Cisco 1941 Series Integrated Services Routers Datasheet

Cisco 1941 Series Routers Datasheet

Cisco 1941 router builds on the best-in-class offering of the existing Cisco 1841 Integrated Services Routers by offering 2 models – Cisco 1941 and Cisco 1941W. In addition to the support of a wide range of wireless and wired connectivity options supported on Cisco 1941 Series, Cisco 1941W offers integration of IEEE 802.11n access point which is backwards compatible with IEEE 802.11a/b/g access points.

 

All Cisco 1900 Series routers Integrated Services Routers offer embedded hardware encryption acceleration, optional firewall, intrusion prevention, and application services. In addition, the platforms support the industries widest range of wired and wireless connectivity options such as T1/E1, xDSL, 3G, 4G LTE, and GE.

 

Cisco 1941 Integrated Services Router

Benefits

Service Integration

The Cisco 1941 Series offer increased levels of services integration with data, security, wireless, and mobility services enabling greater efficiencies cost savings.

 

Services on Demand

A single Cisco IOS Software Universal image is installed on each ISR G2. The Universal image contains all of the Cisco IOS technology sets which can be activated with a software license. This allows your business to quickly deploy advanced features without downloading a new IOS image. Additionally, larger default memory is included to support the new capabilities.

● The Cisco Services Ready Engine (SRE) enables a new operational model which allows you to reduce capital expenditures (CapEx) and deploy a variety of application services as needed on a single integrated compute services module.

 

High Performance with Integrated Services

● The Cisco 1900 Series enables deployment in high speed WAN environments with concurrent services enabled up to 25 Mbps.

● Multi-Gigabit Fabric enables high bandwidth module to module communication without compromising routing performance.

 

Network Agility

● Designed to address customer business requirements, Cisco 1941 Series with the modular architecture, offers performance range of modular interfaces and services as your network needs grow.

● Modular interfaces offer increased bandwidth, a diversity of connection options, and network resiliency.

 

Energy Efficiency

● The Cisco 1941 Series architecture provides energy savings features that include the following:

  1. The Cisco 1900 Series offers intelligent power management and allows the customer to control power to the modules based on the time of day. Cisco EnergyWise technology will be supported in the future.
  2. Services integration and modularity on a single platform performing multiple functions, optimizes raw materials consumption and energy usage.
  3. Platform flexibility and ongoing development of both hardware and software capabilities lead to a longer product lifecycle, lowering all aspects of the total cost of ownership, including materials and energy use.
  4. High efficiency power supplies are provided with each platform.

 

Investment Protection

● The Cisco 1941 Series maximizes investment protection by supporting:

  1. Reuse of a broad array of existing modules supported on the original Integrated Services Routers provides a lower cost of ownership.
  2. Rich set of Cisco IOS Software features carried forward from the original Integrated Services Routers and delivered in the universal image.
  3. Flexibility to grow as your business needs evolve.

 

Modularity Features and Benefits

 

Cisco Enhanced High Speed WAN Interface Card (EHWIC)

 

  • The EHWIC slot replaces the high-speed WAN interface card (HWIC) slot and can natively support HWICs, WAN interface cards (WICs), wireless WAN 3G/4G LTE, voice interface cards (VICs), and voice/WAN interface cards (VWICs).

● Two integrated EHWIC slots are available on the Cisco 1941 for flexible configurations for support of two modules: One double wide HWIC-D or single wide EHWIC/HWIC module and a second single wide E-HIC/HWIC module are supported.

● Each HWIC Slot offers high data throughput capability.

  1. Up to 1.6 Gbps aggregate towards the router processor.
  2. Up to 2 Gbps aggregate to other module slots over MultiGigabit Fabric (MGF).

Cisco Internal Services Module (ISM)

  • A single ISM Slot provides flexibility to integrate intelligent services modules that do not require interface ports.

● ISM replaces the Advanced Integration Module (AIM) slot; existing AIM modules are not supported in the ISM slot.

  • Each ISM Slot offers high data throughput capability.
  1. Up to 4 Gbps aggregate towards the router processor.
  2. Up to 2 Gbps aggregate to other module slots over MultiGigabit Fabric (MGF).
  • Power to ISM slots can be managed by extensions similar to the Cisco EnergyWise framework, allowing organizations to reduce energy consumption in their network infrastructure. Full EnergyWise support will be available in future software releases.

