Sign In
Upload
Manuals
Brands
Cisco Manuals
Network Router
7606-S
User Manuals: Cisco 7606-S Router Chassis
Manuals and User Guides for Cisco 7606-S Router Chassis. We have
5
Cisco 7606-S Router Chassis manuals available for free PDF download: Configuration Manual, User Manual, Installation Manual
Cisco 7606-S Configuration Manual (742 pages)
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide Using the CLI
Brand:
Cisco
| Category:
Network Router
| Size: 7.89 MB
Table of Contents
Table of Contents
3
About this Guide
27
Document Conventions
27
Related Documentation
28
Obtaining Documentation and Submitting a Service Request
29
C H a P T E R 1 Introduction to the Firewall Services Module
38
CHAPTER 1 Introduction to the Firewall Services Module1-1
38
New Features
38
Security Policy Overview
39
Permitting or Denying Traffic with Access Lists
40
Applying NAT
40
Protecting from IP Fragments
40
Using AAA for through Traffic
40
Applying Internet Filtering
40
Applying Application Inspection
41
Applying Connection Limits
41
How the Firewall Services Module Works with the Switch
41
Using the MSFC
42
Firewall Mode Overview
43
Stateful Inspection Overview
44
Security Context Overview
45
CHAPTER 2 Configuring the Switch for the Firewall Services Module2-1
47
Switch Overview
47
C H a P T E R 2 Configuring the Switch for the Firewall Services Module
48
Verifying the Module Installation
48
Assigning Vlans to the Firewall Services Module
48
VLAN Guidelines
49
Assigning Vlans to the FWSM
49
Adding Switched Virtual Interfaces to the MSFC
50
SVI Overview
51
Configuring Svis
53
Customizing the FWSM Internal Interface
54
Configuring the Switch for Failover
55
Assigning Vlans to the Secondary Firewall Services Module
55
Adding a Trunk between a Primary Switch and Secondary Switch
55
Ensuring Compatibility with Transparent Firewall Mode
55
Enabling Autostate Messaging for Rapid Link Failure Detection
55
Managing the Firewall Services Module Boot Partitions
56
Flash Memory Overview
56
Setting the Default Boot Partition
56
Resetting the FWSM or Booting from a Specific Partition
57
Chapter 3 Connecting to the Firewall Services Module and Managing the Configuration
59
Connecting to the Firewall Services Module
59
Logging in to the FWSM
59
Logging out of the FWSM
60
Managing the Configuration
61
Saving Configuration Changes
61
Saving Configuration Changes in Multiple Context Mode
61
Saving Configuration Changes in Single Context Mode
61
Copying the Startup Configuration to the Running Configuration
63
Viewing the Configuration
63
Clearing and Removing Configuration Settings
63
Creating Text Configuration Files Offline
64
Security Context Overview
65
CHAPTER 4 Configuring Security Contexts4-1
66
Security Context Overview
66
C H a P T E R 4 Configuring Security Contexts
66
Common Uses for Security Contexts
66
Context Configuration Files
66
Context Configurations
66
System Configuration
66
Admin Context Configuration
67
Unsupported Features
66
How the FWSM Classifies Packets
67
Valid Classifier Criteria
67
Invalid Classifier Criteria
68
Classification Examples
69
Sharing Interfaces between Contexts
71
NAT and Origination of Traffic
72
Sharing an Inside Interface
72
Sharing an Outside Interface
72
Management Access to Security Contexts
73
System Administrator Access
73
Context Administrator Access
74
Enabling or Disabling Multiple Context Mode
74
Backing up the Single Mode Configuration
74
Enabling Multiple Context Mode
74
Restoring Single Context Mode
75
Managing Memory for Rules
75
About Memory Partitions
76
Default Rule Allocation
76
Setting the Number of Memory Partitions
77
Changing the Memory Partition Size
78
Reallocating Rules between Features for a Specific Memory Partition
83
Configuring Resource Management
85
Classes and Class Members Overview
86
Resource Limits
86
Default Class
87
Class Members
88
Configuring a Class
88
Configuring a Security Context
91
