authentication Dial-In User Service (RADIUS) is supported on the following Cisco routers:
    Cisco 826 and Cisco 836
    Cisco 827, Cisco 827H, Cisco 827-4V, Cisco 831, and Cisco 837
    Cisco 828
    RADIUS enables you to secure your network against unauthorized access. A RADIUS server must be 
    configured in the service provider or corporate network in order for the router to use RADIUS client 
    features.
    Configuring Cisco Easy VPN Client
    Routers and other forms of broadband access provide high-performance connections to the Internet. 
    However, many applications also require the security of Virtual Private Network (VPN) connections that 
    perform a high level of authentication and that encrypt the data between two particular endpoints. 
    Establishing a VPN connection between two routers can be complicated, and it typically requires tedious 
    coordination between network administrators to configure the two routers’ VPN parameters. 
    The Cisco Easy VPN client feature eliminates much of this tedious work by implementing Cisco’s Unity 
    Client protocol, which allows most VPN parameters to be defined at a VPN 3000 concentrator acting as 
    an IPSec server. 
    After the IPSec server has been configured, a VPN connection can be created with minimal configuration 
    on an IPSec client, such as a supported Cisco 800 series router. When the IPSec client then initiates the 
    VPN tunnel connection, the IPSec server pushes the IPSec policies to the IPSec client and creates the 
    corresponding VPN tunnel connection.
    The Cisco Easy VPN client feature supports two modes of operation:
    Client—Specifies that Network Address Translation/Port Address Translation (NAT/PAT) be done, 
    so that the PCs and other hosts at the client end of the VPN tunnel form a private network that does 
    not use any IP addresses in the destination server’s IP address space. 
    Network Extension—Specifies that the PCs and other hosts at the client end of the VPN tunnel 
    should be given IP addresses in the destination enterprise network’s IP address space, so that they 
    form one logical network. 
    Both modes of operation also optionally support split tunneling, which allows secure access to corporate 
    resources through the VPN tunnel while also allowing Internet access through a connection to an ISP or 
    other service (thereby eliminating the corporate network from the path for Web access). This 
    configuration is enabled by a simple access list implemented on the IPSec server. 
    NoteCisco 800-series routers are supported as IPSec clients of VPN 3000 concentrators. Support for other 
    IPSec servers will be available in a future release. Be sure to see the Cisco IOS release notes for the 
    current release to determine if there are any other limitations on the use of Cisco Easy VPN Client. 
    						
    							  
    4-37
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring Cisco Easy VPN Client
    Easy VPN Documentation
    The release note “Cisco EZVPN Client for the Cisco uBR905/uBR925 Cable Access Routers” contains 
    instructions for configuring the DHCP server pool, the Easy VPN client profile required to implement 
    Easy VPN, contains example configurations for the IPSec server, and descriptions of commands 
    available to manage Easy Virtual Private Networking.
    Configuration Example
    This section provides a client mode configuration example for the Cisco 827 router.
    The following example configures a Cisco 827 router as an IPSec client, using the Cisco Easy VPN 
    feature in the client mode of operation. This example shows the following components of the Cisco Easy 
    VPN client configuration:
    DHCP server pool—The ip dhcp pool command creates a pool of IP addresses to be assigned to the 
    PCs connected to the router’s Ethernet1 interface. The pool assigns addresses in the class C private 
    address space (192.168.100.0) and configures each PC so that its default route is 192.168.100.1, 
    which is the IP address assigned to the router’s Ethernet interface. 
    EzVPN client configuration—The first crypto ipsec client ezvpn hw-client command (global 
    configuration mode) creates an EzVPN client configuration named hw-client. This configuration 
    specifies a group name of hw-client-groupname and a shared key value of hw-client-password, and 
    it sets the peer destination to the IP address 188.185.0.5 (which is the address assigned to the 
    interface connected to the Internet on the destination peer router). The EzVPN configuration is 
    configured for the default operations mode client. 
    NoteIf DNS is also configured on the router, the peer option also supports a host name instead 
    of an IP address. 
    The second crypto ipsec client ezvpn hw-client command (ATM 0 interface configuration mode) 
    assigns the EzVPN client configuration to the ATM 0 interface, so that all traffic received and 
    transmitted on that interface is sent through the VPN tunnel. 
    The output of the show running-config command follows:
    Current configuration :1040 bytes
    !
    version 12.2
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    !
    hostname c827-18
    !
    !
    mmi polling-interval 60
    no mmi auto-configure
    no mmi pvc
    mmi snmp-timeout 180
    ip subnet-zero
    ip dhcp excluded-address 192.168.100.1
    !
    ip dhcp pool CLIENT
     import all 
    						