Note: The Cisco 1941 cannot have ISM and WLAN on the same chassis. Please refer to ordering information for WLAN SKUs.

 

Compact Flash Slots

● Two external Compact Flash slots are available on the Cisco 1941. Each slot can support high-speed storage densities upgradeable to 4GB in density.

 

USB 2.0 Ports

  • Two high-speed USB 2.0 ports are supported. The USB ports enable another mechanism secure token capabilities and storage.

 

As a world leading Cisco networking products wholesaler, 3Anetwork.com wholesales original new Cisco networking equipments, including Cisco Catalyst switches, Cisco routers, Cisco firewalls, Cisco wireless products, Cisco modules and interface cards products, 3Anetwork.com are most competitive on Cisco switches, like Cisco 2960 switches, Cisco 3560V2 3560X switches, Cisco 3750V2 3750X switches. If you have such requirement please contact your sales person, if you are new customer, please feel free to contact info@3Anetwork.com. Our CCIE headed technical team can provide network design, products installation and configuration, trouble shooting etc

 

It refers from: http://www.cisco.com

 

More related topics:

FAQ for Cisco Integrated Services Router Generation 2

Cisco 1900 Series Integrated Services Routers

Brief Talk on Static Routing Configuration Experiment

Cisco 1941 vwic 2 port combine

About Cisco IOS ver for 1941 router to do IPSec VPN tunnels (DMVPN)

 

Cisco 2951 works as an MPLS router ?

Question:

Can Cisco 2951 work as an MPLS router. If yes what will be needed to make it function as an MPLS router?

Else which alternative router can function as an MPLS router.

 

The answer:

The 2951 can be configured as LSR/LER. IOS Packaging Model for 1900, 2900 and 3900 ISRs is available as per below mentioned. Please use IP base with data support. That will enable MPLS functionality.

 

white_paper_c11_556985-04 3-11

 

The Cisco 2900 Series offer unparalleled total cost of ownership savings and network agility through the intelligent integration of market leading security, unified communications, wireless, and application services. The Integrated Services Routers Generation 2 platforms are future-enabled with multi-core CPUs, support for high capacity DSPs (Digital Signal Processors) for future enhanced video capabilities, high powered service modules with improved availability, Gigabit Ethernet switching with enhanced POE, and new energy monitoring and control capabilities while enhancing overall system performance.

Which Cisco router 1921 modules are best ?

Q 1: I have PPPoE internet connection from my ISP and its terminating on (Optical Network Terminal) device. I want to connect RJ45 from my ONT to Cisco 1921 router, so that i can use my router as PPPoE dialer and as well as giving internet to other users in my network. I can use normal Linksys router with WAN port, BUT I want to use CISCO 1921/K9,  and for now its 2MB but in future it may go upto 10MB.

Kindly can anyone tell me that which modules i have to have with CISCO 1921/K9 ?

and sholud i need to have four port 10/100 ethernet module ???

 

A 1: The Cisco 1900 has two GigabitEthernet ports.  One for your WAN, one for your LAN.

But you don’t need four.

 

Q 2: May be in future i’ll have different networks… But for now only one required.

Ok .. you meant to say that i can simply put the RJ45 cable from my ONT to first interface (WAN) ? (NO any addtional module required)  and how can i use that WAN interface as PPPoE dialer , is there any IOS upgradation required ?

 

I have 2mb PPPoE DSL connection from my ISP ( a fiber connection which terminates on (ONT) at my premises) this gives me one RJ45 cable to connect with my Linksys router’s Internet (WAN) port, and i make PPPoE dialer through webbased console and give my user name and password to connect with internet also  there are addtional 4 LAN ports which i can use for my LAN users.

Now I want to replace my Linksys router with CISCO1921/K9 router. how shoud i conncet ?

 

A 2: First of, the 1921 has two HWIC ports.  You can stick a one-port HWIC-1FE two-port HWIC-2FE FastEthernet card (maximum ONE per appliance).  If you want GigabitEthernet, then you can use EHWIC-1GE-SFP-CU (maximum ONE per appliance).   The modules stated here are Layer-3 capable.  If you want a Layer-2 capable then read on.

