![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
This appendix provides quick reference configurations for the advanced Cisco AS5800 user and system administrator who need to rapidly modify system functionality or enhance system performance. Interface and/or protocol configurations addressed in this section are listed categorically and sequenced logically by operation.
Remember, Cisco routers are configured using a command line interface (CLI) from a user interface, known as a port, that provides hardware connectivity. Routers are accessed from the routers console port or by Telnetting into the routers interface from another host. A command interpreter, called EXEC, is employed by the operating system to translate and execute Cisco IOS commands. This command interpreter provide the user with privileged mode of access that promotes security to the respective command levels, restricting users to a subset of mode-specific commands.
(5800>)
provides restricted access and limits router configuration or troubleshooting. At this level, miscellaneous functionality is performed, such as viewing system information, obtaining basic router status, changing terminal settings, or establishing remote device connectivity.(5800#)
includes user mode functionality and provides unrestricted access. It is used exclusively for router configuration, debugging, setting operating system (OS) parameters, and retrieving detailed router status information.[5800(config-if)#].
Each configuration command mode restricts the user to a subset of mode-specific commands that individualize and secure a router.(> or rommon>)
is a CLI allowing router configuration if the router does not find a valid system image or if the bootup sequence is interrupted during startup.
The end (Ctrl-Z) command provides an escape from any configuration command mode: Terminal [5800(config)#],
Interface [5800(config-if)#],
Line [5800(config-line)#],
Controller [5800(config-controll)#],
Router [5800(config-router)#], etc.,
to privileged EXEC mode (5800#).
The exit command provides an escape from any configuration command mode to one command prompt level higher, or completely out of the command line interface if you are in privileged EXEC or user EXEC mode. The disable command provides an escape from privileged EXEC mode to user EXEC mode. The logout command provides a complete escape out of the command line interface if you are in privileged EXEC or user EXEC mode.
This section provides abridged interface and/or protocol configurations listed categorically and sequenced logically by operation. Each functional component is dependent on previous component configurations and includes the following reference information:
Cisco AS5800 operational configurations are provided for the following functional components.
7. AAA
8. Modem Pools
9. TTY Line
10. Async Interface
11. Dial Interface
12. IP Address Pools
13. Virtual Template
14. SGBP
15. VPDN
16. SNMP
17. Virtual Profiles
18. Multilink Virtual Template
19. V.120 Support
20. VoIP
22. Finalizing Operational Configurations
Egress interfaces are network connections, or ports, used for outbound traffic flow.
The following requisites are significant considerations to identify before configuring an egress interface:
The following Cisco IOS CLI script serves as a sample egress interface configuration or setup.
Assigns a primary IP address and subnet mask to the interface.
Disables the translation of directed broadcast to physical broadcasts. It drops the directed broadcasts destined for this subnet.
Turns off IP multicast fast switching.
Disables CDP (Cisco Discovery Protocol).
Exits interface configuration mode to global configuration mode.
Global configuration mode prompt.
Loopback interface is a logical interface on the router that can be used for diagnostics and troubleshooting purposes. It is also used to conserve address space so other physical interfaces can be unnumbered to this interface. The state of the Loopback interface is always UP/UP.
The following requisite is significant consideration to identify before configuring a loopback interface:
The following Cisco IOS CLI script serves as a sample loopback configuration or setup.
Assigns an IP address to the interface.
Disables the translation of directed broadcast to physical broadcasts.
Exits this interface configuration mode to global configuration mode.
Global configuration mode prompt.
Routing protocol that accomplishes routing through the implementation of a specific routing algorithm. Examples of routing protocols include: RIP, IGRP, EIGRP, OSPF, and BGP.
The following requisites are significant considerations to identify before configuring routing protocols:
The following Cisco IOS CLI script serves as a sample routing protocol configuration or setup.
Defines the routing protocol used on the router and initiates the routing protocol processes.
Defines the protocol version used. Enables sending and receiving of Version 2 RIP packets.
Enables the redistribution of static routes in routing updates. Advertises static routes (including per-user static routes downloaded from RADIUS or TACACS+).
