Perform Initial Configuration on Cisco 4000 Series ISRs
You can perform initial configuration on Cisco 4000 Series ISRs by using either the setup command facility or the Cisco IOS command-line interface (CLI):
Use Cisco Setup Command Facility
The setup command facility prompts you to enter the information about your router and network. The facility steps guides you through the initial configuration, which includes LAN and WAN interfaces. For more general information about the setup command facility, see the following document:
Cisco IOS Configuration Fundamentals Configuration Guide , Release 12.4, Part 2: Cisco IOS User Interfaces: Using AutoInstall and Setup: http://www.cisco.com/c/en/us/support/ios-nx-os-software/ios-xe-3s/products-installation-and-configuration-guides-list.html.
This section explains how to configure a hostname for the router, set passwords, and configure an interface to communicate with the management network.
Note |
The messages that are displayed will vary based on your router model, the installed interface modules, and the software image. The following example and the user entries (in bold ) are shown only as examples. |
Note |
If you make a mistake while using the setup command facility, you can exit and run the setup command facility again. Press Ctrl-C , and enter the setup command in privileged EXEC mode (Router#) |
To configure the initial router settings by using the setup command facility, follow these steps:
SUMMARY STEPS
- From the Cisco IOS-XE CLI, enter the setup command in privileged EXEC mode:
- To proceed using the setup command facility, enter yes .
- To enter the basic management setup, enter yes .
- Enter a hostname for the router (this example uses ‘myrouter’):
- Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration.
- Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration.
- Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port:
- Respond to the following prompts as appropriate for your network:
- Respond to the following prompts as appropriate for your network:
- Respond to the following prompts. Select [2] to save the initial configuration:
DETAILED STEPS
Step 1 |
From the Cisco IOS-XE CLI, enter the setup command in privileged EXEC mode: Example:
You are now in the Setup Configuration Utility. Depending on your router model, the installed interface modules, and the software image, the prompts in the setup command facility vary. The following steps and the user entries (in bold) are shown only as examples.
|
||||
Step 2 |
To proceed using the setup command facility, enter yes . Example:
|
||||
Step 3 |
To enter the basic management setup, enter yes . Example:
|
||||
Step 4 |
Enter a hostname for the router (this example uses ‘myrouter’): Example:
|
||||
Step 5 |
Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration. Example:
|
||||
Step 6 |
Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration. Example:
|
||||
Step 7 |
Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port: Example:
|
||||
Step 8 |
Respond to the following prompts as appropriate for your network: Example:
A summary of the available interfaces is displayed.
Example:
|
||||
Step 9 |
Respond to the following prompts as appropriate for your network: Example:
The following configuration command script was created: Example:
|
||||
Step 10 |
Respond to the following prompts. Select [2] to save the initial configuration: Example:
The user prompt is displayed: Example:
|
Complete the Configuration
When using the Cisco Setup, and after you have provided all the information requested by the facility, the final configuration appears. To complete your router configuration, follow these steps:
SUMMARY STEPS
- Choose to save the configuration when the facility prompts you to save the configuration.
- When the messages stop appearing on your screen, press Return to get the Router> prompt.
- Choose to modify the existing configuration or create another configuration. The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed a initial router configuration. Nevertheless, this is not a complete configuration. At this point, you have two choices:
DETAILED STEPS
Step 1 |
Choose to save the configuration when the facility prompts you to save the configuration.
Example:
|
Step 2 |
When the messages stop appearing on your screen, press Return to get the Router> prompt. |
Step 3 |
Choose to modify the existing configuration or create another configuration. The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed a initial router configuration. Nevertheless, this is not a complete configuration. At this point, you have two choices:
Example:
Example:
|
Use Cisco IOS XE CLI—Manual Configuration
This section describes you how to access the command-line interface (CLI) to perform the initial configuration on the router.
