EasyManua.ls Logo

Cisco 3945 User Manual

Cisco 3945
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #328 background imageLoading...
Page #328 background image
320
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Administering the Wireless Device
Managing the System Time and Date
DETAILED STEPS
The first part of the clock summer-time global configuration command specifies when summer time
begins, and the second part specifies when it ends. All times are relative to the local time zone. The start
time is relative to standard time. The end time is relative to summer time. If the starting month is after
the ending month, the system assumes that you are in the southern hemisphere.
To disable summer time, use the no clock summer-time command in global configuration mode.
This example shows how to set summer time to start on October 12, 2000, at 02:00, and end on April 26,
2001, at 02:00:
AP(config)# clock summer-time pdt date 12 October 2000 2:00 26 April 2001 2:00
Command Purpose
Step 1
configure terminal Enters global configuration mode.
Step 2
clock summer-time zone date [month
date year hh:mm month date year hh:mm
[offset]]
or
clock summer-time zone date [date
month year hh:mm date month year
hh:mm [offset]]
Configures summer time to start on the first date and end on the second
date.
Summer time is disabled by default.
For zone, specify the name of the time zone (for example, PDT) to be
displayed when summer time is in effect.
(Optional) For week, specify the week of the month (1 to 5 or last).
(Optional) For day, specify the day of the week (for example,
Sunday).
(Optional) For month, specify the month (for example, January).
(Optional) For hh:mm, specify the time (24-hour format) in hours and
minutes.
(Optional) For offset, specify the number of minutes to add during
summer time. The default is 60.
Step 3
end Returns to privileged EXEC mode.
Step 4
show running-config Verifies your entries.
Step 5
copy running-config startup-config (Optional) Saves your entries in the configuration file.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco 3945 and is the answer not in the manual?

Cisco 3945 Specifications

General IconGeneral
Form FactorRack-mountable
Maximum Throughput75 Mbps
Product TypeRouter
Connectivity TechnologyWired
Data Link ProtocolEthernet, Fast Ethernet, Gigabit Ethernet
Operating SystemCisco IOS
Flash Memory256 MB
Network/Transport ProtocolIPSec
Remote Management ProtocolSNMP
Encryption AlgorithmDES, AES
FeaturesFirewall, VPN, Quality of Service (QoS), VLAN support
Interfaces2 x USB
Security FeaturesIntrusion Prevention System (IPS)
Operating Temperature32 °F to 104 °F (0 °C to 40 °C)
Storage Temperature-4 °F to 149 °F (-20 °C to 65 °C)
Humidity10 - 85% (non-condensing)
Memory2 GB
Expansion Slots4 (free) x EHWIC ¦ 2 x service module ¦ 1 x ISM ¦ 1 x CompactFlash Card

Summary

Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces

Configuring a Network Interface Device on the L3 Interface

Details configuring a Network Interface Device (NID) for L3 interfaces, enabling NID functionality without hardware.

CFM Support on Routed Port and Port MEP

Explains configuration steps for Ethernet CFM on a Port Maintenance End Point (MEP).

Configuring Ethernet Virtual Connection Bridge Domain

Configuring EVCs on Cisco ISR G2 Router

Provides procedures for configuring Ethernet Virtual Connection (EVC) Bridge Domains (BD) and EFPs on ISR G2 routers.

Configuring Backup Data Lines and Remote Management

Configuring Dial Backup and Remote Management Through the Console Port or Auxiliary Port

Details configuring dial backup and remote management using console/auxiliary ports with DHCP and chat scripts.

Configuring Data Line Backup and Remote Management Through the ISDN S/T Port

Explains ISDN S/T port configuration for remote management and backup, including dialer pool and list setup.

Configuring Security Features

Configuring the Cryptographic Engine Accelerator

Details enabling hardware acceleration for SSLVPN with crypto engine accelerator.

Configuring SSL VPN

Explains setting up SSL VPN for secure remote user access to enterprise networks via a web browser.

Configuring Access Lists

Explains how to configure standard or extended access lists to permit or deny network traffic.

Configuring Cisco IOS Firewall

Covers configuring a stateful firewall for inspecting packets and monitoring network connections.

Zone-Based Policy Firewall

Details deploying security policies by assigning interfaces to zones and configuring traffic inspection.

Configuring VPN

Provides information on configuring site-to-site and remote access VPNs using IPSec and GRE tunnels.

Configure a VPN over an IPSec Tunnel

Outlines tasks for configuring a VPN over IPSec, including IKE policy, crypto maps, and transforms.

Configuring Identity Features on Layer 3 Interface

Controlling Port Authorization State

Details methods for controlling port authorization: Force-authorized, Force-unauthorized, and Auto.

Configuring the MAC Authentication Bypass (MAB)

Provides steps to configure MAC-based authentication on a port for wireless devices.

Configuring the Access Point for Local Authentication and Authorization

Describes configuring AAA in local mode for wireless devices to handle authentication and authorization.

Upgrading the Cisco IOS Software

Restrictions for Upgrading the System Image

Details restrictions for system image upgrades, including CF card compatibility and slot usage.

How to Upgrade the Cisco IOS Image

Provides procedures for upgrading Cisco IOS image on routers, including backup and flash memory checks.

Saving Backup Copies of Your New System Image and Configuration

Recommends saving backup copies of startup configuration and system images to a server for recovery.

Configuring the Wireless Device

Starting a Wireless Configuration Session

Provides steps to establish a configuration session with the wireless device using the router's CLI.

Upgrading to Cisco Unified Software

Details steps to upgrade the access point to Cisco Unified software, including preparation and performing the upgrade.

Configuring Radio Settings

Configuring the Role in the Radio Network

Explains how to set the wireless device's network role (access point, bridge) and fallback role.

Configuring Radio Data Rates

Details selecting data rates for wireless devices to optimize range or throughput.

Configuring MCS Rates

Explains configuring Modulation Coding Scheme (MCS) for 802.11n radios to optimize throughput.

Configuring Radio Channel Settings

Covers setting channels for wireless devices, including 2.4-GHz, 5-GHz, and 802.11n channel widths.

Administering the Wireless Device

Security on the Wireless Device

Covers disabling mode button, preventing unauthorized access, protecting EXEC commands, and RADIUS/TACACS+ control.

APPENDIX A Cisco IOS CLI for Initial Configuration

Using the Cisco IOS CLI to Perform Initial Configuration

Details initial configuration procedures using Cisco IOS CLI, including hostname, passwords, and interfaces.

Configuring the Enable and Enable Secret Passwords

Guides on setting secure enable and enable secret passwords for privileged EXEC mode access.

Configuring Gigabit Ethernet Interfaces

Shows how to assign IP addresses and interface descriptions to Ethernet interfaces on the router.

Specifying a Default Route or Gateway of Last Resort

Explains how to specify default routes and gateways for IP routing.

Saving Your Router Configuration

Describes saving the running configuration to startup configuration in NVRAM to prevent data loss.

Saving Backup Copies of Configuration and System Image

Recommends saving backup copies of configuration and system images to a server for file recovery.

APPENDIX D Changing the Configuration Register Settings

Related product manuals