Defines the Group-Async interface as a passive interface so no routing updates are sent out of these interfaces. Disables sending of updates across the interface and places the interface in listen mode.
Defines the Virtual-Template as a passive interface so no routing updates are send out the Virtual-Access interfaces that are cloned off the Virtual-Template.
Defines the Dialer interface as a passive interface.
Defines the Loopback interface as a passive interface.
Enables advertisement of interfaces in this network. Defines 10.0.0.0 network as part of the RIP routing process. The router exchanges routing updates about the 10.0.0.0 network dynamically.
Defines 172.16.0.0 network as part of the RIP routing process. Updates regarding this network are exchanged dynamically between this router and its neighbors.
Turns off route summarization, so updates are not summarized to classful boundaries.
Exits the router configuration mode to global configuration mode.
Defines a default route for this router. If the router does not have an address in its routing table, the table forwards the packets to this IP address. Default route for destinations are not learned through the routing protocol.
Interfaces used for inbound traffic flow.
The following requisites are significant considerations to identify before configuring ingress interfaces:
The following Cisco IOS CLI script serves as a sample T3 ingress interface configuration or setup.
Defines the ISDN switch-type to be used on the router. This is a global command but can also be configured under the D-channel in later versions of Cisco IOS software.
Identifies controller type and number to be configured. The controller type is a T3 and the controller is in shelf 1, slot 0, port 0.
Enables m23 framing. Sets the framing type under the T3 controller.
Sets the cable length to 224 feet.
Enables the first T1 in the T3. Configures individual T1 controllers under the T3 controller. Range is 1-28.
Enables the second T1 in the T3. Configures individual T1 controllers under the T3 controller. Range is 1-28.
Configures additional individual T1 controllers under the T3 controller. Range is 1-28.
Exits this controller configuration mode to global configuration mode.
Global configuration mode prompt.
The following Cisco IOS CLI script serves as a sample T1 ingress interface configuration or setup.
Configures the first T1 on the T3 card in slot 0. Enters the controller configuration mode and configures controller t1 1 under the T3 controller.
Enables T1 Extended Superframe Framing. Sets framing to Extended Super Frame (ESF).
Enable Binary 8 Zero Substitution line coding. Sets the line coding to Binary 8 Zero Substitution (B8ZS).
Configures the controller for ISDN PRI on time slots 1 through 24. Time slot 24 is the D-channel.
Configures the second T1 on the T3 card in slot 0. Configures controller t1 2 under the T3 controller.
Sets framing to Extended Super Frame (ESF).
Configures the controller for ISDN PRI on time slots 1 through 24. Time slot 24 is the D-channel.
Exits controller configuration mode to global configuration mode.
Global configuration mode prompt.
When configuring a router for signaling, line signaling can be used for both inbound and outbound calls. The line signaling configuration must match the corresponding telco switch configuration.
The following requisites are significant considerations to identify before configuring line signaling:
The following Cisco IOS CLI script serves as a sample ISDN line signaling configuration or setup.
Configures the ISDN switch-type that the access server is connected to.
Configures the first T1 on slot 0.
Enables this T1 to use ISDN PRI signaling on all 24 timeslots.
Exits controller configuration mode to global configuration mode.
Global configuration mode prompt.
The following Cisco IOS CLI script serves as a sample CAS line signaling configuration or setup.
Enters the controller configuration mode.
Sets framing to Extended Super Frame (ESF).
Sets the line coding to Binary 8 Zero Substitution (B8ZS).
Configures this T1 CAS line to use E&M feature-group B signaling on all 24 timeslots.
Exits controller configuration mode to global configuration mode.
This is the 24th timeslot on T1/PRI or the 16th timeslot on E1/PRI and is used for signaling information. Call setup and tear down information is sent over the D-channel.
The following requisites are significant considerations to identify before configuring ISDN D-Channels:
The following Cisco IOS CLI script serves as a sample ISDN D-Channel configuration or setup.
Defines the D-channel to configure. Configure the D-channel on controller T1 1 under the T3 controller in shelf 1, slot 0, and port 0.
Not assigning an IP address on the D-channel.
Disables the translation of directed broadcast to physical broadcasts
Sets the encapsulation type to PPP.
