cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2050
Views
50
Helpful
14
Replies

Connecting to a Cisco 891F Router Using an Ethernet Cable to the LAN

plckidd
Level 1
Level 1

How do I access my 891F Cisco router using an ethernet connection to the LAN side of the router? I want to be able to access the router from my office on the same network. 

3 Accepted Solutions

Accepted Solutions

Hello,

 

make the changes marked in bold:

 

--> access-list 23 permit 192.168.1.0 0.0.0.255
!
line vty 0 4
access-class 23 in
privilege level 15
login local
--> transport input all

View solution in original post

Hello,

 

use the syntax below:

 

Router891F#conf t

Router891F(config)#no access-list 23

Router891F(config)#access-list 23 permit 192.168.1.0 0.0.0.255

 

View solution in original post

Then as suggested your ACL wrong :

 

access-list 23 permit 192.168.1.0 0.0.0.255




line vty 0 4
transport input telnet ssh

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

View solution in original post

14 Replies 14

Hello,

 

your PC (connected to the LAN side of the router) has a default gateway, that is the LAN IP address of the router. Can you ping that IP address (your default gateway) ?

Hi Georg. Yes, I can ping the LAN IP. Does the router need to be configured so that I can edit the router instead of using the Ethernet/Serial cable?

Hello,

 

you need to configure the VTY lines for TELNET access:

 

891F(config)#username admin privilege 15 password 0 cisco

!

891F(config)#line vty 0 4

891F(config-line)#login local


After that, you can TELNET to the router, using the LAN IP address of the router.

 

This is my current configuration. What do I need to change?

 

-

-

-

 

Router891F#sh run
Building configuration...


Current configuration : 6190 bytes
!
! Last configuration change at 20:39:16 UTC Tue Feb 22 2022 by cisco
!
version 15.9
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router891F
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
!
no aaa new-model
!
crypto pki trustpoint TP-self-signed-2208840803
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2208840803
revocation-check none
rsakeypair TP-self-signed-2208840803
!
!
crypto pki certificate chain TP-self-signed-2208840803
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32323038 38343038 3033301E 170D3232 30323232 32303137
35345A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32303838
34303830 3330819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A3D2 FE7407AE 258D8403 3FFC67C9 3B136AE5 09D32867 150C97A9 6D9C8D76
4D806011 FC6C1C3C 2F949E29 A35672A9 771DDB71 EA56313F 945C18F5 0B3AA97B
B80F33A0 A8288CAD 7BA680C1 FE695E70 CCA7239C 196E0D51 37773A23 AA60BF79
93F8D883 FA936405 C38160CD D5C7F68B C39963AE A13F6213 3229A65F F9267B69
F45D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 1426B2AF 84816620 FD1AD92A CE67C863 D87B151D 1A301D06
03551D0E 04160414 26B2AF84 816620FD 1AD92ACE 67C863D8 7B151D1A 300D0609
2A864886 F70D0101 05050003 81810016 A67AE780 5F22C06E 3A1217BA DBB5CE88
CC3842A4 E8DA5400 C4F3E529 2586CD88 658B4F3F 3672F3B5 2463FCBE 8EAAE14B
6298D237 62EECE92 8BEAB035 7A70A631 73FB064F 1A027023 6248485C BF9B463D
43AE8203 F47F93D1 F065CC08 90719D8D B8C6D0C4 484525D5 A01DC8FF 59806401
CC79B11F D3A113F3 5D3B6E7D D5CA09
quit
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!


!
ip dhcp excluded-address 10.10.10.1
ip dhcp excluded-address 192.168.1.1 192.168.1.150
!
ip dhcp pool ccp-pool
import all
network 10.10.10.0 255.255.255.128
default-router 10.10.10.1
lease 0 2
!
ip dhcp pool nvi-pool
import all
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
lease 0 2
!
!
!
no ip domain lookup
ip domain name Google.com
ip cef
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
license udi pid C891F-K9 sn FCZ193794FU
!
!
username cisco privilege 15 secret 5 $1$nXZP$QWvsa0lvt/WkIhEYR7njB.
!
redundancy
!
!
!
!
no cdp run
!
!
!
!
!
!
!
!
!
!
!
!
interface BRI0
no ip address
encapsulation hdlc
shutdown
isdn termination multidrop
!
interface FastEthernet0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0
no ip address
!
interface GigabitEthernet1
no ip address
!
interface GigabitEthernet2
no ip address
!
interface GigabitEthernet3
no ip address
!
interface GigabitEthernet4
no ip address
!
interface GigabitEthernet5
no ip address
!
interface GigabitEthernet6
no ip address
!
interface GigabitEthernet7
no ip address
!
interface GigabitEthernet8
ip address dhcp
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface Vlan1
description $ETH_LAN$
ip address 192.168.1.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1452
!
interface Async3
no ip address
encapsulation slip
!
interface Dialer0
no ip address
ip mtu 1492
no cdp enable
!
ip forward-protocol nd
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 1 interface GigabitEthernet8 overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet8 dhcp
!
ipv6 ioam timestamp
!
access-list 1 permit 192.168.1.0 0.0.0.255
access-list 23 permit 10.10.10.0 0.0.0.127
access-list 23 permit 192.168.1.0 0.0.0.127
!
control-plane
!
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
banner exec ^C
% Password expiration warning.


-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you
want to use.

-----------------------------------------------------------------------
^C
banner login ^C

-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.

YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE
PUBLICLY-KNOWN CREDENTIALS


Here are the Cisco IOS commands.



username <myuser> privilege 15 secret 0 <mypassword>
no username cisco


Replace <myuser> and <mypassword>

with the username and password you want
to use.


IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL
NOT BE ABLE TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.

For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
^C
!

line con 0
login local
no modem enable
line aux 0
line 3
speed 115200
line vty 0 4
access-class 23 in
privilege level 15
login local
transport input ssh
line vty 5 15
access-class 23 in
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
!
!
!
!
!
!
!
end

Router891F#

 

Hello,

 

make the changes marked in bold:

 

--> access-list 23 permit 192.168.1.0 0.0.0.255
!
line vty 0 4
access-class 23 in
privilege level 15
login local
--> transport input all

I will add this now. 

 

I noticed I have 2 access-list 23 permit.

1) 10.10.10.0 0.0.0.127

2) 192.168.1.0 0.0.0.127

 

Can I or should I remove the 10.10.10.0? If so, how do I delete it?

Hello,

 

use the syntax below:

 

Router891F#conf t

Router891F(config)#no access-list 23

Router891F(config)#access-list 23 permit 192.168.1.0 0.0.0.255

 

Thank you for the support! I can now get to this router via web browser by entering the IP address of the router. 

Is PUTTY an option to connect to the router from a remote location (my work office)?

what is your PC IP address trying to connect, SSH enabled on VTY Lines, suggest using SSH (telnet is not secure)

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

I have my PC set to Obtain IP automatically.

Would I use PUTTY or a web browser to connect to the router?

Can I use the router name (Router891F) in the Host Name or IP address) filed in PUTTY...Port 23...SSH...Telnet?

Then as suggested your ACL wrong :

 

access-list 23 permit 192.168.1.0 0.0.0.255




line vty 0 4
transport input telnet ssh

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

thanks help

The PC is set to "Get IP Automatically".

Translator
Community Manager
Community Manager

thanks for help!

Review Cisco Networking for a $25 gift card