Experts in Networking. CCNA Cheat Sheet. This CCNA command cheat sheet covers both ICND parts 1 & 2 and covers the current CCNA exam (640-802).



Similar documents
CISCO CATALYST 3550 Series Switches

ENetwork Basic Configuration PT Practice SBA

Configuring a Router

Welcome to Todd Lammle s CCNA Bootcamp

ICND IOS CLI Study Guide (CCENT)

Skills Assessment Student Training Exam

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Interconnecting Cisco Networking Devices Part 2

How To Learn Cisco Cisco Ios And Cisco Vlan

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

"Charting the Course...

Network Simulator Lab Study Plan

Fundamentals of Switching

: Interconnecting Cisco Networking Devices Part 2 v1.1

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Lab Introductory Lab 1 Getting Started and Building Start.txt

Brocade to Cisco Comparisons

3.1 Connecting to a Router and Basic Configuration

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions

: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

Device Interface IP Address Subnet Mask Default Gateway

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

Applicazioni Telematiche

Lab 2 - Basic Router Configuration

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

CCT vs. CCENT Skill Set Comparison

Interconnecting Cisco Network Devices 1 Course, Class Outline

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Chapter 2 Reading Organizer

Objectives. Background. Required Resources. CCNA Security

ISOM3380 Advanced Network Management. Spring Course Description

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

Lab: Basic Router Configuration

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

How To Configure A Cisco Router With A Cio Router

- Basic Router Security -

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)

Lab Advanced Telnet Operations

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Lab Load Balancing Across Multiple Paths

Lab Load Balancing Across Multiple Paths Instructor Version 2500

Lab Use Network Inspector to Observe STP Behavior

Cisco Router Configuration Basics. Scalable Infrastructure Workshop

Leased Line PPP Connections Between IOS and HP Routers

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Lab 7-1 Configuring Switches for IP Telephony Support

How To Install An At-S100 (Geo) On A Network Card (Geoswitch)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Cisco Nexus 5548UP. Switch Configuration Guide for Dell PS Series SANs. A Dell Deployment and Configuration Guide

How to Configure Cisco 2600 Routers

Lab Developing ACLs to Implement Firewall Rule Sets

Document ID: Introduction

Time Remaining: Showing 1 of 4 Next> Page:

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

CCNA2 Chapter 11 Practice

SSVP SIP School VoIP Professional Certification

Cisco 12 CCNA Certification

LAB MANUAL for Computer Network

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Securing Networks with PIX and ASA

Figure 1 - T1/E1 Internet Access

CCNA Exploration 4.0: (II) Routing Protocols and Concepts. Chapter 1: Introduction to Routing and Packet Forwarding

Cisco Catalyst 3750X. Rapid EqualLogic Configuration Series Implementation Guide. Dell Storage Engineering April 2014

How To Configure InterVLAN Routing on Layer 3 Switches

Router Lab Reference Guide

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

Table of Contents. Configuring IP Access Lists

Lab Configuring Syslog and NTP (Instructor Version)

CCNA Access List Sim

- The PIX OS Command-Line Interface -

Cisco Networking Professional-6Months Project Based Training

Comware versus Cisco IOS Command Guide

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

NAT (Network Address Translation) & PAT (Port Address Translation)

Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...

How To Set Up A Netvanta For A Pc Or Ipad (Netvanta) With A Network Card (Netvina) With An Ipa (Net Vanta) And A Ppl (Netvi) (Netva)

50 Cragwood Rd, Suite 350 South Plainfield, NJ Victoria Commons, 613 Hope Rd Building #5, Eatontown, NJ 07724

CCNP v2 Eğitimi İçeriği

Configure ISDN Backup and VPN Connection

Lab Configure Basic AP Security through IOS CLI

- Virtual LANs (VLANs) and VTP -

Cisco Networking Academy CCNP Multilayer Switching

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Lab Organizing CCENT Objectives by OSI Layer

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...

Lab Creating a Network Map using CDP Instructor Version 2500

Introduction to Cisco router configuration

Case Study 1: Registering IP Phones with a remote Call

Transcription:

CCNA Cheat Sheet This CCNA command cheat sheet covers both ICND parts 1 & 2 and covers the current CCNA exam (640-802). Whilst not an exhaustive IOS command list it covers the majority of commands found in the exam. Older cheat sheets may contain additional commands, such as IPX which is no longer in the exam. Cisco Modes Description User mode Enter Privilege mode Privileged mode Switch> Switch>enable Switch# Keyboard short cut Enter configuration mode Global Config mode Enter Interface mode Interface mode Return to global configuration Exit Global Config mode Return to use mode Logout Switch#configure terminal Switch(config)# Switch(config)#interface fa0/1 Switch(config-if) Switch(config-if)exit Switch(config)#exit Switch#disable Switch>exit Keyboard Shortcuts Description Recall Previous command Recall Next command Beginning of command End of command Delete input Exit Configuration Mode Complete command Keyboard shortcut Up arrow or <Ctrl> p Down arrow or <Ctrl> n <Ctrl> a <Ctrl> e <Ctrl> d <Ctrl> z TAB