    							  
    4-38
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring Dial-on-Demand Routing for PPPoE Client
     network 192.168.100.0 255.255.255.0
     default-router 192.168.100.1
    !
    ip ssh time-out 120
    ip ssh authentication-retries 3
    !
    crypto ipsec client ezvpn hw-client
     group hw-client-groupname key hw-client-password
     mode client
     peer 188.185.0.5
    !
    interface Ethernet0
     ip address 192.168.100.1 255.255.255.0
     hold-queue 100 out
    !
    interface ATM0
     ip address 192.168.101.18 255.255.255.0
     no atm ilmi-keepalive
      protocol ip 192.168.101.19 broadcast
      encapsulation aal5snap
     !
     dsl operating-mode auto
     crypto ipsec client ezvpn hw-client
    !
    ip classless
    ip route 0.0.0.0 0.0.0.0 ATM0
    ip route 50.0.0.0 255.0.0.0 40.0.0.19
    ip http server
    ip pim bidir-enable
    !
    line con 0
     stopbits 1
    line vty 0 4
     login
    !
    Configuring Dial-on-Demand Routing for PPPoE Client
    Dial-on-demand routing (DDR) for PPPoE client is supported on the following Cisco routers:
    Cisco 826 and Cisco 836
    Cisco 827, 827H, Cisco 827-4V, Cisco 831, and Cisco 837
    Cisco 828 
    Cisco SOHO 77, Cisco SOHO 77H, Cisco SOHO 78, Cisco SOHO 91, Cisco SOHO 96, and 
    Cisco SOHO 97
    The DDR for PPPoE client feature provides flexibility for subscribers whose ISP charges are based on 
    the amount of time they are connected to the network (non-flat-rate services). With the DDR for PPPoE 
    feature, you can designate a type of traffic as traffic of interest. You can then configure the router so that 
    it will bring up the PPPoE connection when any interesting traffic arrives from the LAN interface and 
    will bring down the connection when the dialer idle timer expires. 
    DDR is configured in Ethernet 1 configuration mode, using the pppoe-client dial-pool-number 
    command with the dial-on demand keyword. The syntax is shown below.
    pppoe-client dial-pool-number number [dial-on-demand] 
    						
    							  
    4-39
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring Dial-on-Demand Routing for PPPoE Client
    Configuring DDR for a PPPoE Client
    Complete the following tasks to configure DDR for a PPPoE client, beginning in global configuration 
    mode:
    Step 1Enable vpdn.
    a.Enter the global configuration mode vpdn enable command.
    b.Enter no vpdn logging command to disable vpdn logging.
    Step 2Configure a virtual private dial-up network (VPDN) group.
    a.Enter the global configuration mode vpdn-group number command, to enter vpdn group 
    configuration mode.
    b.Enter request-dialin to specify the dial-in dialing mode.
    Step 3Configure the Ethernet 1 interface.
    a.Enter interface Ethernet 1 to enter Ethernet 1 interface configuration mode.
    b.Enter pppoe enable to enable PPPoE for this interface.
    c.Activate DDR and create a dial pool by entering pppoe-client dial-pool-number number 
    dial-on-demand. The number value must match the vpdn group number.
    Step 4Configure the dialer interface.
    a.Enter interface dialer 1 to enter dialer interface configuration mode.
    b.Enter ip address negotiated to indicate that the ip address will be negotiated with the DHCP server.
    c.Specify the maximum transmission unit size by entering ip mtu 1492.
    d.Set the encapsulation type by entering encapsulation ppp.
    e.Enter the dialer pool number command to associate the dialer interface with the dialer pool created 
    for the Ethernet 1 interface.
    f.Set the idle timer interval by entering dialer idle-timeout 180 either. The either keyword specifies 
    that either inbound or outbound traffic can reset the idle timer.
    NoteA value of 0 specifies that the timer will never expire and that the connection will always be up.
    g. Enter dialer hold-queue 100 to set the queue to a size that will hold packets of interest before the 
    connection is established.
    h.Enter dialer-group 1 to specify the dialer list that defines traffic of interest.
    i.Leave Dialer 1 interface configuration mode by entering exit.
    Step 5Enter the global interface configuration dialer-list 1 protocol ip permit command to define IP traffic as 
    the traffic of interest.
    Syntax Descriptions
    dial-pool-numberCreate a dial pool.
    dial-on-demandActivate DDR. 
    						
    							  
    4-40
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring Weighted Fair Queuing
    Step 6Create a static route for the Dialer 1 interface by entering the ip route 0.0.0.0 0.0.0.0 dialer 1 
    permanent command.
    Step 7Enter end to leave router configuration mode.
    Configuring Weighted Fair Queuing
    Weighted fair queuing (WFQ) is supported on the following Cisco routers:
    Cisco 826 and Cisco 836
    Cisco 827, Cisco 827H, Cisco 827-4V, Cisco 831, and Cisco 837
    Cisco 828
    WFQ enables slow-speed links, such as serial links, to provide fair treatment for all types of traffic. In 
    order to do this, WFQ classifies the traffic into different flows (also known as conversations) based on 
    layer three and layer four information, such as IP addresses and TCP ports. It does this without requiring 
    you to define access lists. This means that low-bandwidth traffic effectively has priority over 
    high-bandwidth traffic because high-bandwidth traffic shares the transmission media in proportion to its 
    assigned weight. WFQ is now available on IP Base and IP Firewall Cisco IOS images. 
    WFQ has certain limitations: it is not scalable if the flow amount increases considerably, and native 
    WFQ is not available on high-speed interfaces such as ATM interfaces. Class-based WFQ, available on 
    Cisco IOS Plus images, overcomes these limitations. 
    Configuring Weighted Fair Queuing
    The following procedure shows how to apply WFQ to the ATM interface of a Cisco router.
    Step 1Create a policy map for WFQ.
    a.Enter the policy-map map-name command in global configuration mode to construct a WFQ policy. 
    The map name wfq could be used to specify that this is the policy map for WFQ.
    b.Enter class class-default to use the default class for all traffic. 
    c.Apply WFQ to all traffic by entering the fair-queue command.
    d.Enter exit twice to return to global configuration mode.
    Step 2Apply the policy map to the router interface.
    a.Enter interface atm number, where number is the ATM interface number.
    b.Enter pvc vpi/vci to specify which PVC you are applying the policy map to.
    c.Enter service-policy output map-name to apply the policy to this PVC. If you named the policy map 
    wfq, you would enter the command service-policy output wfq.
    Step 3Enter end to leave router configuration mode. 
    						
    							  
    4-41
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring DSL Commands
    Example Configuration
    The following configuration applies WFQ to PVC 0/33 on the ATM 0.1 interface. The policy map named 
    wfq is created, and WFQ is applied to the default class referenced in that policy map. Then, wfq is 
    referenced in the ATM 0.1 interface configuration.
    version 12.2
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password encryption
    !
    hostname 806-uut
    !
    ip subnet-zero
    !
    policy-map wfq
      class class-default
      fair-queue
    !
    interface Ethernet0
    ip address 192.168.1.1 255.255.255.0
    !
    interface atm0.1
     no ip address
     pvc 0/33
      service-policy output wfq
    !
    ip classless
    ip http server
    ip pim bidir-enable
    !
    line con 0
     stopbits 1
    line vty 0 4
     login
    !
    scheduler max-task-time 5000
    end
    !
    Configuring DSL Commands
    The sections below describe the supported DSL commands. 
    Follow the steps below to configure DSL command-line interface (CLI) commands. 
    Command Purpose
    Step 1dsl noise-marginSets the noise margin offset.
    Step 2max-tone-bitsSets the maximum bits per tone limit.
    Step 3gain-setting rx-offsetSets the receive gain offset.
    Step 4gain-setting tx-offsetSets the transmit gain offset. 
    						
    							  
    4-42
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring DSL Commands
    Configuration Example
    The following is a configuration example for the dsl command.
    interface ATM0
    no ip address
    no atm ilmi-keepalive
    dsl operating-mode auto
    dsl noise-margin 0
    dsl max-tone-bits 14
    dsl gain-setting tx-offset 0
    dsl gain-setting rx-offset 1
    Enabling the DSL Training Log
    The DSL training log feature is available on the following Cisco routers:
    Cisco 826 and 836
    Cisco 827, 827H, 827-4V, and 837
    Cisco 828
    By default, a DSL training log is retrieved each time the Cisco router establishes contact with the 
    DSLAM. The training log is a record of the events that occur when the router trains, or negotiates 
    communication parameters, with the DSLAM at the central office. However, retrieving this log adds 
    significant time to the training process, and retrieval is not always necessary after the router has 
    successfully trained. You must use the dsl enable-training-log command to enable the retrieval of this 
    log. The no form of this command disables retrieval of the DSL training log.
    dsl enable-training-log
    no dsl enable-training-log
    Retrieving the DSL Training Log and Then Disabling Further Retrieval of the Training Log
    Complete the following tasks to retrieve the training log, examine it, and then disable the router from 
    retrieving the training log the next time it trains with the DSLAM.
    Step 1Configure the router to retrieve the training log.
    a.Enter the global configuration mode interface ATM number command, where number is the number 
    of the ATM interface.
    b.Enter dsl enable-training-log to enable the retrieval of the training log.
    c.Enter end to leave router configuration mode.
    Step 2Unplug the DSL cable from the DSL socket on the back of the router, wait a few seconds, and then plug 
    the cable back in.
    Step 3When the “DSL line up” message appears, issue the show dsl int atm number command, where number 
    is the number of the ATM interface, to display the retrieved log. 
    Step 4When you decide that it is no longer necessary for the router to retrieve the training log, reconfigure the 
    router to disable the retrieval of the log by completing the following tasks:
    a.Enter the global configuration mode interface ATM number command, where number is the number 
    of the ATM interface. 
    						
