Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
2509 - Router - EN
Cisco 2509 - Router - EN Manuals
Manuals and User Guides for Cisco 2509 - Router - EN. We have
3
Cisco 2509 - Router - EN manuals available for free PDF download: User Manual, Getting Started Manual
Cisco 2509 - Router - EN User Manual (686 pages)
User Guide
Brand:
Cisco
| Category:
Software
| Size: 5.92 MB
Table of Contents
Table of Contents
4
Related Documentation
29
Obtaining Documentation
30
Ordering Documentation
30
World Wide Web
30
Documentation Feedback
31
Obtaining Technical Assistance
31
Technical Assistance Center
32
AAA Protocols-TACACS+ and RADIUS
40
Tacacs
40
Radius
40
Authentication
41
Authentication Considerations
42
Authentication and User Databases
42
Authentication Protocol-Database Compatibility
43
Passwords
44
Other Authentication-Related Features
49
Authorization
49
Max Sessions
50
Dynamic Usage Quotas
51
Shared Profile Components
51
Support for Cisco Device-Management Applications
52
Other Authorization-Related Features
53
Accounting
54
Other Accounting-Related Features
54
Administration
55
HTTP Port Allocation for Remote Administrative Sessions
55
Network Device Groups
56
Other Administration-Related Features
56
Cisco Secure ACS HTML Interface
57
About the Cisco Secure ACS HTML Interface
57
HTML Interface Security
58
HTML Interface Layout
59
Uniform Resource Locator for the HTML Interface
60
Network Environments and Remote Administrative Sessions
61
Remote Administrative Sessions and HTTP Proxy
61
Remote Administrative Sessions through a NAT Gateway
62
Remote Administrative Sessions through Firewalls
62
Accessing the HTML Interface
63
Logging off the HTML Interface
63
Online Help and Online Documentation
64
Using Online Help
64
Using the Online Documentation
65
Chapter 2 Deploying Cisco Secure ACS
67
Basic Deployment Requirements for Cisco Secure ACS
68
System Requirements
68
Hardware Requirements
68
Operating System Requirements
68
Third-Party Software Requirements
69
Network Requirements
70
Basic Deployment Factors for Cisco Secure ACS
71
Network Topology
71
Dial-Up Topology
71
Wireless Network
74
Remote Access Using VPN
77
Remote Access Policy
79
Security Policy
80
Administrative Access Policy
80
Separation of Administrative and General Users
82
Database
83
Number of Users
83
Type of Database
83
Network Latency and Reliability
84
Suggested Deployment Sequence
84
Chapter 3 Setting up the Cisco Secure ACS HTML Interface
87
Interface Design Concepts
88
User-To-Group Relationship
88
Per-User or Per-Group Features
88
User Data Configuration Options
89
Defining New User Data Fields
89
Advanced Options
90
Setting Advanced Options for the Cisco Secure ACS User Interface
92
Protocol Configuration Options for TACACS
93
Setting Options for TACACS
95
Protocol Configuration Options for RADIUS
96
Setting Protocol Configuration Options for IETF RADIUS Attributes
101
Setting Protocol Configuration Options for Non-IETF RADIUS Attributes
102
C H a P T E R 4 Setting up and Managing Network Configuration
106
CHAPTER 4 Setting up and Managing Network Configuration
106
About Network Configuration
106
About Distributed Systems
107
AAA Servers in Distributed Systems
107
Default Distributed System Settings
108
Proxy in Distributed Systems
108
Fallback on Failed Connection
110
Character String
110
Stripping
110
Proxy in an Enterprise
111
Remote Use of Accounting Packets
111
Other Features Enabled by System Distribution
112
Network Device Searches
112
Network Device Search Criteria
113
Searching for Network Devices
114
AAA Client Configuration
115
AAA Client Configuration Options
115
Adding a AAA Client
119
