About This Guide This section discusses the objectives, audience, organization, and conventions of the Cisco 2500 Series Access Server User Guide. All Cisco technical documentation and additional literature are available on UniverCD, Cisco’s online library of product information. UniverCD is updated and shipped monthly, so it might be more up to date than printed documentation. UniverCD is available both as a single CD and as an annual subscription.
Document Organization Document Organization The major sections of this user guide are as follows: • Chapter 1, “Overview of the Cisco 2500 Series Access Server,” discusses the features and specifications of the Cisco 2500 series access server. • Chapter 2, “Preparing to Install the Cisco 2500 Series Access Server,” discusses environmental requirements and preparation for network connections, and describes the various ports and how to prepare for connections between networks and ports.
Document Conventions Document Conventions This publication uses the following conventions to convey instructions and information: Command descriptions use these conventions: • • • • Commands and keywords are in boldface font. Variables for which you supply values are in italic font. Elements in square brackets ([ ]) are optional. Alternative but required keywords are grouped in braces ({ }) and are separated by a vertical bar ( | ).
Document Conventions Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, you must be aware of the hazards involved with electrical circuitry and familiar with standard practices for preventing accidents. To see translated versions of this warning, refer to the appendix “Translated Safety Warnings.
CHAPT E R 1 Overview of the Cisco 2500 Series Access Server The Cisco 2500 series access server is a full-featured communication server with multiprotocol routing capability between synchronous serial, LAN, and asynchronous serial ports.
Access Server Hardware Features Access Server Hardware Features The access server has the following hardware features: • 8 or 16 ports for connection to modems, terminals, or other asynchronous (EIA/TIA-232) equipment • 2 MB to 16 MB (depending on the selected feature set) of primary memory, using dynamic random-access memory (DRAM) single in-line memory modules (SIMMs) • • 32-KB nonvolatile random-access memory (NVRAM) to store configurations • • • • 2-MB shared packet memory 4-MB to 8-MB Flash m
Access Server Services Cisco 2500 Series Access Server (Model 2511 Shown) H3540 Figure 1-1 DB-15 SCSI II 68-pin DB-60 Power RJ-45 On/off switch Access Server Services The access server connects terminals, printers, modems, microcomputers, and remote LANs over asynchronous serial lines to an internetwork. The access server uses a set of connection services to allow remote networks access to an internetwork of LANs and WANs.
System Specifications Terminal Services Terminal services provide terminal-to-host connectivity with virtual terminal protocols including Telnet, local-area transport (LAT), TN3270, and rlogin. Terminal services can be used to connect to a modem in a modem pool for outbound connectivity. Asynchronous Routing Services Routing services enable the access server to route packets over LANs and WANs using asynchronous interfaces to a remote LAN or WAN.
System Specifications Description Specification Input voltage, DC power supply Current Power dissipation 40W, 40–72 VDC 0.5–1.0A 40W (maximum), 135.
System Specifications 1-6 Cisco 2500 Series Access Server User Guide
2 CHAPT E R Preparing to Install the Cisco 2500 Series Access Server This chapter describes the tasks you must perform before you begin to install the Cisco 2500 series access server.
Safety Recommendations • Wear safety glasses if you are working under any conditions that might be hazardous to your eyes. • Do not perform any action that creates a potential hazard to people or makes the equipment unsafe. Maintaining Safety with Electricity Follow these guidelines when working on equipment powered by electricity. Warning Before working on equipment that is connected to power lines, remove jewelry (including rings, necklaces, and watches).
General Site Requirements • Look carefully for possible hazards in your work area, such as moist floors, ungrounded power extension cables, frayed power cords, and missing safety grounds. • If an electrical accident occurs, proceed as follows: — Use caution; do not become a victim yourself. — Turn off power to the system. — If possible, send another person to get medical aid. Otherwise, assess the condition of the victim and then call for help.
General Site Requirements Site Environment The location of individual chassis and the layout of your equipment rack or wiring room are extremely important for proper system operation. Equipment placed too close together, inadequate ventilation, and inaccessible panels can cause system malfunctions and shutdowns, and can make system maintenance difficult.
General Site Requirements • When mounting a chassis in an open rack, ensure that the rack frame does not block the intake or the exhaust ports. If the chassis is installed on slides, check the position of the chassis when it is seated all the way into the rack. • In an enclosed rack with a ventilation fan in the top, excessive heat generated by equipment near the bottom of the rack can be drawn upward and into the intake ports of the equipment above it in the rack.
Installation Checklist Installation Checklist The Installation Checklist lists the procedures for initial hardware installation of a new access server. Make a copy of this checklist and mark the entries as you complete each procedure. Include a copy of the checklist for each system in your Site Log. (See the following section, “Creating a Site Log.
Creating a Site Log Creating a Site Log The Site Log provides a record of all actions relevant to the system. Keep it near the chassis where anyone who performs tasks has access to it. Use the Installation Checklist (see the previous section “Installation Checklist”) to verify steps in the installation and maintenance of your system. Site Log entries might include the following: • Installation progress—Make a copy of the Installation Checklist and insert it into the Site Log.
Cabling Considerations Distance Limitations Following are the distance limitation specifications for Ethernet, Token Ring, and serial interfaces. Ethernet Connections The distance limitations for the IEEE 802.3 (10Base5 coaxial cable) specification indicate a maximum segment distance of 1,640 feet (500 m) at a transmission rate of 10 megabits per second (Mbps).
Console and Auxiliary Port Considerations Data Rate (Baud) Distance (Feet) Distance (Meters) 38,400 50 15 57,600 25 7.6 115,200 12 3.7 The use of balanced drivers allows EIA/TIA-449 signals to travel greater distances than the EIA/TIA-232 standard. Table 2-2 lists the standard relationship between baud rate and maximum distance for EIA/TIA-449 signals. These limits are also valid for V.35 and X.21.
Network Connection Considerations Console Port Connections Each access server system includes an EIA/TIA-232 (RJ-45) console asynchronous serial port. This port connects to a terminal using an RJ-45 cable and an RJ-45-to-DB-25 adapter. Depending on the cable and the adapter used, this port will appear as a data terminal equipment (DTE) or data communications equipment (DCE) device at the end of the cable.
Network Connection Considerations You can use the following equipment to connect to the Ethernet AUI port: • • An Ethernet AUI cable connected to a transceiver An Ethernet transceiver connected directly to the access server’s AUI port The connection to the AUI port can be attached using one of two connector types, as follows: • • Slide latch connectors Jackscrew connectors Note Ethernet cables are not shipped as standard with the access server.
Inspecting the System Note Because of the small size of the pins on the DB-60 serial connector, attempting to manufacture your own serial cables is not recommended. Asynchronous Serial Connections The asynchronous serial ports use one or two 68-pin connectors located on the far left of the rear panel. Each of the connectors provides eight asynchronous ports. The lower port is labeled ASYNC 1–8, and the upper port is labeled ASYNC 9–16.
Inspecting the System • • Warranty pack UniverCD and optional printed publications, as specified on your order Inspect all items for shipping damage. If anything appears to be damaged, or if you encounter problems when installing or configuring your system, contact a customer service representative.
Inspecting the System 2-14 Cisco 2500 Series Access Server User Guide
3 CHAPT E R Installing the Cisco 2500 Series Access Server This chapter guides you through the installation of the Cisco 2500 series access server and includes the following sections: • • • • • • • Required Tools and Parts Installing the Rubber Feet Rack-Mounting the Chassis Wall-Mounting the Chassis Connecting to the Network Connecting the Console Terminal and Modem What to Do after Installing the Access Server Hardware If you plan to place the access server on a desk or table, do not place anything o
Required Tools and Parts Required Tools and Parts Following are the tools and parts required to install the access server: • • • Flat-blade screwdrivers: small, 3/16-inch (0.476 cm), and medium, 1/4-inch (0.625 cm) • • Rubber feet for desktop installation. • An interface cable for each interface you will connect.
Installing the Rubber Feet Installing the Rubber Feet This section explains how to install the rubber feet on the bottom of the chassis. If you want to rack-mount the chassis, skip this section and proceed with the next section, “Rack-Mounting the Chassis.” To wall-mount the chassis, skip this section and proceed with the section “Wall-Mounting the Chassis” later in this chapter.