Changing between Contexts and the System Execution Space
95
Managing Security Contexts
96
Removing a Security Context
96
Changing the Admin Context
97
Changing the Security Context URL
97
Reloading a Security Context
98
Reloading by Clearing the Configuration
98
Reloading by Removing and Readding the Context
98
Monitoring Security Contexts
99
Viewing Context Information
99
Viewing Resource Allocation
100
Viewing Resource Usage
103
Monitoring SYN Attacks in Contexts
104
Chapter 5 Configuring the Firewall Mode
107
Routed Mode Overview
107
IP Routing Support
107
How Data Moves through the FWSM in Routed Firewall Mode
108
An Inside User Visits a Web Server
108
An Outside User Visits a Web Server on the DMZ
109
An Inside User Visits a Web Server on the DMZ
110
An Outside User Attempts to Access an Inside Host
111
A DMZ User Attempts to Access an Inside Host
112
Transparent Mode Overview
113
Transparent Firewall Network
113
Bridge Groups
113
Management Interface
114
Allowing Layer 3 Traffic
114
Allowed MAC Addresses
114
Passing Traffic Not Allowed in Routed Mode
114
MAC Address Vs. Route Lookups
115
Using the Transparent Firewall in Your Network
115
Transparent Firewall Guidelines
116
Unsupported Features in Transparent Mode
117
How Data Moves through the Transparent Firewall
118
An Inside User Visits a Web Server
119
An Inside User Visits a Web Server Using NAT
120
An Outside User Visits a Web Server on the Inside Network
121
An Outside User Attempts to Access an Inside Host
122
Setting Transparent or Routed Firewall Mode
123
Chapter 6 Configuring Interface Parameters
125
Security Level Overview
125
Configuring Interfaces for Routed Firewall Mode
126
Guidelines and Limitations
126
Configuring an Interface
127
Configuring Interfaces for Transparent Firewall Mode
128
Information about Interfaces in Transparent Mode
128
Information about Bridge Groups
128
Information about Device Management
128
Guidelines and Limitations
129
Configuring Transparent Firewall Interfaces for through Traffic
130
Assigning an IP Address to a Bridge Group
130
Adding a Management Interface
131
Allowing Communication between Interfaces on the same Security Level
134
Configuring Inter-Interface Communication
134
Configuring Intra-Interface Communication
135
Turning off and Turning on Interfaces
136
Changing the Passwords
137
Changing the Login Password
137
Chapter 7 Configuring Basic Setting
138
Changing the Enable Password
138
Changing the Maintenance Software Passwords
138
Setting the Hostname
139
Setting the Domain Name
140
Setting the Prompt
140
Configuring a Login Banner
141
CHAPTER 8 Configuring IP Routing and DHCP Services
143
How Routing Behaves Within FWSM
143
Egress Interface Selection Process
143
Next Hop Selection Process
144
Configuring Static and Default Routes
144
C H a P T E R 8 Configuring IP Routing and DHCP Services
145
Configuring a Static Route
145
Configuring a Default Route
146
Monitoring a Static or Default Route
147
Defining a Route Map
147
Configuring BGP Stub Routing
148
BGP Stub Limitations
149
Configuring BGP Stub Routing
149
Monitoring BGP Stub Routing
150
Restarting the BGP Stub Routing Process
151
Configuring OSPF
151
OSPF Overview
151
Enabling OSPF
152
Redistributing Routes between OSPF Processes
153
Configuring OSPF Interface Parameters
154
Configuring OSPF Area Parameters
156
Configuring OSPF NSSA
157
Configuring a Point-To-Point, Non-Broadcast OSPF Neighbor
158
Configuring Route Summarization between OSPF Areas
159
Configuring Route Summarization When Redistributing Routes into OSPF
159
Generating a Default Route
160
Configuring Route Calculation Timers
160
Logging Neighbors Going up or down
161
Displaying OSPF Update Packet Pacing
161
Monitoring OSPF
162
Restarting the OSPF Process
163
Configuring RIP
163
RIP Overview
163
Enabling RIP
163
Configuring EIGRP
164
EIGRP Routing Overview
164
Enabling and Configuring EIGRP Routing
165
Enabling and Configuring EIGRP Stub Routing
166
