HomeContributionsA Comprehensive Guide to Configuring the Cisco ASR1001-X

A Comprehensive Guide to Configuring the Cisco ASR1001-X

-

This article was contributed by Ahmed Alvi from JBS Devices.

The Cisco ASR 1000 Series Aggregation Services Routers are popular choices in today’s edge networking market, all due to their cutting-edge Quantum Flow Processor. This unique feature ensures exceptional performance without breaking the bank.

Among these routers, the ASR 1001-X Router truly shines. Its compact design not only saves energy but also frees up valuable rack space while maintaining high-performance levels. With a forwarding throughput of 20 Gbps, it packs all the essential routing and security features synonymous with the Cisco ASR 1000 Series.

This guide is your roadmap to configuring the ASR1001-X router, where we’ll focus on the setup and installation steps. We’ll also explore its technical specifications so that you have the know-how about how to reap the full benefits of this formidable networking solution.

ASR1001-X Cisco: Key Technical Specifications

The Cisco ASR 1001-X Router packs impressive technical specifications essential for robust networking solutions:

  • Memory: Up to 16 GB DDR3 ECC-protected, expandable from 8 GB.
  • Embedded Services Processor (ESP): Nonmodular, upgradeable to 20 Gbps.
  • Security: Up to 8 Gbps dedicated processing.
  • Ports: RJ-45, auxiliary, mini-USB, copper Ethernet, and two USB 2.0.
  • Interfaces: Six 1 GE SFP-only, two 10 GE SFP+ supporting SyncE, and one half-height SPA bay.
  • Redundancy: Dual IOS for software redundancy.
  • Management: LED indicators, CLI, network management, logging, and more.
  • Environmental: Chassis management and 10 MB TCAM.
  • Performance: Sustained forwarding data traffic of up to 20 Gbps.
  • Power: AC input voltage 85-264V, max power consumption 242W (DC) to 250W (AC), redundant power supply.
  • Dimensions: Compact size, 1.75 x 17.25 x 18.17 inches, 24.9 pounds.

Precautions Prior to System Startup for ASR1001-X

Before starting up the ASR1001-X system, it’s crucial to take some precautions to ensure safety and optimal performance. Firstly, make sure all card slots and compartments are closed. For empty slots, it’s recommended to install blank faceplates. Also, ensure all power supply slots are filled to avoid exposure to hazardous voltages.

Blank faceplates serve three critical functions for safe system operation. They prevent exposure to dangerous voltages and currents, contain electromagnetic interference, and guide cooling airflow to maintain proper temperatures.

Never operate the system without securely placing all cards, faceplates, front covers, and rear covers. This ensures both safety and optimal system performance.

Before powering on the router, ensure the following:

  • Network interface or optional Fast Ethernet Management port cable is connected.
  • The chassis is securely mounted and grounded.
  • Power and interface cables are correctly connected.
  • Your PC with a terminal emulation program (like Hyperterminal) is connected to the console port and configured appropriately.
  • Access control passwords are set.
  • Installation screws are tightened on all removable components.
  • The console terminal is turned on.
  • IP addresses for network interfaces are determined.
  • Shared port adapter and NIM are inserted into their slots if needed.
  • Empty card slots are filled with blanks to maintain proper airflow and electromagnetic compatibility.

Powering Up the ASR1001-X Router

Before powering on:

  • Ensure the power cord is plugged in.
  • Check all cables are connected.
  • Verify your computer is powered up and connected.

Step 1: Flip the power switch to ON. Listen for the fans and check LEDs for power status.

Step 2: Wait for the initialization process to complete. The router typically initializes within seconds.

Now, proceed with the initial router configuration of the ASR1001-X Cisco.

Performing the Initial Configuration of the ASR1001-X Router

When setting up your ASR1001-X Router for the first time, you have two options: the CISCO Setup Command Facility or the CISCO IOS-XE CLI.

1. Using the CISCO Setup Command Facility

The CISCO setup command facility simplifies the initial configuration process of the router, encompassing the setup of LAN and WAN interfaces. It guides users by prompting them to input all necessary information required for a swift and efficient configuration.