Rack-Mounting the Chassis Figure 3-2 Installing the Rubber Feet H4795 Fan Rack-Mounting the Chassis Depending on the rack you are using, attach the rack-mount brackets to the chassis using one of the following figures as a guide: • • • Figure 3-3 and Figure 3-4 for 19-inch racks Figure 3-5 for 19-inch center-mount telco racks Figure 3-6 for installing the chassis in a rack (all rack types) 3-4 Cisco 2500 Series Access Server User Guide
Rack-Mounting the Chassis 19-Inch Rack To install the chassis in a 19-inch rack with the front panel forward, attach the rack-mount brackets as shown in Figure 3-3. 19-Inch Rack Installation—Front Panel Forward SERIES H1706 Figure 3-3 Note: The second bracket attaches to the other side of the chassis. To install the chassis in a 19-inch rack with the rear panel forward, attach the rack-mount brackets as shown in Figure 3-4.
Rack-Mounting the Chassis Telco Rack To install the chassis in a 19-inch, center-mount telco rack, attach the rack-mount brackets as shown in Figure 3-5. Figure 3-5 Telco Rack Installation—Rear Panel Forward Input: 100-240VAC Freq: 50.60 Hz Current: 1.2-0.6A Watts: 40W H1705 1 0 Note: The second bracket attaches to the other side of the chassis. The brackets can also be installed with the front panel forward.
Wall-Mounting the Chassis Wall-Mounting the Chassis Following is the procedure for wall-mounting the chassis: Step 1 Attach the brackets as shown in Figure 3-7. Figure 3-7 Attaching the Wall-Mount Brackets Input: 100-240VAC Freq: 50/60 Hz Current: 1.2-0.6A Watts: 40W H1714 1 0 Step 2 Using screws and anchors you provide, attach the chassis assembly to the wall as shown in Figure 3-8.
Wall-Mounting the Chassis Figure 3-8 Wall-Mounting the Chassis H1718 Power supply and fan at the top Vertical wall stud 3-8 Cisco 2500 Series Access Server User Guide
Connecting to the Network Connecting to the Network Take the following steps to connect the access server to your networks: Note Refer to the document Cisco 2500 Series Public Network Certification for information on connection prerequisites and related warnings. Step 1 Connect the Ethernet or Token Ring port to the transceiver or MAU as shown in Figure 3-9 or Figure 3-10.
Connecting to the Network Connecting Token Ring Cables H3543 Figure 3-10 Token Ring lobe cable (not supplied) Standard IEEE 802.
Connecting to the Network Step 2 Connect the synchronous serial ports to the modem or CSU/DSU, as shown in Figure 3-11. Make certain to connect the 60-pin serial port connector as shown. Connecting Synchronous Serial Cables H3544 Figure 3-11 Access server Serial transition cable 60-pin serial port connector CSU/DSU or other DCE RJ-45 to DB-25 adapter EIA/TIA-232, EIA/TIA-449, V.
Connecting to the Network Step 3 Connect the asynchronous breakout cable to one of the 68-pin ports, and then use the RJ-45-to-DB-25 adapters to connect the breakout cable and your asynchronous devices. (See Figure 3-12.) For additional instructions on connecting asynchronous devices to the breakout cable, refer to the appendix “Cable Specifications.
Connecting the Console Terminal and Modem Connecting the Console Terminal and Modem The console terminal is used to provide local administrative access to the access server. Connect the terminal to the console port. The auxiliary port can be used for with a terminal, or with a modem for remote access.
Connecting the Console Terminal and Modem Figure 3-13 Identifying a Roll-Over Cable Pin 1 and pin 8 should be the same color Pin 8 H3824 Pin 1 Additional information on roll-over cable pinouts is available in the appendix “Cable Specifications.” Connection to a terminal will require an RJ-45-to-DB-25 adapter, and possibly a DB-25-to-DB9 adapter. (See Figure 3-14.
Connecting the Console Terminal and Modem Figure 3-14 Connecting the Console Terminal Access server Console port connector (RJ-45) Personal computer OK H3823 AUX SER 0 LAN ETH RJ-45 roll-over RJ-45 to DB-25 adapter Step 2 Your terminal or PC terminal emulation software should be configured for 9600 baud, 8 data bits, no parity, and 2 stop bits (9600, 8/N/2).
What to Do after Installing the Access Server Hardware Connecting a Modem to the Auxiliary Port This section explains how to connect a modem to the console port on the access server: Step 1 Connect a modem to the auxiliary port using a roll-over RJ-45 cable with an RJ-45-to-DB-25 adapter. The adapter provided by Cisco will be labeled “Modem.” (See Figure 3-15.
4 CHAPT E R Configuring the Cisco 2500 Series Access Server This chapter describes the procedures for configuring the Cisco 2500 series access server and contains the following sections: • • • Booting the Access Server for the First Time Using the Enable Secret and the Enable Password Configuring the Access Server To configure your console, you need to connect a terminal to the access server. Configuration requires access to the console port.
If You Need More Information Additional Publications For more information on configuring the Cisco 2500 series access server, see the appendix “Internetworking Primer,” or refer to the following publications: • • • • • • • Access and Communication Servers Configuration Guide Access and Communication Servers Command Reference Configuration Builder Getting Started Guide Router Products Getting Started Guide Router Products Configuration Guide Router Products Command Reference Troubleshooting Internetworkin
If You Need More Information Available 24 hours a day, 7 days a week, CIO provides a wealth of standard and value-added services to Cisco’s customers and business partners. CIO services include product information, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.
Booting the Access Server for the First Time • Software version level and hardware configuration (enter the show version command to display this information) • Software configuration (enter the show running config (Release 11.0 or later) or the write terminal command (Earlier than Release 11.
Configuring the Access Server There are two commands you can use to do this, depending on the release you have of the Cisco IOS software: • • enable secret password (which is a very secure, encrypted password). enable password (which is a less secure, or nonencrypted, password). The enable secret password is available in Cisco IOS Release 10.2(3) or later. The enable secret password is not available before Release 10.2(3). The enable password is available in all releases.
Configuring the Access Server Note You will need to acquire the correct network addresses from your system administrator or consult your network plan to determine correct addresses before you can complete the access server configuration. For details on network addressing, see the appendix “Internetworking Primer.” Before continuing the configuration process, check the current state of the access server by entering the show version command.
Configuring the Access Server You can now enter any changes to the configuration that are desired. Press Ctrl-Z to exit configuration mode. (See the appendix “Internetworking Primer” for configuration assistance.) To see the currently operating configuration, enter the command show running-config at the # prompt if you are running Cisco IOS Release 11.0 or later. Enter the command write terminal at the # prompt if you are running a Cisco IOS release earlier than 11.
Configuring the Access Server This functionality is coordinated by your system administrator at the site where the TCP/IP host is located. You should not attempt to use AutoInstall unless the required files have been provided on the TCP/IP host. See the publication Access and Communication Server Configuration Guide for information on how AutoInstall works. Take the following steps to prepare your access server for the AutoInstall process: Step 1 Attach the synchronous serial cable to the access server.
Configuring the Access Server Once the access server has determined that AutoInstall is not configured, it will default to the setup facility. If the serial (WAN) cable is not connected, the access server will boot from Flash memory and go into the setup facility. Note You can run the setup facility any time you are at the enable prompt (#) by entering the command setup. Configuring the Global Parameters When you first start the setup program you must configure the global parameters.
Configuring the Access Server cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco Internetwork Operating System Software IOS (tm) 3000 Software (IGS-C-L), Version 11.0(0.8), SOFTWARE Copyright (c) 1986-1995 by cisco Systems, Inc. Compiled Mon 19-Jun-95 23:22 by Image text-base: 0x030200E4, data-base: 0x00001000 cisco 2500 (68030) processor (revision C) with 16380K/2048K bytes of memory. Processor board ID 2685538369 SuperLAT software copyright 1990 by Meridian Technology Corp).
Configuring the Access Server Interface Ethernet0 Serial0 Serial1 IP-Address unassigned unassigned unassigned OK? NO NO NO Method not set not set not set Status up down down Protocol down down down Step 4 Choose what protocols to support on your Ethernet or Token Ring interface. For IP-only installations, you can accept the default values for most of the questions.
Configuring the Access Server Step 7 In most cases you will use IP routing. If you are using IP routing, you must also select an interior routing protocol. You can specify only one of two interior routing protocols to operate on your system using setup: Interior Gateway Routing Protocol (IGRP) or Routing Information Protocol (RIP).
Configuring the Access Server Step 2 Set the line speed and the flow control for the asynchronous lines. Hardware flow control must be configured to allow proper communications with modems. Async line speed [9600]:57600 Configure for HW flow control? [yes]: For additional information on configuring modem connections see the section “Modems” in the appendix “Internetworking Primer.