Enabling EIGRP Authentication
167
Defining an EIGRP Neighbor
168
Redistributing Routes into EIGRP
168
Configuring the EIGRP Hello Interval and Hold Time
169
Disabling Automatic Route Summarization
169
Configuring Summary Aggregate Addresses
170
Disabling EIGRP Split Horizon
170
Changing the Interface Delay Value
171
Monitoring EIGRP
171
Disabling Neighbor Change and Warning Message Logging
172
Configuring Asymmetric Routing Support
172
Adding Interfaces to ASR Groups
173
Asymmetric Routing Support Example
173
Configuring Route Health Injection
174
Route Health Injection Overview
174
RHI Guidelines
175
Enabling RHI
175
Configuring DHCP
177
Configuring a DHCP Server
177
Enabling the DHCP Server
177
Configuring DHCP Options
179
Using Cisco IP Phones with a DHCP Server
180
Configuring DHCP Relay Services
181
Configuring the DHCP Relay Agent
181
DHCP Relay Overview
181
Preserving DHCP Option 82
183
Verifying the DHCP Relay Configuration
183
CHAPTER 9 Configuring Multicast Routing9-1
185
Multicast Routing Overview
185
C H a P T E R 9 Configuring Multicast Routing
186
Enabling Multicast Routing
186
Configuring IGMP Features
186
Disabling IGMP on an Interface
187
Configuring Group Membership
187
Configuring a Statically Joined Group
187
Controlling Access to Multicast Groups
188
Limiting the Number of IGMP States on an Interface
188
Modifying the Query Interval and Query Timeout
188
Changing the Query Response Time
189
Changing the IGMP Version
189
Configuring Stub Multicast Routing
189
Configuring a Static Multicast Route
190
Configuring PIM Features
190
Disabling PIM on an Interface
190
Configuring a Static Rendezvous Point Address
191
Configuring the Designated Router Priority
191
Filtering PIM Register Messages
191
Configuring PIM Message Intervals
192
For more Information about Multicast Routing
192
CHAPTER 10 Configuring Ipv610-1
193
Ipv6-Enabled Commands
193
Configuring Ipv6 on an Interface
194
Configuring a Dual IP Stack on an Interface
196
Configuring Ipv6 Duplicate Address Detection
196
Configuring Ipv6 Default and Static Routes
197
Configuring Ipv6 Access Lists
197
Configuring Ipv6 Neighbor Discovery
198
Configuring Neighbor Solicitation Messages
198
Configuring the Neighbor Reachable Time
199
Configuring the Neighbor Solicitation Message Interval
199
Configuring Router Advertisement Messages
200
Configuring the Ipv6 Prefix
201
Configuring the Router Advertisement Transmission Interval
201
Configuring the Router Lifetime Value
201
Suppressing Router Advertisement Messages
202
Configuring a Static Ipv6 Neighbor
202
Verifying the Ipv6 Configuration
202
Viewing Ipv6 Interface Settings
202
Viewing Ipv6 Routes
203
CHAPTER 11 Configuring AAA Servers and the Local Database11-1
205
AAA Overview
205
About Accounting
206
About Authentication
206
About Authorization
206
C H a P T E R 11 Configuring AAA Servers and the Local Database
206
AAA Server and Local Database Support
207
Summary of Support
207
RADIUS Server Support
208
Attribute Support
208
Authentication Methods
208
RADIUS Authorization Functions
208
TACACS+ Server Support
208
SDI Server Support
209
SDI Primary and Replica Servers
209
SDI Version Support
209
Two-Step Authentication Process
209
NT Server Support
209
Kerberos Server Support
210
LDAP Server Support
210
Local Database Support
210
Fallback Support
210
User Profiles
210
Configuring the Local Database
211
Identifying AAA Server Groups and Servers
213
CHAPTER 12 Configuring Certificates12-1
217
Public Key Cryptography
217
About Public Key Cryptography
217
C H a P T E R 12 Configuring Certificates
218
Certificate Scalability
218
About Key Pairs
218
About Trustpoints
219
About Revocation Checking
219
Certificate Configuration
219
Preparing for Certificates
220
Generating Key Pairs
220
Removing Key Pairs
221
Establishing AAA Authentication
221
Verifying Configurations for Specified Settings
222
Exporting and Importing Keypairs and Certificates
223
Exporting a Keypair and Certificate
