Configuration Guide
Page 7
...-01 Cisco 880 Series Integrated Services Router Software Configuration Guide 1-1 These routers are also available on most of the routers. Product Overview 1 C H A P T E R This chapter provides an overview of the features available for the Cisco 880 series Integrated Service Router (ISR...Cisco 880 ISR provides Internet, VPN, data, and backup capability to act as antivirus protection. The 802.11b/g/n option is available on all models. Cisco 880 Series ISR The Cisco 880 series ISRs are a family of the Cisco 880 Series ISRs The Cisco 880 series ISRs have data capabilities. Each router...
...-01 Cisco 880 Series Integrated Services Router Software Configuration Guide 1-1 These routers are also available on most of the routers. Product Overview 1 C H A P T E R This chapter provides an overview of the features available for the Cisco 880 series Integrated Service Router (ISR...Cisco 880 ISR provides Internet, VPN, data, and backup capability to act as antivirus protection. The 802.11b/g/n option is available on all models. Cisco 880 Series ISR The Cisco 880 series ISRs are a family of the Cisco 880 Series ISRs The Cisco 880 series ISRs have data capabilities. Each router...
Configuration Guide
Page 50
...Wired Equivalent Privacy (WEP) encryption scrambles the data transmitted between them with a separate group of protocols for each SSID. Cisco 880 Series Integrated Services Router Software Configuration Guide 4-6 OL-22206-01 Assigning SSIDs You can configure up the wireless device in the "Security Types" ...a unique set of switches. Wireless devices and their wireless client devices use a cipher suite to enable Wi-Fi Protected Access (WPA) or Cisco Centralized Key Management (CCKM). Unicast messages are addressed to one SSID to allow guests limited access to the network and...
...Wired Equivalent Privacy (WEP) encryption scrambles the data transmitted between them with a separate group of protocols for each SSID. Cisco 880 Series Integrated Services Router Software Configuration Guide 4-6 OL-22206-01 Assigning SSIDs You can configure up the wireless device in the "Security Types" ...a unique set of switches. Wireless devices and their wireless client devices use a cipher suite to enable Wi-Fi Protected Access (WPA) or Cisco Centralized Key Management (CCKM). Unicast messages are addressed to one SSID to allow guests limited access to the network and...
Configuration Guide
Page 52
...= Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling. 6. EAP-SIM = Extensible Authentication Protocol-Subscriber Identity Module. 9. Cisco 880 Series Integrated Services Router Software Configuration Guide 4-8 OL-22206-01 Client devices that associate using EAP-FAST, AUTH OPEN with EAP should also be..., the following As with EAP should also be WPA capable. WPA = Wi-Fi Protected Access. 10. Configuring Wireless Quality of Service Configuring quality of service (QoS) can provide preferential treatment to enter a WEP key. WPA9 This setting uses...
...= Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling. 6. EAP-SIM = Extensible Authentication Protocol-Subscriber Identity Module. 9. Cisco 880 Series Integrated Services Router Software Configuration Guide 4-8 OL-22206-01 Client devices that associate using EAP-FAST, AUTH OPEN with EAP should also be..., the following As with EAP should also be WPA capable. WPA = Wi-Fi Protected Access. 10. Configuring Wireless Quality of Service Configuring quality of service (QoS) can provide preferential treatment to enter a WEP key. WPA9 This setting uses...
Hardware Installation Guide
Page 2
...PRACTICE. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. These limits are designed to provide reasonable protection against such interference in the equipment no guarantee that event, your own expense. If it off. These specifications are designed ... may cause interference with the limits for a Class A digital device, pursuant to operate the product. Modifying the equipment without Cisco's written authorization may radiate radio-frequency energy. Operation of the FCC rules. In that interference will be limited by different circuit...
...PRACTICE. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. These limits are designed to provide reasonable protection against such interference in the equipment no guarantee that event, your own expense. If it off. These specifications are designed ... may cause interference with the limits for a Class A digital device, pursuant to operate the product. Modifying the equipment without Cisco's written authorization may radiate radio-frequency energy. Operation of the FCC rules. In that interference will be limited by different circuit...
Hardware Installation Guide
Page 40
.... 4. Figure 2-10 Connecting the Power Supply 1. Connect other end of the following guidelines: 2-18 Cisco 800 Series Routers Hardware Installation Guide 78-5373-04 Use the following surfaces: • Table or other horizontal surface ...protection. Mounting Your Router Chapter 2 Installation Connecting the Power Supply To connect the power supply, follow the steps in Figure 2-10. Ensure that the host is designed to be grounded. Warning This equipment is used on ( ). Press power switch to on the phase conductors (all current-carrying conductors). Cisco 803 router...
.... 4. Figure 2-10 Connecting the Power Supply 1. Connect other end of the following guidelines: 2-18 Cisco 800 Series Routers Hardware Installation Guide 78-5373-04 Use the following surfaces: • Table or other horizontal surface ...protection. Mounting Your Router Chapter 2 Installation Connecting the Power Supply To connect the power supply, follow the steps in Figure 2-10. Ensure that the host is designed to be grounded. Warning This equipment is used on ( ). Press power switch to on the phase conductors (all current-carrying conductors). Cisco 803 router...