And the other question’ answer: I mean if you just want a router with four Layer-2 ports then you should consider the EHWIC-4ESG module.

 

Cisco router: commond configuration overview (3)

Set the host name:

Router (config hostname set-hostname) #

Router (config) # ^ Z

Router (config) # ^ Z

Set user mode code:

Router (config) line console 0 #

Router (config-line) # login

Router (config-line password set-password) #

Router (config-line) # ^ Z

Set the telnet password:

Router (config) line vty 04 #

Router (config-line) # login

Router (config-line password set-password) #

Router (config-line) # ^ Z

Set the privileged mode password:

Router (config) enable password set-password # < — the password is not encrypted, password — >

Router (config) enable secret set-password # < — the encrypted password — >

Router (config) # ^ Z

 

For all the password encryption:

Router (config) service password-ancryption set-password-here #

Router (config) no service password-ancryption # < — cancel encryption — >

Router (config) # ^ Z

Set the login banner:

Router (config banner MOTD) # separator set-banner-information-here delimiters < — before and after the delimiter must agree — >

Set interface description information:

Router (config-if description set-port-information-here) #

Router (config) # ^ Z

The control of cdp:

Router (config-if CDP enable) # < — in the designated port enable CDP, default — >

Router (config-if) no CDP enable # < — close CDP — > in the designated port

Router (config CDP run) # < — that all ports enable CDP — >

Router (config) no CDP run # < — that all ports closed CDP — >

The use of ping:

Router# Ping IP-address

Router# Ping < — extended ping command — >

Protocol [ip]:[protocol-type] < — select the protocol type — >

Target IP address:ip-address < — input test address — >

Repeat count [5]: < — choose to send ICMP packet number — >

Datagram size [100]: < — choose the size of each package — >

Timeout in seconds [2]: < — set each packet timeout — >

Extended commands [n]:y < — using the extended ping command — >

Sweep range of sizes [n]:

The use of tracke:

Router# trace IP-address [host-name]

Cisco 4000 router specified media type:

Router (config-if media-type 10baset) # < — the AUI (the default) failure, modified to use RJ-45 –>

Router (config-if) # ^ Z

Change the startup sequence of routers:

Router (config) boot system flash ios-filename #

Router (config) boot system TFTP ios-filename tftp-ip-address #

Router (config) boot system ROM #

Router (config) # ^ Z

Modify register values:

Router (config config-register value) # < — Cisco default value = 0x2102, value range: 0x2100(enter ROM monitor), 0x2101 (the system boot from ROM to 0x210f (0x2102), enables the system to boot from NVRAM). 0x1 = 0x2101, starting from the smallest bit change — >

Change the register values in the ROM monitor:

> o/r value

Router password recovery:

Cold shutdown, then start again and in 60 seconds press ctrl>+ to enter the ROM monitor mode

> o/r 0x2142 > > confreg <–25xx router or 0x2142 <–16xx router

Router> I

Router> n

Router> enable

Router# copy startup-config running-config

Router# configure terminal

Router (config) enable secret new-password #

Router (config config-register 0x2102) #

Router (config) # ^ Z

Router# copy running-config startup-config

Router# reload

Configuration name  main entrance:

Router (config) # IP host set-name [tcp-port-number] IP-address [IP-address 2..

Router (config) # ^ Z

The definition of the DNS host:

Router (config) IP name-server server-address # [server-address 2..

Router (config) # ^ Z

Disable dns:

Router (config) no IP domain-lookup #

Router (config) # ^ Z configuration level segmentation:

Router (config-if IP split-horizon) #

Router (config-if) no IP split-horizon #

Router (config-if) # ^ Z

Static router configuration:

Router (config) IP route IP-address subnet-mask # [next-hop-address [distace local-out-port]] |

< — distance range: 1 ~ 255, equivalent to the priority, the smaller the better. Rip=120;dspf=110; igrp=100; eigrp=90 — >

Router (config) # ^ Z

Configure a default router:

Router (config) IP defoult-network IP-address # < — Dynamic default route — >

Router (config) IP route 0.0.0.0 0.0.0.0 # [next-hop-address local-out-port [distace]] | < — Staticdefault route — >

Router (config) # ^ Z

 

Other commands:

Router# show version

Router# show running-config

Router# show startup-config

Router# show flash

Router# show interface [type port]

Router# show buffers

Router# show protocol

Router# show mem

Router# show stacks

Router# show processes

Router# show CDP entry [device-name] < — display the specified neighbor three layers of information — >

Router# show cdp neighbors

Router# show cdp neighbors detail < — shows all the neighbors three layers of information – >

Router# show IP router

Router# show IPX router

Router# show host

Router# show ip protocol

Router# show IP interface type port

Router# show IPX interface type port

Router# show IPX servers

Router# show IPX traffic

Router# show access-lists [acl-number]

Router# show ISDN status

Router# show dialer < — Viewing the ISDN dial information — >

Router# show ISDN active

Router# show frame-relay PVC

Router# show frame-relay map

Router# show frame-relay LMI

Router# erase startup-config

Router# reload

Router# setup

Router# copy running-config startup-config

Router# copy startup-config running-config

Router# copy TFTP running-config

Router# copy running-config TFTP

Router# debug IPX routing activity

Router# debug IPX SAP

Router# debug ISDN q921

Router# debug ISDN Q931

Router# debug dialer

Router# debug IP rip

Router# clear interface bri

Cisco 1921 price or Cisco 2900 price competitive price on 3anetwork.com. The Cisco networking products distributor.

Cisco router: command configuration overview (2)

Configure the DCE clock:

Router# show controllers type port < — define DCE interface — >

Router (confin-if) clock rate 64000 # < — into the DCE interface to set the clock rate — >

Router (config-if) # ^ Z

Configure the PPP protocol:

Router (config) username name password set-password-here # < — Verification establishdatabase — >

Router (config) interface type port #

Router (config-if encapsulation PPP) # — start — > < PPP protocol

Router (config-if PPP outhentication) # [chap chap PAP PAP chap | | | PAP] < — choose PPPauthentication — >

Router (config-if) PPP Pap sent-username name password password # < — send verificationinformation — >

Router (config-if) # ^ Z

PAP authentication configuration example:

The verifier:

Router-server (config) username client password 12345 # < — Verification establish database –>

Router-server (config) interface serial 0 #

Router-server (config-if encapsulation PPP) #

Router-server (config-if) PPP authentication Pap # < — choose to use PAP to achieve PPP certification — >

Router-server (config-if) # ^ Z

Attested party:

Router-client (config-if encapsulation PPP) #

Router-client (config-if) PPP Pap sent-username client password 12345 # < — send verificationinformation — >

Router-client (config-if) # ^ Z

PAP bidirectional authentication configuration example:

Router a:

Routera (config) username B password 12345 #

Routera (config) interface serial 0 #

Routera (config-if encapsulation PPP) #

Routera (config-if) PPP authentication Pap #

Routera (config-if) PPP Pap sent-username a password 54321 #

Routera (config-if) # ^ Z

Router b:

Routerb (config) username a password 54321 #

Routerb (config) interface serial 1 #

Routerb (config-if encapsulation PPP) #

Routerb (config-if) PPP authentication Pap #

Routerb (config-if) PPP Pap sent-username B password 12345 #

Routerb (config-if) # ^ Z

Chap authentication configuration example:

The verifier:

Router-server (config) username router-client password 12345 #

Router-server (config) interface serial 0 #

Router-server (config-if encapsulation PPP) #

Router-server (config-if) PPP authentication chap #

Router-server (config-if) # ^ Z

Attested party:

Router-client (config-if encapsulation PPP) #

Router-client (config-if) PPP authentication chap #

Router-client (config-if) PPP chap hostname router-client #

Router-client (config-if) PPP chap password 12345 #

Router-client (config-if) # ^ Z chap bidirectional authentication configuration example:

Router a:

Routera (config) username routerb password 12345 #

Routera (config) interface serial 0 #

Routera (config-if encapsulation PPP) #

Routera (config-if) PPP authentication chap #

Routera (config-if) PPP chap hostname routera #

Routera (config-if) PPP chap password 54321 #

Routera (config-if) # ^ Z

Router b:

