Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 860, 880 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    6-17
    Book Title
    OL-xxxxx-xx
    Chapter 6      Configuring Security Features
      Configuring VPN
    Configuration Example
    The following configuration example shows a portion of the configuration file for a VPN using a GRE 
    tunnel scenario described in the preceding sections.
    !aaa new-model
    !
    aaa authentication login rtr-remote local
    Step 4tunnel destination default-gateway-ip-address
    Example:
    Router(config-if)# tunnel destination 
    192.168.101.1
    Router(config-if)# 
    Specifies the destination endpoint of the router for 
    the GRE tunnel.
    Step 5crypto map map-name
    Example:
    Router(config-if)# crypto map static-mapRouter(config-if)# 
    Assigns a crypto map to the tunnel.
    NoteDynamic routing or static routes to the 
    tunnel interface must be configured to 
    establish connectivity between the sites. 
    See the 
    Cisco IOS Security Configuration 
    Guide for details. 
    Step 6exit
    Example:
    Router(config-if)# exit
    Router(config)# 
    Exits interface configuration mode, and returns to 
    global configuration mode.
    Step 7ip access-list {standard | extended} ac-
    cess-list-name 
    Example:
    Router(config)# ip access-list extended 
    vpnstatic1
    Router(config-acl)# 
    Enters ACL configuration mode for the named 
    ACL that is used by the crypto map. 
    Step 8permit protocol source source-wildcard destina-
    tion destination-wildcard 
    Example:
    Router(config-acl)# permit gre host 
    192.168.100.1 host 192.168.101.1
    Router(config-acl)# 
    Specifies that only GRE traffic is permitted on the 
    outbound interface. 
    Step 9exit
    Example:
    Router(config-acl)# exitRouter(config)# 
    Returns to global configuration mode.
    Command or Action Purpose 
    						
    							 
    6-18
    Book Title
    OL-xxxxx-xx
    Chapter 6      Configuring Security Features
      Configuring VPN
    aaa authorization network rtr-remote localaaa session-id common
    !
    username cisco password 0 cisco!
    interface tunnel 1
    ip address 10.62.1.193 255.255.255.252
    tunnel source fastethernet 0
    tunnel destination interface 192.168.101.1
    ip route 20.20.20.0 255.255.255.0 tunnel 1
    crypto isakmp policy 1
    encryption 3desauthentication pre-share
    group 2
    !crypto isakmp client configuration group rtr-remote
    key secret-password
    dns 10.50.10.1 10.60.10.1domain company.com
    pool dynpool
    !
    crypto ipsec transform-set vpn1 esp-3des esp-sha-hmac!
    crypto ipsec security-association lifetime seconds 86400
    !crypto dynamic-map dynmap 1
    set transform-set vpn1
    reverse-route!
    crypto map static-map 1 ipsec-isakmp dynamic dynmap
    crypto map dynmap isakmp authorization list rtr-remotecrypto map dynmap client configuration address respond
    !
    ! Defines the key association and authentication for IPsec tunnel.crypto isakmp policy 1 
    hash md5 
    authentication pre-sharecrypto isakmp key cisco123 address 200.1.1.1
    !
    !! Defines encryption and transform set for the IPsec tunnel.
    crypto ipsec transform-set set1 esp-3des esp-md5-hmac 
    !! Associates all crypto values and peering address for the IPsec tunnel.
    crypto map to_corporate 1 ipsec-isakmp 
     set peer 200.1.1.1 set transform-set set1 
     match address 105
    !!
    ! VLAN 1 is the internal home network.
    interface vlan 1 ip address 10.1.1.1 255.255.255.0
     ip nat inside
     ip inspect firewall in ! Inspection examines outbound traffic.crypto map static-map
    no cdp enable
    !! FE4 is the outside or Internet-exposed interface
    interface fastethernet 4 
    						