Note |
To configure the initial router settings by using the Cisco IOS CLI, you must set up a console connection. |
If the default configuration file is installed on the router prior to shipping, the system configuration dialog message does not appear, To configure the device, follow these steps:
SUMMARY STEPS
- Enter the appropriate answer when the following system message appears on the router.
- Press Return to terminate autoinstall and continue with manual configuration:
- Press Return to bring up the Router> prompt.
- Type enable to enter privileged EXEC mode:
DETAILED STEPS
Step 1 |
Enter the appropriate answer when the following system message appears on the router. Example:
|
Step 2 |
Press Return to terminate autoinstall and continue with manual configuration: Example:
Several messages are displayed, ending with a line similar to the following: Example:
|
Step 3 |
Press Return to bring up the Router> prompt. Example:
|
Step 4 |
Type enable to enter privileged EXEC mode: Example:
|
Configure Cisco 4000 Series ISR Hostname
The hostname is used in CLI prompts and default configuration filenames. If you do not configure the router hostname, the router uses the factory-assigned default hostname “Router.”
SUMMARY STEPS
- enable
- configure terminal
- hostname name
- Verify that the router prompt displays your new hostname.
- end
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
hostname name Example:
|
Specifies or modifies the hostname for the network server. |
Step 4 |
Verify that the router prompt displays your new hostname. Example:
|
— |
Step 5 |
end Example:
|
(Optional) Returns to privileged EXEC mode. |
Configure the Enable and Enable Secret Passwords
To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, you can use either the enable password command or enable secret command. Both commands accomplish the same thing—they allow you to establish an encrypted password that users must enter to access privileged EXEC (enable) mode.
We recommend that you use the enable secret command because it uses an improved encryption algorithm. Use the enable password command only if you boot an older image of the Cisco IOS XE software.
For more information, see the “Configuring Passwords and Privileges” chapter in the Cisco IOS Security Configuration Guide . Also see the Cisco IOS Password Encryption Facts tech note and the Improving Security on Cisco Routers tech note.
Note |
If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously. |
SUMMARY STEPS
- enable
- configure terminal
- enable password password
- enable secret password
- end
- enable
- end
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
enable password password Example:
|
(Optional) Sets a local password to control access to various privilege levels.
|
Step 4 |
enable secret password Example:
|
Specifies an additional layer of security over the enable password command.
|
Step 5 |
end Example:
|
Returns to privileged EXEC mode. |
Step 6 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 7 |
end Example:
|
(Optional) Returns to privileged EXEC mode. |
Configure the Console Idle Privileged EXEC Timeout
This section describes how to configure the console line’s idle privileged EXEC timeout. By default, the privileged EXEC command interpreter waits 10 minutes to detect user input before timing out.
When you configure the console line, you can also set communication parameters, specify autobaud connections, and configure terminal operating parameters for the terminal that you are using. For more information on configuring the console line, see the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide . In particular, see the “Configuring Operating Characteristics for Terminals” and “Troubleshooting and Fault Management” chapters.
SUMMARY STEPS
- enable
- configure terminal
- line console 0
- exec-timeout minutes [seconds ]
- end
- show running-config
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
line console 0 Example:
|
Configures the console line and starts the line configuration command collection mode. |
Step 4 |
exec-timeout minutes [seconds ] Example:
|
Sets the idle privileged EXEC timeout, which is the interval that the privileged EXEC command interpreter waits until user input is detected.
|
Step 5 |
end Example:
|
Returns to privileged EXEC mode. |
Step 6 |
show running-config Example:
|
Displays the running configuration file.
|
Examples
The following example shows how to set the console idle privileged EXEC timeout to 2 minutes 30 seconds:
line console
exec-timeout 2 30
The following example shows how to set the console idle privileged EXEC timeout to 30 seconds:
line console
exec-timeout 0 30
Gigabit Ethernet Management Interface Overview
The router provides an Ethernet management port named GigabitEthernet0.