Routerb (config) username routera password 54321 #

Routerb (config) interface serial 1 #

Routerb (config-if encapsulation PPP) #

Routerb (config-if) PPP authentication chap #

Routerb (config-if) PPP chap hostname routerb #

Routerb (config-if) PPP chap password 12345 #

Routerb (config-if) # ^ Z

Telnet use:

Routera# terminal monitor < — can back to execute the debug command on a remote hostresults — >

Routera# telnet IP-address [router-name] < — the host telnet to the specified address or name –>

Routerb# [exit logout] < — | exit telnet — >

Routerb# ++<6> then press < — hang telnet — >

Routera# show sessions < — shows all current telnet information, including connect-number — >

Routera# connect-number < — returns the specified telnet connection — >

Connection — > routera# disconnect IP-address [router-name] < — disconnect the specified address or name of the host

Routera# show user < — show the telnet connection to the information — > this machine

Routera# clear line [0 | 1 | 2 | 3 | 4] < — disconnect connection to the specified telnet — > thismachine

No telnet to the machine:

Router (config) line vty 04 #

Router (config-line access-class acl-number) #

Router (config) # ^ Z

The most used Cisco router for you: Cisco 3925ECisco 1941 router.

Cisco router: command configuration overview (1)

[Abstract] Cisco router configuration (include Cisco 2901Cisco 2911)statement summary startup interface, assigning IP address: router>router>enablerouter#router#configureterminalrouter (config) #router (config)#interfacetypeportrouter (config-if) #noshutdownrouter (config-if) # ipaddressip-addresssubnet-maskrouter (config-if) rip routing protocol # ^ Z configuration: 30 seconds to update a router(config) #routerriprouter (config-if) #……

 

Cisco router: commond configuration overview:

Start the interface, IP address allocation:

Router>

Router> enable

Router#

Router# configure terminal

Router (config) #

Router (config) interface type port #

Router (config-if no shutdown) #

Router (config-if) IP address IP-address subnet-mask #

Router (config-if) # ^ Z

 

Configure the rip routing protocol: 30 seconds to update once

Router (config router RIP) #

Router (config-if network network-number) # < — notice the standard a, B, C network — >

Router (config-if) # ^ Z

Configure the IGRP routing protocol: 90 seconds to update once

Router (config) router IGRP as-number # < — as-number range of 1 to 65535 — >

Router (config-if network network-number) # < — notice the standard a, B, C network — >

Router (config-if) # ^ Z

 

Configure the Novell IPX routing protocol: Novell rip 60 second to update once

Router (config) IPX routing [node address] #

Router (config) IPX maximum-paths paths # < — set the load balance, the range of 1 to 512 — >

Router (config) interface type port #

Router (config-if) IPX network network-number [encapsulation encapsulation-type] [secondary] #< — notice the standard a, B, C network — >

Router (config-if) # ^ Z

The configuration of ddr:

Router (config) dialer-list group-number protocol protocol-type permit [list # acl-number]

Router (config) Interface BRI 0 #

Router (config-if dialer-group group-number) #

Router (config-if) dialer map protocol-type next-hop-address name hostname # telphone-number

Router (config-if) # ^ Z

The configuration of isdn:

Router (config) isdnth-typeth-type < — # configuration ISDN switch type, Chinese using basic-net3 — >

Router (config-if) # ^ Z

 

Configure frame relay:

Router (config-if) encapsulation frame-relay [cisco IETF # |]

Router (config-if) frame-relay lmi-type [ansi Cisco # | | q933a]

Router (config-if bandwidth kilobits) #

Router (config-if) # frame-relay invers-arp [protocol] [dlci]

< — Static invers ARP table:

Router (config) frame-relay protocol protocol-address DLCI # [broadcast] [Cisco] [payload-compress IETF | | packet-by-packet]

— >

< — set the keepalive interval:

Router (config-if keepalive number) #

— >

< — the local interface with the specified dlci:

Router (config-if) frame-lelay local-dlci number #

— >

< — sub interface:

Router (config-if) interface type port.subininterface-number multipoint | # [point-to-point]