223
Importing a Keypair and Certificate
223
Linking Certificates to a Trustpoint
225
Configuration Example: Cut-Through-Proxy Authentication
225
CHAPTER 13 Identifying Traffic with Access Lists13-1
227
Access List Overview
227
Access List Types
228
Access Control Entry Order
228
C H a P T E R 13 Identifying Traffic with Access Lists
229
Access List Implicit Deny
229
IP Addresses Used for Access Lists When You Use NAT
229
Access List Commitment
231
Maximum Number of Aces
232
Adding an Extended Access List
232
Extended Access List Overview
232
Allowing Broadcast and Multicast Traffic through the Transparent Firewall
233
Adding an Extended ACE
233
Adding an Ethertype Access List
235
Supported Ethertypes
235
Apply Access Lists in both Directions
235
Implicit Deny at the End of an Access List Does Not Affect IP or ARP Traffic
235
Using Extended and Ethertype Access Lists on the same Interface
236
Allowing MPLS
236
Adding an Ethertype ACE
236
Adding a Standard Access List
237
Simplifying Access Lists with Object Grouping
237
Adding Object Groups
238
Adding a Protocol Object Group
238
Adding a Network Object Group
239
Adding a Service Object Group
240
Adding an ICMP Type Object Group
240
Nesting Object Groups
241
Using Object Groups with an Access List
242
Displaying Object Groups
243
Removing Object Groups
243
Adding Remarks to Access Lists
244
Access List Group Optimization
244
How Access List Group Optimization Works
244
Configuring Access List Group Optimization
246
Scheduling Extended Access List Activation
250
Adding a Time Range
250
Applying the Time Range to an ACE
251
Logging Access List Activity
251
Access List Logging Overview
251
Configuring Logging for an ACE
252
Managing Deny Flows
253
Understanding Failover
255
Chapter 14 Configuring Failover
256
Failover System Requirements
256
Software Requirements
256
License Requirements
256
Failover and State Links
256
Failover Link
256
State Link
257
Intra- and Inter-Chassis Module Placement
257
Intra-Chassis Failover
257
Inter-Chassis Failover
258
Transparent Firewall Requirements
261
Active/Standby and Active/Active Failover
262
Active/Standby Failover
262
Active/Active Failover
266
Determining Which Type of Failover to Use
271
Regular and Stateful Failover
271
Regular Failover
272
Stateful Failover
272
Failover Health Monitoring
273
Unit Health Monitoring
273
Interface Monitoring
273
Rapid Link Failure Detection
274
Configuring Failover
274
Failover Configuration Limitations
275
Using Active/Standby Failover
275
Configuring Active/Standby Failover
275
Prerequisites
275
Configuring Optional Active/Standby Failover Settings
278
Using Active/Active Failover
280
Configuring Active/Active Failover
280
Prerequisites
280
Configuring Optional Active/Active Failover Settings
283
Configuring Failover Communication Authentication/Encryption
285
Verifying the Failover Configuration
285
Viewing Failover Status
285
Testing the Failover Functionality
293
Viewing Monitored Interfaces
293
Viewing the Failover Configuration
293
Controlling and Monitoring Failover
294
Forcing Failover
294
Disabling Failover
295
Disabling Configuration Synchronization
295
Restoring a Failed Unit or Failover Group
295
Monitoring Failover
296
Debug Messages
296
Failover System Log Messages
296
Snmp
296
Chapter 15 Permitting or Denying Network Access
299
Inbound and Outbound Access List Overview
299
Inbound and Outbound Access List Overview
301
Applying an Access List to an Interface
302
Configuring NAT
305
NAT Overview
305
Chapter 16 Configuring NAT
306
Introduction to NAT
306
NAT in Routed Mode
306
NAT in Transparent Mode
307
NAT Control
309
NAT Types
310
Dynamic NAT
310
Pat
312
Static NAT
312
Static PAT
313
Bypassing NAT When NAT Control Is Enabled
314
Policy NAT
314
NAT Session (Xlate) Creation
317
NAT and PAT Global Pool Usage
318
NAT and same Security Level Interfaces
318
Order of NAT Commands Used to Match Real Addresses
319
