Do you have a question about the Cisco 3945 and is the answer not in the manual?
Form Factor | Rack-mountable |
---|---|
Maximum Throughput | 75 Mbps |
Product Type | Router |
Connectivity Technology | Wired |
Data Link Protocol | Ethernet, Fast Ethernet, Gigabit Ethernet |
Operating System | Cisco IOS |
Flash Memory | 256 MB |
Network/Transport Protocol | IPSec |
Remote Management Protocol | SNMP |
Encryption Algorithm | DES, AES |
Features | Firewall, VPN, Quality of Service (QoS), VLAN support |
Interfaces | 2 x USB |
Security Features | Intrusion Prevention System (IPS) |
Operating Temperature | 32 °F to 104 °F (0 °C to 40 °C) |
Storage Temperature | -4 °F to 149 °F (-20 °C to 65 °C) |
Humidity | 10 - 85% (non-condensing) |
Memory | 2 GB |
Expansion Slots | 4 (free) x EHWIC ¦ 2 x service module ¦ 1 x ISM ¦ 1 x CompactFlash Card |
Details configuring a Network Interface Device (NID) for L3 interfaces, enabling NID functionality without hardware.
Explains configuration steps for Ethernet CFM on a Port Maintenance End Point (MEP).
Provides procedures for configuring Ethernet Virtual Connection (EVC) Bridge Domains (BD) and EFPs on ISR G2 routers.
Details configuring dial backup and remote management using console/auxiliary ports with DHCP and chat scripts.
Explains ISDN S/T port configuration for remote management and backup, including dialer pool and list setup.
Details enabling hardware acceleration for SSLVPN with crypto engine accelerator.
Explains setting up SSL VPN for secure remote user access to enterprise networks via a web browser.
Explains how to configure standard or extended access lists to permit or deny network traffic.
Covers configuring a stateful firewall for inspecting packets and monitoring network connections.
Details deploying security policies by assigning interfaces to zones and configuring traffic inspection.
Provides information on configuring site-to-site and remote access VPNs using IPSec and GRE tunnels.
Outlines tasks for configuring a VPN over IPSec, including IKE policy, crypto maps, and transforms.
Details methods for controlling port authorization: Force-authorized, Force-unauthorized, and Auto.
Provides steps to configure MAC-based authentication on a port for wireless devices.
Describes configuring AAA in local mode for wireless devices to handle authentication and authorization.
Details restrictions for system image upgrades, including CF card compatibility and slot usage.
Provides procedures for upgrading Cisco IOS image on routers, including backup and flash memory checks.
Recommends saving backup copies of startup configuration and system images to a server for recovery.
Provides steps to establish a configuration session with the wireless device using the router's CLI.
Details steps to upgrade the access point to Cisco Unified software, including preparation and performing the upgrade.
Explains how to set the wireless device's network role (access point, bridge) and fallback role.
Details selecting data rates for wireless devices to optimize range or throughput.
Explains configuring Modulation Coding Scheme (MCS) for 802.11n radios to optimize throughput.
Covers setting channels for wireless devices, including 2.4-GHz, 5-GHz, and 802.11n channel widths.
Covers disabling mode button, preventing unauthorized access, protecting EXEC commands, and RADIUS/TACACS+ control.
Details initial configuration procedures using Cisco IOS CLI, including hostname, passwords, and interfaces.
Guides on setting secure enable and enable secret passwords for privileged EXEC mode access.
Shows how to assign IP addresses and interface descriptions to Ethernet interfaces on the router.
Explains how to specify default routes and gateways for IP routing.
Describes saving the running configuration to startup configuration in NVRAM to prevent data loss.
Recommends saving backup copies of configuration and system images to a server for file recovery.