|
|
This chapter describes the following configurations:
The following features can be configured in your network:
Cisco recommends that you familiarize yourself with the features in the configuration examples to help you decide which features you wish to include in your network.
![]() |
Note Certain protocols (IP, User Datagram Protocol [UDP], IPX, and Network Time Protocol [NTP]) send updates that can cause an ISDN line to be activated excessively. For information on preventing this situation, see the "Controlling the DDR ISDN Line Activation" section later in this chapter. |
Before configuring the advanced networks or the advanced features, you must do the following:
Step 2 While ordering your ISDN line, gather the following information from your telephone service provider:
![]() |
Note The format of the LDN varies from region to region, depending on the telephone service provider. In some regions, you need to add the area code to the telephone number. Find out from your local telephone service provider whether or not you need to specify an area code for the LDN. |
Step 3 If setting up an Internet connection, gather the following information from your Internet service provider (ISP):
Step 4 If setting up a connection to a corporate network, you and the network administrator of the corporate network must decide on or generate the following information for the WAN interfaces of your routers and share this information:
Step 5 If setting up either IP or IPX routing, generate the following information:
Step 6 Decide which router configuration method to use:
![]() |
Note Cisco strongly recommends that you use the Cisco 800 Fast Step application to configure your router. |
In the network example shown in Figure 4-1, the Cisco 800 series router connects a private IP network to an ISP and a corporate network. In this network, the ISP assigns a registered IP address for the WAN interface only.

This network uses the following features on the LAN:
This network uses the following features on the WAN:
With NAT overload configured, your router can use one address for multiple hosts. With IPCP configured, your router can automatically negotiate its IP address from the router it is attempting to connect to.
You can use CHAP or PAP as the PPP authentication protocol. Cisco recommends using CHAP, because it is more secure. For more information, see the "Selecting PPP Authentication Protocol" section in Appendix A, "Concepts."
For the ISDN connection, you can use one of the following options:
For complete information on these options, including how to configure them, see the "Configuring the ISDN Line" section later in this chapter.
The IP routing protocol can use either RIP or EIGRP to learn routes dynamically. For more information on the benefits and differences, see the "Selecting IP Routing Protocols" section in Appendix A, "Concepts." You can also use triggered extensions to RIP to control when RIP sends routing updates. For information on how to configure these options, see the "Configuring Dynamic Routing" section later in this chapter.
![]() |
Note Before you begin to configure your router, review "Before Configuring Advanced Networks or Features" earlier in this chapter. |
Starting from global configuration mode, follow these steps to configure the Cisco 800 series router in the private IP network to connect to the Internet and the corporate network. For more information on the commands used, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# hostname c804 | Enter the router name. |
Step 3 | c804(config)# enable secret 804password | Enter the password. |
Step 4 | c804(config)# pots country us | Optional. If you have a Cisco 803 or 803 router that is connected to telephones, fax machines, or modems, specify the country where your router is located. Specifying a country configures the country-specific default settings for each physical characteristic. |
Step 5 | c804(config)# interface bri0 c804(config-if)# isdn switch-type basic-ni c804(config-if) exit | Change to interface configuration mode, set the ISDN switch type, and return to global configuration mode. |
Step 6 | c804(config)# ip subnet-zero | Set the router to recognize the zero subnet range as a valid range of addresses. |
Step 7 | c804(config)# ip dhcp pool DHCPpoolLAN_0 | Optional. Configure your router as a DHCP server. This step specifies the DHCP relay pool name. |
Step 8 | c804(dhcp-config)# network 10.0.0.0 255.255.255.0 | For configuring DHCP only. Set the DHCP pool of addresses. |
Step 9 | c804(dhcp-config)# dns-server 192.168.1.100 | For configuring DHCP only. Set the IP address of the DNS server. |
Step 10 | c804(dhcp-config)# netbios-name-server 10.1.1.2 10.1.1.3 | For configuring DHCP only. Set the NetBIOS servers. |
Step 11 | c804(dhcp-config)# default-router 10.1.1.1 | For configuring DHCP only. Set the Ethernet 0 IP address as the default gateway. |
Step 12 | c804(dhcp-config)# exit | For configuring DHCP only. Exit to global configuration mode. |
Step 13 | c804(config)# ipx routing | Enable IPX routing. The router uses the Media Access Control (MAC) address of the Ethernet port as the node address. Cisco 803 and 804 routers use the MAC address of Ethernet port 0. |