Editing a AAA Client
122
Deleting a AAA Client
123
AAA Server Configuration
124
AAA Server Configuration Options
125
Adding a AAA Server
127
Editing a AAA Server
129
Deleting a AAA Server
131
Network Device Group Configuration
131
Adding a Network Device Group
132
Assigning an Unassigned AAA Client or AAA Server to an NDG
133
Reassigning a AAA Client or AAA Server to an NDG
134
Renaming a Network Device Group
135
Deleting a Network Device Group
135
Proxy Distribution Table Configuration
136
About the Proxy Distribution Table
136
Adding a New Proxy Distribution Table Entry
137
Editing a Proxy Distribution Table Entry
139
Sorting the Character String Match Order of Distribution Entries
139
Deleting a Proxy Distribution Table Entry
140
Chapter 5 Setting up and Managing Shared Profile Components
141
About Shared Profile Components
141
Downloadable PIX Acls
142
About Downloadable PIX Acls
142
Downloadable PIX ACL Configuration
144
Adding a Downloadable PIX ACL
144
Deleting a Downloadable PIX ACL
145
Editing a Downloadable PIX ACL
145
Network Access Restrictions
146
About Network Access Restrictions
146
Shared Network Access Restrictions Configuration
148
Adding a Shared Network Access Restriction
149
Deleting a Shared Network Access Restriction
149
Editing a Shared Network Access Restriction
149
Command Authorization Sets
153
About Command Authorization Sets
154
About Pattern Matching
155
Command Authorization Sets Configuration
156
Adding a Command Authorization Set
156
Editing a Command Authorization Set
159
Deleting a Command Authorization Set
160
Chapter 6 Setting up and Managing User Groups
161
User Group Setup Features and Functions
162
Default Group
162
Group TACACS+ Settings
162
Common User Group Settings
163
Enabling Voip Support for a User Group
164
Setting Default Time-Of-Day Access for a User Group
165
Setting Callback Options for a User Group
166
Setting Network Access Restrictions for a User Group
167
Setting Max Sessions for a User Group
171
Setting Usage Quotas for a User Group
173
Configuration-Specific User Group Settings
175
Setting Token Card Settings for a User Group
176
Setting Enable Privilege Options for a User Group
178
Enabling Password Aging for the Ciscosecure User Database
180
Enabling Password Aging for Users in Windows Databases
185
Setting IP Address Assignment Method for a User Group
187
Assigning a Downloadable PIX ACL to a Group
188
Configuring TACACS+ Settings for a User Group
189
Configuring a Shell Command Authorization Set for a User Group
191
Configuring a PIX Command Authorization Set for a User Group
193
Configuring Device-Management Command Authorization for a User Group
195
Configuring IETF RADIUS Settings for a User Group
197
Configuring Cisco IOS/PIX RADIUS Settings for a User Group
198
Configuring Cisco Aironet RADIUS Settings for a User Group
199
Configuring Ascend RADIUS Settings for a User Group
201
Configuring Cisco VPN 3000 Concentrator RADIUS Settings for a User Group
202
Configuring Cisco VPN 5000 Concentrator RADIUS Settings for a User Group
203
Configuring Microsoft RADIUS Settings for a User Group
205
Configuring Nortel RADIUS Settings for a User Group
206
Configuring Juniper RADIUS Settings for a User Group
208
Configuring BBSM RADIUS Settings for a User Group
209
Configuring Custom RADIUS VSA Settings for a User Group
210
Group Setting Management
211
Listing Users in a User Group
212
Resetting Usage Quota Counters for a User Group
212
Renaming a User Group
213
Saving Changes to User Group Settings
213
Chapter 7 Setting up and Managing User Accounts
215
User Setup Features and Functions
216
About User Databases
216