The purpose of this interface is to allow users to perform management tasks on the router. It is an interface that should not and often cannot forward network traffic. It ca, however, be used to access the router through Telnet and SSH to perform management tasks on the router. The interface is most useful before a router begins routing, or in troubleshooting scenarios when other forwarding interfaces are inactive.
Note he following aspects of the management ethernet interface:
- The router has one management ethernet interface named GigabitEthernet0.
- IPv4, IPv6, and ARP are the only routed protocols supported for the interface.
- The interface provides a way to access to the router even if forwarding interfaces are not functional, or the IOS process is down.
- The management ethernet interface is part of its own VRF. See the “ Management Ethernet Interface VRF ” section in the Software Configuration Guide for Cisco 4000 Series ISRs for more details.
Default Gigabit Ethernet Configuration
By default, a forwarding VRF is configured for the interface with a special group named “Mgmt-intf.” This cannot be changed. This isolates the traffic on the management interface away from the forwarding plane. The basic configuration is like other interfaces; however, there are many forwarding features that are not supported on these interfaces. No forwarding features can be configured on the GigabitEthernet0 interface as it is only used for management.
For example, the default configuration is as follows:
interface GigabitEthernet0
vrf forwarding Mgmt-intf
ip address 172.18.77.212 255.255.255.0
negotiation auto
Gigabit Ethernet Port Numbering
The Gigabit Ethernet Management port is always GigabitEthernet0.
The port can be accessed in configuration mode.
Router# config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface gigabitethernet0
Router(config-if)#
Configure Gigabit Ethernet Interfaces
This sections shows how to assign an IP address and interface description to an Ethernet interface on your router.
For comprehensive configuration information on Gigabit Ethernet interfaces, see the “Configuring LAN Interfaces” chapter of Cisco IOS Interface and Hardware Component Configuration Guide , http://www.cisco.com/en/US/docs/ios/12_2/interface/configuration/guide/icflanin.html
For information on interface numbering, see the software configuration guide for your router.
SUMMARY STEPS
- enable
- show ip interface brief
- configure terminal
- interface {fastethernet | gigabitethernet } 0/ port
- description string
- ip address ip-address mask
- no shutdown
- end
- show ip interface brief
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
||
Step 2 |
show ip interface brief Example:
|
Displays a brief status of the interfaces that are configured for IP.
|
||
Step 3 |
configure terminal Example:
|
Enters global configuration mode. |
||
Step 4 |
interface {fastethernet | gigabitethernet } 0/ port Example:
|
Specifies the Ethernet interface and enters interface configuration mode.
|
||
Step 5 |
description string Example:
|
(Optional) Adds a description to an interface configuration. The description helps you remember what is attached to this interface. The description can be useful for troubleshooting. |
||
Step 6 |
ip address ip-address mask Example:
|
Sets a primary IP address for an interface. |
||
Step 7 |
no shutdown Example:
|
Enables an interface. |
||
Step 8 |
end Example:
|
Returns to privileged EXEC mode. |
||
Step 9 |
show ip interface brief Example:
|
Displays a brief status of the interfaces that are configured for IP. Verify that the Ethernet interfaces are up and configured correctly. |
Configuration Examples
Configuring the GigabitEthernet Interface: Example
!
interface GigabitEthernet0/0/0
description GE int to HR group
ip address 172.16.3.3 255.255.255.0
duplex auto
speed auto
no shutdown
!
Sample Output for the show ip interface brief Command
Router#show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 unassigned YES NVRAM administratively down down
GigabitEthernet0/0/1 unassigned YES NVRAM administratively down down
GigabitEthernet0/0/2 unassigned YES NVRAM administratively down down
GigabitEthernet0/0/3 unassigned YES NVRAM administratively down down
GigabitEthernet0 10.0.0.1 YES manual up up
Specify a Default Route or Gateway of Last Resort
This section describes how to specify a default route with IP routing enabled. For alternative methods of specifying a default route, see the Configuring a Gateway of Last Resort Using IP Commands Technical Specifications Note.