Step 14 | c804(config)# interface ethernet0 c804(config-if)# ipx network BEEF encapsulation SAP | Change to the Ethernet interface configuration mode to enable IPX routing on the Ethernet interface and select the type of encapsulation. |
Step 15 | c804(config-if)# ip address 10.0.0.1 255.255.255.0 | Enter the IP address and subnet mask. |
Step 16 | c804(config-if)# ip nat inside c804(config-if)# exit | Enable Network Address Translation (NAT) on your LAN, then change to global configuration mode. |
Step 17 | c804(config)# interface bri0 | Change to interface configuration mode for BRI0. |
Step 18 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 19 | c804(config-if)# isdn incoming-voice modem | Optional. Specify that incoming voice calls are forwarded to the devices connected to the telephone ports. |
Step 20 | c804(config-if)# ppp authentication pap chap callin | Enable PAP or CHAP on incoming calls only. |
Step 21 | c804(config-if)# ppp chap hostname c804 c804(config-if)# ppp chap password 804password | For CHAP only. Define the router hostname and password to authenticate. |
Step 22 | c804(config-if)# ppp multilink | Enable multilink PPP. |
Step 23 | c804(config-if)# ip nat outside c804(config-if)# exit | Configure a valid Internet address to which the inside network address will be translated, then change to global configuration mode. |
Step 24 | c804(config)# interface dialer1 | Create a dialer interface. |
Step 25 | c804(config-if)# ip unnumbered ethernet0 | Specify that no specific IP addresses are assigned for Ethernet 0. |
Step 26 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 27 | c804(config-if)# dialer remote-name corp_router | Specify the name of the corporate router. |
Step 28 | c804(config-if)# dialer pool 1 | Assign a dialer pool. |
Step 29 | c804(config-if)# dialer idle-timeout 300 | Specify the time in seconds that the line is idle before it is disconnected. |
Step 30 | c804(config-if)# dialer string 7771111 | Set up the dialer string. |
Step 31 | c804(config-if)# dialer hold-queue 10 | Specify the maximum number of packets to be held in the outgoing queue. |
Step 32 | c804(config-if)# dialer load-threshold 150 either | Define the load level that must be exceeded on the first ISDN B channel before the second B channel is brought up. The load-threshold variable is a number from 1 to 255 representing a utilization percentage. Enter outbound to calculate the load using outbound data only, inbound to use inbound data only, and either to set the maximum load as the larger of the two loads. |
Step 33 | c804(config-if)# dialer-group 1 | Assign the interface to dialer access group 1. |
Step 34 | c804(config-if)# ipx network AAAA | Define the IPX network. |
Step 35 | c804(config-if)# ppp authentication chap pap callin | Configure CHAP and PAP to authenticate incoming calls. |
Step 36 | c804(config-if)# ppp chap hostname c804 c804(config-if)# ppp chap password 804password | Specify the CHAP hostname and password. |
Step 37 | c804(config-if)# ppp pap sent-username c804 password 804password | Specify the PAP username and password. |
Step 38 | c804(config)# interface dialer2 | Create a second dialer interface. |
Step 39 | c804(config-if)# ip address negotiated | Specify that IP addresses are negotiated. |
Step 40 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 41 | c804(config-if)# dialer remote-name isp | Specify the name of the corporate router. |
Step 42 | c804(config-if)# dialer pool 2 | Assign a dialer pool. |
Step 43 | c804(config-if)# dialer idle-timeout 300 | Specify the time in seconds that the line is idle before it is disconnected. |
Step 44 | c804(config-if)# dialer string 18001234567 | Set up the dialer string. |
Step 45 | c804(config-if)# dialer hold-queue 10 | Specify the maximum number of packets to be held in the outgoing queue. |
Step 46 | c804(config-if)# dialer load-threshold 150 either | Define the load level that must be exceeded on the first ISDN B channel before the second B channel is brought up. The load-threshold variable is a number from 1 to 255 representing a utilization percentage. Enter outbound to calculate the load using outbound data only, inbound to use inbound data only, and either to set the maximum load as the larger of the two loads. |
Step 47 | c804(config-if)# dialer-group 1 | Assign the interface to dialer access group 1. |
Step 48 | c804(config-if)# ppp authentication chap pap callin | Configure CHAP and PAP to authenticate incoming calls. |
Step 49 | c804(config-if)# ppp chap hostname c804(config-if)# password user pass | Specify the CHAP username and password. |
Step 50 | c804(config-if)# ppp pap sent-username generic_user password user pass | Specify the PAP username and password. |
Step 51 | c804(config-if)# ppp multilink | Enable multilink PPP. |
Step 52 | c804(config-if)# exit | Change to global configuration mode. |
Step 53 | c804(config)# access-list 1 permit 10.0.0.1 255.255.255.0 c804(config)# dialer-list 1 protocol ip permit | Specify an access list and a dialer list to control IP traffic. |
Step 54 | c804(config)# ip route 10.1.0.0 255.255.0.0 bri0 | Add a default route and interface. |
Step 55 | c804(config)# dial-peer voice 1 pots c804(config-dial-peer)# destination-pattern 5551212 c804(config-dial-peer)# port 1 | Create a dial peer to determine how incoming calls are routed to the telephone port 1. |