Router (config-subif) IP unnumbered interface #

Router (config-subif) frame-lelay local-dlci number #

— >

Router (config-if) # ^ Z

Configuration the standard acl:

Router (config) access-list access-list-number permit | # [Deny] source [source-mask] < –access-list-number range: 1 to 99 standard ACL; 100 ~ 199 extended ACL; 800 to 899 standard IPX ACL; 900 ~ 999 expansion of IPX ACL; 1000~1099 IPX SAP ACL; 600 ~ 699apple talk ACL –>

Router (config) interface type port #

Router (config-if) IP access-group access-list-number in | # [out]

Router (config-if) # ^ Z

 

Configure an extended acl:

Router (config) access-list access-list-number permit | # [Deny] [protocol protocol-number]source source-wildcard | [source-port] destination destination-wildcard [destination-port][established]

Router (config) interface type port #

Router (config-if) IP access-group access-list-number in | # [out]

Router (config-if) # ^ Z

Configuration the naming acl:

Router (config) IP access-list standard | # [extended] acl-name

Router (config [std- NaCl ext-] |) | # [permit deny] [ip-access-list-test-conditions]

Router (config [std- NaCl ext-] |) # no [permit deny] [ip-access-list-test-conditions] |

Router (config [std- NaCl ext-] |) # ^ Z

Router (config) interface type port #

Router (config-if) IP access-group [acl-name 1~199 # | |] [in out]

Router (config-if) # ^ Z

Setting up Cisco 2901 Router with Comcast Broadband modem

I am trying to set-up a Cisco 2901 router that is connected to a Comcast High-Speed Modem.  The connection is live since I connected a laptop directly to the modem and the internet works.

 

Below is the configuration from the router:

no service pad

service tcp-keepalives-in

service tcp-keepalives-out

service timestamps debug datetime msec localtime show-timezone

service timestamps log datetime msec localtime show-timezone

service password-encryption

service sequence-numbers

!

hostname Cisco2901

!

boot-start-marker

boot-end-marker

 

no aaa new-model

!

no ipv6 cef

no ip source-route

ip cef

!

no ip bootp server

multilink bundle-name authenticated

 

!

interface Embedded-Service-Engine0/0

no ip address

no ip redirects

no ip unreachables

no ip proxy-arp

shutdown

!

interface GigabitEthernet0/0

description $ES_WAN$

ip address 173.xx.yy.109 255.255.255.240

no ip redirects

no ip unreachables

no ip proxy-arp

duplex auto

speed auto

no mop enabled

!

interface GigabitEthernet0/1

description $ES_LAN$

ip address 192.xx.yy.1 255.255.255.0

no ip redirects

no ip unreachables

no ip proxy-arp

duplex auto

speed auto

no mop enabled

!

ip forward-protocol nd

!

ip http server

ip http authentication local

no ip http secure-server

!

ip route 0.0.0.0 0.0.0.0 173.xx.yy.110

!

logging trap debugging

!

no cdp run

!

snmp-server community public RO

!

control-plane

!

line con 0

line aux 0

line 2

no activation-character

no exec

transport preferred none

transport input all

transport output pad telnet rlogin lapb-ta mop udptn v120 ssh

stopbits 1

 

Is there something I am missing?  It tries to connect from the laptop, but just keeps looping.

 

The solution:

Try changing this line

ip route 0.0.0.0 0.0.0.0 173.xx.yy.110

to

ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0

 

When logged into the router can you ping any internet address?

Ping 8.8.8.8 – what does this show?

 

Respond 1:

I changed the setting from the static IP address to GigabitEthernet 0/0 in the routing and this did not solve the problem.

When pinging any address I receive host not reachable.

According to comcast the gateway should read 173.xx.yy.110 should that the IP address of the WAN port?

 

Respond 2:

What should your WAN IP be? Did you ask?

If they say the gateway should be 110 this can mean multiple things, its either there side or as you mention your WAN port

Try it on your WAN and see if it helps…

ip address 173.xx.yy.110 255.255.255.240

You currently have it set  ip address 173.xx.yy.109 255.255.255.240

 

Respond 3:

Here is the response from Comcast:

We don’t support devices behind our gateway due to liability issues and that there are a million different devices.  If you are wanting the device set up in pass thru we you will want to put the .110 in your router and I can make the changes on the gateway.  Let me know and I can change it up.