Basic User Setup Options
218
Adding a Basic User Account
219
Setting Supplementary User Information
221
Setting a Separate CHAP/MS-CHAP/ARAP Password
222
Assigning a User to a Group
223
Setting User Callback Option
224
Assigning a User to a Client IP Address
225
Setting Network Access Restrictions for a User
226
Setting Max Sessions Options for a User
230
Setting User Usage Quotas Options
232
Setting Options for User Account Disablement
234
Assigning a PIX ACL to a User
235
Advanced User Authentication Settings
236
TACACS+ Settings (User)
236
Configuring TACACS+ Settings for a User
237
Configuring a Shell Command Authorization Set for a User
239
Configuring a PIX Command Authorization Set for a User
242
Configuring Device Management Command Authorization for a User
244
Configuring the Unknown Service Setting for a User
246
Advanced TACACS+ Settings (User)
247
Setting Enable Privilege Options for a User
247
Setting TACACS+ Enable Password Options for a User
249
Setting TACACS+ Outbound Password for a User
250
RADIUS Attributes
251
Setting IETF RADIUS Parameters for a User
252
Setting Cisco IOS/PIX RADIUS Parameters for a User
253
Setting Cisco Aironet RADIUS Parameters for a User
254
Setting Ascend RADIUS Parameters for a User
256
User
257
User
259
Setting Microsoft RADIUS Parameters for a User
260
Setting Nortel RADIUS Parameters for a User
262
Setting Juniper RADIUS Parameters for a User
263
Setting BBSM RADIUS Parameters for a User
265
Setting Custom RADIUS Attributes for a User
266
User Management
267
Listing All Users
268
Finding a User
268
Disabling a User Account
269
Deleting a User Account
270
Resetting User Session Quota Counters
271
Resetting a User Account after Login Failure
272
Saving User Settings
273
C H a P T E R 8 Establishing Cisco Secure ACS System Configuration
276
CHAPTER 8 Establishing Cisco Secure
276
Service Control
276
Determining the Status of Cisco Secure ACS Services
276
Stopping, Starting, or Restarting Services
276
Logging
277
Date Format Control
277
Setting the Date Format
278
Local Password Management
279
Configuring Local Password Management
281
Ciscosecure Database Replication
283
About Ciscosecure Database Replication
283
Replication Process
286
Replication Frequency
288
Important Implementation Considerations
289
Database Replication Versus Database Backup
290
Database Replication Logging
291
Replication Options
291
Replication Components Options
291
Outbound Replication Options
292
Inbound Replication Options
294
Cisco Secure Acses
294
Configuring a Secondary Cisco Secure ACS
295
Replicating Immediately
298
Scheduling Replication
300
Disabling Ciscosecure Database Replication
303
Database Replication Event Errors
303
APPENDIX E Ciscosecure ACS and Virtual Private Dial-Up Networks
303
RDBMS Synchronization
303
About RDBMS Synchronization
304
Users
305
User Groups
306
Network Configuration
306
Custom RADIUS Vendors and Vsas
307
RDBMS Synchronization Components
307
About Csdbsync
307
About the Accountactions Table
308
Cisco Secure ACS Database Recovery Using the Accountactions Table
310
Reports and Event (Error) Handling
311
Preparing to Use RDBMS Synchronization
311
Considerations for Using CSV-Based Synchronization
312
Preparing for CSV-Based Synchronization
313
Configuring a System Data Source Name for RDBMS Synchronization
314
RDBMS Synchronization Options
315
RDBMS Setup Options
315
Synchronization Scheduling Options
316
Synchronization Partners Options
316
Performing RDBMS Synchronization Immediately
317
Scheduling RDBMS Synchronization
318
Disabling Scheduled RDBMS Synchronizations
320
Cisco Secure ACS Backup
321
About Cisco Secure ACS Backup
321