Step 1: Access the CISCO setup command facility by entering the setup command in privileged EXEC mode from the Cisco IOS-XE CLI:

  • Router> enable
  • Password: <password>
  • Router# setup
  • Continue with configuration dialog? [yes/no]:

Please note that the prompts presented during this setup process may vary based on the router model, installed interface modules, and software image.

Step 2: To proceed with the setup command facility, input “yes” when prompted to continue with the configuration dialog:

  • Continue with configuration dialog? [yes/no]:

At any stage, you can request assistance by typing ‘?’ for help or abort the configuration dialog by using Ctrl-C. Default settings are indicated within square brackets ‘[].’

Step 3: Opt to enter basic management setup by responding with “yes”:

  • Would you like to enter a basic management setup? [yes/no]: yes

Step 4: Define a hostname for the router:

  • Configuring global parameters:
  • Enter host name [Router]: myrouter

Step 5: Set an enable secret password for enhanced security. This password is encrypted and cannot be viewed in the configuration:

Enter enable secret: cisco

Step 6: Set a unique enable password that differs from the enable secret password. Unlike the encrypted enable secret password, this password is not encrypted and can be viewed when examining the configuration. This password is utilized when an enable secret password is not specified, typically in older software versions or specific boot images.

Enter enable password: cisco123

Step 7: Establish the password for virtual terminal access, which limits unauthorized entry to the router via ports other than the console port. This password safeguards router access over a network interface.

Enter virtual terminal password: cisco

Step 8: Respond appropriately to the following prompts based on your network requirements. If necessary, configure SNMP Network Management by specifying a community string:

  • Configure SNMP Network Management? [no]: yes
  • Community string [public]:

Note: The setup command provides a summary of available interfaces, with numbering varying depending on the installed modules, interface cards, and router model.

Step 9: Address the prompts according to your network requirements:

Configure interface GigabitEthernet0/0/1:

  • Indicate whether to configure IP on this interface: [yes]
  • Specify the IP address for this interface: [10.10.10.12]
  • Define the subnet mask for this interface: [255.255.255.0]

A configuration command script is generated as follows:

hostname myrouter

enable secret 5 $1$t/Dj$yAeGKviLLZNOBX0b9eifO0

enable password cisco123

line vty 0 4 password cisco snmp-server community public !

no IP routing

!

interface GigabitEthernet0/0/0

shutdown

no IP address

!

interface GigabitEthernet0/0/1

no shutdown

IP address 10.10.10.12 255.255.255.0

!

interface GigabitEthernet0/0/2

shutdown

no IP address

!

...

end

 

Step 10: Respond to the prompts and select option [2] to save the initial configuration:

[0] Proceed to the IOS command prompt without saving.

[1] Go back to the setup without saving this config.

[2] Save configuration to nvram and exit.

Enter your selection [2]: 2

Upon completion, the configuration will be saved to nvram, and you’ll be directed to the user prompt:

  • myrouter>

2. Finalize Configuration

After providing all the required details in the Cisco setup command facility, you’ll reach the last stage of configuration. Follow these steps:

Step 1: Here, you’ll be prompted to save the configuration:

Choose “yes” to save and return to the user prompt or “no” to discard changes and return to the router enable prompt.

Use this configuration? {yes/no} : yes

Building configuration…

Use the enabled mode ‘configure’ command to modify this configuration.

%LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/0, changed state to up

<Additional messages omitted.>

Step 2: Press Return when messages stop, reaching the Router> prompt.

Step 3: You’ve completed the initial configuration of the ASR1001-X Cisco. At this point, you can:

Re-run setup for an alternate configuration:

  • Router> enable
  • Password: password
  • Router# setup

Modify or add features using the CLI:

  • Router> enable
  • Password: password
  • Router# configure terminal
  • Router(config)#

3. Manual Configuration via CISCO IOS-XE CLI

In this segment, you’ll discover how to access the CLI for the initial router setup. If you don’t encounter the system configuration message, it means a default configuration file was previously installed on the router. Follow these steps to configure the router manually:

Step 1: Decline the initial configuration dialog when prompted:

— System Configuration Dialog —

Would you like to enter the initial configuration dialog? [yes/no]: no

Step 2: Click Return to proceed with manual setup. Various log messages will be displayed.