So, I am not sure how helpful Comcast is.

I tried to put the 110 in the WAN and it still does not work.

 

Respond 4:

Ok well 110 on WAN port as they said is correct, and you left the GigabitEthernet0/0 on the end of the route command as well yes?

 

There are 2 other things missing – NAT and DHCP?

I assume you are assigning static IP’s to your laptop/pc you are testing with yes? What IP has your laptop at minute?

And you also need a NAT statement I think

ip nat inside source list 1 interface GigabitEthernet0/0 overload

Put this acceSsslist in as well

access-list 1 permit 192.xx.yy.1 0.0.0.255

The similar Cisco router, Cisco 2921 more information, visit 3anetwork.com.

Configuration of SSH and telnet on Cisco 1941 Router

Do you configurate the SSH and telnet on Cisco 1941 Router? When you configurate on a new Cisco 1941, maybe you should meet the problem below, let’s look for it:

 

Configuration of SSH and telnet on Cisco 1941 Router

1941#sho config

Using 4895 out of 262136 bytes

!

! Last configuration change at 00:15:29 UTC Thu May 3 2012 by admin

! NVRAM config last updated at 00:15:31 UTC Thu May 3 2012 by admin

! NVRAM config last updated at 00:15:31 UTC Thu May 3 2012 by admin

version 15.1

service timestamps debug datetime msec

service timestamps log datetime msec

service password-encryption

!

hostname 1941

!

boot-start-marker

boot-end-marker

!

card type t1 0 0

logging buffered 51200 warnings

no logging console

enable secret 5 xxxxxx

enable password 7 xxxxxx

!

no aaa new-model

!

no network-clock-participate wic 0

!

no ipv6 cef

no ip source-route

ip cef

!

ip domain name xxxxxxxx.com

!

multilink bundle-name authenticated

!

crypto pki token default removal timeout 0

!

crypto pki trustpoint TP-self-signed-1026262783

 enrollment selfsigned

 subject-name cn=IOS-Self-Signed-Certificate-1026262783

 revocation-check none

 rsakeypair TP-self-signed-1026262783

!

crypto pki certificate chain TP-self-signed-1026262783

 certificate self-signed 01 nvram:IOS-Self-Sig#1.cer

license udi pid CISCO1941/K9 sn FTX160380UH

!

username xxxx privilege 15 secret 5 xxxxxxxxxxxx

!

redundancy

!

controller T1 0/0/0

 cablelength long 0db

 channel-group 0 timeslots 1-24

 description WAN interface

!

controller T1 0/0/1

 cablelength long 0db

 channel-group 0 timeslots 1-24

 description WAN interface

!

ip ssh version 2

!

!

interface Embedded-Service-Engine0/0

 no ip address

 shutdown

!

interface GigabitEthernet0/0

 description  LAN Interface

 ip address 10.166.32.254 255.255.255.0

 duplex auto

 speed auto

 no mop enabled

!

interface GigabitEthernet0/1

 no ip address

 shutdown

 duplex auto

 speed auto

!

interface Serial0/0/0:0

 description  WAN connection

 ip address 192.168.100.1 255.255.255.0

 encapsulation ppp

 no cdp enable

!

interface Serial0/0/1:0

 description WAN connection

 ip address 192.168.101.1 255.255.255.0

 encapsulation ppp

 no cdp enable

!

ip forward-protocol nd

!

ip http server

ip http access-class 23

ip http authentication local

ip http secure-server

ip http timeout-policy idle 60 life 86400 requests 10000

!

ip route 0.0.0.0 0.0.0.0 10.166.32.70

ip route 10.10.32.0 255.255.255.0 10.166.32.175

ip route 10.10.33.0 255.255.255.128 10.166.32.175

ip route 10.10.33.128 255.255.255.128 10.166.32.175

ip route 10.166.33.0 255.255.255.128 192.168.101.2

ip route 10.166.33.128 255.255.255.128 192.168.100.2

!

access-list 23 permit 10.166.32.0 0.0.0.7

!

no cdp run

!