Step 56 | c804(config-dial-peer)# exit | Return to global configuration mode. |
Step 57 | c804(config)# dial-peer voice 2 pots c804(config-dial-peer)# destination-pattern 5551313 c804(config-dial-peer)# port 2 | Create a second dial peer for the telephone port 2. |
Step 58 | c804(config-dial-peer)# exit | Change to global configuration mode. |
Step 59 | c804(config)# ip nat inside source list 1 interface bri0 overload c804(config)# access-list 1 permit 10.0.0.0 0.0.0.255 | Set global NAT commands. In this example, all inside network addresses assigned to interface BRI0 are configured for translation, and the access list that contains the inside network addresses is defined. |
Starting from global configuration mode, follow these steps to configure the router that is connected to the Cisco 800 series router. This procedure assumes that this router is a Cisco router that supports Cisco IOS software, such as a Cisco 3600 router.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# hostname 3600 | Specify a name for the router. |
Step 3 | 3600(config)# enable secret secret | Set an encrypted password to gain access to privileged EXEC mode commands. |
Step 4 | 3600(config)# username c800 password c800 pass | Specify the username and password of the Cisco 800 series router. |
Step 5 | 3600(config)# ip subnet-zero | Set router to recognize the zero subnet range as a valid range of addresses. |
Step 6 | 3600(config)# no ip domain-lookup | Disable router from translating unfamiliar words entered during a console session into IP addresses. |
Step 7 | 3600(config)# ip dhcp pool DHCPpoolLAN_1 | Optional. Configure your router as a DHCP server. This step specifies the DHCP relay pool name. |
Step 8 | 3600(dhcp-config)# network 192.168.1.0 255.255.255.0 | For configuring DHCP only. Set the DHCP pool of addresses. |
Step 9 | 3600(dhcp-config)# dns-server 192.168.1.2 | For configuring DHCP only. Set the IP address of the DNS server. |
Step 10 | 3600(dhcp-config)# netbios-name-server 192.168.1.11 192.168.1.12 | For configuring DHCP only. Set the NetBIOS servers. |
Step 11 | 3600(dhcp-config)# default-router 192.168.1.1 | For configuring DHCP only. Set the Ethernet 0 IP address as the default gateway. |
Step 12 | 3600(dhcp-config)# exit | For configuring DHCP only. Exit to global configuration mode. |
Step 13 | 3600(config)# ip local pool POOL1 192.168.1.10 192.168.1.20 | Set a local pool of IP addresses to be used when Cisco 800 series router attempts to connect. |
Step 14 | 3600(config)# interface e0 | Change to interface configuration mode for Ethernet 0. |
Step 15 | 3600(config-if)# ip address 192.168.1.1 255.255.255.0 3600(config-if)# exit | Set IP address and subnet mask for the Ethernet interface, then return to global configuration mode. |
Step 16 | 3600(config)# interface bri0 3600(config-if)# isdn switch-type basic-net3 | Change to interface configuration mode for BRI0 and specify the ISDN switch type. |
Step 17 | 3600(config-if)# encapsulation ppp | Enable PPP. |
Step 18 | 3600(config-if)# isdn spid1 0155533330101 3600(config-if)# isdn spid2 0155544440101 | North America only. Specify SPID numbers assigned to B channels by telephone service provider. |
Step 19 | 3600(config-if)# peer default ip address pool POOL1 | Specify address from a particular IP address pool be returned to the connected router. Use pool name specified in ip local pool command. |
Step 20 | 3600(config-if)# ppp authentication chap callin | Enable PAP or CHAP and specify authentication in incoming calls only. |
Step 21 | 3600(config-if)# ppp multilink | Enable multilink PPP. |
Step 22 | 3600(config-if)# no cdp enable | Disable CDP. |
Step 23 | 3600(config-if)# exit 3600(config)# ip classless | Change to global configuration mode and set IP addresses to be treated as classless. |
In the network example shown in Figure 4-2, the Cisco 800 series router and two other routers, such as Cisco 3600 routers, connect a remote network to two corporate networks.

This network uses the following features on the LAN:
This network uses the following features on the WAN:
With NAT overload configured, your router can use one address for multiple hosts. With IPCP configured, your router can automatically negotiate its IP address from the router it is attempting to connect to.
You can use either CHAP or PAP as the PPP authentication protocol. Cisco recommends using CHAP because it is the more secure of the two protocols. For more information, see the "Selecting PPP Authentication Protocol" section in Appendix A, "Concepts."
For the ISDN connection, you can use one of the following options:
For complete information on these options, including how to configure them, see the "Configuring the ISDN Line" section later in this chapter.
The IP routing protocol can use either RIP or EIGRP to learn routes dynamically. You can use either one of these options. For more information on the benefits and differences between the two, see the "Selecting IP Routing Protocols" section in Appendix A, "Concepts." You can also use triggered extensions to RIP to control when RIP sends routing updates. For information on how to configure these options, see the "Configuring Dynamic Routing" section later in this chapter.