Configuring the Access Server Step 6 Enter yes if you will be using IPX on your asynchronous lines, In this example, the access server will not be using IPX on the asynchronous lines: Configure XRemote font servers? [no]: Configure for Async IPX? [yes]: no Configuring the Ethernet or Token Ring Interfaces Take the following steps to configure the Ethernet or Token Ring interface to allow communication over a LAN.
Configuring the Access Server Step 3 Determine if you are going to enable IPX on this interface, enter the unique IPX network number. See the appendix “Internetworking Primer” for additional information on IPX routing: Configure IPX on this interface? [no]: yes IPX network number [1]: B001 Configure XNS on this interface? [no] Configuring the Synchronous Serial Interfaces The synchronous serial interfaces are configured to allow connection to WANs through a CSU/DSU.
Configuring the Access Server Configure IP unnumbered on this interface? [no]: yes IP address for this interface: 172.16.74.2 Number of bits in subnet field [8]: Class B network is 172.16.0.0, 8 subnet bits; mask is 255.255.255.
Configuring the Access Server Configuring interface Async6: Default client IP address for this interface [172.16.72.16]: Configuring interface Async7: Default client IP address for this interface [172.16.72.17]: Configuring interface Async8: Default client IP address for this interface [172.16.72.18]: Step 2 The configuration you have entered is now displayed and you are asked if you want to use the displayed configuration. If you answer no, you can begin the configuration again.
Configuring the Access Server To store the configuration or changes to your startup configuration, enter at the hostname# prompt the command copy running-config startup-config if you are running Cisco IOS Release 11.0 or later, or the command write memory if you are running a Cisco IOS release earlier than 11.0: Hostname# copy running-config startup-config Entering this command will save the configuration settings that the setup process created in the access server.
A APPEND IX Internetworking Primer This appendix gives an introduction to the technologies used in internetworking. It also includes basic information about designing and implementing an internetwork with a Cisco 2500 series access server.
Cisco Internetwork Operating System Note To order UniverCD, Cisco’s technical documentation in CD-ROM format, or paper documentation, refer to “Ordering Cisco Documents,” DOC-OCD, which is in your warranty pack.
Cisco Internetwork Operating System Memory Purpose RAM Stores the operating configuration (for example, running-config), routing tables, caches, queues, packets, and so forth Shared packet memory Stores incoming and outgoing packets The show version command displays the capacity of each kind of memory. Proper operation of the access server requires the following memory configuration: • The correct system image (Cisco IOS) is loaded and running in Flash memory.
Cisco Internetwork Operating System The configuration register can be used by system administrators to control some very low level operations of the access server. When the configuration register is set to specific values (shown in Table A-2), the access server can be instructed to stop the boot process in any of the three operating environments. You modify the configuration register value by using the configuration command config-reg [value].
Cisco Internetwork Operating System Cisco IOS Normal operation of your access server requires the Cisco IOS image to be stored and executing in Flash memory.
Cisco Internetwork Operating System EXEC Modes The command interpreter of Cisco IOS software is called the EXEC. The EXEC interprets the commands you type and carries out the corresponding operations. You must log in to the access server before you can enter an EXEC command. For security purposes, the EXEC has two basic levels of access to commands, user EXEC mode and privileged EXEC mode.
Cisco Internetwork Operating System section “Using the Enable Secret and the Enable Password,” in the chapter “Configuring the Cisco 2500 Series Access Server”). Enter ? to display the privileged commands. Privileged commands include the following: • • • configure—Changes the access server’s software configuration. debug—Displays process and hardware event messages. Use caution with the debug command because the additional load of generating debug message can overload the CPU.
Cisco Internetwork Operating System Setup Mode You use the setup facility of Cisco IOS software to streamline the creation of configuration files. If Cisco IOS software determines that there is no configuration file stored in NVRAM, it will automatically enter setup mode when the access server boots. (See the section “Configuring the Access Server Manually Using the Setup Facility” in the chapter “Configuring the Cisco 2500 Series Access Server” for more information about the setup command.
LANs and WANs The interaction of the configuration commands is illustrated in Figure A-1. Figure A-1 Configuration Command Interaction with Cisco IOS Release 11.
LANs and WANs Each layer of the OSI reference model specifies particular network functions such as addressing, flow control, error control, encapsulation, reliable message transfer, and data representation. The upper layer (the application layer) is closest to the user; the lowest layer (the physical layer) is the closest to the cables and wires. Each layer of the OSI reference model relies on the layers below, and offers its services to the layers above.
LANs and WANs For example, the IEEE standard 802.3 (Ethernet) defines the physical layer (connectors, voltages, and binary logic to enable communication) as well as the data link layer (framing data structures, addressing packets for local delivery, and error checking). Once the physical and data link layers are installed in a network and working correctly, the network layer and its associated devices can use these services to route packets efficiently across the room or around the world.
LANs and WANs Ethernet LANs The IEEE has established Ethernet as standard 802.3. Ethernet uses a 10-Mbps bus. Ethernet LANs use carrier sense multiple access collision detect (CSMA/CD) for bus access control. Several physical layer implementations have been established for Ethernet; the more common implementations are as follows: • 10Base5—Ethernet on thick coaxial cable. This implementation was based on the original Ethernet and is not in common use today. Maximum segment length is 1,640 feet (500 m).
LANs and WANs Configuring Token Ring The only option you must configure Token Ring interfaces is the ring speed. The following example shows the commands you typically enter to configure the ring speed on a Token Ring network: Router(config)# interface tokenring 0 Router(config-if)# ring-speed 16 Other useful commands are: • show interface—an EXEC command that displays information about interfaces attached to the access server.
LANs and WANs In addition to data link layer addressing, network protocols (Layer 3) were developed to allow more precise delivery of packets (or routing), within a larger internetwork. This strategy is similar to the post office’s method of delivering mail. Everyone has a name (like a MAC address), but that is not enough information to route letters efficiently.
LANs and WANs A Typical WAN Architecture Layer 3 Layer 2 Layer 3 Layer 2 Layer 2 Layer 1 Layer 1 WAN CSU/DSU CSU/DSU Router Layer 2 Layer 1 H3569 Figure A-4 Layer 1 Router WAN Physical Layer (Layer 1) Most WANs require an interconnection that is provided by a communications service provider, such as a phone company. This physical layer uses many of the technologies that have evolved over the last few decades for carrying voice communications.
LANs and WANs Note The cable used on the access server port will configure the port as DTE or DCE. If it is configured as DCE, enter the command clockrate value to enable the port for use as a DCE port. Some WAN technologies, such as Frame Relay, Switched Multimegabit Data Service (SMDS), or X.25, reuse the DTE and DCE terminology at Layer 2. The DTE/DCE mode at Layer 1 is independent of the DTE/DCE mode at Layer 2. For example, It is possible for a single device to be a V.
LANs and WANs Point-to-Point WANs Point-to-point WANs only allow two endnodes on the WAN connection (as shown in Figure A-6). The two common point-to-point WAN encapsulations are HDLC and PPP. Because there are only two devices, there is no need for addressing at the data link layer. Point-to-point encapsulations are generally used on leased WAN lines.
LANs and WANs Point-to-Point Protocol PPP encapsulation provides Cisco IOS software to devices that are not running Cisco IOS software, connectivity over leased WAN lines. PPP uses a more complex model than HDLC to ensure interoperability between networking vendors.
LANs and WANs Figure A-7 Multipoint WAN Router A Router C Router B Router D H3114 WAN Frame Relay Frame Relay is a packet-switching data communications technology that can connect multiple network devices on a multipoint WAN. The design of Frame Relay WANs can have impact on aspects of higher layer protocols such as IP, IPX, and AppleTalk (for example, the split-horizon aspect of routing protocols). Frame Relay is called a nonbroadcast multiaccess technology, because there is no broadcast channel.
Desktop Protocols Frame Relay WANs should be carefully designed with the above considerations in mind. (see the publication Internetwork Design Guide). Dial-on-Demand Routing Dial-on-demand routing (DDR) enables you to make a standard telephone connection or an Integrated Services Digital Network (ISDN) connection only when required by the volume of network traffic. DDR may be less expensive than a leased-line or multipoint solutions.