Maximum Number of NAT Statements
319
Mapped Address Guidelines
319
DNS and NAT
320
Configuring NAT Control
322
Configuring Xlate Bypass
323
Using Dynamic NAT and PAT
323
Dynamic NAT and PAT Implementation
324
Configuring Dynamic NAT or PAT
330
Using Static NAT
333
Using Static PAT
335
Bypassing NAT
337
Configuring Identity NAT
338
Configuring Static Identity NAT
338
Configuring NAT Exemption
340
NAT Examples
341
Overlapping Networks
342
Redirecting Ports
343
Chapter 17 Applying AAA for Network Access
345
AAA Performance
345
Configuring Authentication for Network Access
345
Authentication Overview
346
Applications Required to Receive an Authentication Challenge
346
FWSM Authentication Prompts
346
One-Time Authentication
346
Authenticating Directly with the FWSM
347
Static PAT and HTTP
347
Enabling Network Access Authentication
347
Configuring Custom Login Prompts
349
Enabling Secure Authentication of Web Clients
350
Disabling Authentication Challenge Per Protocol
352
Configuring Authorization for Network Access
353
Configuring TACACS+ Authorization
353
Configuring RADIUS Authorization
354
Configuring a RADIUS Server to Download Per-User Access Control List Names
354
Configuring a RADIUS Server to Download Per-User Access Control Lists
354
Configuring Accounting for Network Access
357
Using MAC Addresses to Exempt Traffic from Authentication and Authorization
358
Chapter 18 Applying Filtering Services
361
Filtering Overview
361
Filtering Activex Objects
361
Activex Filtering Overview
362
Enabling Activex Filtering
362
Filtering Java Applets
363
Filtering Urls and FTP Requests with an External Server
364
URL Filtering Overview
364
Identifying the Filtering Server
364
Buffering the Content Server Response
366
Caching Server Addresses
366
Filtering HTTP Urls
367
Configuring HTTP Filtering
367
Enabling Filtering of Long HTTP Urls
367
Truncating Long HTTP Urls
367
Exempting Traffic from Filtering
368
Filtering HTTPS Urls
368
Filtering FTP Requests
369
Viewing Filtering Statistics and Configuration
369
Viewing Filtering Server Statistics
370
Viewing Buffer Configuration and Statistics
370
Viewing Caching Statistics
371
Viewing Filtering Performance Statistics
371
Viewing Filtering Configuration
371
Chapter 19 Configuring ARP Inspection and Bridging Parameters
373
Configuring ARP Inspection
373
ARP Inspection Overview
373
Adding a Static ARP Entry
374
Enabling ARP Inspection
374
Customizing the MAC Address Table
375
MAC Address Table Overview
375
Adding a Static MAC Address
375
Setting the MAC Address Timeout
375
Disabling MAC Address Learning
376
Viewing the MAC Address Table
376
Chapter 20 Using Modular Policy Framework
377
Information about Modular Policy Framework
377
Modular Policy Framework Supported Features
377
Modular Policy Framework Configuration Overview
378
Default Global Policy
379
Identifying Traffic (Layer 3/4 Class Map)
380
Default Class Maps
380
Maximum Class Maps
380
Creating a Layer 3/4 Class Map for through Traffic
381
Configuring Special Actions for Application Inspections (Inspection Policy Map)
382
Inspection Policy Map Overview
383
Defining Actions in an Inspection Policy Map
383
Identifying Traffic in an Inspection Class Map
386
Creating a Regular Expression
387
Creating a Regular Expression Class Map
390
Defining Actions (Layer 3/4 Policy Map)
390
Information about Layer 3/4 Policy Maps
391
Feature Directionality
391
Feature Matching Guidelines Within a Policy Map
391
Policy Map Guidelines
391
Order in Which Multiple Feature Actions Are Applied
392
Incompatibility of Certain Feature Actions
393
Feature Matching Guidelines for Multiple Policy Maps
394
Default Layer 3/4 Policy Map
394
Adding a Layer 3/4 Policy Map
394
Applying Actions to an Interface (Service Policy)
396
Modular Policy Framework Examples
397
Applying Inspection to HTTP Traffic Globally
397
Applying Inspection and Connection Limits to HTTP Traffic to Specific Servers
398