    							 
    6-19
    Book Title
    OL-xxxxx-xx
    Chapter 6      Configuring Security Features
      Configuring VPN
     ip address 210.110.101.21 255.255.255.0 ! acl 103 permits IPsec traffic from the corp. router as well as 
     ! denies Internet-initiated traffic inbound. 
     ip access-group 103 in  ip nat outside
     no cdp enable
     crypto map to_corporate ! Applies the IPsec tunnel to the outside interface.!
    ! Utilize NAT overload in order to make best use of the 
    ! single address provided by the ISP.ip nat inside source list 102 interface Ethernet1 overload
    ip classless
    ip route 0.0.0.0 0.0.0.0 210.110.101.1no ip http server
    !
    !! acl 102 associated addresses used for NAT.
    access-list 102 permit ip 10.1.1.0 0.0.0.255 any
    ! acl 103 defines traffic allowed from the peer for the IPsec tunnel.access-list 103 permit udp host 200.1.1.1 any eq isakmp
    access-list 103 permit udp host 200.1.1.1 eq isakmp any
    access-list 103 permit esp host 200.1.1.1 any! Allow ICMP for debugging but should be disabled because of security implications.
    access-list 103 permit icmp any any 
    access-list 103 deny ip any any ! Prevents Internet-initiated traffic inbound.
    ! acl 105 matches addresses for the IPsec tunnel to or from the corporate network.access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255
    no cdp run 
    						
    							 
    6-20
    Book Title
    OL-xxxxx-xx
    Chapter 6      Configuring Security Features
      Configuring VPN 
    						
    							CH A P T E R
     
    7-1
    Book Title
    OL-xxxxx-xx
    7
    Configuring the Ethernet Switches
    This chapter gives an overview of configuration tasks for the 4-port Fast Ethernet (FE) switch, and for 
    the Gigabit Ethernet (GE) switch that services the embedded wireless access point on the Cisco
     860 and 
    Cisco
     880 series Integrated Services Routers (ISRs).
    The FE switches are 10/100Base T Layer 2 Fast Ethernet switches. Traffic between different VLANs on 
    a switch is routed through the router platform with the switched virtual interface (SVI).
    The GE switch is a 1000Base T Layer 2 Gigabit Ethernet switch, the internal interface between the router 
    and its embedded wireless access point.
    Any switch port may be configured as a trunking port to connect to other Cisco Ethernet switches.
    An optional power module can be added to Cisco 880 series ISRs to provide inline power to two of the 
    FE ports for IP telephones or external access points.
    This chapter contains the following sections:
     Switch Port Numbering and Naming, page 7-1
     Restrictions for the FE Switch, page 7-1
     Information About Ethernet Switches, page 7-2
     How to Configure Ethernet Switches, page 7-4
    Switch Port Numbering and Naming
    The ports on the FE switch are numbered FE0 through FE3. The port on the GE switch is named and 
    numbered Wlan-GigabitEthernet0.
    Restrictions for the FE Switch
    The following restrictions apply to the FE switch:
     The ports of an FE switch must NOT be connected to any Fast Ethernet onboard port of the router.
     On Cisco 880 series ISRs, inline power is supported only on FE switch ports FE0 and FE1. Inline 
    power is not supported on Cisco
     860 series ISRs.
     VTP pruning is not supported.
     The FE switch can support up to 200 secure MAC addresses. 
    						
    							 
    7-2
    Book Title
    OL-xxxxx-xx
    Chapter 7      Configuring the Ethernet Switches
      Information About Ethernet Switches
    Information About Ethernet Switches
    To configure Ethernet switches, you should understand the following concepts:
     VLANs and VLAN Trunk Protocol, page 7-2
     Inline Power, page 7-2
     Layer 2 Ethernet Switching, page 7-2
     802.1x Authentication, page 7-3
     Spanning Tree Protocol, page 7-3
     Cisco Discovery Protocol, page 7-3
     Switched Port Analyzer, page 7-3
     IGMP Snooping, page 7-3
     Storm Control, page 7-4
     Fallback Bridging, page 7-4
    VLANs and VLAN Trunk Protocol
    For information on the concepts of VLANs and VLAN Trunk Protocol (VTP), see the information at this 
    URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1047027
    Inline Power
    Inline power is not supported on the Cisco 860 series ISRs. On the Cisco_880 series ISRs, inline power 
    can be supplied to Cisco IP phones or external access points on FE switch ports FE0 and FE1. 
    A detection mechanism on the FE switch determines whether it is connected to a Cisco device. If the 
    switch senses that there is no power on the circuit, the switch supplies the power. If there is power on 
    the circuit, the switch does not supply it.
    You can configure the switch to never supply power to the Cisco device and to disable the detection 
    mechanism. 
    The FE switch also provides support for powered devices compliant with IEEE 802.3af.
    Layer 2 Ethernet Switching
    For information on the concept of Layer 2 Ethernet Switching, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1048478 
    						