Desktop Protocols Routed Protocol Design Goals Each of these three desktop protocols was designed with a common set of goals—unique network numbering, node addressing, and data link address resolution, routing protocols, and directory services. Understanding these goals, and how each desktop protocol solves each goal, aids in the understanding, building, and administration of internetworks. Unique Network Numbering Every data link in your internetwork is given a unique network number.
Desktop Protocols 172.16.10.0 B010 1001–1002 Network Numbering Plan for IP, IPX, and AppleTalk 172.16.20.0 B020 2001–2002 E0 Token Ring Router A F0 FDDI 172.16.30.0 B030 3001–3002 T0 F0 172.16.1.0 B001 10-10 Router C S0 E0 S0 172.16.40.0 A001 100–100 Router B S1 172.16.2.0 B002 20–20 S0 E0 Router D H3546 Figure A-8 Node Addressing and Data Link Address Resolution Each network protocol needs to able to uniquely address each node on a network.
Desktop Protocols The ARP (or AARP) address mapping process is illustrated in Figure A-9 and works as follows: 1 A node needs to deliver a packet to a network layer node address. It checks its ARP table to determine the data link address associated with the node address. If a mapping exists, it can deliver the packet. If a mapping does not exist, an ARP is performed.
Desktop Protocols The function of the routing protocol is to build a complete routing table in each access server or router. The routing table is a pointer to every network in an internetwork. For example, the IP routing table for Router B in Figure A-8 might look as follows: network 172.16.10.0 172.16.20.0 172.16.30.0 172.16.1.0 172.16.2.0 172.16.40.0 172.16.40.
Desktop Protocols Design and administration of an IP network requires an understanding of IP subnetting. Review the document Beginning IP for New Users which is available on CIO to ensure basic familiarity with the concepts of IP subnetting. IP Network Numbering The IP address space is 32 bits long and is used to represent both the network and the node. An IP address is written as four decimal numbers separated by dots (called dotted decimal notation); for example, 172.16.10.1.
Desktop Protocols Figure A-11 172.16.10.0 IP Subnetting Plan 172.16.20.0 E0 Token Ring Router C 172.16.1.0 S0 E0 Router A F0 FDDI T0 F0 S0 172.16.40.0 Router B S1 172.16.30.0 172.16.2.0 E0 Router D H3795 S0 IP Node Numbering IP uses the bits to the right of the subnet mask to uniquely number each node on the network. These addresses are configured manually by the system administrator. Access servers and routers are also nodes, and require unique node addresses.
Desktop Protocols The IP routing protocol options are as follows: • • • • • • Routing Information Protocol (RIP) Interior Gateway Routing Protocol (IGRP) Enhanced IGRP OSPF Integrated Intermediate System-to-Intermediate System (integrated IS-IS) Static routing (a fixed, configured routing table entry) Enter the command show ip route to examine the IP routing table. IP Directory Services The directory service used with IP is called Domain Name System (DNS). DNS resolves names into IP addresses.
Desktop Protocols Because Router D and Router C share a data link, they must agree on the IP network and the subnet used on that data link, but they must have unique node numbers. The serial link used by Router D is distinct from the serial link used by Router C, so it uses a unique subnet number. The IP configuration of Router D in Figure A-11 is as follows: interface ethernet 0 ip address 172.16.40.2 255.255.255.0 ! interface serial 0 ip address 172.16.2.1 255.255.255.0 ! router igrp 1 network 172.16.0.
Desktop Protocols Figure A-12 IPX Network Numbering Plan B020 B010 E0 Token Ring Router A F0 FDDI T0 F0 Router C B001 S0 E0 S0 A001 Router B S1 B030 S0 E0 Router D H3796 B002 IPX Node Numbering IPX uses a 48-bit address for the node. The IPX device will use the data link address of one interface as its IPX node address. Because the Layer 3 address is the same as the Layer 2 address, there is no need for an ARP process to perform network-to-data link layer address resolution.
Desktop Protocols IPX Directory Services Novell servers advertise their presence throughout the IPX internetwork with the Service Advertisement Protocol (SAP). Novell servers include file servers, print servers, and directory servers. Each type of server is advertised by a SAP type number as well as its IPX address. SAP works like a distance vector routing protocol.
Desktop Protocols For Novell NetWare 3.x and earlier versions, the default encapsulation was Ethernet_II. As of Netware 4.x, the default encapsulation is Ethernet_802.2. In the example in Figure A-12, all Novell networks use SAP, or 802.2, except B010 which uses ARP for compatibility with older devices on the LAN links. These encapsulation issues do not apply to the WAN links.
Desktop Protocols AppleTalk Network Numbering AppleTalk uses a 16-bit number to uniquely identify networks. There are two kinds of AppleTalk networks, extended and nonextended. Extended networks are used for all LANs and most WANs. A single network number, such as 200, identifies a nonextended AppleTalk network. Nonextended networks can have a maximum of 253 nodes and a single zone name. See the section “AppleTalk Directory Services” later in this appendix for information on zones.
Desktop Protocols Figure A-13 1001–1002 Marketing, Sales AppleTalk Numbering and Zone Naming Plan 2001–2002 Marketing E0 Token Ring 10–10 ZZ Serial Router C S0 E0 Router A FDDI 3001–3002 Backbone T0 F0 S0 100–100 Field Service, Sales Router B S1 20–20 ZZ Serial S0 E0 Router D H3797 F0 AppleTalk Node Numbering The AppleTalk node address is an eight-bit number. AppleTalk devices will dynamically find a free node address on startup using an extension of the AARP.
Desktop Protocols AppleTalk Routing Protocols Several AppleTalk routing protocols are available, including the following: • • • Routing Table Maintenance Protocol (RTMP) AppleTalk Update Routing Protocol (AURP) Enhanced IGRP The default AppleTalk routing protocol on the access server is RTMP. RTMP is a distance vector algorithm that advertises known extended and nonextended networks in the internetwork at ten-second intervals.
Desktop Protocols In order to configure AppleTalk correctly, all AppleTalk access server or router interfaces on a data link must agree on the assigned cable range, default zone, and any additional zones. If there are any conflicts when a new router or access server using AppleTalk attempts to connect to the network, the interface will not enable AppleTalk and will report a port configuration mismatch. Enter the EXEC command show apple interface to confirm correct startup.
Desktop Protocols Enter the command show apple zone to look at the zone information table of the access server or router. When a node lookup request comes in for the zone Marketing, the device routing AppleTalk will create two packets for forwarding, one for network 1001–1002 and one for network 2001–2002.
Modems Modems Modems are used with access servers to allow remote nodes and remote LANs to connect to internetworks across Public Switched Telephone Networks (PSTNs). (See Figure A-14.) This section contains the following sections: • • • • • EIA/TIA-232 Standard and Cabling Configuring the Asynchronous Port Communicating with the Modem Configuring the Modem Testing the Dial-In Connection Dialup access to an internetwork is achieved via modems connected to the asynchronous port of the access server.
Modems RJ-45 Cabling The access server uses high-density, 68-pin connectors with an 8-connector breakout cable (with RJ-45 connectors) for its asynchronous ports. To connect to a modem, an MMOD type RJ-45-to-DB-25 adapter is used. The MMOD adapter is labelled “MODEM.” (For connecting a modem on the auxiliary port, use an RJ-45 roll-over cable and an MMOD adapter.) For additional information about supported cabling configurations, see the appendix “Cable Specifications.
Modems Signal Name Asynchronous Port (DTE) Modem (DCE) Clear To Send (CTS) Input Output DCE signals to DTE that it can continue to accept data into its buffers. Data Terminal Ready (DTR) Output Input DTE indicates to DCE that it can accept a call. Lowering and raising instructs DCE to drop the active call and return to the stored configuration. Data Carrier Detect (DCD) Input Output DCE indicates to DTE that a call is now present and established with a remote modem.
Modems Hardware Flow Control (RTS/CTS) Hardware flow control is used between the access server and the modem to start and stop data transfer on the TX/RX wire pair. Hardware flow control is used to prevent the loss of data when buffers are full. Hardware flow control is controlled on the RTS/CTS wire pair. The conditions that must be met when setting hardware flow control are as follows: • Both the access server asynchronous port and the modem must be configured for hardware flow control.
Modems Configuring the Line The goal of line configuration is to prepare the line to test dial-in access to an EXEC session. In the following example, lines 1 through 8 are configured: Step 1 From a privileged EXEC session, enter the command configure terminal and access line configuration mode: Router# conf terminal Enter one configuration command per line. Router(config)# line 1 8 Router(config-line)# End with CNTL-Z.