The Cisco IOS-XE software uses the gateway (router) as a last resort if it does not have a better route for a packet and if the destination is not a connected network. This section describes how to select a network as a default route (a candidate route for computing the gateway of last resort). The way in which routing protocols propagate the default route information varies for each protocol.
Configure IP Routing and IP Protocols
For comprehensive configuration information about IP routing and IP routing protocols, see the Configuring IP Routing Protocol-Independent Feature at cisco.com.
IP Routing
IP routing is automatically enabled in the Cisco ISO- XE software. When IP routing is configured, the system will use a configured or learned route to forward packets, including a configured default route.
Note |
This task section does not apply when IP routing is disabled. To specify a default route when IP routing is disabled, refer to the Configuring a Gateway of Last Resort Using IP Commands Technical Specifications Note at cisco.com. |
Default Routes
A router might not be able to determine the routes to all other networks. To provide complete routing capability, the common practice is to use some routers as smart routers and give the remaining routers default routes to the smart router. (Smart routers have routing table information for the entire internetwork.) These default routes can be passed along dynamically, or can be configured into the individual routers.
Most dynamic interior routing protocols include a mechanism for causing a smart router to generate dynamic default information that is then passed along to other routers.
Default Network
If a router has an interface that is directly connected to the specified default network, the dynamic routing protocols running on the router generates or sources a default route. In the case of RIP, the router will advertise the pseudonetwork 0.0.0.0. In the case of IGRP, the network itself is advertised and flagged as an exterior route.
A router that is generating the default for a network may also need a default of its own. One way a router can generate its own default is to specify a static route to the network 0.0.0.0 through the appropriate device.
Gateway of Last Resort
When default information is being passed along through a dynamic routing protocol, no further configuration is required. The system periodically scans its routing table to choose the optimal default network as its default route. In the case of RIP, there is only one choice, network 0.0.0.0. In the case of IGRP, there might be several networks that can be candidates for the system default. The Cisco IOS-XE software uses both administrative distance and metric information to determine the default route (gateway of last resort). The selected default route appears in the gateway of last resort display of the show ip route EXEC command.
If dynamic default information is not being passed to the software, candidates for the default route are specified with the ip default-network global configuration command. In this usage, the ip default-network command takes an unconnected network as an argument. If this network appears in the routing table from any source (dynamic or static), it is flagged as a candidate default route and is a possible choice for the default route.
If the router has no interface on the default network, but does have a route to it, it considers this network as a candidate default path. The route candidates are examined and based on administrative distance and metric, the best one is chosen. The gateway to the best default path becomes the gateway of last resort.
SUMMARY STEPS
- enable
- configure terminal
- ip routing
- ip route dest-prefix mask next-hop-ip-address [admin-distance ] [permanent ]
- Do one of the following:
- ip default-network network-number
- ip route dest-prefix mask next-hop-ip-address
- end
- show ip route
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode. Enter your password if prompted. |
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
ip routing Example:
|
Enables IP routing. |
Step 4 |
ip route dest-prefix mask next-hop-ip-address [admin-distance ] [permanent ] Example:
|
Establishes a static route. |
Step 5 |
Do one of the following:
Example:
Example:
|
Selects a network as a candidate route for computing the gateway of last resort. Creates a static route to network 0.0.0.0 0.0.0.0 for computing the gateway of last resort. |
Step 6 |
end Example:
|
Returns to privileged EXEC mode. |
Step 7 |
show ip route Example:
|
Displays the current routing table information. Verify that the gateway of last resort is set. |
Configuration Examples
Specifying a Default Route: Example
!
ip route 192.168.24.0 255.255.255.0 172.28.99.2
!
ip default-network 192.168.24.0
!