![]() |
Note Before you begin to configure your router, review the section titled "Before Configuring Advanced Networks or Features" in this chapter. |
Starting from global configuration mode, follow these steps to configure the Cisco 800 series router in the remote network to two corporate networks. For information on the commands used in this table, see Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# hostname c804 | Enter the router name. |
Step 3 | c804(config)# enable secret 804password | Enter the password. |
Step 4 | c804(config)# pots country us | Optional. If you have a Cisco 803 or 804 router that are connected to telephones, fax machines, or modems, specify the country where your router is located. Specifying a country configures the country-specific default settings for each physical characteristic. |
Step 5 | c804(config)# ip subnet-zero | Set the router to recognize the zero subnet range as a valid range of addresses. |
Step 6 | c804(config)# ip dhcp pool DHCPpoolLAN_0 | Optional. Configure your router as a DHCP server. In this step, specify the DHCP relay pool name. |
Step 7 | c804(dhcp-config)# network 192.168.1.0 255.255.255.0 | Optional. Set the DHCP pool of addresses. |
Step 8 | c804(dhcp-config)# dns-server 172.29.20.41 172.29.20.51 | For DHCP configuration only. Set the IP address of the DNS servers. |
Step 9 | c804(dhcp-config)# netbios-name-server 172.29.20.41 172.29.20.51 | For DHCP configuration only. Set the NetBIOS servers. |
Step 10 | c804(dhcp-config)# default-router 192.168.1.1 | For DHCP configuration only. Set the Ethernet 0 IP address as the default gateway. |
Step 11 | c804(dhcp-config)# exit | For DHCP configuration only. Exit to global configuration mode. |
Step 12 | c804(config)# ipx routing | Enable IPX routing. The router uses the Media Access Control (MAC) address of the Ethernet port as the node address. Cisco 803 and 804 routers use the MAC address of Ethernet port 0. |
Step 13 | c804(config)# interface ethernet0 | Change to the Ethernet interface configuration mode. |
Step 14 | c804(config-if)# ip nat inside | Enable NAT on the inside network. |
Step 15 | c804(config-if)# ipx network BEEF encapsulation SAP | Enable IPX routing on the Ethernet interface and select the type of encapsulation. |
Step 16 | c804(config-if)# ip address 192.168.2.2 255.255.255.0 c804(config-if)# exit | Assign the IP addresses for Ethernet 0, then change to global configuration mode. |
Step 17 | c804(config)# interface dialer1 | Create a dialer interface. |
Step 18 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 19 | c804(config-if)# dialer remote-name corp1 | Specify the name of the corporate router. |
Step 20 | c804(config-if)# dialer pool 1 | Assign a dialer pool. |
Step 21 | c804(config-if)# dialer idle-timeout 300 | Specify the time in seconds that the line is idle before it is disconnected. |
Step 22 | c804(config-if)# dialer string 7771111 | Set up the dialer string. |
Step 23 | c804(config-if)# dialer hold-queue 10 | Specify the maximum number of packets to be held in the outgoing queue. |
Step 24 | c804(config-if)# dialer-group 1 | Assign the interface to dialer access group 1. |
Step 25 | c804(config-if)# ipx network C0FFEE | Define the IPX network. |
Step 26 | c804(config-if)# ppp authentication chap pap callin | Configure CHAP and PAP to authenticate incoming calls. |
Step 27 | c804(config-if)# ppp chap hostname c804 | Specify the CHAP hostname. |
Step 28 | c804(config-if)# ppp chap password 804password | Specify the CHAP password. |
Step 29 | c804(config-if)# ppp pap sent-username c804 password 804password | Specify the PAP username and password. |
Step 30 | c804(config)# interface dialer2 | Create a second dialer interface. |
Step 31 | c804(config-if)# ip address 192.168.3.1 255.255.255.0 | Assign the IP addresses for Ethernet 0. |
Step 32 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 33 | c804(config-if)# dialer remote-name corp2 | Specify the name of the corporate router. |
Step 34 | c804(config-if)# dialer pool 1 | Assign a dialer pool. |
Step 35 | c804(config-if)# dialer idle-timeout 300 | Specify the time in seconds that the line is idle before it is disconnected. |
Step 36 | c804(config-if)# dialer string 7772222 | Set up the dialer string. |
Step 37 | c804(config-if)# dialer hold-queue 10 | Specify the maximum number of packets to be held in the outgoing queue. |
Step 38 | c804(config-if)# dialer-group 2 | Assign the interface to a dialer access group. |
Step 39 | c804(config-if)# ppp authentication chap pap callin | Configure CHAP and PAP to authenticate incoming calls. |
Step 40 | c804(config-if)# ppp chap hostname c804 | Specify the CHAP hostname. |
Step 41 | c804(config-if)# ppp chap password 804password | Specify the CHAP password. |
Step 42 | c804(config-if)# ppp pap sent-username c804 password 804password | Configure PAP username and password. |
Step 43 | c804(config-if)# exit c804(config)# | Change to global configuration mode. |
Step 44 | c804(config)# dialer-list 1 protocol ip permit c804(config) dialer-list 2 protocol ip permit | Specify dialer-list protocol permissions. |
Step 45 | c804(config)# interface bri0 c804(config-if)# isdn switch-type basic-ni | Change to the interface BRI0 configuration mode and set the ISDN switch type. |
Step 46 | c804(config-if)# ip address 192.168.1.1. 255.255.255.0 | Enter the IP address and subnet mask. |
Step 47 | c804(config-if)# ip nat outside | Configure a valid Internet address to which the inside network address will be translated. |