Backup File Locations
322
Directory Management
322
Components Backed up
322
Reports of Cisco Secure ACS Backups
323
Backup Options
323
Performing a Manual Cisco Secure ACS Backup
324
Scheduling Cisco Secure ACS Backups
324
Disabling Scheduled Cisco Secure ACS Backups
325
Cisco Secure ACS System Restore
326
About Cisco Secure ACS System Restore
326
Backup File Names and Locations
327
Components Restored
328
Reports of Cisco Secure ACS Restorations
328
Restoring Cisco Secure ACS from a Backup File
328
Cisco Secure ACS Active Service Management
329
System Monitoring
330
System Monitoring Options
330
Setting up System Monitoring
331
Event Logging
332
Setting up Event Logging
332
IP Pools Server
333
About IP Pools Server
334
Allowing Overlapping IP Pools or Forcing Unique Pool Address Ranges
335
Refreshing the AAA Server IP Pools Table
336
Adding a New IP Pool
337
Editing an IP Pool Definition
338
Resetting an IP Pool
339
Deleting an IP Pool
340
IP Pools Address Recovery
341
Enabling IP Pool Address Recovery
341
Voip Accounting Configuration
342
Configuring Voip Accounting
342
Cisco Secure ACS Certificate Setup
343
Background on Protocols and Certification
343
Digital Certificates
343
About the EAP-TLS Protocol
344
About the PEAP Protocol
346
Installing a Cisco Secure ACS Server Certificate
348
Adding a Certificate Authority Certificate
350
Editing the Certificate Trust List
351
Generating a Certificate Signing Request
352
Updating or Replacing a Cisco Secure ACS Certificate
354
Global Authentication Setup
355
Configuring Authentication Options
355
Logging Formats
359
Special Logging Attributes
360
Chapter 9 Working with Logging and Report
361
Update Packets in Accounting Logs
362
About Cisco Secure ACS Logs and Reports
362
Accounting Logs
363
Dynamic Administration Reports
365
Viewing the Logged-In Users Report
366
Deleting Logged-In Users
367
Viewing the Disabled Accounts Report
368
Cisco Secure ACS System Logs
369
Configuring the Administration Audit Log
370
Working with CSV Logs
371
CSV Log File Names
371
CSV Log File Locations
371
Enabling or Disabling a CSV Log
372
Viewing a CSV Report
373
Configuring a CSV Log
374
Working with ODBC Logs
377
Preparing for ODBC Logging
377
Configuring a System Data Source Name for ODBC Logging
378
Configuring an ODBC Log
378
Remote Logging
381
About Remote Logging
381
Implementing Centralized Remote Logging
382
Remote Logging Options
383
Enabling and Configuring Remote Logging
384
Disabling Remote Logging
386
Service Logs
386
Services Logged
387
Configuring Service Logs
388
CHAPTER 10 Setting up and Managing Administrators and Policy
391
Administrator Accounts
391
About Administrator Accounts
392
C H a P T E R 10 Setting up and Managing Administrators and Policy
392
Administrator Privileges
393
Adding an Administrator Account
396
Editing an Administrator Account
398
Unlocking a Locked out Administrator Account
400
Deleting an Administrator Account
401
Access Policy
401
Access Policy Options
402
Setting up Access Policy
404
Session Policy
406
Session Policy Options
406
Setting up Session Policy
407
Audit Policy
408
Ciscosecure User Database
410
About the Ciscosecure User Database
410
Chapter 11 Working with User Database
411
User Import and Creation
411
About External User Databases
412
Authenticating with External User Databases
413
External User Database Authentication Process
414
Windows NT/2000 User Database
415
What's Supported with Windows NT/2000 User Databases
416
Databases
417
Trust Relationships
417
Windows Dial-Up Networking Clients
418
Windows Dial-Up Networking Clients with a Domain Field
418
Windows Authentication
419