    							  
    4-43
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring DSL Commands
    b.Enter no dsl enable-training-log to disable the retrieval of the training log.
    c.Enter end to leave router configuration mode.
    Selecting Secondary DSL Firmware
    This command is available on the following routers:
    Cisco 827, 827H, and 827-4V
    Cisco 837 routers.
    The ATM interface mode dsl firmware secondary command enables you to select the secondary DSL 
    firmware. 
    dsl firmware secondary
    To revert to using the primary firmware, enter the no form of this command.
    no dsl firmware secondary
    NoteThe router must retrain in order for the configuration changes to take effect. To retrain the line, you can 
    unplug the DSL cable from the DSL socket on the back of the router and then plug the DSL cable back 
    in again.
    You can use the show dsl interface atm number command to compare firmware versions in use before 
    retraining the DSL line, and after retraining.
    Output Example
    The following example output contains show dsl interface atm command output before the dsl 
    secondary firmware command is added to the configuration. 
    827-sus2#sh dsl int atm0
                     ATU-R (DS)                      ATU-C (US)
    Modem Status:   Showtime (DMTDSL_SHOWTIME)
    DSL Mode:       ITU G.992.1 (G.DMT)
    ITU STD NUM:    0x01                            0x01
    Vendor ID:      ALCB                          GSPN
    Vendor Specific:0x0000                          0x0002
    Vendor Country: 0x00                            0x00
    Capacity Used:  66%                             74%
    Noise Margin:   16.5 dB                         17.0 dB
    Output Power:    8.0 dBm                        12.0 dBm
    Attenuation:     0.0 dB                          4.0 dB
    Defect Status:  None                            None
    Last Fail Code: None
    Selftest Result:0x49
    Subfunction:    0x02
    Interrupts:     652 (1 spurious)
    Activations:    1
    SW Version:     3.8129
    FW Version:     0x1A04 
    						
    							  
    4-44
    Cisco 826, 827, 828, 831, 836, and 837 and Cisco SOHO 76, 77, 78, 91, 96, and 97 Routers Software Configuration Guide
    78-14565-03
    Chapter 4      Advanced Router Configuration
    Configuring DSL Commands
    After the dsl firmware secondary command is added to the configuration and retraining, the show dsl 
    interface ATM0 output shows that the software version has changed to 3.7123.
    827-sus2#sh dsl int atm0
                     ATU-R (DS)                      ATU-C (US)
    Modem Status:   Showtime (DMTDSL_SHOWTIME)
    DSL Mode:       ITU G.992.1 (G.DMT)
    ITU STD NUM:    0x01                            0x01
    Vendor ID:      ALCB                          GSPN
    Vendor Specific:0x0000                          0x0002
    Vendor Country: 0x00                            0x00
    Capacity Used:  71%                             74%
    Noise Margin:   18.0 dB                         17.0 dB
    Output Power:    7.5 dBm                        12.0 dBm
    Attenuation:     0.0 dB                          4.0 dB
    Defect Status:  None                            None
    Last Fail Code: None
    Selftest Result:0x00
    Subfunction:    0x02
    Interrupts:     1206 (2 spurious)
    Activations:    2
    SW Version:     3.7123
    FW Version:     0x1A04
    Configuration Example
    The following example shows configuration of a Cisco 827 router using secondary DSL firmware. 
    827-sus2#sh run
    Building configuration...
    Current configuration :738 bytes
    !
    version 12.2
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    no service dhcp
    !
    hostname 827-sus2
    !
    ip subnet-zero
    no ip domain-lookup
    !
    ip ssh time-out 120
    ip ssh authentication-retries 3
    !
    interface Ethernet0
     ip address 192.168.5.23 255.255.255.0
     no cdp enable
     hold-queue 100 out
    !
    interface Virtual-Template1
     ip address 2.2.3.4 255.255.255.0
    !
    interface ATM0
     no ip address
     no atm ilmi-keepalive
     pvc 1/40
      encapsulation aal5mux ppp Virtual-Template1
    !
     dsl operating-mode itu-dmt 
    						
    All Cisco manuals Comments (0)