Step 3: Press Return again to reach the Router> prompt.

Step 4: Input “enable” to access privileged EXEC mode:

Router> enable

Router#

4. Setting Up Router Hostname

The router’s hostname is crucial for CLI prompts and default configuration filenames. Without configuring it, the router defaults to the factory-assigned name “Router.”

Follow these steps to configure the hostname:

 

Command 

Purpose 

Step 1

Enable

Example: 

Router>enable

Enable privileged EXEC mode.

Step 2

configure terminal

Example:
Router# configure terminal

Enter global configuration mode.

Step 3

hostname name

Example:
Router(config)# hostname myrouter

 

Specify or modify the hostname.

Step 4

end

Example:
myrouter# end

 

Return to privileged EXEC mode.

 

5. Configuring Enable and Enable Secret Passwords

To secure passwords during transmission or storage, utilize the enable password or enable secret command. Both ensure encrypted password access to privileged EXEC (enable) mode.

Prefer the enable secret command for its superior encryption. Note: Enabling the secret command supersedes the password command; simultaneous use isn’t possible. 

Consider the following steps: 

 

Command 

Purpose 

Step 1

enable

Example:
Router> enable

Enable privileged EXEC mode; enter the password when prompted. 

Step 2

configure terminal

Example:
Router# configure terminal

Enter global configuration mode.

Step 3

enable secret password

Example:
Router(config)# enable secret greentree

Add additional security over the enable password command.

Step 4

end

Example:
Router(config)# end

Return to privileged EXEC mode.

Step 5

enable

Example:
Router> enable

Enable privileged EXEC mode; verify new enable/enable secret password works. 

Step 6

end

Example:
Router(config)# end

Return to privileged EXEC mode.

 

6. Configuring Console Idle Timeout

Here’s how to adjust the console line’s idle privileged EXEC timeout. By default, it waits 10 minutes for user input before timing out. Additionally, when configuring the console line, you can set communication parameters, specify autobaud connections, and adjust terminal operating parameters.

 

Command 

Purpose 

Step 1

enable

Example:
Router> enable

Enables privileged EXEC mode. Enter your password if asked.

Step 2

configure terminal

Example:
Router# configure terminal

Enters global configuration mode.

Step 3

line console 0

Example:
Router(config)# line console 0

Configures the console line and begins the line configuration command collection mode.

Step 4

exec-timeout minutes [seconds]

Example:
Router(config-line)# exec-timeout 0 0

Sets the idle privileged EXEC timeout. The interval the privileged EXEC command interpreter waits until user input is detected. 

 

No timeout is specified in the example. Once logged in, the router never logs out when exec-timeout is set to 0. If you exit the console without manually logging out with the disable command, this can have security ramifications.

Step 5

end

Example:
Router(config)# end

Returns to privileged EXEC mode.

Step 6

show running-config

Example:
Router# show running-config

Displays the running configuration file. Verify the configured idle privileged EXEC timeout.

 

Examples:

  • To set a 2-minute and 30-second console idle privileged EXEC timeout:

line console

exec-timeout 2 30

  • To set a 30-second console idle privileged EXEC timeout:

line console

exec-timeout 0 30

Summing Up

To sum up, this is a concise guide to configuring ASR1001-X Cisco router settings using both the setup command facility and manual configuration via the Cisco IOS-XE CLI. From hostname setup to password configuration and console timeouts, each step is outlined with clear instructions and examples. By following these guidelines, administrators can tailor their router configurations to enhance security, accessibility, and operational efficiency.

If you need a reliable source to buy the Cisco ASR1001-X or other IT hardware products, head over to JBS Devices right away. JBS Devices has the best products in stock at the most affordable rates. Reach out to them for further information.

About the author

Ahmed Alvi is a digital marketer leading a team in JBS Devices and ComputerPartsHQ.

Recent News

Table of Contents:
Mastodon