Modems Line security options The login tacacs command allows for centralized and enhanced security with a Terminal Access Controller Access System (TACACS) server. Use one of the login line subcommands from Table A-7 to control access to your EXEC session.
Modems Communicating with the Modem You must establish communication with your modem before you can configure it, which requires terminal access to the modem’s command environment. The access server’s reverse Telnet feature is used to communicate with the modem. This section explains how to use reverse Telnet to access the modem.
Modems Testing the Modem Connection After connecting to the modem with a reverse Telnet, you need to test the connection. Send the modem the at command to request its attention. It should respond with OK: at OK If the modem does not reply to the at command, check the following: 1 Look at the output of the command show line 1. If it displays “no CTS” for the modem hardware state, the modem is not connected, powered on, and waiting for data, or the modem might not be configured for hardware flow control.
Modems Step 2 Test Communications with the modem: at OK Step 3 Suspend the Telnet session by entering Ctrl-Shift-6-x: - suspend keystroke Router# Step 4 Enter the EXEC command where to check for open sessions: Router#where Conn Host * 1 172.16.1.10 Address 172.16.1.10 Byte 0 Idle Conn Name 0 172.16.1.10 Step 5 Enter the EXEC command disc to terminate the session: Router#disc Closing connection to 172.16.1.
Modems Determine the Modem Initialization String The initialization string is used to configure the modem for use. A sample modem initialization string for a US Robotics Courier modem would be as follows: &b1&h1&r2&c1&d3&m4&k1s0=1 Timesaver Initialization strings for other modems are available from CIO. Locking EIA/TIA-232 Speed Lock the EIA/TIA-232 port speed of the modem to the port speed of the Cisco 2500 series access server.
Modems Proper DTR Interpretation The modem must interpret a toggle of the DTR signal as a command to drop any active call and return to the stored settings. Most modems use the settings &d2 or &d3. Refer to your modem documentation for the settings used with your modem. Other Modem Settings This section defines other settings that may be needed or desirable depending on your modem. For these settings refer to your modem documentation.
Modems Most modems use the setting s0=1 to answer the call after one ring. Refer to your modem documentation for the settings used with your modem. Initializing the Modem Once the modem initialization string has been determined, take the following steps to configure the modem. (This example configures a U.S. Robotics Courier modem on line 1): Step 1 Reverse Telnet to the modem: Router#telnet modem1 Trying modem1 (172.16.1.10, 2001)...
Asynchronous Protocols Testing the Dial-In Connection The access server and modem are now correctly configured for dial-in access. Before configuring any additional protocols for the line (such as SLIP, PPP, or ARA), test the dial-in connection. Note Remember, the same configuration issues exist between the client DTE (PC) and client modem. Make sure you have the correct EIA/TIA-232 cabling and modem initialization string for your client modem.
Asynchronous Protocols The EXEC Session When a dial-in user connects to an asynchronous line on the access server, the session received after the security dialog is called an EXEC session. From an EXEC session, you can use terminal services (such as Telnet or rlogin), run an asynchronous protocol over the line, or use one of many other access server services. For example, you can enter the command ppp to initiate a PPP session.
Asynchronous Protocols Configuring Asynchronous Ports Cisco 2500 series access servers have 8 or 16 asynchronous ports (plus an asynchronous auxiliary port). These ports use RJ-45 connectors and the EIA/TIA-232 signaling standard. In the access server configuration, there are two configuration submodes associated with any asynchronous port—lines and asynchronous interfaces.
Asynchronous Protocols Modem Configuration See the section “Modems” earlier in this appendix for assistance in configuring your access server and modem for proper operation. This section will involve configuring the line for EIA/TIA-232 options, and EXEC security. Testing the Line for EXEC Functionality Testing for access to EXEC functionality is a critical step in the configuration of the Cisco 2500 series access server ports.
Asynchronous Protocols Step 2 Enable IP and IPX (or other protocols) by assigning network numbers. (IP can be configured by entering the command ip unnumbered rather than an IP subnet.) This example enables PPP to support IP control protocol (ipcp) and IPX control protocol (ipxcp).
Asynchronous Protocols Note For additional information on these commands, see the publication Access Server Configuration Guide. Serial Line Internet Protocol Serial line internet protocol (SLIP) is an older protocol that supports IP only. Configuring SLIP is similar to configuring PPP for IP.
Asynchronous Protocols ARA Authentication You can use the line configuration command autoselect arap to launch ARA protocol automatically. The person logging into an access server that is using the ARA protocol, is authenticated against either the username and password database in the configuration of the access server, or against a TACACS server. To store the ARA protocol username database on a TACACS server may require that the tacacs server be enabled with the supplementary file.
Asynchronous Protocols ! interface asynchronous 1 ip unnumbered ethernet 0 ipx network B011 encapsulation ppp ip tcp header compression passive asynchronous mode interactive asynchronous default ip address 172.16.10.
B APPEND IX Maintaining the Cisco 2500 Series Access Server This appendix contains information about maintenance procedures you might need to perform on the Cisco 2500 series access server as your internetworking needs change. If any upgrades requiring hardware or software replacement are necessary, a related publication called a configuration note will ship to you automatically with the parts.
Opening the Chassis Opening the Chassis This section describes the procedure for opening the chassis by removing the chassis cover. Warning Do not touch the power supply when the power cord is connected. For systems with a power switch, line voltages are present within the power supply even when the power switch is off and the power cord is connected. For systems without a power switch, line voltages are present within the power supply when the power cord is connected.
Opening the Chassis Step 4 Remove the single screw located on the bottom of the chassis (on the chassis side closest to you). Note that the chassis is comprised of two sections: top and bottom. Step 5 If required, insert a medium-size flat-blade screwdriver into the slots shown in Figure B-1, Part A, and gently rotate the blade so that the top and bottom sections separate slightly. Step 6 Holding the chassis with both hands, position it as shown in Figure B-1, Part B.
Upgrading the Boot PROMs Figure B-2 System Card Layout—Model 2509 System-code SIMMs (Flash memory or PROMs) Flash card socket Boot ROM jumpers CODE 0 A B DRAM Polarization notch Primary memory (DRAM SIMM) Shared memory (fixed DRAM) FW1 CODE 1 FW2 H3555 Boot ROMs Ethernet Serial 0 Serial 1 BRI Console Auxiliary Upgrading the Boot PROMs To replace the boot programmable read only memory (PROM) software with a new software image, you need to replace the existing boot PROMs.
Upgrading the Boot PROMs Tools and Equipment Required for Replacing the Boot PROMs The following tools and equipment are required to replace the boot PROMs: • Erasable programmable read-only memory (EPROM) extraction tool or a small flat-blade screwdriver • Two boot PROMs Replacing the Boot PROMs Take the following steps to replace the boot PROMs: Step 1 To open the chassis and expose the boot PROMs, follow the procedures in the section “Opening the Chassis” earlier in this appendix.
Upgrading the Boot PROMs Figure B-3 Extracting and Inserting Boot PROMs Squeeze here Squeeze here PLCC extractor slot PLCC socket PLCC PROM PLCC extractor slot H1579a PLCC extractor tool Step 4 Insert each new boot PROM in its socket in the orientation shown in Figure B-4. Insert the new boot ROMs in their respective sockets so that the beveled edge of the ROM chip is on the same side as the flat corner on the ROM socket. Caution Boot PROMs should be installed with the printed label side up.
Installing Primary-Memory DRAM SIMMs Figure B-4 Orienting the Boot PROMs to the Socket Beveled edge on the boot ROM ROM socket Boot ROM H3804 Flat corner on boot ROM socket Step 5 Replace the tray assembly and cover following the instructions in the section “Closing the Chassis” later in this appendix. Installing Primary-Memory DRAM SIMMs The access server contains primary and shared (or packet) memory. Primary memory size, in kilobytes (KB), is displayed in the system banner on the console screen.
Installing Primary-Memory DRAM SIMMs Tools and Equipment Required The following lists the tools required to remove and replace the DRAM SIMMs on the access server: • • • Medium-size flat-blade screwdriver (1/4 inch [0.625 cm]) ESD-preventive wrist strap The appropriate DRAM SIMM for your access server model Primary Memory Configurations You can upgrade to 4- or 16-MB DRAM; the 4-MB upgrade kit includes one 1 MB x 36 DRAM SIMM, and the 16 MB kit includes one 4 MB x 36 DRAM SIMM.
Installing Primary-Memory DRAM SIMMs Figure B-5 Removing and Replacing the DRAM SIMM Connector edge of the system card Pull the tabs away with your thumbs, bracing your forefingers against the posts. Raise the SIMM to a vertical position. Polarization notch H3558 DRAM SIMM card Step 6 Using the system card orientation shown in Figure B-5, position the new SIMM so that the polarization notch is located at the right end of the SIMM socket.
Replacing System-Code SIMMs Replacing System-Code SIMMs The system code (software) is stored on Flash memory or PROM SIMMs. The 80-pin Flash memory and PROM SIMMs must be purchased from us. Contact a customer service representative for more information. Note The system code for all the access server models can be contained on either one or two 80-pin Flash memory or PROM SIMMs. If only one 80-pin SIMM socket is populated, it must be the SIMM socket indicated in Figure B-2 (CODE 0).
Replacing System-Code SIMMs Step 5 Locate the system-code SIMMs on the system card. The SIMM sockets are labeled CODE 0 and CODE 1 (shown in Figure B-2). Step 6 Remove the existing system-code SIMM by pulling outward on the connector holders to unlatch them. The connector holds the SIMM tightly, so be careful not to break the holders on the SIMM connector. (See Figure B-6.) Caution To prevent damage, do not press on the center of the SIMMs. Handle each SIMM carefully.
Closing the Chassis Step 8 Using the system card orientation shown in Figure B-6, position the new SIMM so that the polarization notch is located at the right end of the SIMM socket. Note that the orientation of the system card is the opposite of that shown in Figure B-2.
Closing the Chassis Replacing the Cover After you perform the maintenance for your system, take the following steps to replace the cover: Step 1 Position the two chassis sections as shown in Figure B-7. Step 2 Referring to Figure B-7, press the two chassis sections together and ensure the following: • • • The top section fits into the rear of the bottom section. (See A in Figure B-7.) The bottom section fits into the front of the top section. (See B in Figure B-7.
Recovering a Lost Enable Password Step 5 Reinstall the chassis on the wall, rack, desktop, or table. Step 6 Replace all cables. Recovering a Lost Enable Password This section describes in outline and then in detail how to recover a lost enable password. Note Recovering a lost password is possible on the enable password. Systems running Cisco IOS Release 10.3(2) or later use the enable secret password, which is encrypted and must be replaced with a new enable secret.
Recovering a Lost Enable Password Note To recover a lost enable password if Break is disabled on the router, you must have physical access to the access server. Take the following steps to recover a lost enable password: Step 1 Attach an ASCII terminal to the access server console port, which is located on the rear panel. Step 2 Configure the terminal to operate at 9600 baud, 8 data bits, no parity, 2 stop bits. Step 3 Enter the command show version to display the existing configuration register value.
Recovering a Lost Enable Password Step 9 Press Return. The boot ROM prompt appears as follows: Router> Step 10 Enter the enable command to enter the EXEC mode in the boot ROM image. Then enter the command configure memory as follows: Router# configure memory Step 11 Enter the EXEC command configure terminal to display the enable password in the configuration file and to display any boot system commands.
Virtual Configuration Register Settings Virtual Configuration Register Settings The access server has a 16-bit virtual configuration register, which is written into NVRAM. You might want to change the virtual configuration register settings for the following reasons: • • • • • • • • Set and display the configuration register value Force the system into the ROM monitor or boot ROM.
Virtual Configuration Register Settings Bit No.1 Hexadecimal Meaning 11–12 0x0800–0x1000 Console line speed 13 0x2000 Load the boot ROM software if a Flash boot fails five times 14 0x4000 IP broadcasts do not have network numbers 15 0x8000 Enable diagnostic messages and ignore the contents of NVRAM 1. The factory default value for the configuration register is 0x2102. This value is a combination of the following: bit 13 = 0x2000, bit 8 = 0x0100, and bits 00 through 03 = 0x0002.
Virtual Configuration Register Settings Step 2 At the privileged-level system prompt (access server #), enter the command configure terminal. You will be prompted as shown in the following example: router# conf term Enter configuration commands, one per line.
Virtual Configuration Register Settings Step 6 Reboot the access server. The new value takes effect. Configuration register changes take effect only when the server restarts, which occurs when you switch the power off and on or when you issue a reload command from the console. Virtual Configuration Register Bit Meanings The lowest four bits of the virtual configuration register (bits 3, 2, 1, and 0) form the boot field. (See Table B-3.) The boot field specifies a number in binary form.
Virtual Configuration Register Settings Action or Filename Bit 3 Bit 2 Bit 1 Bit 0 cisco4-igs 0 1 0 0 cisco5-igs 0 1 0 1 cisco6-igs 0 1 1 0 cisco7-igs 0 1 1 1 cisco10-igs 1 0 0 0 cisco11-igs 1 0 0 1 cisco12-igs 1 0 1 0 cisco13-igs 1 0 1 1 cisco14-igs 1 1 0 0 cisco15-igs 1 1 0 1 cisco16-igs 1 1 1 0 cisco17-igs 1 1 1 1 In the following example, the virtual configuration register is set to boot the access server from Flash memory and to ignore B
Virtual Configuration Register Settings Bit 8 controls the console Break key. Setting bit 8 (the factory default) causes the processor to ignore the console Break key. Clearing bit 8 causes the processor to interpret the Break key as a command to force the system into the bootstrap monitor, thereby halting normal operation. A break can be sent in the first 60 seconds while the system reboots, regardless of the configuration settings. Bit 10 controls the host portion of the IP broadcast address.
Copying to Flash Memory Bit 13 determines the server response to a bootload failure. Setting bit 13 causes the server to load operating software from ROM after five unsuccessful attempts to load a boot file from the network. Clearing bit 13 causes the server to continue attempting to load a boot file from the network indefinitely. By factory default, bit 13 is set to 1.
Copying to Flash Memory IP address or name of remote host [255.255.255.255]? server1 Name of tftp filename to copy into flash []? IJ09140Z copy IJ09140Z from 131.131.101.101 into flash memory? [confirm] xxxxxxxx bytes available for writing without erasure. erase flash before writing? [confirm] Clearing and initializing flash memory (please wait)####... Loading from 101.2.13.110: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!... [OK - 324572/524212 bytes] Verifying checksum...
C APPEND IX Cable Specifications This appendix provides the following pinout information: • • • • • • • • • • • • • • • • • Console Port Pinouts (RJ-45), Table C-1 Auxiliary Port Pinouts (RJ-45), Table C-2 EIA-530 DTE Cable Pinout (DB-60 to DB-25), Table C-3 EIA/TIA-232 DTE Cable Pinout (DB-60 to DB-25), Table C-4 EIA/TIA-232 DCE Cable Pinout (DB-60 to DB-25), Table C-5 EIA/TIA-449 DTE Cable Pinout (DB-60 to DB-37), Table C-6 EIA/TIA-449 DCE Cable Pinout (DB-60 to DB-37), Table C-7 V.
Console and Auxiliary Port Signals and Pinouts Console and Auxiliary Port Signals and Pinouts The console port is configured as data communications equipment (DCE), and the auxiliary port is configured as data terminal equipment (DTE). The console and auxiliary ports both use RJ-45 connectors. RJ-45-to-DB-25 adapters are available for connection to modems and other external communications equipment. Both ports are configured as asynchronous serial ports.
Serial Cable Assemblies and Pinouts Auxiliary Port (DTE) Pin1 Signal Input/Output 4 GND – 5 GND – 6 RXD Input 7 DSR Input 8 CTS Input 1. Any pin not referenced is not connected. Serial Cable Assemblies and Pinouts The following illustrations and tables provide assembly drawings and pinouts for the EIA-530 DCE, and EIA/TIA-232, EIA/TIA-449, V.35, and X.21 DTE and DCE cables. EIA-530 Figure C-1 shows the EIA-530 serial cable assembly, and Table C-3 lists the pinouts.