    							 
    7-3
    Book Title
    OL-xxxxx-xx
    Chapter 7      Configuring the Ethernet Switches
      Information About Ethernet Switches
    802.1x Authentication
    For information on the concept of 802.1x Authentication, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1051006
    Spanning Tree Protocol
    For information on the concept of Spanning Tree Protocol, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1048458
    Cisco Discovery Protocol
    Cisco Discovery Protocol (CDP) runs over Layer 2 (the data link layer) on all Cisco routers, bridges, 
    access servers, and switches. CDP allows network management applications to discover Cisco devices 
    that are neighbors of already known devices, in particular, neighbors running lower-layer, transparent 
    protocols. With CDP, network management applications can learn the device type and the SNMP agent 
    address of neighboring devices. This feature enables applications to send SNMP queries to neighboring 
    devices.
    CDP runs on all LAN and WAN media that support Subnetwork Access Protocol (SNAP). Each 
    CDP-configured device sends periodic messages to a multicast address. Each device advertises at least 
    one address at which it can receive SNMP messages. The advertisements also contain the time-to-live, 
    or hold-time information, which indicates the length of time a receiving device should hold CDP 
    information before discarding it. 
    Switched Port Analyzer
    For information on the concept of Switched Port Analyzer, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1053663
    IGMP Snooping
    For information on the concept of IGMP Snooping, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1053727
    IGMP Version 3
    The Cisco 880 series ISRs support Version 3 of IGMP snooping.
    IGMPv3 provides supports for source filtering, which enables a multicast receiver host to signal to a 
    router which groups the receiver host wants to receive multicast traffic from, and from which sources 
    this traffic is expected. Enabling the IGMPv3 feature with IGMP snooping on Cisco ISRs provides Basic 
    IGMPv3 Snooping Support (BISS). BISS provides constrained flooding of multicast traffic in the 
    presence of IGMPv3 hosts. This support constrains traffic to approximately the same set of ports as 
    IGMPv2 snooping does with IGMPv2 hosts. The constrained flooding only considers the destination 
    multicast address. 
    						
    							 
    7-4
    Book Title
    OL-xxxxx-xx
    Chapter 7      Configuring the Ethernet Switches
      How to Configure Ethernet Switches
    Storm Control
    For information on the concept of storm control, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1051018
    Fallback Bridging
    For information on the concept of fallback bridging, see the information at this URL:
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t4/feature/guide/gt1636nm.html#wp1054833
    How to Configure Ethernet Switches
    See the following sections for configuration tasks for Ethernet switches. 
     Configuring VLANs, page 7-4
     Configuring Layer 2 Interfaces, page 7-6
     Configuring 802.1x Authentication, page 7-6
     Configuring Spanning Tree Protocol, page 7-6
     Configuring MAC Table Manipulation, page 7-7
     Configuring Cisco Discovery Protocol, page 7-7
     Configuring the Switched Port Analyzer, page 7-7
     Configuring Power Management on the Interface, page 7-8
     Configuring IP Multicast Layer 3 Switching, page 7-8
     Configuring IGMP Snooping, page 7-8
     Configuring Per-Port Storm Control, page 7-9
     Configuring Fallback Bridging, page 7-9
     Configuring Separate Voice and Data Subnets, page 7-9
     Managing the Switch, page 7-10
    Configuring VLANs 
    This section provides information on how to configure VLANs. The Cisco 860 series ISRs support 2 
    VLANs. and the Cisco
     880 series ISRs support 8 VLANs.
     VLANs on the FE Ports, page 7-4
     VLANs on the GE Port, page 7-5
    VLANs on the FE Ports
    Perform these steps to configure VLANs, beginning in configuration mode. 
    						