Device Configuration Description Configure device system name Sets the encrypted enable password Sets the unencrypted enable password Enable password encryption on all clear text password within the configuration file Configure a Message Of The Banner, with an ending character of $ Commands Switch(config)#hostname sw1 Switch(config)#enable secret cisco Switch(config)#enable password cisco Switch(config)#service password-encryption Switch(config)#banner motd $ Assign IP address to vlan Switch(config)#int vlan 1 Switch(config-if)#ip addr 172.22.1.11 255.255.255.0 Assign Default gateway, note the mode Select one interface Switch(config)#ip default-gateway 10.1.1.1 Switch(config)#int fa0/1 Select a range of interfaces (version dependant) Set the interface description Switch(config)#int range fa0/1 12 Switch(config-if)#description Add vlan using config mode switch(config)#vlan 11 switch(config-vlan)#name test Configure Interface fa0/1 @ speed 100 Mbps and full duplex Switch(config-if)#speed 100 Switch(config-if)#duplex full Assign interface to vlan switch(config-if)#switchport access vlan 11 Enable Port Security. Disable Interface Enable Interface Switch(config-if)#switchport mode access Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security mac-address sticky Switch(config-if)shutdown Switch(config-if)no shutdown

Configures 5 Telnet sessions each with a password of cisco Enable and define console password of cisco Synchronise console messages (keep what you have typing on the screen) Set the timezone and automatically adjust Sets the switch priority for the vlan. This combined with the switch mac address creates the switch BID Enables portfast Enables RSTP. Other options are, PVST and MST Creates a vlan. Note this now done in config mode not vlan database. Also note the int vlan command does NOT create vlans Switch(config)#line vty 0 4 Switch(config-line)#login Switch(config-line)#password cisco Switch(config)#line con 0 Switch(config-line)#login Switch(config-line)#password cisco Switch(config-line)#logging synchronous Switch(config)#clock timezone gmt 0 Switch(config)#clock summer-time gmt recurring Switch(config)#spanning-tree vlan 1 priority 4096 Switch(config)#int fa0/1 Switch(config-if)#spanning-tree portfast Switch(config)#spanning-tree mode rapid-pvst Switch(config)#vlan 2 Switch(config-vlan)#name sales Assign an interface to vlan 2 Switch(config-if)#switchport access vlan 2 Unconditionally forces an interface into trunking. Other options are access and dynamic Manually assign a switch to a VTP domain. A switch will automatically become part of a VTP domain if it s currently in the null domain and receives a VTP frame Changes the VTP mode from the default server mode to client mode. In client mode no changes can be made Enable the http server to SDM can be used Switch(config-if)#switchport mode trunk Switch(config)#vtp domain lab Switch(config)#vtp mode client Router(config)#ip http server

Defines a username and password. The list can be used for many things from PPP authentication to user access Defines a local host file. Like /etc/hosts in unix Disables DNS lookup. Useful when a command as been miss typed Sets the logical (not physical) bandwidth of interface. This is used by routing protocols, SNMP queuing etc Router(config)#username sue password cisco Router(config)#ip host mypc 10.1.1.3 Router(config)#no ip domain-lookup Router(config)#int s0 Router(config-if)#bandwidth Sets the physical clock Router(config-if)#clock rate 64000 Set the serial interface WAN encapsulation. Other options are PPP or frame-relay Authentication on PPP is optional. This command enable chap on the interface. Other option PAP Defines the type of LMI being used. If left unconfigured the correct LMI type should be automatically detected Defines a static route. Renumber static routes have an admin distance of 1. Therefore will over ride any dynamic routing. Enables RIP version 1 on all LOCAL interfaces which have a 10.x.x.x address Enables RIP version 2 Enable the router to provide a DHCP service. Changes the config register which controls what the Router(config-if)#encapsulation hdlc Router(config-if)#ppp authentication chap Router(config-if)#frame-relay lmi-type cisco Router(config)#ip route 50.0.0.0 255.0.0.0 10.1.2.1 Router(config)#router rip Router(config-router)#network 10.0.0.0 Router(config-router)#version 2 Router(config)#ip dhcp pool MYPOOL Router(dhcp-config)#network 10.1.1.0 255.255.255.0 Router(dhcp-config)#default-router 10.1.1.1 Router(dhcp-config)#exit Router(config)#ip dhcp excluded-address 10.1.1.1 10.1.1.99 Router(config)#config-register 0x2102

router does when the router boots Creates a logical sub interface below the physical interface Enables 802.1q trunking on the interface Define the ip address Enable OSPF on any local interface which start with the ip address 10.1.x.x. Note the inverted mask EIGRP can be configured in a similar way to RIP or the mask option could be used Defines a standard ACL. Standard ACL use number 1-99 Defines an Extended ACL. The first address is the source IP address Use the group command to attach an ACL to an interface. is used under an interface if the ACL is to filter traffic An example using named ACL in stead of numbers Attaching a named ACL to an interface Configuring a static NAT to allow a server to be access via the Internet, using the IP address on interface s0/0/1 Defining interface which NAT takes place between Enables RIPng Router(config)#int fa0/0.1 Router(config-subif)#encapsulation dot1q 1 Router(config-subif)#ip address 10.1.1.1 255.255.255.0 Router(config-)#router ospf 1 Router(config-router)#network 10.1.0.0 0.0.255.255 area 0 Router(config)#router eigrp 1 Router(config-router)#network 172.16.0.0 Or Router(config-router)#network 172.16.2.0 0.0.0.255 Router(config)#access-list 1 permit 172.16.1.1 Router(config)#access-list 101 deny tcp host 172.16.1.1 host 172.16.2.1 eq telnet Router(config)#access-list 101 permit ip any any Router(config)#interface fa0/0 Router(config-if)#ip access-group 1 out Router(config)#ip access-list extended my_list Router(config-ext-nacl)# deny tcp host 172.16.1.1 host 172.16.2.1 eq ftp Router(config-ext-nacl)# permit ip any any Router(config)#int fa0/0 Router(config-if)#ip access-group my_list in Router(config)#ip nat inside source static 10.1.1.2 interface s0/0/1 Router(config)#int fa0/0.1 Router(config-if)#ip nat inside Router(config)#ipv6 unicast-routing ROuter(config)#ipv6 router rip ccna

Router(config)#int s0/0/0 Router(config-if)#ipv6 rip ccna enable Privilege Commands Description Manually starts the setup dialog which is automatically invoked when the device starts with no config Switch#setup Commands Displays the config held in DRAM. Which is lost if not copy run start command is not used Displays the NVRAM (None volatile) config. Saves the config. Without this command all changes/configuration will be lost. Saves the running config to a TFTP server Copies IOS files to a TFTP server Copies files from a TFTP server the device flash Erase the config held in NVRAM. If this is followed with the reload command all configuration is lost Reboots the device Switch#show running-config Switch#show startup-config Switch#copy running-config startup-config Switch#copy running-config tftp Switch#copy flash tftp Switch#copy tftp flash Switch#erase startup-config Switch#reload Abort sequence <Shift> <Ctrl> 6 Suspend Telnet Session Show the current sessions. The one with a * is your active session Forcible closes a telnet session Set the device local clock. Note this is not done in config mode <Shift> <Ctrl> 6(then let all keys go, then)x Switch#show sessions Switch#disconnect Switch#clock set 10:00:00 april 2 2008

Display the IOS version along with other useful info e.g sys uptime, config register etc Displays the file contents of the flash Displays the clock Displays the users currently logged on By default displays the last 10 commands Displays the ARP cache Displays the spanning tree status on vlan 1 Lists all the configured vlans Displays VTP info such as VTP mode, VTP domain, VTP counter. Switch#show version Switch#show flash Switch#show clock Switch#show users Switch#show history Switch#show arp Switch#show spanning-tree vlan 1 Switch#show vlan Switch#sh vtp status Ping selected address Switch#ping 10.1.1.1 Extended ping. Must be in privilege mode Display the interface status Displays the vlan status and the IP address VLAN 1 (often the management vlan) Displays a list of CDP neighbours Extended information on the above Display CDP packets as they arrive Display ping packets as they arrive Display switch MAC Addresses table. These entries are learnt from the source mac address in the Ethernet frames Switch#ping Switch#show int fa0/1 Switch#show interfaces vlan 1 Switch#show cdp neighbors Switch#show cdp neighbors details Switch#debug cdp packets Switch#debug icmp packets Switch#show mac address-table

Displays the interface operational status and IP addresses for all router interfaces Displays all the configured routing protocols Displays the IP routeing table Displays the NAT translations Displays the physical cable DTE/DCE, x.21, V.35, RS232 configuration Displays the end-to-end status. Recall that show interface does not Displays the type of LMI and the number LMI frames Displays the frame relay inverse ARP table To be come neighbours both the local and remote interface must be correctly configured. If adjacent routers don t become neighbours. Then use the command to check the local router interface is configured correctly Same information as the above OSPF commands but with EIGRP. Remember that AS numbers MUST match Same information as the above OSPF commands but with EIGRP IPv6 ping. Recall that :: means all zero in between Router#show ip interface brief Router#show ip protocols Router#show ip route Router#show ip nat translations Router#show controllers s 0 Router#show frame-relay pvc Router#show frame-relay lmi Router#show frame-relay map Router#show ip ospf neighbor Router#show ip ospf interface Router#show ip eigrp neighbor Router#show ip eigrp interface Router#ping 2000:1000:500:3::1