Serial Cable Assemblies and Pinouts Figure C-1 EIA-530 Serial Cable Assembly J1-46 J1-45 J1-16 J1-15 60-pin connector 25-pin connector H1972 J2-13 J2-25 J2-14 J2-1 J1-1 J1-30 J1-31 J1-60 Connectors are not to scale Table C-3 EIA-530 DTE Cable Pinout (DB-60 to DB-25) 60 Pin1 Signal 25 Pin Signal Direction DTE DCE2 J1-11 J1-12 TxD/RxD+ TxD/RxD– J2-2 J2-14 BA(A), TxD+ BA(B), TxD– —> —> J1-28 J1-27 RxD/TxD+ RxD/TxD– J2-3 J2-16 BB(A), RxD+ BB(B), RxD– <— <— J1-9 J1-10 RTS/CTS+ RTS/CT
Serial Cable Assemblies and Pinouts 60 Pin1 Signal 25 Pin Signal Direction DTE DCE2 J1-5 J1-6 DCD/DCD+ DCD/DCD– J2-8 J2-10 CF(A), DCD+ CF(B), DCD– <— <— J1-24 J1-23 TxC/RxC+ TxC/RxC– J2-15 J2-12 DB(A), TxC+ DB(B), TxC– <— <— J1-26 J1-25 RxC/TxCE+ RxC/TxCE– J2-17 J2-9 DD(A), RxC+ DD(B), RxC– <— <— J1-44 J1-45 LL/DCD Circuit_GN D J2-18 J2-7 LL Circuit_ GND —> – J1-7 J1-8 DTR/DSR+ DTR/DSR– J2-20 J2-23 CD(A), DTR+ CD(B), DTR– —> —> J1-13 J1-14 TxCE/TxC+ TxCE/TxC– J2-24 J2-11 DA
Serial Cable Assemblies and Pinouts Figure C-2 EIA/TIA-232 Cable Assembly J1-46 J1-45 J1-16 J1-15 60-pin connector 25-pin connector H1972 J2-13 J2-25 J2-14 J2-1 J1-1 J1-30 J1-31 J1-60 Table C-4 Connectors are not to scale EIA/TIA-232 DTE Cable Pinout (DB-60 to DB-25) 60 Pin1 Signal Description Direction 25 Pin Signal J1-50 J1-51 J1-52 MODE_0 GND MODE_DCE Shorting group – – – J1-46 Shield GND Single – J2-1 Shield GND J1-41 Shield TxD/RxD – Twisted pair no.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 25 Pin Signal J1-33 Shield DCD/LL – Twisted pair no. 12 <— – J2-8 Shield DCD – J1-37 Shield TxC/NIL – Twisted pair no. 8 <— – J2-15 Shield TxC – J1-38 Shield RxC/TxCE – Twisted pair no. 7 <— – J2-17 Shield RxC – J1-44 Shield LL/DCD – Twisted pair no. 2 —> – J2-18 Shield LTST – J1-43 Shield DTR/DSR – Twisted pair no. 3 —> – J2-20 Shield DTR – J1-39 Shield TxCE/TxC – Twisted pair no.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 25 Pin Signal J1-45 Shield Circuit GND – Twisted pair no. 1 – – J2-7 Shield Circuit GND J1-44 Shield LL/DCD – Twisted pair no. 2 —> – J2-8 Shield DCD – J1-39 Shield TxCE/TxC – Twisted pair no. 7 —> – J2-15 Shield TxC – J1-40 Shield NIL/RxC – Twisted pair no. 6 —> – J2-17 Shield RxC – J1-33 Shield DCD/LL – Twisted pair no. 12 <— – J2-18 Shield LTST – J1-34 Shield DSR/DTR – Twisted pair no.
Serial Cable Assemblies and Pinouts Figure C-3 EIA/TIA-449 Cable Assembly 60-pin connector (J1) 37-pin connector (J2) J2-19 J2-37 H1973 J1-46 J1-45 J1-16 J1-15 J1-1 J1-30 J1-31 J1-60 Table C-6 J2-20 J2-1 Connectors are not to scale EIA/TIA-449 DTE Cable Pinout (DB-60 to DB-37) 60 Pin1 Signal Description Direction 37 Pin Signal J1-49 J1-48 MODE_1 GND Shorting group – – – J1-51 J1-52 GND MODE_DCE Shorting group – – – J1-46 Shield_GND Single _ J2-1 Shield GND J1-11 J1-12 TxD
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 37 Pin Signal J1-1 J1-2 CTS/RTS+ CTS/RTS– Twisted pair no. 1 <— <— J2-9 J2-27 CS+ CS– J1-44 J1-45 LL/DCD Circuit_GND Twisted pair no. 12 —> _ J2-10 J2-37 LL SC J1-3 J1-4 DSR/DTR+ DSR/DTR– Twisted pair no. 2 <— <— J2-11 J2-29 DM+ DM– J1-7 J1-8 DTR/DSR+ DTR/DSR– Twisted pair no. 4 —> —> J2-12 J2-30 TR+ TR– J1-5 J1-6 DCD/DCD+ DCD/DCD– Twisted pair no.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 37 Pin Signal J1-24 J1-23 TxC/RxC+ TxC/RxC– Twisted pair no. 9 —> —> J2-8 J2-26 RT+ RT– J1-9 J1-10 RTS/CTS+ RTS/CTS– Twisted pair no. 5 —> —> J2-9 J2-27 CS+ CS– J1-29 J1-30 NIL/LL Circuit_GND Twisted pair no. 12 —> – J2-10 J2-37 LL SC J1-7 J1-8 DTR/DSR+ DTR/DSR– Twisted pair no. 4 —> —> J2-11 J2-29 DM+ DM– J1-3 J1-4 DSR/DTR+ DSR/DTR– Twisted pair no.
Serial Cable Assemblies and Pinouts V.35 Figure C-4 shows the V.35 cable assembly; Table C-8 lists the DTE pinout; Table C-9 lists the DCE pinout. Arrows indicate signal direction: —> indicates DTE to DCE, and <— indicates DCE to DTE. V.35 Cable Assembly 60-pin connector (J1) J1-46 J1-45 J1-16 J1-15 J1-1 J1-30 J1-31 J1-60 Table C-8 15-pin connector (J2) J2-B J2-D J2-A J2-C J2-KK J2-MM J2-LL J2-NN Connectors are not to scale H1975 Figure C-4 V.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 34 Pin Signal J1-45 Shield Circuit_GND – Twisted pair no. 12 – – J2-B Shield Circuit GND – J1-42 Shield RTS/CTS – Twisted pair no. 9 —> – J2-C Shield RTS – J1-35 Shield CTS/RTS – Twisted pair no. 8 <— – J2-D Shield CTS – J1-34 Shield DSR/DTR – Twisted pair no. 7 <— – J2-E Shield DSR – J1-33 Shield DCD/LL – Twisted pair no. 6 <— – J2-F Shield RLSD – J1-43 Shield DTR/DSR – Twisted pair no.
Serial Cable Assemblies and Pinouts Table C-9 V.35 DCE Cable Pinout (DB-60 to 34-Pin) 60 Pin1 Signal Description Direction 34 Pin Signal J1-49 J1-48 MODE_1 GND Shorting group – – – J1-50 J1-51 MODE_0 GND Shorting group – – – J1-53 J1-54 J1-55 J1-56 TxC/NIL RxC_TxCE RxD/TxD GND Shorting group – – – J1-46 Shield_GND Single – J2-A Frame GND J1-45 Shield Circuit_GND – Twisted pair no. 12 – – J2-B Shield Circuit GND – J1-35 Shield CTS/RTS – Twisted pair no.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 34 Pin Signal J1-20 J1-19 TxCE/TxC+ TxCE/TxC– Twisted pair no. 2 —> —> J2-Y J2-AA SCT+ SCT– 1. Any pin not referenced is not connected. X.21 Figure C-5 shows the X.21 cable assembly; Table C-10 lists the DTE pinout; Table C-11 lists the DCE pinout. Arrows indicate signal direction: —> indicates DTE to DCE, and <— indicates DCE to DTE. Figure C-5 X.
Serial Cable Assemblies and Pinouts 60 Pin1 Signal Description Direction 15 Pin Signal J1-46 Shield_GND Single – J2-1 Shield GND J1-11 J1-12 TxD/RxD+ TxD/RxD– Twisted pair no. 3 —> —> J2-2 J2-9 Transmit+ Transmit– J1-9 J1-10 RTS/CTS+ RTS/CTS– Twisted pair no. 2 —> —> J2-3 J2-10 Control+ Control– J1-28 J1-27 RxD/TxD+ RxD/TxD– Twisted pair no. 6 <— <— J2-4 J2-11 Receive+ Receive– J1-1 J1-2 CTS/RTS+ CTS/RTS– Twisted pair no.
Ethernet Cable Assembly and Pinout 60 Pin1 Signal Description Direction 15 Pin Signal J1-15 Shield Control_GND – Twisted pair no. 5 – – J2-8 Shield Control GND – 1. Any pin not referenced is not connected. Ethernet Cable Assembly and Pinout Figure C-6 shows an Ethernet (AUI) cable assembly, and Table C-12 lists an AUI cable pinout.