Configures the D-channel for rotary-group. Make this interface a member of the Dialer 0 rotary interface. This is legacy DDR configuration and it assigns the physical interface serial 1/0/0:1:23 to rotary-group 0.
Sets the ISDN switch-type to primary-5ess.
Incoming voice calls should be handed off to the CSM and terminated on a modem. Accept speech (voice) bearer-type calls and route them to a voice or modem resource.
Disables Cisco Discovery Protocol (CDP). If an incoming speech call cannot be terminated because all voice/modem resources are in use, disconnect the call with a cause code of user-busy.
Exits interface configuration mode to global configuration mode.
Triple A security in billing that stands for Authentication, Authorization and Accounting.
The following requisites are significant considerations to identify before configuring AAA:
For detailed AAA configuration information, refer to Authentication, Authorization, and Accounting (AAA), available online at
http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_c/scprt1/
The following AAA server options are significant network design considerations:
For detailed RADIUS Server configuration information, refer to RADIUS Commands, available online at
http://www.cisco.com/univercd/cc/td/doc/product/software/ios113ed/113ed_cr/secur_r/srprt2/
The following Cisco IOS CLI script serves as a sample AAA authentication configuration or setup.
Turns on the AAA process on a Cisco router. Enables the AAA security paradigm.
Configure an authentication method list called CONSOLE that requires no authentication. Defines the login authentication method for EXEC users. The method list is called CONSOLE and it points to none so there is no authentication for method list CONSOLE.
Configures an authentication method list called LOCAL that consults the local database of user names and passwords.
Defines the login authentication for method list USE-RADIUS that points to RADIUS server. User will be authenticated against the RADIUS database. Configure an authentication method list called USE-RADIUS that uses the global RADIUS server list. If the RADIUS servers do not respond, then fallback to the local user database.
Defines the login authentication for method list USE-TACACS that point to TACACS+ server. Users will be authenticated against the TACACS+ database. Configure an authentication method list called USE-TACACS that uses the global TACACS+ server list. If the TACACS+ servers do not respond, fallback to using the enable password.
Defines the authentication method for enable privilege on the router. The method list is called "default" and it points to the enable password defined on the router and then to the TACACS+ server.
Defines the authentication method for PPP users. Method list is called "USE-RADIUS" and it points to the radius server if authentication is required. The "if-needed" option states that if users have already been authenticated then do not re-authenticate them. Configure an authentication method list called USE-RADIUS that uses the global RADIUS server list.
Defines the username and password locally on the router for local authentication. Configure a local user account to authenticate when the RADIUS server is not available.
The following Cisco IOS CLI script serves as a sample AAA authorization configuration or setup.
Configures an authorization method list called USE-RADIUS that uses the global RADIUS server list. EXEC authorization is required to process per-user attribute such as autocommands. Defines the authorization method for EXEC (shell). Method list is called "USE-RADIUS" and it points to the radius server. If the radius server does not respond, the user, if authenticated, is automatically authorized due to the "if-authenticated" option.
Configure an authorization method list called USE-TACACS that uses the global TACACS+ server list. EXEC authorization is required to process per-user attribute such as autocommands. Defines the authorization method for EXEC (shell). Method list is called "USE-TACACS" and it points to the TACACS+ server. If the TACACS+ server does not respond, the user, if authenticated, is automatically authorized due to the "if-authenticated" option.
Defines the authorization method for network services (PPP, SLIP, ARAP). Method list is called "default" and it points to the radius server. If the radius server does not respond the user, if already authenticated, will be automatically authorized due to the "if-authenticated" option.
Defines the authorization method for network services (PPP, SLIP, ARAP). Method list is called "USE-RADIUS" and it points to the radius server. If the radius server does not respond the user, if already authenticated, will be automatically authorized due to the "if-authenticated" option.
The following Cisco IOS CLI script serves as a sample AAA accounting configuration or setup.
Do not generate accounting records for users with a null-username.
Generates accounting records for EXEC (shell) service. Start and Stop records should be generated without wait. Radius server is being used for this accounting. This enables accounting records for all EXEC sessions. The accounting record will be sent at the beginning and the end of the EXEC session. The record will be sent to the global RADIUS server list.
Generates accounting records for network services (PPP, SLIP, ARAP). Start and Stop records should be generated without wait. Radius server is being used for this accounting. This enables accounting records for all network sessions (PPP/SLIP). The accounting record will be sent at the beginning and the end of the network session. The record will be sent to the global RADIUS server list.
Generates accounting records for systems events. Start and Stop records should be generated using the Radius server. This enables accounting records for system events. The accounting record will be sent when the access server is booted and when accounting is turned on or off. The record will be sent to the global RADIUS server list.
The following Cisco IOS CLI script serves as a sample AAA Radius Server configuration or setup.
Defines the radius server IP address and the authentication (UDP 1645) and accounting (UDP 1646) ports. The non-standard option enable the parsing of attributes that violate the RADIUS standard.
Defines a RADIUS server at IP address a.b.c.d, with authentication being done on UDP port x and accounting being done on UDP port y. The key "mysharedsecret" is used to encrypt the wire password.
Defines the time to stop using a server that does not respond. The time is defined in minutes.
Defines the time to wait for a RADIUS server to reply. The time is defined in seconds.
Specifies the number of retries to active server.
Sets the format of the NAS-Port attribute to "c" which means:
Data format(bits): shelf(2), slot(4), port(5), channel(5).
The following Cisco IOS CLI script serves as a sample TACACS Server configuration or setup.
Defines a TACACS+ server at IP address a.b.c.d. The key "mysharedsecret" is used to encrypt the all transactions with the TACACS+ server on the wire.
The modem pool covers a specified range of modems that accept calls based on the number called by dial in users. If there is only one dialin number, then all modems can be defined under the default modem pool. It is also used for modem firmware upgrades.
The following requisites are significant considerations to identify before configuring modem pools:
For information, refer to Modem Management Commands, available online at
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/dial_r/drprt1/drmodmgt.htm
The following Cisco IOS CLI script serves as a sample modem pool configuration or setup.
Defines the default modem pool by creating a new modem pool called "Default".
Defines the pool range for the modems to be included in the modem pool. The modem pool spans all modems between 1/2/00 and 1/11/143. Empty slots are ignored.
Defines the firmware to be loaded onto the modems. Configures all modems within a modem-pool to run version 2.6.2.0 of Portware.
Exits from the configuration mode.
Disables the modem recovery process. Disables the automatic recovery of faulty modems. Modem recovery may be enabled if you are temporarily working around a specific problem of hung modems.
Generates a Terse Modem Call Record at the end of a call. Enables modem call records logging that provide detailed connection information, which aids in troubleshooting call failure patterns.
These are asynchronous lines on the router. TTY is a line configuration, not an interface configuration. These lines correspond to async interfaces that are configured separately.
The following requisites are significant considerations to identify before configuring a TTY line:
The following Cisco IOS CLI script serves as a sample TTY line configuration or setup.
Defines the range for lines to be configured.
Defines the location of the async line.
Sets the EXEC-timeout under the line to indefinite.
Sets line to allow PPP autoselection. Enables the automatic the detection of PPP packets.
Automatically selects at the Username/Password prompt. Present the login prompt before beginning autoselect process.
Defines the authentication method for login and points it to the "USE-RADIUS" list defined in the AAA process. Configures EXEC authentication on this line to use the USE-RADIUS method list.
Defines the authorization method for EXEC service and point it to the "USE-RADIUS" list defined in the AAA process. Configures EXEC authorization on the line to use the USE-RADIUS method list.
Configures the line to allow a modern modem to dial-in (dial-out not allowed).
Turns off the rs232 log events. Does not log EIA/TIA-232 events in the modem log.
Sets the preferred protocol to none. Does not try to auto-connect the user to a host with a particular protocol.
Exits line configuration mode to global configuration mode.
Asychronous interface is used to terminate analog (async) dialin calls.
The following requisites are significant considerations to identify before configuring an async interface:
The following Cisco IOS CLI script serves as a sample async interface configuration or setup.
Creates a group-async interface used to configure all the async interfaces at one time.
Unnumbers the interface to the IP address of loopback 0 interface.