Step 48 | c804(config-if)# encapsulation ppp | Enable PPP. |
Step 49 | c804(config-if)# dialer rotary-group 1 c804(config-if)# dialer rotary-group 2 | Create dialer rotary groups 1 and 2, specifying a number between 0 and 255 for each. |
Step 50 | c804(config-if)# isdn spid1 0 4085551212 c804(config-if)# isdn spid2 0 4085551313 | North America only. Associate the ISDN LDNs provided by your telephone service provider to the first and second SPIDs and configure the SPID numbers to be automatically detected. |
Step 51 | c804(config-if)# ppp authentication pap chap callin | Enable PAP or CHAP for incoming data. |
Step 52 | c804(config-if)# isdn incoming-voice modem | Specify that voice calls are forwarded to the devices connected to the analog telephone ports. |
Step 53 | c804(config-if)# exit | Change to global configuration mode. |
Step 54 | c804(config)# dial-peer voice 1 pots c804(config-dial-peer)# destination-pattern 5551212 c804(config-dial-peer)# port 1 | Create a dial peer to determine how incoming calls are routed to the telephone port 1. |
Step 55 | c804(config-dial-peer)# exit | Return to global configuration mode. |
Step 56 | c804(config)# dial-peer voice 2 pots c804(config-dial-peer)# destination-pattern 5551313 c804(config-dial-peer)# port 2 | Create a second dial peer to determine how incoming calls are routed to the telephone port 2. |
Step 57 | c804(config-dial-peer)# exit | Change to global configuration mode. |
Step 58 | c804(config)# ip nat inside source list 1 interface bri0 overload c804(config)# access-list 1 permit 192.168.1.0 0.0.0.255 | Set global NAT commands. In this example, all inside network addresses assigned to interface BRI0 are configured for translation, and the access list that contains the inside network addresses is defined. |
Starting from global configuration mode, follow these steps to configure the routers that connect the Cisco 800 series router. This procedure assumes that these routers are Cisco routers that support Cisco IOS software, such as a
Cisco 3600 router.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# hostname 3600 | Define the corporate router hostname. |
Step 3 | 3600(config)# enable secret secret | Enter an encrypted password to gain access to privileged EXEC mode commands. |
Step 4 | 3600(config)# username c800 password c800_pass | Specify the username and password of the Cisco 800 series router. |
Step 5 | 3600(config)# ip subnet-zero | Set router to recognize the zero subnet range as a valid range of addresses. |
Step 6 | 3600(config)# no ip domain-lookup | Disable router from translating unfamiliar words entered during a console session into IP addresses. |
Step 7 | 3600(config)# ip local pool POOL1 1.1.2.1 1.1.2.7 | Set a local pool of IP addresses to be used when the Cisco 800 series router attempts to connect. Define the pool name and the range of IP addresses in the pool. |
Step 8 | 3600(config)# ip dhcp pool DHCPpoolLAN_1 | Optional if configuring your router as a DHCP server. If DHCP is not being configured, go to step 14. This step specifies the DHCP relay pool name. |
Step 9 | 3600(dhcp-config)# network 1.1.2.0 255.255.255.0 | For configuring DHCP only. Set the DHCP pool of addresses. |
Step 10 | 3600(dhcp-config)# dns-server 1.1.2.2 | For configuring DHCP only. Set the IP address of the DNS server. |
Step 11 | 3600(dhcp-config)# netbios-name-server 1.2.2.2 1.2.2.3 | For configuring DHCP only. Set the NetBIOS servers. |
Step 12 | 3600(dhcp-config)# default-router 1.1.2.1 | For configuring DHCP only. Set the Ethernet 0 IP address as the default gateway. |
Step 13 | 3600(dhcp-config)# exit | For configuring DHCP only. Exit to global configuration mode. |
Step 14 | 3600(config)# ip address 1.1.1.1 255.255.255.0 | Set IP address and subnet mask. |
Step 15 | 3600(config)# interface bri0 3600(config-if)# isdn switch-type basic-net3 | Change to interface configuration mode for BRI0 and specify ISDN switch type. |
Step 16 | 3600(config-if)# encapsulation ppp | Enable PPP. |
Step 17 | 3600(config-if)# isdn spid1 0155533330101 3600(config-if)# isdn spid2 0155544440101 | North America only. Specify SPID numbers assigned to B channels by telephone service provider. |
Step 18 | 3600(config-if)# peer default ip address pool POOL1 | Specify address from a particular IP address pool be returned to the connected router. Use pool name specified in ip local pool command. |
Step 19 | 3600(config-if)# ppp authentication chap | Enable PAP or CHAP. |
Step 20 | 3600(config-if)# ppp multilink | Enable multilink PPP. |
Step 21 | 3600(config-if)# no cdp enable | Disable CDP. |
Step 22 | 3600(config-if)# exit | Change to global configuration mode. |
Step 23 | 3600(config)# ip classless | Set the IP addresses to be treated as classless. |
Step 24 | 3600(config)# ipx routing | Enable IPX routing. Router uses MAC address of first Ethernet port as node address. |
Step 25 | 3600(config)# ipx network A.A.A.A | Enable IPX routing on Ethernet and ISDN interfaces. |
Step 26 | 3600(config)# no ipx route-cache | Disable IPX fast switching. |
Step 27 | 3600(config)# ipx watchdog-spoof | Set the software to respond to watchdog packets of a server on behalf of a remote client. |
Step 28 | Specify static SAP entries (from left to right) for the service type, network name, network number and node address of the server, socket number for the service, and the hop count to the server. |
For the ISDN line, you can use one of the following features:
This section provides further information on these features and how to configure them.
![]() |
Note Some protocols (IP, UDP, IPX, and NTP) send updates that can cause an ISDN line to be activated excessively. For information on preventing this situation, see "Controlling the DDR ISDN Line Activation" later in this chapter. |
Starting from interface configuration mode, follow these steps to configure DDR using snapshot routing. For information on the commands used in this configuration, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal router(config)# interface bri0 | Enter global configuration mode, then interface configuration mode. |
Step 2 | router(config-if)# dialer rotary-group 1 | Create a dialer rotary-group, useful in environments that require multiple calling destinations. Only the rotary group needs to be configured with dialer map commands. |
Step 3 | router(config-if)# interface dialer 0 | Create a dialer rotary group leader. |
Step 4 | router(config-if)# ppp multilink | Enable multilink PPP. |
Step 5 | router(config-if)# dialer in-band | Enable DDR. |
Step 6 | router(config-if)# dialer idle-timeout 150 | Specify amount of time that line is idle before it is disconnected. |
Step 7 | router(config-if)# dialer hold-queue 10 | Set number of packets held in outgoing queue. |
Step 8 | router(config-if)# dialer load-threshold 150 either | Define load level that must be exceeded on first ISDN B channel before second B channel is brought up, and whether the load level is defined for inbound or outbound traffic, or either. |
Step 9 | router(config-if)# dialer-group 2 | Assign interface to dialer access group. |
Step 10 | router(config-if)# dialer-list 2 protocol ip permit | Define the traffic types that trigger and sustain an ISDN call on interfaces sharing the same dialer-group number. |
Step 11 | router(config-if)# map-class dialer class1 | Optional. Define a class of shared configuration parameters for outgoing calls. |
Step 12 | router(config-map-class)# dialer isdn speed 56 | Optional. If 64 kbps calling is not supported, enter 56 kbps as speed for the B channel. |
Step 13 | router(config-map-class)# exit router(config)# interface bri0 | Change to global configuration, then to interface configuration mode for BRI0. |
Step 14 | router(config-if)# dialer map 3.3.3.3 name name1 5551000 | Create a dialer map used by the WAN interface. |
Step 15 | router(config-if)# exit router(config)# interface dialer0 | Change to global configuration mode, then to interface configuration for dialer 0. |
Step 16 | router(config-if)# snapshot server 5 or router(config-if)# snapshot client 5 | Set up one of the following options for snapshot routing:
|
Step 17 | router(config-if)# exit router(config)# interface bri0 | Change to global configuration mode, then to interface configuration for BRI0. |
Step 18 | router(config-if)# dialer map snapshot 2 5551000 | Define a dialer map for snapshot routing on a client router connected to a DDR interface. |
You can test your DDR configuration by making an ISDN data call through the CLI listed in the following steps. For more information on the commands listed, see the Cisco IOS documentation set.
| Command | Purpose | |
|---|---|---|
Step 1 | router# isdn call interface bri0 5551000 | Initiate the data call and specify the interface and dial string. |
Step 2 | router# isdn disconnect interface bri0 all | Disconnect the data call without bringing down the interface. |
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# isdn leased-line bri0 128 | Configure the BRI interface to use the ISDN physical connection as a leased-line service. Select one of the following line speeds:
|
The IP routing protocol can use RIP or EIGRP to learn routes dynamically. You can configure either one of these options. For more information on the benefits and differences between the two, see the "Selecting IP Routing Protocols" section in Appendix A, "Concepts." This section also provide information on triggered extensions to RIP.
RIP is a commonly used Interior Gateway Protocol (IGP) for use in small networks.
Starting in global configuration mode, follow these steps to configure RIP. For information on the commands used in this configuration, see the IOS documentation set.
| Command | Purpose | |
|---|---|---|
Step 1 | router(config)# router rip | Enable the RIP routing process. |
Step 2 | router(config-router)# network network-number | Associate a network with the RIP routing process. |
Step 3 | router(config-router)# version | Set the software to receive and send only RIP version 1 or only RIP version 2 packets. |
Triggered extensions to RIP cause RIP to send updates only when the routing data base is updated.
For complete information on this feature, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide."
For complete information on this feature, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide" in this publication.
Figure 4-3 shows a Cisco 800 series router that is configured to function in a Windows NT environment.

If keeping monthly ISDN costs low is a concern, you can control when your DDR ISDN line is activated. For more information on this option, see "Controlling the DDR ISDN Line Activation" in this chapter.
Starting from the ISDN interface configuration mode, use the following steps to configure the router to forward UDP broadcasts. For more information on the commands listed, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Change to interface configuration mode for BRI0. |
Step 3 | router(config-if)# ip helper-address address | Set the router to forward UDP broadcasts, including broadcasts of IP addresses and IP configuration requests to the NT server. |
![]() |
Note By default, eight other UDP ports including 137 (NetBIOS name server) and 138 (NetBIOS datagram service) are enabled. For more information, see the Cisco IOS documentation. |
With the DHCP relay feature configured, the Cisco 800 series routers can relay IP configuration information from the LAN interface, over the ISDN interface, and to a specified DHCP server as shown in Figure 4-4.

DHCP relay configures the router to forward UDP broadcasts, including IP configuration requests, from DHCP clients. However, if your network uses a DDR ISDN line, you might find that this line is activated excessively by the IP configuration requests and other UDP broadcasts. If keeping monthly ISDN costs low is a concern, you can control the activation of your ISDN line. For more information, see "UDP Broadcasts in DHCP Relay Environment" in this chapter.
For complete information on DHCP relay, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide" in this publication.
Starting from global configuration mode, use the following steps to configure DHCP relay. For more information on the commands listed, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# ip dhcp-server ip-address | Specify which DHCP server to use on your network. |
The following types of traffic can activate your ISDN line and increase your monthly ISDN line cost:
The following sections describe how to control these types of traffic.
The "Configuring Windows NT" section earlier in this chapter describes how to configure the router to forward UDP broadcasts.
Starting from global configuration mode, use the following steps to configure an extended access list so that UDP broadcasts do not activate the ISDN line. For more information on the commands listed, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Change to interface configuration mode for the WAN interface. |
Step 3 | router(config-if)# dialer-group 1 | Create a dialer list. |
Step 4 | router(config-if)# exit | Return to global configuration mode. |
Step 5 | router(config)# access-list 100 deny udp any any eq netbios-nm | Set NetBIOS name service packets not to activate the ISDN line. |
Step 6 | router(config)# access-list 100 deny udp any any eq netbios-dgm | Set NetBIOS datagram service packets not to activate the ISDN line. |
Step 7 | router(config)# access-list 100 permit ip any any | Permit all other IP traffic. |
Step 8 | router(config)# dialer-list 1 protocol ip list 100 | Set IP packets to activate the ISDN line. |
![]() |
Note This example of an extended access list includes commonly anticipated restrictions. The information in this section is meant to be used as a base from which you can add or delete restrictions as they relate to your particular network. The extended access list that you create depends on your particular network. |
The "Configuring DHCP Relay" section earlier in this chapter describes how to configure the router to forward UDP broadcasts.
Starting from global configuration mode, use the following steps to configure an extended access list so that UDP broadcasts do not activate the ISDN line. For more information on the commands listed, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Change to interface configuration mode for the WAN interface. |
Step 3 | router(config-if)# dialer-group 1 | Create a dialer list. |
Step 4 | router(config-if)# exit | Return to global configuration mode. |
Step 5 | router(config)# access-list 100 deny udp any any eq 135 | Set location services packets not to activate the ISDN line. |
Step 6 | router(config)# access-list 100 permit ip any any | Permit all other IP traffic. |
Step 7 | router(config)# dialer-list 1 protocol ip list 100 | Set IP packets to activate the ISDN line. |
You can configure an extended access list so that UDP broadcasts associated with NTP do not activate the ISDN line. An extended access list controls packets. When defining this list, you can specify complex addresses and permit or deny specific protocols.
Starting from global configuration mode, use the following steps to configure an extended access list so that UDP broadcasts associated with NTP do not activate the ISDN line. For more information on the commands listed, see the
Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Specify parameters for the WAN interface. |
Step 3 | router(config-if)# dialer-group 1 | Create a dialer list. |
Step 4 | router(config-if)# exit | Return to global configuration mode. |
Step 5 | router(config)# access-list 100 deny udp any any eq ntp | Set NTP packets not to activate the ISDN line. |
Step 6 | router(config)# access-list 100 permit ip any any | Permit all other IP traffic. |
Step 7 | router(config)# dialer-list 1 protocol ip list 100 | Specify that extended access list 100 defines which IP packets activate the ISDN line. |
Starting from global configuration mode, use the following steps to configure an extended access list so that IP packets do not activate the ISDN line. For more information on the commands listed, see the Cisco IOS documentation.
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Change to interface configuration mode for the WAN interface. |
Step 3 | router(config-if)# dialer-group 1 | Create a dialer list. |
Step 4 | router(config-if)# exit | Return to global configuration mode. |
Step 5 | router(config)# access-list 100 deny eigrp any any | Set EIGRP packets not to activate the ISDN line. |
Step 6 | router(config)# access-list 100 deny udp any any eq rip | Set RIP packets not to activate the ISDN line. |
Step 7 | router(config)# access-list 100 permit ip any any | Allow other packets to activate the ISDN line. |
The following IPX protocols send updates that can cause the ISDN line to be activated excessively:
To control costs, you can configure an extended access list so that SAP, RIP, and serialization packets do not activate the ISDN line. An extended access list controls packets. When defining this list, you can specify complex addresses and permit or deny specific protocols.
Starting from global configuration mode, use the following steps to configure an extended access list so that IPX packets do not activate the ISDN line.
![]() |
Note Before you begin this configuration, verify that the Cisco IOS image loaded on your router supports IPX. |
For more information on the commands listed, see the Cisco IOS documentation.
You can restrict access to your network by creating an extended access list. An extended access list controls packets. When defining this list, you can specify complex addresses and permit or deny specific protocols.
Figure 4-5 shows an example of a network with restricted access. See Table 4-1 for instructions on how to restrict network access.
![]() |
Note This network example and extended access list include commonly anticipated restrictions. The information in this section is meant to be used as a base from which you can add or delete restrictions as they relate to your particular network. The extended access list that you create depends on your particular network. |

| Access Permitted | Access Denied |
|---|---|
Permit any host on network 192.168.1.0 to access any Internet host. | Prevent any Internet host from spoofing any host on the network. (Spoofing is illegally misrepresenting the address of the sender.) |
Permit the outside Internet Domain Name System (DNS) server to send TCP replies to any host on the network 192.168.1.0. | Deny any Internet host from making a remote terminal connection (Telnet) to any host on network. |
Permit the outside Internet DNS server to send UDP replies to any host on the network 192.168.1.0. |
|
Permit any Internet host to access the Simple Mail Transport Protocol (SMTP) mail server 192.168.1.2. |
|
Permit any Internet host to access the Web server 192.168.1.3. |
|
Permit any Internet host to access the File Transport Protocol (FTP) server with IP address 192.168.1.4. |
|
For information on how to configure this access list, see the "Configuration" section in this chapter. For more information on extended access lists, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide" in this publication.
Starting in global configuration mode, use the examples in the following steps to set up an extended access list based on the restrictions in Table 4-1.
For information on the commands used in this table, see the Cisco IOS documentation. For information on TCP and UDP port assignments, see Appendix F, "Common Port Assignments."
| Command | Purpose | |
|---|---|---|
Step 1 | router# configure terminal | Enter global configuration mode. |
Step 2 | router(config)# interface bri0 | Change to interface configuration mode for the WAN interface. |
Step 3 | router(config-if)# dialer-group 1 | Create a dialer list. |
Step 4 | router(config-if)# exit | Return to global configuration mode. |
Step 5 | router(config)# access-list 100 permit tcp any 192.168.1.0 0.0.0.255 established | Permit any host on the specified network to access any Internet host if it has an established connection. |
Step 6 | router(config)# access-list 100 deny ip any 192.168.1.0 0.0.0.255 | Prevent IP spoofing using the specified network. |
Step 7 | router(config)# access-list 100 permit tcp host 10.0.0.3 192.168.1.0 0.0.0.255 eq domain | Permit the DNS server to send TCP replies to the specified network. |
Step 8 | router(config)# access-list 100 permit udp host 10.0.0.3 192.168.1.0 0.0.0.255 eq domain | Permit the DNS server to send UDP replies to the specified network. |
Step 9 | router(config)# access-list 100 permit tcp any host 192.168.1.2 eq smtp | Permit any host to access the mail server through SMTP. |
Step 10 | router(config)# access-list 100 permit tcp any host 192.168.1.3 eq www | Permit any host to access the mail server through Hypertext Transfer Protocol (HTTP). |
Step 11 | router(config)# access-list 100 permit tcp any host 192.168.1.4 eq ftp | Allow access to the FTP server from any Internet host through FTP. |
Step 12 | router(config)# access-list 100 deny tcp any 192.168.1.0 0.0.0.255 eq telnet | Restrict any Internet host from making a Telnet connection to any host on the specified network. |
Step 13 | router(config)# interface dialer 1 | Change to dialer interface configuration mode. |
Step 14 | router(config-if)# ip access-group 100 in | Activate access list 100. |
If you want to restrict who can access your network and what services are authorized for each user, you can purchase and install CiscoSecure ACS for Windows NT. For complete information, see the documentation that accompanies the CiscoSecure software.
For complete information on this feature, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide."
For complete information on this feature, see the Cisco IOS documentation. For information on accessing the feature documentation, see "References to Cisco IOS Documentation Set" in "About This Guide."
For information on configuring ISDN voice priority, data over voice bearer service, and distinctive ringing, see Chapter 7, "Configuring Telephone Interfaces."
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed May 24 16:45:02 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.