Home > Cisco Systems > Router > Cisco Systems Router 1800 Series User Manual

Cisco Systems Router 1800 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Systems Router 1800 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 Cisco Systems manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
     
    8-3
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 8      Config uring a Simple Firewall
      Configure Access Lists
    Configure Access Lists
    Perform these steps to create access lists for use by the firewall, beginning in global configuration mode:
    CommandPurpose
    Step 1access-list access-list-number  {deny  | permit } 
    protocol source source-wildcard  [operator  [port ]] 
    destination
    Example:
    Router(config)#  access-list 103 permit host 
    200.1.1.1 eq isakmp any
    Router(config)# 
    Creates an access list which prevents Internet- 
    initiated traffic from reac hing the local (inside) 
    network of the router, and which compares 
    source and destination ports.
    See the  Cisco IOS IP Command Reference, 
    Volume 1 of 4: Addressing and Services for 
    details about this command.
    Step 2access-list  access-list-number  {deny  | permit } 
    protocol source source-wildcard destination 
    destination-wildcard
    Example:
    Router(config)#  access-list 105 permit ip 
    10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255
    Router(config)# 
    Creates an access list that allows network traffic 
    to pass freely between the corporate network 
    and the local networks through the configured 
    VPN tunnel.
    Configure Inspection Rules
    Perform these steps to configure firewall inspection rule s for all TCP and UDP traffic, as well as specific 
    application protocols as defined by the security  policy, beginning in global configuration mode:
    Command or ActionPurpose
    Step 1ip inspect name inspection-name protocol  
    Example:
    Router(config)# ip inspect name firewall tcpRouter(config)# 
    Defines an inspection rule for a particular 
    protocol.
    Step 2ip inspect name inspection-name protocol  
    Example:
    Router(config)# ip inspect name firewall rtsp
    Router(config)# ip inspect name firewall h323Router(config)# ip inspect name firewall 
    netshow
    Router(config)#  ip inspect name firewall ftpRouter(config)# ip inspect name firewall 
    sqlnet
    Router(config)# 
    Repeat this command for each inspection rule 
    that you wish to use. 
    						
    							
     
    8-4
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 8      Configuring a Simple Firewall
      Apply Access Lists and Inspection Rules to Interfaces
    Apply Access Lists and Insp ection Rules to Interfaces
    Perform these steps to apply the ACLs and inspection rules to the network interfaces, beginning in global 
    configuration mode:
    CommandPurpose
    Step 1interface type number
    Example:
    Router(config)#  interface vlan 1Router(config-if)# 
    Enters interface configuration mode for the 
    inside network interface on your router.
    Step 2ip inspect inspection-name  {in  | out }
    Example:
    Router(config-if)#  ip inspect firewall in
    Router(config-if)# 
    Assigns the set of firewall inspection rules to the 
    inside interface on the router.
    Step 3exit
    Example:
    Router(config-if)#  exitRouter(config)# 
    Returns to global configuration mode.
    Step 4interface type number
    Example:
    Router(config)#  interface fastethernet 0
    Router(config-if)# 
    Enters interface configuration mode for the 
    outside network interface on your router.
    Step 5ip access-group {access-list-number  | 
    access-list-name } {in | out } 
    Example:
    Router(config-if)#  ip access-group 103 in
    Router(config-if)# 
    Assigns the defined ACLs to the outside 
    interface on the router.
    Step 6exit
    Example:
    Router(config-if)# exitRouter(config)# 
    Returns to global configuration mode. 
    						