Applying Inspection to HTTP Traffic with NAT
398
Chapter 21 Configuring Advanced Connection Features
401
Configuring Connection Limits and Timeouts
401
Permitting or Denying Application Types with PISA Integration
404
PISA Integration Overview
405
PISA Integration Guidelines and Limitations
405
Using GRE for Tagging
405
Failover Support
406
Configuring the FWSM to Deny PISA Traffic
406
Configuring the Switch for PISA/FWSM Integration
407
Changing the MTU on the Switch to Support Longer Packet Length
407
PISA Limitations and Restrictions
407
Configuring Classification on the PISA
408
Configuring Tagging on the PISA
408
Sample Switch Configurations for PISA Integration
409
Monitoring PISA Connections
410
Syslog Message for Dropped Connections
410
Viewing PISA Connections on the FWSM
410
Configuring TCP State Bypass
410
TCP State Bypass Overview
411
Allowing Outbound and Inbound Flows through Separate Fwsms
411
Compatibility with NAT
412
Unsupported Features
412
Connection Timeout
413
Enabling TCP State Bypass
413
Disabling TCP Normalization
414
Preventing IP Spoofing
414
Configuring the Fragment Size
415
Blocking Unwanted Connections
415
Advertisement
Cisco 7606-S User Manual (446 pages)
User Guide
Brand:
Cisco
| Category:
Network Router
| Size: 4.95 MB
Table of Contents
Table of Contents
3
About this Guide
11
Audience
11
Organization
11
Related Documentation
12
Conventions and Terminology
13
Obtaining Documentation
14
World Wide Web
14
Documentation CD-ROM
14
Ordering Documentation
14
Documentation Feedback
15
Obtaining Documentation
15
World Wide Web
15
Documentation CD-ROM
15
Ordering Documentation
16
Documentation Feedback
16
Obtaining Technical Assistance
16
Cisco.com
16
Technical Assistance Center
17
Chapter 1 Product Overview
19
Cisco 6500/7600 Series Manager Software Overview
19
Software Features
20
Catalyst 6000 Family Overview
20
Cisco 7600 Series Overview
22
Supported Hardware
24
Supported Software
28
Chapter 2 Basic Concepts
29
Cisco EMF and Cisco 6500/7600 Series Manager Software
29
Element Management
30
C65/76M Objects and Interfaces
31
Physical Objects
31
Logical Objects
32
Network Element Object
34
Containment Views
35
Network View
35
Physical View
36
C65/76M Object States
36
Decommissioned State
36
Discovery State
36
Normal State
37
Lostcomms State
37
Normal Lostcomms State
37
Performance State
37
Perflostcomms State
38
Discovery Lostcomms State
38
Mismatched State
38
Chapter 3 Getting Started
39
Preparing to Use the C65/76M Software
39
Using Cisco EMF
40
Cisco Element Management Framework Launchpad Window
41
Quitting a Cisco EMF User Session
44
Deploying C65/76M Objects
45
Launching Object Management Dialogs
48
Chapter 4 Deploying the C65/76M
51
Managing a Catalyst 6000 Family Switch or a Cisco 7600 Series Internet Router
51
Deploying Objects
51
Commissioning Objects
53
Deployment and Commissioning Process
55
IP Auto Discovery
55
Deployment and Commissioning Process
57
Manual Deployment
61
IP Auto Discovery
69
Manual Deployment
69
Predeployment
71
Predeploying Subchassis Modules
81
Chapter 5 Physical Object Dialog Boxe
117
C6576M Chassis Dialog Box
117
Status Tab
117
Inventory Tab
120
Performance Tab
124
Additional Notes Tab
125
C6576M Power Supply Dialog Box
126
Details Tab
126
Additional Notes Tab
128
C6576M Supervisor Module Dialog Box
129
Status Tab
129
Inventory Tab
131
Performance Tab
133
Additional Notes Tab
134
C6576M Ethernet Module Dialog Box
136
Details Tab
136
Additional Notes Tab
140
C6576M Ethernet Interface Dialog Box
141
Status Tab
141
Configuration Tab
144
Performance Tab
147
Routing Protocol Tab
149
STP Tab
152
HSRP Tab
156
Qos Tab
159
Additional Notes Tab
162
C6576M Switch Fabric Module Dialog Box
163
Details Tab
163
Performance Tab
165
Additional Notes Tab
166
C6576M Flexwan Module Dialog Box
167
Details Tab
167
Additional Notes Tab
169
C6576M Port Adapter Dialog Box
170
Details Tab
170
Additional Notes Tab
172
C6576M Optical Services Modules Dialog Box