Token Ring Pinout Pin1 Ethernet Circuit Signal 2 CI-A Control In Circuit A 9 CI-B Control In Circuit B 1 CI-S Control In Circuit Shield 6 VC Voltage Common 13 VP Voltage Plus 14 VS Voltage Shield (L25 and M25) Shell PG Protective Ground 1. Any pin not referenced is not connected. Token Ring Pinout Table C-13 lists the pinout for the Token Ring interface port. Table C-13 Token Ring Port Pinout (DB-9) 9 Pin1 Signal 1 Receive 3 +5V2 5 Transmit 6 Receive 9 Transmit 1.
Asynchronous Serial Ports Asynchronous Serial Ports Figure C-7 shows the RJ-45 breakout cable with pinouts for the 68-pin SCSI port and the RJ-45 serial port. Table C-14 contains the pinout for the RJ-45 end, and Table C-15 contains the pinout for the 68-pin SCSI type connector.
Asynchronous Serial Ports Note The Asynchronous breakout cable is equivalent to a console or auxiliary port with a roll-over RJ-45 cable attached. See Table C-17 for asynchronous device connection options.
Asynchronous Serial Ports RJ-45 Plug Pin Signal 68-Pin SCSI (J1) 3 1 CTS 47 2 DSR 13 3 RXD 46 4 RXD GND 12 5 TXD GND 45 6 TXD 11 7 DTR 44 8 RTS 10 1 CTS 51 2 DSR 17 3 RXD 50 4 RXD GND 16 5 TXD GND 49 6 TXD 15 7 DTR 48 8 RTS 14 1 CTS 55 2 DSR 21 3 RXD 54 4 RXD GND 20 5 TXD GND 53 6 TXD 19 7 DTR 52 8 RTS 18 4 5 Cable Specifications C-21
Asynchronous Serial Ports RJ-45 Plug Pin Signal 68-Pin SCSI (J1) 6 1 CTS 59 2 DSR 25 3 RXD 58 4 RXD GND 24 5 TXD GND 57 6 TXD 23 7 DTR 56 8 RTS 22 1 CTS 53 2 DSR 29 3 RXD 62 4 RXD GND 28 5 TXD GND 61 6 TXD 27 7 DTR 60 8 RTS 26 1 CTS 67 2 DSR 33 3 RXD 66 4 RXD GND 32 5 TXD GND 65 6 TXD 31 7 DTR 64 8 RTS 30 7 8 C-22 Cisco 2500 Series Access Server User Guide
RJ-45 Adapter Pinouts RJ-45 Adapter Pinouts Refer to Table C-16 for a list of the pins used on the RJ-45-to-DB-25 adapters, used with an RJ-45 cable, to connect terminals and modems to the Cisco 2500 series access server. The cable you use may be a roll-over cable or a straight cable. A roll-over cable can be detected by comparing the two modular ends of the cable.
RJ-45 Adapter Pinouts Table C-16 Pinouts for the RJ-45-to-DB-25 Adapters Adapter DTE M/F Pins1 DCE M/F Pins MMOD Pins2 RJ-45 Pins DB-25 Pins 1 4 5 5 2 20 6 8 3 2 3 3 4 7 7 7 5 7 7 7 6 3 2 2 7 6 20 20 8 5 4 4 1. The female data terminal equipment (FDTE) adapter that is available from Cisco is labeled “Terminal.” 2. The MMOD adapter that is available from Cisco is labeled “Modem.
APPEND IX D Translated Safety Warnings This appendix repeats in multiple languages the warnings in this publication. Warning Definition Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Waarschuwing Dit waarschuwingssymbool betekent gevaar.
Jewelry Removal Warning Warnung Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt. Avvertenza Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle persone.
Jewelry Removal Warning Varoitus Ennen kuin työskentelet voimavirtajohtoihin kytkettyjen laitteiden parissa, ota pois kaikki korut (sormukset, kaulakorut ja kellot mukaan lukien). Metalliesineet kuumenevat, kun ne ovat yhteydessä sähkövirran ja maan kanssa, ja ne voivat aiheuttaa vakavia palovammoja tai hitsata metalliesineet kiinni liitäntänapoihin. Attention Avant d’accéder à cet équipement connecté aux lignes électriques, ôter tout bijou (anneaux, colliers et montres compris).
Installation Warning Installation Warning Warning Read the installation instructions before you connect the system to its power source. Waarschuwing Raadpleeg de installatie-aanwijzingen voordat u het systeem met de voeding verbindt. Varoitus Lue asennusohjeet ennen järjestelmän yhdistämistä virtalähteeseen. Attention Avant de brancher le système sur la source d'alimentation, consulter les directives d'installation.
Circuit Breaker (15A) Warning Advarsel Utstyret er utfomet til bruk med TN-strømsystemer. Aviso O dispositivo foi criado para operar com sistemas de corrente TN. ¡Atención! El equipo está diseñado para trabajar con sistemas de alimentación tipo TN. Varning! Enheten är konstruerad för användning tillsammans med elkraftssystem av TN-typ. Circuit Breaker (15A) Warning Warning This product relies on the building’s installation for short-circuit (overcurrent) protection.
SELV Circuit Warning Advarsel Dette produktet er avhengig av bygningens installasjoner av kortslutningsbeskyttelse (overstrøm). Kontroller at det brukes en sikring eller strømbryter som ikke er større enn 120 VAC, 15 A (USA) (240 VAC, 10 A internasjonalt) på faselederne (alle strømførende ledere). Aviso Este produto depende das instalações existentes para protecção contra curto-circuito (sobrecarga).
SELV Circuit Warning Varoitus Portit, joissa on nimet "Ethernet", "10BaseT", "Token Ring", "Console" ja "AUX", ovat erityisen pienen jännityksen omaavia turvallisuuspiirejä (SELV-piirejä). Tällaiset SELV-piirit tulee yhdistää ainoastaan muihin SELV-piireihin. Koska perusluokan liitäntöjen (Basic Rate Interface- eli BRI-liitännät) jännite vastaa puhelinverkoston jännitettä, vältä SELV-piirin yhdistämistä puhelinverkoston jännitepiireihin (TNV-piireihin).
Power Supply Disconnection Warning ¡Atención! Los puertos "Ethernet", "10BaseT", "Token Ring", "Console" y "AUX" son circuitos de baja señal (Safety Extra Low Voltage = SELV) que garantizan ausencia de peligro. Estos circuitos SELV deben ser conectados exclusivamente con otros también de tipo SELV. Puesto que los circuitos tipo BRI se comportan como aquéllos con voltajes de red telefónica, debe evitarse conectar circuitos SELV con circuitos de voltaje de red telefónica (TNV).
Power Supply Disconnection Warning Advarsel Før det utføres arbeid på kabinettet eller det arbeides i nærheten av strømforsyningsenheter, skal strømledningen trekkes ut på vekselstrømsenheter, eller strømmen kobles fra ved strømbryteren på likestrømsenheter. Aviso Antes de trabalhar num chassis, ou antes de trabalhar perto de unidades de fornecimento de energia, desligue o cabo de alimentação nas unidades de corrente alternada, ou desligue a corrente no disjuntor nas unidades de corrente contínua.
Power Supply Disconnection Warning Attention Ne pas toucher le bloc d'alimentation quand le cordon d'alimentation est branché. Avec les systèmes munis d'un commutateur marche-arrêt, des tensions de ligne sont présentes dans l'alimentation quand le cordon est branché, même si le commutateur est à l'arrêt. Avec les systèmes sans commutateur marche-arrêt, l'alimentation est sous tension quand le cordon d'alimentation est branché. Warnung Berühren Sie das Netzgerät nicht, wenn das Netzkabel angeschlossen ist.
Lightning Activity Warning Lightning Activity Warning Warning Do not work on the system or connect or disconnect cables during periods of lightning activity. Waarschuwing Tijdens onweer dat gepaard gaat met bliksem, dient u niet aan het systeem te werken of kabels aan te sluiten of te ontkoppelen. Varoitus Älä työskentele järjestelmän parissa äläkä yhdistä tai irrota kaapeleita ukkosilmalla. Attention Ne pas travailler sur le système ni brancher ou débrancher les câbles pendant un orage.
Lightning Activity Warning D-12 Cisco 2500 Series Access Server User Guide