Cisco 3825 Software Configuration Guide - Page 64

Configuration Sequence, Summary of Steps, Configuring the Hostname and Password

Page 64 highlights

Configuration Sequence Chapter 4 Configuring the Cisco 3825 Mobile Wireless Edge Router in a RAN-O Solution with the Command-Line Configuration Sequence The Summary of Steps section provides the recommended primary configuration sequence for the Cisco 3825 router in a RAN-O solution. These steps have configuration sub-steps or tasks within the primary steps or tasks. Note The installation of the Cisco 3825 router and the Cisco 2-port T1/E1-RAN interface card should be completed before attempting the configuration (see the "Related Documentation" section on page ix for more information). The configuration sequence of the Cisco 3825 router for the RAN-O solution assumes that you will have already had some familiarity with the configuration of Cisco routers. It is also assumed that you are familiar with your own network configurations and that you are familiar with the CLI used in configuring Cisco routers. Note For correct CLI syntax and format, see the "Cisco 3825 Mobile Wireless Edge Router RAN-O Command Reference" section on page A-1. Summary of Steps Perform the following tasks to configure the Cisco 3825 router in a RAN-O solution. 1. Configuring the Hostname and Password 2. Verifying the Hostname and Password, page 4-7 3. Configuring Gigabit Ethernet Interfaces, page 4-8 4. Enabling the GE Interface, page 4-9 5. Configuring the Backhaul Links, page 4-9 6. Configuring the PPP Backhaul Interfaces, page 4-19 7. Configuring GSM-Abis Links, page 4-20 8. Configuring UMTS Links, page 4-24 9. Configuring Redundancy, page 4-28 10. Configuring for SNMP Support, page 4-33 11. Saving Configuration Changes, page 4-61 Configuring the Hostname and Password Two important configuration tasks that you might want to perform first are to configure the hostname and to set an encrypted password. Configuring a host name allows you to distinguish multiple Cisco routers from each other. Setting an encrypted password allows you to prevent unauthorized configuration changes. Note In the following procedure, press the Return key after each step unless otherwise noted. At any time, you can exit the privileged level and return to the user level by entering disable at the Router# prompt. Cisco 3825 Mobile Wireless Edge Router Software Configuration Guide 4-6 OL-15667-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358

4-6
Cisco 3825 Mobile Wireless Edge Router Software Configuration Guide
OL-15667-03
Chapter 4
Configuring the Cisco 3825 Mobile Wireless Edge Router in a RAN-O Solution with the Command-Line
Configuration Sequence
Configuration Sequence
The
Summary of Steps
section provides the recommended primary configuration sequence for the
Cisco 3825 router in a RAN-O solution. These steps have configuration sub-steps or tasks within the
primary steps or tasks.
Note
The installation of the Cisco 3825 router and the Cisco 2-port T1/E1-RAN interface card should be
completed before attempting the configuration (see the
“Related Documentation” section on page ix
for
more information).
The configuration sequence of the Cisco 3825 router for the RAN-O solution assumes that you will have
already had some familiarity with the configuration of Cisco routers. It is also assumed that you are
familiar with your own network configurations and that you are familiar with the CLI used in configuring
Cisco routers.
Note
For correct CLI syntax and format, see the
“Cisco 3825 Mobile Wireless Edge Router RAN-O Command
Reference” section on page A-1
.
Summary of Steps
Perform the following tasks to configure the Cisco 3825 router in a RAN-O solution.
1.
Configuring the Hostname and Password
2.
Verifying the Hostname and Password, page 4-7
3.
Configuring Gigabit Ethernet Interfaces, page 4-8
4.
Enabling the GE Interface, page 4-9
5.
Configuring the Backhaul Links, page 4-9
6.
Configuring the PPP Backhaul Interfaces, page 4-19
7.
Configuring GSM-Abis Links, page 4-20
8.
Configuring UMTS Links, page 4-24
9.
Configuring Redundancy, page 4-28
10.
Configuring for SNMP Support, page 4-33
11.
Saving Configuration Changes, page 4-61
Configuring the Hostname and Password
Two important configuration tasks that you might want to perform first are to configure the hostname
and to set an encrypted password. Configuring a host name allows you to distinguish multiple Cisco
routers from each other. Setting an encrypted password allows you to prevent unauthorized configuration
changes.
Note
In the following procedure, press the
Return
key after each step unless otherwise noted. At any time,
you can exit the privileged level and return to the user level by entering
disable
at the
Router#
prompt.