    							 
    7-5
    Book Title
    OL-xxxxx-xx
    Chapter 7      Configuring the Ethernet Switches
      How to Configure Ethernet Switches
    For additional information, see the information at the following URL:
    http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/layer2.ht
    ml
    VLANs on the GE Port
    Because the GE port is an internal interface that services only the router’s embedded access point, it 
    cannot be configured only with the command switchport access vlan X, where X is other than 1. It may, 
    however, be configured in trunk mode. This may be done by performing the following steps, beginning 
    in configuration mode.
    CommandPurpose
    Step 1interface fe portSelects the Fast Ethernet port to configure.
    Step 2shutdown(Optional) Shuts down the interface to prevent 
    traffic flow until configuration is complete.
    Step 3switchportConfigures the Fast Ethernet port for Layer 2 
    switching.
    NoteYou must enter the switchport command 
    once without any keywords to configure 
    the Fast Ethernet port as a Layer 2 port 
    before you can enter additional switchport 
    commands with keywords. This command 
    creats a Cisco default VLAN.
    This configuration sets the default 
    trunking administrative mode to 
    switchport mode dynamic desirable 
    and the trunk encapsulation to negotiate.
    By default, all VLANs created are 
    included in the default trunk.
    Step 4switchport access vlan vlan_idCreates instances of additional VLANs. 
    Allowable values of vlan_id are 2 to 4094, except 
    for reserved values of 1002 to 1005.
    Step 5no shutdownActivates the interface.
    Step 6endExits configuration mode.
    ComandPurpose
    Step 1interface Wlan-GigabitEthernet0Selects the Gigabit Ethernet port to configure.
    Step 1switchport mode trunkPlaces the port in trunk mode.
    Step 1switchport access vlan vlan_id(Optional) Once the port is in trunk mode, it may 
    be assigned a VLAN number other than 1. 
    						
    							 
    7-6
    Book Title
    OL-xxxxx-xx
    Chapter 7      Configuring the Ethernet Switches
      How to Configure Ethernet Switches
    Configuring Layer 2 Interfaces
    For information on how to configure Layer 2 interfaces, see the following URL: 
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t8/feature/guide/esw_cfg.html#wp1047041
    The URL contains information on the following topics:
     Configuring a range of interfaces
     Defining a range macro
     Configuring Layer 2 optional interface features
    Configuring 802.1x Authentication
    For information on how to configure 802.1x port-based authentication, see the following URL: 
    http://www.cisco.com/en/US/docs/ios/12_4t/12_4t11/ht_8021x.html
    The URL contains information on the following topics:
     Understanding the default 802.1x configuration
     Enabling 802.1x Authentication
     Configuring the switch-to-RADIUS-server comunication
     Enabling periodic reauthentication
     Changing the quiet period
     Changing the switch-to-client retransmission time
     Setting the switch-to-client frame-retransmission number
     Enabling multiple hosts
     Resetting the 802.1x configuration to default values
     Displaying 802.1x statistics and status
    Configuring Spanning Tree Protocol
    For information on how to configure Spanning Tree Protocol, see the following URL: 
    http://www.cisco.com/en/US/docs/ios/12_3t/12_3t8/feature/guide/esw_cfg.html#wp1047906
    The URL contains information on the following topics:
     Enabling spanning tree
     Configuring spanning tree port priority
     Configuring spanning tree port cost
     Configuring the bridge priority of a VLAN
     Configuring the Hello Time
     Configuring the forward-delay time for a VLAN
     Configuring the maximum aging time for a VLAN
     Disabling spanning tree  
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 860, 880 Series User Manual