    							 
    8-5
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 8      Configuring a Simple Firewall
      Configuration Example
    Configuration Example
    A telecommuter is granted secure access to a corporate network, using IPSec tunneling. Security to the 
    home network is accomplished through firewall inspection. The protocols that are allowed are all TCP, 
    UDP, RTSP, H.323, NetShow, FTP, and SQLNet. There are no servers on the home network; therefore, 
    no traffic is allowed that is initiated from outside. IPSec tunneling secures the connection from the Home 
    LAN to the corporate network.
    Like the Internet Firewall Policy, HTTP need not be specified because Java blocking is not necessary. 
    Specifying TCP inspection allows for single-channel protocols such as Telnet and HTTP. UDP is 
    specified for DNS.
    The following configuration example shows a portion of the configuration file for the simple firewall 
    scenario described in the preceding sections.
    ! Firewall inspection is setup for all tcp and udp traffic as well as specific application 
    protocols as defined by the security policy.
    ip inspect name firewall tcpip inspect name firewall udp
    ip inspect name firewall rtsp
    ip inspect name firewall h323ip inspect name firewall netshow
    ip inspect name firewall ftp
    ip inspect name firewall sqlnet
    !interface vlan 1! This is the internal home network
    ip inspect firewall in ! inspection examines outbound traffic
    no cdp enable!
    interface fastethernet 0! FE0 is the outside or internet exposed interface.
    ip access-group 103 in ! acl 103 permits ipsec traffic from the corp. router as well as denies internet initiated traffic inbound.
    ip nat outside
    no cdp enable!
    ! acl 103 defines traffic allowed from the peer for the ipsec tunnel.
    access-list 103 permit udp host 200.1.1.1 any eq isakmpaccess-list 103 permit udp host 200.1.1.1 eq isakmp any
    access-list 103 permit esp host 200.1.1.1 any
    access-list 103 permit icmp any any ! allow icmp for debugging but should be disabled due to security implications.
    access-list 103 deny ip any any ! prevents internet initiated traffic inbound.
    ! acl 105 matches addresses for the ipsec tunnel to/from the corporate network.access-list 105 permit ip 10.1.1.0 0.0.0.255 192.168.0.0 0.0.255.255
    no cdp run
    ! 
    						
    							 
    8-6
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 8      Configuring a Simple Firewall
      Configuration Example 
    						
    							
    CH A P T E R
     
    9-1
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    9
    Configuring a Wireless LAN Connection
    The Cisco 1800 series integrated services fixed-configuration routers support  a secure, affordable, and 
    easy-to-use wireless LAN solution that combines  mobility and flexibility with the enterprise-class 
    features required by networking professionals. With  a management system based on Cisco IOS software, 
    the Cisco routers act as access points, and are Wi -Fi certified, IEEE 802.11a/b/g-compliant wireless 
    LAN transceivers.
    You can configure and monitor the routers using th e command-line interface (CLI), the browser-based 
    management system, or Simple Ne twork Management Protocol (SNMP) . This chapter describes how to 
    configure the router us ing the CLI. Use the interface dot11radio  global configuration CLI command to 
    place the device into radio configuration mode.
    See the  Cisco Access Router Wireless Configuration Guide  for more detailed information about 
    configuring these Cisco routers in a wireless LAN application.
    Figure 9-1 shows a wireless network deployment.
    Figure 9-1 Sample Wireless LAN 
    129282
    1
    2
    3
    4
    1Wireless LAN (with multiple networked devices)
    2Cisco 1800 series integrated services  router connected to the Internet
    3VLAN 1
    4VLAN 2
    In the configuration example that follows, a remote  user is accessing the Cisco 1800 series integrated 
    services router using a wireless connecti on. Each remote user has his own VLAN. 
    						
    							 
    9-2
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 9      Configuring a Wireless LAN Connection
      Configure the Root Radio Station
    Configuration Tasks
    Perform the following tasks to configure this network scenario:
     Configure the Root Radio Station
     Configure Bridging on VLANs
     Configure Radio Station Subinterfaces
    An example showing the results of these configuration tasks is shown in the section “Configuration 
    Example.”
    NoteThe procedures in this chapter assume that you have already configured basic router features as well as 
    PPPoE or PPPoA with NAT. If you have not performed these configurations tasks, see 
    Chapter 1, “Basic 
    Router Configuration,” Chapter 3, “Configuring PPP over Ethernet with NAT,” and Chapter 4, 
    “Configuring PPP over ATM with NAT,” as appropriate for your router. You may have also configured 
    DHCP, VLANs, and secure tunnels.
    Configure the Root Radio Station
    Perform these steps to create and configure the root radio station for your wireless LAN, beginning in 
    global configuration mode:
    CommandPurpose
    Step 1interface name number
    Example:
    Router(config)# interface dot11radio 0Router(config-if)# 
    Enters interface configuration mode for the 
    specified wireless interface.
    Step 2broadcast-key [[vlan vlan-id] change secs] 
    [membership-termination] [capability-change]
    Example:
    Router(config-if)# broadcast-key vlan 1 
    change 45
    Router(config-if)# 
    Specifies the time interval (in seconds) between 
    rotations of the broadcast encryption key used 
    for clients.
    NoteClient devices using static Wired 
    Equivalent Privacy (WEP) cannot use 
    the access point when you enable 
    broadcast key rotation—only wireless 
    client devices using 802.1x 
    authentication (such as Light Extensible 
    Authentication Protocol [LEAP], 
    Extensible Authentication 
    Protocol-Transport Layer Security 
    [EAP-TLS], or Protected Extensible 
    Authentication Protocol [PEAP]) can 
    use the access point.
    NoteThis command is not supported on 
    bridges.
    See the Cisco IOS Commands for Access Points 
    and Bridges document for more details. 
    						
    							 
    9-3
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 9      Configuring a Wireless LAN Connection
      Configure the Root Radio Station
    Step 3encryption method algorithm key
    Example:
    Router(config-if)# encryption vlan 1 mode 
    ciphers tkip
    Router(config-if)# 
    Specifies the encryption method, algorithm, and 
    key used to access the wireless interface.
    The example uses the VLAN with optional 
    encryption method of data ciphers.
    Step 4ssid name 
    Example:
    Router(config-if)# ssid ciscoRouter(config-if-ssid)# 
    Creates a Service Set ID (SSID), the public 
    name of a wireless network.
    NoteAll of the wireless devices on a WLAN 
    must employ the same SSID to 
    communicate with each other.
    Step 5vlan number
    Example:
    Router(config-if-ssid)# vlan 1
    Router(config-if-ssid)# 
    Binds the SSID with a VLAN.
    Step 6authentication type
    Example:
    Router(config-if-ssid)# authentication openRouter(config-if-ssid)# authentication 
    network-eap eap_methods
    Router(config-if-ssid)# authentication 
    key-management wpa
    Sets the permitted authentication methods for a 
    user attempting access to the wireless LAN.
    More than one method can be specified, as 
    shown in the example.
    Step 7exit
    Example:
    Router(config-if-ssid)# exit
    Router(config-if)# 
    Exits SSID configuration mode, and enters 
    interface configuration mode for the wireless 
    interface.
    Step 8speed rate
    Example:
    Router(config-if)# basic-1.0 basic-2.0 
    basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 
    36.0 48.0 54.0
    Router(config-if)# 
    (Optional) Specifies the required and allowed 
    rates, in Mbps, for traffic over the wireless 
    connection.
    Step 9rts [retries | threshold]
    Example:
    Router(config-if)# rts threshold 2312
    Router(config-if)# 
    (Optional) Specifies the Request to Send (RTS) 
    threshold or the number of times to send a 
    request before determining the wireless LAN is 
    unreachable.
    Command Purpose 
    						
    							 
    9-4
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 9      Configuring a Wireless LAN Connection
      Configure Bridging on VLANs
    Configure Bridging on VLANs
    Perform these steps to configure integrated routing and bridging on VLANs, beginning in global 
    configuration mode:
    Step 10power [client | local] [cck [number | maximum] | 
    ofdm [number | maximum]]
    Example:
    Router(config-if)# power local cck 50Router(config-if)# power local ofdm 30
    Router(config-if)# 
    (Optional) Specifies the radio transmitter power 
    level.
    See the Cisco Access Router Wireless 
    Configuration Guide for available power level 
    values.
    Step 11channel [number | least-congested]
    Example:
    Router(config-if)# channel 2462Router(config-if)# 
    (Optional) Specifies the channel on which 
    communication occurs.
    See the Cisco Access Router Wireless 
    Configuration Guide for available channel 
    numbers.
    Step 12station-role [repeater | root]
    Example:
    Router(config-if)# station-role root
    Router(config-if)# 
    (Optional) Specifies the role of this wireless 
    interface. 
    You must specify at least one root interface.
    Step 13exit
    Example:
    Router(config-if)# exitRouter(config)# 
    Exits interface configuration mode, and enters 
    global configuration mode.
    Command Purpose
    Command or ActionPurpose
    Step 1bridge [number | crb | irb |mac-address-table]
    Example:
    Router(config)# bridge irbRouter(config)# 
    Specifies the type of bridging.
    The example specifies integrated routing and 
    bridging.
    Step 2interface name number 
    Example:
    Router(config)# interface vlan 1
    Router(config)# 
    Enters interface configuration mode. 
    We want to set up bridging on the VLANs, so the 
    example enters the VLAN interface 
    configuration mode. 
    						
    							 
    9-5
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 9      Configuring a Wireless LAN Connection
      Configure Radio Station Subinterfaces
    Repeat Step 2 through Step 6 above for each VLAN that requires a wireless interface.
    Configure Radio Station Subinterfaces
    Perform these steps to configure subinterfaces for each root station, beginning in global configuration 
    mode:
    Step 3bridge-group number
    Example:
    Router(config)# bridge-group 1Router(config)# 
    Assigns a bridge group to the interface.
    Step 4bridge-group parameter
    Example:
    Router(config)# bridge-group 
    spanning-disabled
    Router(config)# 
    Sets other bridge parameters for the bridging 
    interface.
    Step 5interface name number
    Example:
    Router(config)# interface bvi 1
    Router(config)# 
    Enters configuration mode for the virtual bridge 
    interface.
    Step 6ip address address mask
    Example:
    Router(config)# ip address 10.0.1.1 
    255.255.255.0
    Router(config)# 
    Specifies the address for the virtual bridge 
    interface.
    Command or Action Purpose
    CommandPurpose
    Step 1interface type number
    Example:
    Router(config)# interface dot11radio 0.1
    Router(config-subif)# 
    Enters subinterface configuration mode for the 
    root station interface.
    Step 2description string
    Example:
    Router(config-subif)# description Cisco open
    Router(config-subif)# 
    Provides a description of the subinterface for the 
    administrative user. 
    						
    							 
    9-6
    Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
    OL-6426-02
    Chapter 9      Configuring a Wireless LAN Connection
      Configuration Example
    Repeat these steps to configure more subinterfaces, as needed.
    Configuration Example
    The following configuration example shows a portion of the configuration file for the wireless LAN 
    scenario described in the preceding sections.
    !
    bridge irb
    !interface Dot11Radio0
     no ip address
     ! broadcast-key vlan 1 change 45
     !
     ! encryption vlan 1 mode ciphers tkip 
     !
     ssid cisco    vlan 1
        authentication open 
        authentication network-eap eap_methods     authentication key-management wpa
     !
     ssid ciscowep    vlan 2
    Step 3encapsulation dot1q vlanID [native | 
    second-dot1q]
    Example:
    Router(config-subif)# encapsulation dot1q 1 
    native
    Router(config-subif)# 
    Enables IEEE 802.1q encapsulation on the 
    specified subinterface.
    Step 4no cdp enable
    Example:
    Router(config-subif)# no cdp enableRouter(config-subif)# 
    Disables the Cisco Discovery Protocol (CDP) on 
    the wireless interface.
    Step 5bridge-group number
    Example:
    Router(config-subif)# bridge-group 1
    Router(config-subif)# 
    Assigns a bridge group to the subinterface.
    Step 6exit
    Example:
    Router(config-subif)# exitRouter(config)# 
    Exits subinterface configuration mode, and 
    enters global configuration mode.
    Command Purpose 
    						
    All Cisco Systems manuals Comments (0)