174
Details Tab
174
Additional Notes Tab
178
C6576M SLB Dialog Box
179
Details Tab
179
Client Side VLAN Tab
182
Server Side VLAN Tab
184
Server Farms Tab
186
Virtual Servers Tab
188
Additional Notes Tab
191
C6576M ATM T3 Interface Dialog Box
192
Status Tab
192
Configuration Tab
194
ATM/T3 Tab
196
Performance Tab
198
Routing Protocol Tab
201
Additional Notes Tab
203
C6576M ATM E3 Interface Dialog Box
204
Status Tab
204
Configuration Tab
206
ATM/E3 Tab
208
Performance Tab
209
Routing Protocol Tab
212
Additional Notes Tab
214
C6576M ATM SONET Interface Dialog Box
215
Status Tab
215
Configuration Tab
218
Atm/Sonet Tab
220
Performance Tab
222
Routing Protocol Tab
225
Additional Notes Tab
228
C6576M OSM GE-WAN Interface Dialog Box
229
Status Tab
229
Configuration Tab
231
Performance Tab
232
Routing Protocol Tab
235
HSRP Tab
238
Additional Notes Tab
241
C6576M OSM Channelized SONET Interface Dialog Box
242
Status Tab
242
Status Field
244
Configuration Tab
245
Performance Tab
249
Additional Notes Tab
251
C6576M OSM POS Interface Dialog Box
252
Status Tab
252
Configuration Tab
254
ATM/SONET Tab
255
Performance Tab
257
Routing Protocol Tab
259
Additional Notes Tab
261
C6576M OSM Serial Subinterface Dialog Box
263
Status Tab
263
Interface Configuration Tab
265
DS-3 Configuration Tab
266
Performance Tab
270
DS-3 Statistics Tab
272
Routing Protocol Tab
274
Additional Notes Tab
276
C6576M OSM POS Subinterface Dialog Box
277
Status Tab
277
Interface Configuration Tab
279
POS Tab
281
Performance Tab
283
POS Statistics Tab
286
Routing Protocol Tab
287
Additional Notes Tab
290
Chapter 6 Logical Object Dialog Boxe
292
C6576M NE Config/Mgmt Dialog Box
293
Configuration Tab
293
System Information Tab
296
SNMP Tab
297
SNMP Trap Tab
298
Additional Notes Tab
302
Cisco 7606-S Installation Manual (324 pages)
7600 Series
Brand:
Cisco
| Category:
Network Router
| Size: 11.91 MB
Table of Contents
Table of Contents
3
Preface
9
Document Revision History
9
Audience
11
Organization
11
Appendix A Technical Specification
11
A P P E N D I X B Connector and Cable Specifications
11
Chapter 3 Installing the Cisco 7600 Serie Router
11
Conventions
12
Obtaining Documentation
15
Related Documentation
15
Cisco.com
16
Documentation CD-ROM
16
Documentation Feedback
16
Ordering Documentation
16
Cisco.com
17
Obtaining Technical Assistance
17
Technical Assistance Center
17
Obtaining Additional Publications and Information
18
Product Overview
21
Chapter 1 Product Overview
22
Cisco 7603 Router
23
Cisco 7603-S Router
24
Cisco 7604 Router
25
Cisco 7604 Router
26
Cisco 7606 Router
27
Cisco 7606 Router
28
Cisco 7606-S Router
31
Cisco 7609 Router
32
Cisco 7609 Router
33
Cisco 7609-S Router
34
Cisco 7613 Router
35
Bandwidth and Port Density
36
System Features
36
Bandwidth and Port Density
37
Cisco 7603 Router
37
Cisco 7603-S Router
37
Redundancy
37
System Features
37
Cisco 7604 Router
38
Component Hot Swapping
38
Cisco 7600 Series Router Components
39
Cisco 7606 Router
39
Cisco 7606-S Router
39
Cisco 7609 Router
39
Fan Assembly
39
Cisco 7609-S Router
42
Power Supplies
43
Cisco 7613 Router
43
Cisco 7603-S Router Power Supplies
44
Cisco 7609-S Router Power Supplies
50
Load Sharing
51
Power Supply Cooling
51
Environmental Monitoring of the Power Supply
52
Pem
52
Power Supply Leds
52
Chapter 2 Preparing for Installation
57
This Publication Describes the Following Cisco 7600 Series Routers:
57
Safety
58
Supported Line Cards on 7600 Chassis
58
Site Requirements
60
Environmental Requirements
60
Preventing Electrostatic Discharge Damage
60
Power Requirements
76
Power Connection Guidelines
77
AC-Powered Systems
77
Power Requirements
77
Ac Power Cord Illustrations
81
DC-Powered Systems
89
Site Planning Checklist
90
Installing the Cisco 7600 Series Router
91
Unpacking the Router
92
Installation Guidelines
93
Installing the Shelf Brackets and Crossbar Bracket
94
Required Tools
94
Installing the Chassis Brackets
95