Sample Output for the show ip route Command
Router# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default,
U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP,
l - LISP a - application route + - replicated route, % - next hop override
Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks C 10.0.0.0/24 is directly connected, Loopback1 L 10.0.0.1/32 is directly connected, Loopback1 Router#
Configure Virtual Terminal Lines for Remote Console Access
Virtual terminal (vty) lines are used to allow remote access to the router. This section shows you how to configure the virtual terminal lines with a password, so that only authorized users can remotely access the router.
By default, the router has five virtual terminal lines. However, you can create additional virtual terminal lines. See the Cisco IOS XE Dial Technologies Configuration Guide at http://www.cisco.com/en/US/docs/ios/dial/configuration/guide/2_xe/dia_2_xe_book.html .
Line passwords and password encryption is described in the C isco IOS XE Security Configuration Guide: Secure Connectivity document available at the following URL: http://www.cisco.com/en/US/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/2_xe/sec_secure_connectivity_xe_book.html . See the Security with Passwords, Privilege Levels, and Login Usernames for CLI Sessions on Networking Devices section. If you want to secure the virtual terminal lines (vty) with an access list, see the Access Control Lists: Overview and Guidelines.
SUMMARY STEPS
- enable
- configure terminal
- line vty line-number [ending-line-number ]
- password password
- login
- end
- show running-config
- From another network device, attempt to open a Telnet session to the router.
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode. Enter your password if prompted. |
||
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
||
Step 3 |
line vty line-number [ending-line-number ] Example:
|
Starts the line configuration command collection mode for the virtual terminal lines (vty) for remote console access.
|
||
Step 4 |
password password Example:
|
Specifies a password on a line. |
||
Step 5 |
login Example:
|
Enables password checking at login. |
||
Step 6 |
end Example:
|
Returns to privileged EXEC mode. |
||
Step 7 |
show running-config Example:
|
Displays the running configuration file. Verify that you bave properly configured the virtual terminal lines for remote access. |
||
Step 8 |
From another network device, attempt to open a Telnet session to the router. Example:
Example:
|
Verifies that you can remotely access the router and that the virtual terminal line password is correctly configured. |
Configuration Examples
The following example shows how to configure virtual terminal lines with a password:
!
line vty 0 4
password guessagain
login
!
What to Do Next
After you configure the vty lines, follow these steps:
- (Optional) To encrypt the virtual terminal line password, see the “Configuring Passwords and Privileges” chapter in the Cisco IOS Security Configuration Guide . Also see the Cisco IOS Password Encryption Facts tech note.
- (Optional) To secure the VTY lines with an access list, see the “Part 3: Traffic Filtering and Firewalls” in the Cisco IOS Security Configuration Guide .
Configure the Auxiliary Line
This section describes how to enter line configuration mode for the auxiliary line. How you configure the auxiliary line depends on your particular implementation of the auxiliary (AUX) port. See the following documents for information on configuring the auxiliary line:
- Configuring a Modem on the AUX Port for EXEC Dialin Connectivity , Technical Specifications Note http://www.cisco.com/en/US/tech/tk801/tk36/technologies_tech_note09186a0080094bbc.shtml
- Configuring Dialout Using a Modem on the AUX Port , sample configuration http://www.cisco.com/en/US/tech/tk801/tk36/technologies_configuration_example09186a0080094579.shtml
- Configuring AUX-to-AUX Port Async Backup with Dialer Watch , sample configuration http://www.cisco.com/en/US/tech/tk801/tk36/technologies_configuration_example09186a0080093d2b.shtml
- Modem-Router Connection Guide , Technical Specifications Note http://www.cisco.com/en/US/tech/tk801/tk36/technologies_tech_note09186a008009428b.shtml
SUMMARY STEPS
- enable
- configure terminal
- line aux 0
- See the Technical Specifications Note and sample configurations to configure the line for your particular implementation of the AUX port.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode.
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
Step 3 |
line aux 0 Example:
|
Starts the line configuration command collection mode for the auxiliary line. |
Step 4 |
See the Technical Specifications Note and sample configurations to configure the line for your particular implementation of the AUX port. |
— |