Windows Dial-Up Networking Clients Without a Domain Field
419
User-Changeable Passwords with Windows NT/2000 User Databases
421
Preparing Users for Authenticating with Windows NT/2000
422
Configuring a Windows NT/2000 External User Database
422
Generic LDAP
424
Multiple LDAP Instances
425
Database
425
LDAP Organizational Units and Groups
426
Domain Filtering
426
LDAP Failover
428
Successful Previous Authentication with the Primary LDAP Server
429
Unsuccessful Previous Authentication with the Primary LDAP Server
429
LDAP Configuration Options
430
Configuring a Generic LDAP External User Database
436
Novell NDS Database
441
About Novell NDS User Databases
442
User Contexts
443
Novell NDS External User Database Options
444
Configuring a Novell NDS External User Database
445
ODBC Database
447
What Is Supported with ODBC User Databases
448
Database
449
Database
450
Implementation of Stored Procedures for ODBC Authentication
451
Type Definitions
452
Microsoft SQL Server and Case-Sensitive Passwords
452
Sample Routine for Generating a PAP Authentication SQL Procedure
453
Procedure
454
PAP Authentication Procedure Input
454
PAP Procedure Output
455
CHAP/MS-CHAP/ARAP Authentication Procedure Input
456
CHAP/MS-CHAP/ARAP Procedure Output
456
Result Codes
457
Database
458
Configuring an ODBC External User Database
459
LEAP Proxy RADIUS Server Database
462
Configuring a LEAP Proxy RADIUS Server External User Database
463
Token Server User Databases
465
About Token Servers and Cisco Secure ACS
465
Token Servers and ISDN
466
RADIUS-Enabled Token Servers
467
About RADIUS-Enabled Token Servers
467
Configuring a RADIUS Token Server External User Database
468
Token Server RADIUS Authentication Request and Response Contents
468
RSA Securid Token Servers
472
Configuring an RSA Securid Token Server External User Database
473
Deleting an External User Database Configuration
474
CHAPTER 12 Administering External User Databases
477
Unknown User Processing
477
C H a P T E R 12 Administering External User Databases
478
Known, Unknown, and Discovered Users
478
General Authentication Request Handling and Rejection Mode
479
Authentication Request Handling and Rejection Mode with the Windows NT/2000 User Database
480
Windows Authentication with a Domain Specified
481
Windows Authentication with Domain Omitted
482
Performance of Unknown User Authentication
483
Added Latency
483
Authentication Timeout Value on AAA Clients
483
Network Access Authorization
484
Unknown User Policy
484
Configuring the Unknown User Policy
485
Database Search Order
485
Database Group Mappings
487
Turning off External User Database Authentication
487
Group Mapping by External User Database
488
Database, or LEAP Proxy RADIUS Server Database
489
Group Mapping by Group Set Membership
490
Group Mapping Order
491
No Access Group for Group Set Mappings
491
Default Group Mapping for Windows NT/2000
492
Novell NDS, or Generic LDAP Groups
492
Mapping
494
Configuration
496
Mapping
496
Changing Group Set Mapping Order
497
RADIUS-Based Group Specification
498
APPENDIX A Troubleshooting Information for Cisco Secure ACS
502
Administration Issues
502
A P P E N D I X a Troubleshooting Information for Cisco Secure ACS
503
Browser Issues
503
Cisco IOS Issues
503
Database Issues
505
Dial-In Connection Issues
506
Debug Issues
510
Installation and Upgrade Issues
511
Proxy Issues
511
Maxsessions Issues
512
Report Issues
512
PIX Firewall Issues
513
Third-Party Server Issues
513
User Authentication Issues
514
TACACS+ and RADIUS Attribute Issues
516
Cisco Ios Av Pair Dictionary
517
Appendix B TACAC+ Attribute-Value Pair
518
APPENDIX B TACACS+ Attribute-Value Pairs
518