 

control-plane

!

banner exec ^C

% Password expiration warning.

 

Cisco Configuration Professional (Cisco CP) is installed on this device

and it provides the default username “cisco” for  one-time use. If you have

already used the username “cisco” to login to the router and your IOS image

supports the “one-time” user option, then this username has already expired.

You will not be able to login to the router with this username after you exit

this session.

 

It is strongly suggested that you create a new username with a privilege level

of 15 using the following command.

 

username <myuser> privilege 15 secret 0 <mypassword>

 

Replace <myuser> and <mypassword> with the username and password you want to

use.

^C

banner login ^C

Cisco Configuration Professional (Cisco CP) is installed on this device.

This feature requires the one-time use of the username “cisco” with the

password “cisco”. These default credentials have a privilege level of 15.

 

YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE  PUBLICLY-KNOWN

CREDENTIALS

 

Here are the Cisco IOS commands.

 

username <myuser>  privilege 15 secret 0 <mypassword>

no username cisco

 

Replace <myuser> and <mypassword> with the username and password you want

to use.

 

IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE

TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.

 

For more information about Cisco CP please follow the instructions in the

QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp

^C

!

line con 0

 login local

line aux 0

line 2

 no activation-character

 no exec

 transport preferred none

 transport input all

 transport output pad telnet rlogin lapb-ta mop udptn v120 ssh

 stopbits 1

line vty 0 4

 access-class 23 in

 privilege level 15

 password 7 xxxxx

 login local

 transport input telnet ssh

line vty 5 15

 access-class 23 in

 privilege level 15

 password 7 xxxxx

 login local

 transport input telnet ssh

!

scheduler allocate 20000 1000

end

 

I’ve never had a problem in using telnet, yet I can’t access the unit via telnet.  My WS had a valid ip address in that network range, so the access-group ACL should have allowed my IP.

I did run through the SSH configuration steps on Cisco 2951 , but it’s not working as well.

 

The things you should do:

Try it without the access class on the vty lines to rule out the ACL. After removing the ACL from the VTY,you could both telnet and SSH.  Then “fixed” the ACL (with a reverse notation of 0.0.0.255) and removed telnet as a transport input and verified telnet no longer worked, while SSH continued to work just fine.

Why the Dial-Peer not working on Cisco 2901 FXO

I have a location that purchased a Bogen paging system and wanted it connected to our Cisco VoIP network. We are running CUCM 8.6.2, and the Cisco 2901  in question is running 15.0(1)M6.

 

I am attempting to assign a DN of 1000 to the FXO/Paging system. When calling this DN from a phone in the same device pool as the 2901 I get the message that the call cannot be completed.

I have attached a scrubbed version of Cisco 2900 configuration.

 

The solution:

Log into the IP of Callmanager  like this http://<ip addr>/dna

Go to Analyze > Phone > choose the phone you want to dial from > then fill in the next page entering the number as you would dial it on the phone. Then attach the results.Here’s a screenshot of the results.

.2901 FXO

Putting 1000 on the Attendant’s DN  field in the FXO doesn’t actually create a routable pattern. Create a Route Group, insert the FXO in there, create a Route List, put the RG in there, Create a Route Pattern 1000 and link it to the Route List.

How to Reset the Console Password on the Cisco Router

Question: I’m trying to require a password to be entered (i.e. cisco) when getting into the router and before even getting to the ‘user exec mode’ prompt.

It would seem that after I set the password ‘cisco’ and then run the command ‘login’ in order for the password to be required when getting into the router I shouldn’t get the error ‘% Incomplete command.’ and that’s why when I currently console in to the router I go immediately to the ‘user exec mode’ prompt i.e. in my case:

r2

 

Router(config)#line console 0

Router(config-line)#password cisco

Router(config-line)#login

% Incomplete command.

 

The solution:

Added the lines:

aaa authentication login default local

aaa authorization exec default local

 

as described….

 

Using HyperTerminal (directly connected via Console) now requires the appropriate username and password combo to even get into user mode.

And both lines are in my running configuration… Solved the problems.

 

This command also works for Cisco 2901, Cisco 2951, Cisco 2921, Cisco 2911.