Installing the Router Chassis in the Rack
99
Installing the Stabilizer Kit (Cisco 7609 Router, Cisco 7609-S, and Cisco 7613 Router Only)
103
Installing the Cable Management System (Cisco 7609 Router and Cisco 7609-S Router Only)
105
Replacing the Cable Guide
107
System Ground Connection
109
Required Tools and Equipment
110
Connecting the System Ground
114
Attaching the Interface Cables
115
Connecting the Supervisor Engine Console Port
116
Connecting the Supervisor Engine Uplink Ports
117
Connecting to the Interface Ports
118
Installing the Power Supplies in the Router Chassis
115
Verifying Router Chassis Installation
120
Chapter 4 Troubleshooting
121
Getting Started
121
Problem Solving to the System Component Level
122
Identifying Startup Problems
122
Troubleshooting the Power Supply
123
Troubleshooting the Fan Assembly
126
Troubleshooting Modules
127
Troubleshooting the Fan Assembly
127
Contacting Customer Service
128
CHAPTER 5 Removal and Replacement Procedures
129
Preventing Electrostatic Discharge Damage
129
Removing and Replacing the Power Supply
130
C H a P T E R 5 Removal and Replacement Procedures
130
Required Tools
130
Removing an AC-Input Power Supply
131
Installing an AC-Input Power Supply
136
Identifying Startup Problems
137
Removing a DC-Input Power Supply
137
Installing DC-Input Power Supplies
170
Removing and Replacing the PEM
240
Removing the AC-Input PEM
241
Required Tools
241
Installing the AC-Input PEM
243
Removing a DC-Input PEM
243
Installing a DC-Input PEM
245
Removing and Replacing the Fan Assembly
247
Removing the Fan Assembly
247
Installing the Fan Assembly
253
Checking the Installation
254
Installing the Air Filter Assembly on a Cisco 7606 Router and the Cisco 7606-S Router (Optional)
254
Installing the Air Filter Assembly on a Cisco 7609 Router and the Cisco 7609-S Router (Optional)
255
Replacing the Air Filter on a Cisco 7609 Router and the Cisco 7609-S Router (Optional)
259
Air Filters in C7603-S Chassis
261
Installing the Thermistor Module on a Cisco 7606-S Router
261
Installing the Thermistor Module on a Cisco 7609-S Router
262
Upgrading the Cisco 7600 Series Routers to a WS-SUP720-3BXL
264
Advertisement
Cisco 7606-S Installation Manual (130 pages)
field-replaceable units (FRUs)
Brand:
Cisco
| Category:
Network Router
| Size: 9.66 MB
Table of Contents
Preventing Electrostatic Discharge Damage
2
Table of Contents
9
Step 3
11
Figure
11
Removing PWR-2700-DC/4 Power Supply from a Cisco 7604 Router
13
Removing PWR-1900-DC Power Supply from a Cisco 7606 Router
15
Removing PWR-2700-DC Power Supply from a Cisco 7606 Router
17
Removing and Replacing the Pem
106
Required Tools
107
Removing and Replacing the Fan Assembly
113
Removing the Fan Assembly
113
Installing the Fan Assembly
118
Checking the Installation
119
Cisco 7606-S User Manual (22 pages)
with Supervisor SUP720-3B
Brand:
Cisco
| Category:
Network Router
| Size: 0.45 MB
Table of Contents
Table of Contents
2
1 Introduction
3
Purpose
3
Module Validation Level
3
References
3
Terminology
4
Document Organization
4
2 Cisco 7606-S and 7609-S Routers with Supervisor Sup720-3B
5
Module
6
Roles and Services
8
Authentication
9
Services
9
User Services
9
Crypto Officer Services
10
Unauthenticated Services
11
Physical Security
11
Module Opacity
11
Tamper Evidence
13
Cryptographic Algorithms
17
Approved Cryptographic Algorithms
17
Non-FIPS Approved Algorithms Allowed in FIPS Mode
18
Non-Approved Cryptographic Algorithms
18
Cryptographic Key Management
18
Self -Tests
20
Self-Tests Performed by the IOS Image
20
3 Secure Operation
21
System Initialization and Configuration
21
Protocols
22
Remote Access
22
Advertisement
Related Products
Cisco 7606
Cisco 7606-S323B-8G-P
Cisco 7606S-RSP720C-R
Cisco 7606S-RSP720CXL-P
Cisco 7603 - Modular Expansion Base
Cisco 7603-S
Cisco 7609-2SUP720XL-2PS
Cisco 7609-S
Cisco 7600-SIP-400 - SPA Interface Processor 400
Cisco 7609
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL