How to Configure Cisco 3845 Routers?

Unlock Best Pricing with In-stock, Ready-to-Ship Products

Cisco 3845 routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 2 requirements. The Cisco 3845 router features a console port, auxiliary port, dual Universal Serial Bus (USB) ports, four high-speed WAN interface card (HWIC) slots, two 10/100/1000 Gigabit Ethernet RJ45 ports, four Enhanced Network Module (ENM) slots, small form factor pluggable (SFP), power inlets, and Compact Flash (CF) drive.

Cisco 3845 supports two internal advanced integration modules (AIMs) 1, and two Ethernet connections. Figure 5 shows the front panel and Figure 6 shows the rear panel. The front panel consists of 7 LEDs: CF LED, PVDM0 LED, PVDM1 LED, PVDM2 LED, PVDM3 LED, AIM0 LED, and AIM1 LED. The back panel consists of 6 LEDs: SYS LED, ACT LED, SYS PWR1 LED, AUX PWR1 LED, SYS PWR2 LED, and AUX PWR2 LED.

 

Q: How I can configure the cards for Slots 0/0, 0/1, 0/2, 0/3?

How to Configure Cisco 3845? To follow step here

F3845#show conf
Using 3487 out of 491512 bytes
!
! Last configuration change at 13:23:09 PCTime Mon Nov 9 2009 by cisco
! NVRAM config last updated at 13:23:10 PCTime Mon Nov 9 2009 by cisco
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname F3845
!
boot-start-marker
boot-end-marker
!
! card type command needed for slot/vwic-slot 0/0
! card type command needed for slot/vwic-slot 0/1
! card type command needed for slot/vwic-slot 0/2
! card type command needed for slot/vwic-slot 0/3
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 51200 debugging
logging console critical
enable secret 5 $1$KG3Z$oYVvBSpD//tgRXSsPcO7V.
!
no aaa new-model
!
resource policy
!
clock timezone PCTime -8
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
no ip source-route
!
!
ip cef
ip tcp synwait-time 10
!
!
no ip bootp server
ip domain name oxnardad.org
ip ssh time-out 60
ip ssh authentication-retries 2
!
!
voice-card 0
no dspfarm
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-3416983991
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3416983991
revocation-check none
rsakeypair TP-self-signed-3416983991
!
!
crypto pki certificate chain TP-self-signed-3416983991
certificate self-signed 01 nvram:IOS-Self-Sig#3104.cer
username vlaguna privilege 15 secret 5 $1$PukE$4.mxdXURqELD/42ERYz1s1
!
!
!
!
!
!
!
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$$ES_LAN$$FW_INSIDE$
ip address 172.20.1.20 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
duplex auto
speed auto
media-type rj45
no mop enabled
!
interface GigabitEthernet0/1
no ip address
no ip redirects
no ip unreachables
no ip proxy-arp
ip route-cache flow
shutdown
duplex auto
speed auto
media-type rj45
no mop enabled
!
!
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
logging trap debugging
no cdp run
!
!
!
!
!
!
control-plane
!
!
!
!
!
!
!
!
!
!
banner exec ^C
% Password expiration warning.
———————————————————————–

Cisco Router and Security Device Manager (SDM) are installed on this device and
it provides the default username “cisco” for one-time use. If you have already
used the username “cisco” to login to the router and your IOS image supports the

“one-time” user option, then this username has already expired. You will not be
able to login to the router with this username after you exit this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use.

———————————————————————–
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
transport output telnet
line aux 0
login local
transport output telnet
line vty 0 4
privilege level 15
login local
transport input telnet ssh
line vty 5 15
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
!
end

F3845#

 

 

Share This Post

Post Comment