Cisco IOS AV Pair Dictionary
518
TACACS+ AV Pairs
518
TACACS+ Accounting AV Pairs
520
Appendix C RADIU Attribute
524
APPENDIX C RADIUS Attributesc-1
525
Cisco IOS Dictionary of RADIUS AV Pairs
525
Cisco IOS/PIX Dictionary of RADIUS Vsas
528
Cisco VPN 3000 Concentrator Dictionary of RADIUS Vsas
530
Cisco VPN 5000 Concentrator Dictionary of RADIUS Vsas
533
Cisco Building Broadband Service Manager Dictionary of RADIUS VSA
534
IETF Dictionary of RADIUS AV Pairs
535
Microsoft Mppe Dictionary of Radius Vsas
549
Microsoft MPPE Dictionary of RADIUS Vsas
550
Ascend Dictionary of Radius Av Pairs
552
Ascend Dictionary of RADIUS AV Pairs
553
Nortel Dictionary of RADIUS Vsas
564
Juniper Dictionary of Radius Vsas
565
Juniper Dictionary of RADIUS Vsas
566
A P P E N D I X D Cisco Secure ACS Command-Line Database Utility
568
APPENDIX D Ciscosecure ACS Command-Line Database Utilityd-1
568
Csutil.exe Syntax
568
Location of Csutil.exe and Related Files
568
Csutil.exe Options
569
Backing up Cisco Secure ACS with Csutil.exe
570
Restoring Cisco Secure ACS with Csutil.exe
571
Creating a Ciscosecure User Database
573
Creating a Cisco Secure ACS Database Dump File
574
Loading the Cisco Secure ACS Database from a Dump File
575
Compacting the Ciscosecure User Database
577
User and AAA Client Import Option
579
Importing User and AAA Client Information
579
User and AAA Client Import File Format
581
About User and AAA Client Import File Format
581
ONLINE or OFFLINE Statement
581
ADD Statements
582
UPDATE Statements
584
DELETE Statements
586
ADD_NAS Statements
587
DEL_NAS Statements
588
Import File Example
589
Exporting User List to a Text File
589
Exporting Group Information to a Text File
590
Exporting Registry Information to a Text File
591
Decoding Error Numbers
592
Recalculating CRC Values
593
User-Defined RADIUS Vendors and VSA Sets
593
About User-Defined RADIUS Vendors and VSA Sets
594
Adding a Custom RADIUS Vendor and VSA Set
594
Deleting a Custom RADIUS Vendor and VSA Set
596
Listing Custom RADIUS Vendors
597
Exporting Custom RADIUS Vendor and VSA Sets
598
RADIUS Vendor/Vsa Import File
599
About the RADIUS Vendor/Vsa Import File
599
Vendor and VSA Set Definition
600
Attribute Definition
601
Enumeration Definition
603
Example RADIUS Vendor/Vsa Import File
604
Vpdn Process
607
A P P E N D I X E Cisco Secure ACS and Virtual Private Dial-Up Networks
608
VPDN Process
608
Accountactions Specification
613
APPENDIX F RDBMS Synchronization Import Definitions
613
A P P E N D I X F RDBMS Synchronization Import Definitions
614
Accountactions Format
614
Accountactions Specification
614
Accountactions Mandatory Fields
615
Accountactions Mandatory Fields
616
Accountactions Processing Order
616
Action Codes
617
Action Codes for Setting and Deleting Values
618
Action Codes for Creating and Modifying User Accounts
619
Action Codes for Initializing and Modifying Access Filters
627
Action Codes for Initializing and Modifying Access Filters
628
User Settings
631
Settings
632
Action Codes for Modifying Network Configuration
637
Action Codes for Modifying Network Configuration
638
Cisco Secure Acs Attributes and Action Codes
645
Cisco Secure ACS Attributes and Action Codes
646
User-Specific Attributes
646
User-Defined Attributes
648
Group-Specific Attributes
649
An Example of Accountactions
650
APPENDIX G Ciscosecure ACS Internal Architectureg-1
653
Windows 2000 Services
653
Csadmin
654
Windows 2000 Registry
654
A P P E N D I X G Cisco Secure ACS Internal Architecture
655
Csauth
655
Csdbsync
656
Cslog
656
Csmon
656
Monitoring
657
Recording
658
Notification
659
Response
659
Cstacacs and Csradius
660
Advertisement
Cisco 2509 - Router - EN User Manual (108 pages)
User Guide
Brand:
Cisco
| Category:
Network Router
| Size: 1.16 MB
Table of Contents
About this Guide
1
Overview of the Router
5
Hardware Features
6
System Specifications
10
Obtaining Service and Support
11
Cisco Connection Online
12
Ordering Documentation
13
Preparing to Install the Router
15
Safety Recommendations
15
Maintaining Safety with Electricity
16
Preventing Electrostatic Discharge Damage
17
General Site Requirements
18
Site Environment
18
Preventive Site Configuration
18
Configuring Equipment Racks
19
Power Supply Considerations
19
Preparing to Connect to a Network
20
ISDN Connections
21
Signaling Standards
24
EIA/TIA-232 Connections
26
EIA/TIA-449 Connections
26
Ethernet Connections
29
Token Ring Connections
30
Console and Auxiliary Port Connections
30
Where to Go Next
31
Installing the Router
33
Required Tools and Equipment
34
Setting up the Chassis
35
Setting the Chassis on a Desktop
35
Rack-Mounting the Chassis
37
Attaching the Brackets
37
Installing in a Rack
39
Wall-Mounting the Chassis
39
Connecting the DC Power Supply
42
DC Power Specifications
42
Wiring the DC Power Supply
43
Connecting to a Network
45
Connecting the Console Terminal and Modem
50
Connecting to the Console Port
50
Connecting a Modem to the Auxiliary Port
52
What to Do after Installing the Router Hardware
53
Configuring the Router
55
Booting the Router for the First Time
56
Configuring the Router for the First Time
56
Using the System Configuration Dialog
57
Configuring the ISDN BRI Interface
62
Configuring the Synchronous Serial Interfaces
64
Using Configuration Mode
66
Using Auto Install
67
Cisco IOS Software Basics
68
Cisco IOS Modes of Operation
68
Getting Context-Sensitive Help
71
Saving Configuration Changes
71
Configuring ISDN
72
Example ISDN Configuration
75
Verifying Network Connectivity
77
Getting more Information
77
Troubleshooting the Router
79
Isolating Problems
79
Troubleshooting the Power and Cooling Systems
80
Troubleshooting the Ports, Cables, and Connections
80
Reading the Leds
81
Cable Specifications
85
Console and Auxiliary Port Signals and Pinouts
85
Identifying a Roll-Over Cable
86
Console Port Signals and Pinouts
87
Auxiliary Port Signals and Pinouts
89
Synchronous Serial Cable Assemblies and Pinouts
91
ISDN BRI Port and Cable Pinouts
107
Cisco 2509 - Router - EN Getting Started Manual (57 pages)
Wireless Controller
Brand:
Cisco
| Category:
Controller
| Size: 3.86 MB
Table of Contents
About this Guide
2
FCC Safety Compliance Statement
2
Safety Information
2
Safety Considerations
3
Package Contents
9
Required Tools and Information
9
Unpacking and Preparing the Controller for Operation
9
Initial System Configuration Information
10
Choosing a Physical Location
11
Installing the Controller
11
Mounting the Controller
11
Mounting the Controller on a Wall (Mounting Screws)
15
Connecting the Controller Console Port
21
Installing a Security Lock
23
Running the Bootup Script and Power-On Self Test
23
Using the Startup Wizard
29
Logging into the Controller
33
Connecting to the Network
34
Connecting Access Points
35
Using the Reset Button
36
What's New in Cisco Product Documentation
37
Translated Safety Warnings
38
Statement 1071-Warning Definition
38
Statement 1015-Battery Handling
47
Statement 1024-Ground Conductor
49
Statement 1040-Product Disposal
52
Statement 371-Power Cable and AC Adapter
55
Advertisement
Advertisement
Related Products
Cisco 2501 - Router - EN
Cisco 2503
Cisco 2502
Cisco 2500 Series
Cisco 2504
Cisco 2513
Cisco 2520/CPA2520
Cisco 2522/CPA2522
Cisco 2523/CPA2523
Cisco 2525
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL