Specifications
Table Of Contents
- Contents
- Preface
- Getting Started
- Basic Router Configuration
- Interface Port Labels
- Viewing the Default Configuration
- Information Needed for Configuration
- Configuring Basic Parameters
- Configuring Static Routes
- Configuring Dynamic Routes
- Configuring Enhanced IGRP
- Basic Router Configuration
- Configuring Your Router for Ethernet and DSL Access
- Sample Network Deployments
- Configuring PPP over Ethernet with NAT
- Configuring PPP over ATM with NAT
- Configuring a LAN with DHCP and VLANs
- Configuring a VPN Using Easy VPN and an IPSec Tunnel
- Configure the IKE Policy
- Configure Group Policy Information
- Apply Mode Configuration to the Crypto Map
- Enable Policy Lookup
- Configure IPSec Transforms and Protocols
- Configure the IPSec Crypto Method and Parameters
- Apply the Crypto Map to the Physical Interface
- Create an Easy VPN Remote Configuration
- Verifying Your Easy VPN Configuration
- Configuration Example
- Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation
- Configuring a Simple Firewall
- Configuring a Wireless LAN Connection
- Sample Configuration
- Configuring Additional Features and Troubleshooting
- Additional Configuration Options
- Configuring Security Features
- Configuring Dial Backup and Remote Management
- Troubleshooting
- Reference Information
- Cisco IOS Software Basic Skills
- Concepts
- ROM Monitor
- Common Port Assignments

Contents
5
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Verifying Your Configuration 12
CHAPTER
5 Configuring a LAN with DHCP and VLANs 1
Configure DHCP 2
Configuration Example 3
Verify Your DHCP Configuration 4
Configure VLANs 5
Verify Your VLAN Configuration 5
Switch Port Configurations 7
VLAN Trunking Protocol (VTP) 8
802.1x Authentication 8
Layer 2 Interfaces 9
MAC Table Manipulation 9
Maximum Switched Virtual Interfaces (SVIs) 9
Switched Port Analyzer (SPAN) 9
IP Multicast Switching 9
Per-Port Storm Control 10
Fallback Bridging 10
Separate Voice and Data Subnets 10
IGMP Snooping 10
CHAPTER
6 Configuring a VPN Using Easy VPN and an IPSec Tunnel 1
Configure the IKE Policy 3
Configure Group Policy Information 4
Apply Mode Configuration to the Crypto Map 5
Enable Policy Lookup 6
Configure IPSec Transforms and Protocols 6
Configure the IPSec Crypto Method and Parameters 7
Apply the Crypto Map to the Physical Interface 8
Create an Easy VPN Remote Configuration 9
Verifying Your Easy VPN Configuration 10
Configuration Example 10
CHAPTER
7 Configuring VPNs Using an IPSec Tunnel and Generic Routing Encapsulation 1
Configure a VPN 3
Configure the IKE Policy 3
Configure Group Policy Information 4
Enable Policy Lookup 5