Cisco Router 860, 880 Series User Manual
Here you can view all the pages of manual Cisco Router 860, 880 Series User Manual. The Cisco manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 1
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Cisco 860 and Cisco 880 Series Integrated Services Routers Software Configuration Guide Customer Order Number: Text Part Number: 78-xxxxx-xx
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE...
Page 3
iii Book Title 78-xxxxx-xx CONTENTS 78-xxxxx-xx i Preface xv Objective xv Audience xv Organization xvi Conventions xvii Related Documentation xviii Searching Cisco Documents xix Obtaining Documentation and Submitting a Service Request xix Overview/Getting Started CHAPTER 1Product Overview 1-1 General Description 1-1 Cisco 860 Series ISRs 1-1 4-port 10/100 FE LAN Switch 1-1 Security Features 1-2 802.11n Wireless LAN Option 1-2 Cisco 880 Series ISRs...
Page 4
Contents iv Book Title 78-xxxxx-xx Default Configuration 3-2 Information Needed for Configuration 3-4 Configuring Basic Parameters 3-5 Configuring Global Parameters 3-6 Configuring the Fast Ethernet LAN Interfaces 3-6 Configuring WAN Interfaces 3-6 Configuring a Wireless Interface 3-10 Configuring a Loopback Interface 3-10 Configuring Command-Line Access 3-12 Configuring Static Routes 3-14 Example 3-15 Verifying Configuration 3-15 Configuring Dynamic...
Page 5
Contents v Book Title 78-xxxxx-xx Restrictions for Configuring Cellular Wireless Interface 5-15 Configuring Data Account Provisioning 5-15 Configuring DDR 5-21 Configuring DDR Backup 5-23 Examples for Configuring Cellular Wireless Interfaces 5-26 Basic Cellular Interface Configuration 5-26 Tunnel over Cellular Interface Configuration 5-27 Cellular Wireless Modem as Backup with NAT and IPsec Configuration 5-27 Configuring Cellular Wireless Interface Data Line Backup...
Page 6
Contents vi Book Title 78-xxxxx-xx How to Configure Ethernet Switches 7-4 Configuring VLANs 7-4 Configuring Layer 2 Interfaces 7-6 Configuring 802.1x Authentication 7-6 Configuring Spanning Tree Protocol 7-6 Configuring MAC Table Manipulation 7-7 Configuring Cisco Discovery Protocol 7-7 Configuring the Switched Port Analyzer 7-7 Configuring Power Management on the Interface 7-8 Configuring IP Multicast Layer 3 Switching 7-8 Configuring IGMP Snooping 7-8...
Page 7
Contents vii Book Title 78-xxxxx-xx Service Set Identifier (SSID) 9-1 Understanding SSIDs 9-1 Multiple SSIDs on Wireless Devices in the Access Point Role 9-1 SSIDs on Wireless Devices in Other Roles 9-2 Configuring SSIDs 9-2 SSID Parameters 9-2 Using Spaces in SSIDs 9-2 Creating a Global SSID 9-3 Guest Mode SSID 9-4 Including an SSID in an SSIDL IE 9-5 Assigning IP Redirection for an SSID 9-6 Guidelines for Using IP Redirection 9-7 Configuring IP...
Page 8
Contents viii Book Title 78-xxxxx-xx Configuring Protected Ports 10-16 Configuring the Beacon Period and the DTIM 10-17 Configure RTS Threshold and Retries 10-17 Configuring the Maximum Data Retries 10-18 Configuring the Fragmentation Threshold 10-19 Enabling Short Slot Time for 802.11g Radios 10-19 Performing a Carrier Busy Test 10-19 Configuring VoIP Packet Handling 10-20 Cipher Suites and WEP 11-1 Understanding Cipher Suites and WEP 11-1 Configuring Cipher...
Page 9
Contents ix Book Title 78-xxxxx-xx Configuring a VLAN 13-4 Assigning Names to VLANs 13-6 Using a RADIUS Server to Assign Users to VLANs 13-7 Viewing VLANs Configured on the Access Point 13-8 VLAN Configuration Example 13-8 Using an Access Point as a Local Authenticator 14-1 Understanding Local Authentication 14-1 Configuring a Local Authenticator 14-2 Guidelines for Local Authenticators 14-2 Configuration Overview 14-2 Configuring the Local Authenticator Access...
Page 10
Contents x Book Title 78-xxxxx-xx Protecting Enable and Enable Secret Passwords with Encryption 17-5 Configuring Username and Password Pairs 17-7 Configuring Multiple Privilege Levels 17-7 Controlling Access Point Access with RADIUS 17-9 Default RADIUS Configuration 17-9 Configuring RADIUS Login Authentication 17-10 Defining AAA Server Groups 17-11 Configuring RADIUS Authorization for User Privileged Access and Network Services 17-13 Displaying the RADIUS Configuration...