Cisco Cisco Packet Data Gateway (PDG)
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Getting Started
▀ Using the ASR 5500 Quick Setup Wizard
▄ ASR 5500 System Administration Guide, StarOS Release 18
40
Table 2. Quick Setup Wizard Logic Diagram Callout Descriptions
Item
Task
Description/Notes
1
Enter or exit the wizard.
instructions on performing an initial system configuration with the CLI.
Enter setup at the command prompt to re-invoke the wizard.
2
For release 19.2 and higher, configure a
tech-support password.
tech-support password.
The tech-support password is used to access cli test-commands.
Configure an administrative
username/password and a hostname for the
system.
username/password and a hostname for the
system.
The name of the default administrative user configured through the wizard
is admin.
is admin.
Administrative user name is an alphanumeric string of 1 through 32
characters that is case sensitive.
characters that is case sensitive.
Administrative user password is an alphanumeric string of 1 through 63
characters that is case sensitive.
characters that is case sensitive.
Configure a valid, non-null hostname. The hostname is an alphanumeric
string of 1 through 63 characters that is case sensitive.
string of 1 through 63 characters that is case sensitive.
3
Change chassis key value.
A unique chassis key is configured at the factory for each system. This
key is used to decrypt encrypted passwords found in generated
configuration files. The system administrator can create a unique chassis
key that will be used to encrypt passwords stored in configuration files.
Enter yes to set a new chassis key. Refer to the instructions in System
Settings. Additional information can be found in the System Security
chapter.
key is used to decrypt encrypted passwords found in generated
configuration files. The system administrator can create a unique chassis
key that will be used to encrypt passwords stored in configuration files.
Enter yes to set a new chassis key. Refer to the instructions in System
Settings. Additional information can be found in the System Security
chapter.
4
Configure a single Management
Input/Output (MIO/UMIO) out-of-band
management interface for out-of-band
system management.
Input/Output (MIO/UMIO) out-of-band
management interface for out-of-band
system management.
Traffic on the management LAN is not transferred over the same media as
user data and control signaling.
user data and control signaling.
For security reasons, it is recommended that management functions be
maintained on a separate network from user data and control signaling.
maintained on a separate network from user data and control signaling.
MIO port 1 (mio1) is the 1000Base-T default management port.
MIO port 2 (mio2) is available as a secondary management port.
MIO port 2 (mio2) is available as a secondary management port.
Use the RJ-45 interfaces to connect the system to the management
network with CAT5 Ethernet cable.
network with CAT5 Ethernet cable.
Configure an IP address, subnet mask, and gateway for the interface.
Instructions for configuring the second management interface on the MIO
can be found in the System Settings chapter.
can be found in the System Settings chapter.
5
Enable various remote access protocols for
accessing the system.
accessing the system.
Secure Shell (SSH) uses TCP port number 22 by default, if enabled.
SSH V1 and/or V2 are supported.
If SSH is enabled, you can also enable SSH File Transfer Protocol (SFTP)
server functionality.
SSH V1 and/or V2 are supported.
If SSH is enabled, you can also enable SSH File Transfer Protocol (SFTP)
server functionality.
Note: For maximum security, use only SSH v2.