Sets the default encapsulation type to PPP.
Enables dial on demand routing on this interface. Establishes a dialer interface.
Defines the idle-timeout under the interface. If the call is idle for 45 minutes (2700 seconds) then the command disconnects the user. Default is 120 seconds.
Assigns interface to dialer-list 1. Use dialer-list 1 to determine what kind of traffic is valid.
Allows the user to run PPP or SLIP on this interface. Line may be switched between interactive use and async interface.
Disables the processing of Network Time Protocol (NTP) on this interface.
Disables SNMP LINKUP and LINKDOWN traps. Do not send SNMP traps when this interface goes up or down.
Use IP pool mechanism to allocate a peer IP address. The pool in this case is called "default".
Disables Cisco Discovery Protocol (CDP) on this interface.
Defines the authentication protocol (PAP) to be used for authenticating incoming calls only. The USE-RADIUS list is defined in the AAA process. PPP clients must authenticate themselves using the Password Authentication Protocol. Authentication will be done using the USE-RADIUS method list.
Configures the interface for multilink. Enable this interface to negotiate PPP multilink.
Defines the group-range for interface to be covered under this group-async interface. Apply this configuration to interfaces from Async1/2/00 to Async1/11/143.
Exits interface configuration mode to global configuration mode.
Global configuration mode prompt.
These interfaces are used for ending digital calls. Dialer interfaces are also used for async calls.
The following requisites are significant considerations to identify before configuring a dial interface:
The following Cisco IOS CLI script serves as a sample dial interface configuration or setup.
Defines the dialer interface. Creates a dialer interface used to configure all dialer interfaces at one time.
Unnumbers the interface to the IP address of loopback 0 interface.
Sets the default encapsulation type to PPP.
Turns off fast switching for multicast traffic.
Enables dial on demand routing on this interface. Enables this interface to be a dialer interface.
Defines the idle-timeout under the interface. If the call is idle for 45 minutes (2700 seconds) then the command disconnects the user. Default is 120 seconds.
Assigns interface to dialer-list 1. Use dialer-list 1 to determine what kind of traffic is considered interesting.
Disables the processing of Network Time Protocol (NTP) on this interface.
Disables SNMP LINKUP and LINKDOWN traps. Do not send SNMP traps when this interface goes up or down.
Use IP pool mechanism to allocate a peer IP address. The pool in this case is called "default".
Disables Cisco Discovery Protocol (CDP) on this interface.
Defines the authentication protocol (PAP) to be used for authenticating incoming calls only. The USE-RADIUS list is defined in the AAA process. PPP clients must authenticate themselves using the Password Authentication Protocol. Authentication will be done using the USE-RADIUS method list.
Configures the interface for multilink. Enable this interface to negotiate PPP multilink.
Exits interface configuration mode to global configuration mode.
Configures dialer-list 1 to consider all IP traffic as interesting.
Administratively defined numeric group of available internet protocol (IP) network device identifier. Range of numeric IP addresses set aside for a specific allocation purpose, such as DHCP. As clients connect to the Network Access Server (NAS), they request and are assigned an IP address from the configured IP address pool.
The following requisites are significant considerations to identify before configuring an IP address pool:
The following Cisco IOS CLI script serves as a sample IP address pool configuration or setup.
Defines the IP address for the DHCP server. Cisco IOS queries this particular DHCP server (instead of broadcasting on all interfaces) when it needs to get an address for a client from DHCP.
Defines the IP address pool for network 1.1.1.0. The range is from 1 to 254 as 255 is a broadcast address. Configures a local address pool called "default" with addresses spanning 1.1.1.1 to 1.1.1.255.
Defines the IP address pool for network 1.1.2.0. The range is from 1 to 254 since 255 is a broadcast address. Appends the address range 1.1.2.1 to 1.1.2.255 to the address pool called "default".
Defines the IP address pool for network 1.1.2.0. The range is from 1 to 254 since 255 is a broadcast address. Appends the address range 21.21.21.1 to 21.21.21.255 to the address pool called "default".
Defines the IP address pool for network 1.1.2.0. Range is from 1 to 64. Configures a local address pool called "1" with the address spanning from 10.100.1.1 to 10.100.1.64.
Defines the IP address pool for network 1.1.2.0. The range is from 1 to 254 since 255 is a broadcast address. Appends the address range 172.16.18.1 to 172.17.18.255 to the address pool called "1".
Virtual Templates are used for cloning virtual-access interfaces for inbound calls.
The following requisites are significant considerations to identify before configuring a virtual template:
The following Cisco IOS CLI script serves as a sample virtual template configuration or setup.
Defines the Virtual-Template interface used for cloning virtual-access interfaces.
Unnumbers the interface to the IP address of loopback 0 interface.
Disables the translation of directed broadcast to physical broadcasts. It drops the directed broadcasts destined for this subnet.
Turns off fast switching for multicast traffic.
Disables the processing of Network Time Protocol (NTP) on this interface.
Disables SNMP LINKUP and LINKDOWN traps. Do not send SNMP traps when this interface goes up or down.
Defines the authentication protocol (PAP) to be used for authenticating incoming calls only. The USE-RADIUS list is defined in the AAA process. PPP clients must authenticate themselves using the Password Authentication Protocol. Authentication will be done using the USE-RADIUS method list.
Configures the interface for multilink. Enables this interface to negotiate PPP multilink.
Exits interface configuration mode to global configuration mode.
Stack Group Bidding Protocol (SGBP) is a protocol used for configuring Multichassis multilink PPP.
The following requisites are significant considerations to identify before configuring SGBP:
The following Cisco IOS CLI script serves as a sample SGBP configuration or setup.
Defines the username and password for the SGBP stack group. Configures a shared secret for the SGBP group name that will be used to authenticate peers into the stack group.
Defines "sg-group" as the sgbp stack group name.
Defines the source IP address for the SGBP stack. Forces the NAS to source the SGBP packets from the loopback0 interface.
Defines the SGBP member "nas01" and its IP address. Statically configures the peer, name, and IP addresses of other peers in the stack group.
Defines the member "nas02" and its IP address. Statically configures the peer, name, and IP addresses of other peers in the stack group.
Virtual Private Dialup Network (VPDN) enables forwarding of PPP links from an Internet Service Provider (ISP) to a Home Gateway. L2TP and L2F are common options for tunneling protocol.
The following requisites are significant considerations to identify before configuring VPDN:
The following Cisco IOS CLI script serves as a sample VPDN configuration or setup.
Enables VPDN on the router. Enables the processing of VPDN calls. VPDN calls are determined either by a special DNIS number or a special format to the username.
Configures the order for searching different VPDN tunnel types. It looks for DNIS based tunnels first and then looks for DOMAIN based tunnels.
Simple Network Management Protocol (SNMP) is used for monitoring and managing network devices.
The following requisites are significant considerations to identify before configuring SNMP:
The following Cisco IOS CLI script serves as a sample SNMP configuration or setup.
Enables SNMP and sets community string and access privileges for public to read-only. Allows users with the public community string to read-only.
Sets community string and access privileges for private to read-write. Allows users with the private community string to read and write.
Enables SNMP environmental monitor traps. Sends an SNMP trap when the router detects an anomaly in the environmental conditions.
Enables SNMP syslog traps. Sends traps to the syslog server.
Specifies host 9.9.9.9 to receive SNMP notifications for public. Defines the SNMP server and community string.
Specifies host 10.10.10.10 to receive SNMP notifications for public. Defines the SNMP server and community string.
Virtual Profiles is a unique Point-to-Point application. It can create and configure a virtual access interface dynamically when a dial-in call is received, and tear down the interface dynamically when the call ends.
The following requisites are significant considerations to identify before configuring a virtual profile:
The following Cisco IOS CLI script serves as a sample virtual profile configuration or setup.
Enables virtual profiles by virtual interface template. Creates a virtual-access interface for every user that is connected to the access server. This is necessary when applying certain per-user attributes (such as timeouts).
Enables virtual profiles by AAA configuration. Allows the installation of per-user configurations specified by the interface-config attributes in a user's TACACS+/RADIUS profile.
A virtual template from which the specified Multilink PPP bundle can clone its interface parameters.
The following requisites are significant considerations to identify before configuring a multilink virtual template:
The following Cisco IOS CLI script serves as a sample multilink virtual template configuration or setup.
Defines a virtual template used to clone parameters for a virtual access interface for Multilink PPP. Allows the virtual-access interface for a user to clone form the virtual-template interface in case there is no physical/dialer interface to clone from. This is necessary on all stack group members.
Uses peer's authenticated name and endpoint discriminator for naming multilink bundles. Sets the router to uniquely identify this multilink session through a combination of the authentication username and the endpoint discriminator. This is necessary when multiple users are dialing in with the same username.
The following Cisco IOS CLI script serves as a sample V.120 configuration or setup.
Defines the serial interface to configure.
Configures the router to automatically switch between ISDN PPP users and ISDN V.120 users. Creates new VTY's for V.120 users to start on.
Creates new VTY's for V.120 users to start on.
Only allows V.120 users to connect to this VTY.
Configures EXEC authentication on this line to use the USE-RADIUS method list.
Configures EXEC authorization on the line to use the USE-RADIUS method list.
Exits line configuration mode to global configuration mode.
Return to global configuration mode.
A technology used to transport voice traffic over the Internet using the existing IP network infrastructure. For sample configurations and command line descriptions, refer to Voice Over IP for the Cisco AS5800, available online at
http://www.cisco.com/univercd/cc/td/doc/product/access/nubuvoip/
These following parameters are defined in global configuration mode on the router.
The following Cisco IOS CLI script serves as sample configurations or setups for global parameters.
Turns on millisecond timestamps for debugs. The debugs are printed with a date and time in millisecond timestamps. Enables debugs to be timestamped with millisecond resolution. This is critical to have when sending in debug traces to the TAC.
Turns on millisecond timestamps for log messages. Log messages are printed with a date and time in millisecond timestamps. Enables log messages to be timestamped with millisecond resolution. This is critical to have when sending in debug traces to the TAC.
Turns on service password encryption so the passwords defined on the router are encrypted when displayed in the running and startup config. Enables "light" encryption of passwords.
Defines and changes the hostname of the router.
Configures a cryptographically strong version of the password used to gain access to the router.
Sets the clock with the appropriate timezone. Sets the timezone and clock offset from GMT time.
Configures recurring summer (daylight savings) time. Sets the clock to adjust for daylight savings time.
Allows "subnet zero" subnets. Allows the router to use subnet zero.
Disables processing of packets with source routing header options.
Sets DNS name servers. Configures the DNS server the router responds with when dealing with PPP clients that implement RFC1877.
Configures NTP server and prefers this peer when possible.
Configures NTP server. Configures the router to sync to the NTP server at y.y.y.y.
Finishing up the router configurations and getting the router ready for operational mode.
The following Cisco IOS CLI script serves as a sample finalized operational configurations or setups.
Turns off console logging so messages do not appear on the router console. Prevents debug messages to be sent to the console. Flooding of debug messages on the console has an operational impact on the router.
Enters console configuration mode.
Sets the login authentication for console access. The method list CONSOLE is defined in the global AAA process. User will be prompted for a username and password when attempting console access. Configures EXEC authentication on this line to use the CONSOLE method list.
Sets EXEC timeout for the console to indefinite. Disables idle timeout for EXEC sessions on this line.
Enters virtual terminal line configuration mode. These lines are used for Telnetting to the router.
Sets the EXEC timeout to indefinite. Disables the idle timeout for EXEC sessions on this line.
Sets the login authentication under the virtual terminal lines. The method list LOCAL is defined in the global AAA process. Configures EXEC authentication on this line to use the LOCAL method list.
Exits global configuration mode to privileged EXEC mode.
Access lists are defined on the router to control the flow of incoming and outgoing traffic. Access lists define the kind of traffic permitted and denied.
Route summarization is used to summarize the routes advertised to other routers in the network. Routes are normally summarized to classful boundaries.
The show commands are used to look at various information and statistics on the router.
The debug commands are used for isolating and troubleshooting problems on the router. If something is not working on the router, use debug commands to find the cause of the problem.
Posted: Mon Jan 20 21:11:41 PST 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.