Basic Cisco Commands By Marcus Nielson (2014)



Similar documents
ICND IOS CLI Study Guide (CCENT)

Skills Assessment Student Training Exam

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Summary Report for Individual Task 113-SIG-3002 Implement Local Area Network (LAN) Redundancy Status: Approved

Case Study 1: Registering IP Phones with a remote Call

Lab 7-1 Configuring Switches for IP Telephony Support

Brocade to Cisco Comparisons

Objectives. Background. Required Resources. CCNA Security

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Configuring a Leased Line

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

CCNA Security. Chapter Two Securing Network Devices Cisco Learning Institute.

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

CCT vs. CCENT Skill Set Comparison

Lab Use Network Inspector to Observe STP Behavior

Lab: Basic Router Configuration

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

CCNA Security 1.1 Student Lab Manual

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Experts in Networking. CCNA Cheat Sheet. This CCNA command cheat sheet covers both ICND parts 1 & 2 and covers the current CCNA exam ( ).

LAN-Cell to Cisco Tunneling

Lab Configure Basic AP Security through IOS CLI

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

Flow-Based per Port-Channel Load Balancing

Device Interface IP Address Subnet Mask Default Gateway

: Interconnecting Cisco Networking Devices Part 2 v1.1

Lab Configuring Syslog and NTP (Instructor Version)

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

CCNA 2 v5.0 Routing Protocols Final Exam Answers

Skills Assessment Student Training (Answer Key)

How To Learn Cisco Cisco Ios And Cisco Vlan

"Charting the Course...

TotalCloud Phone System

Configuring the MNLB Forwarding Agent

Welcome to Todd Lammle s CCNA Bootcamp

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM

CCNP v2 Eğitimi İçeriği

Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version

ROLE-BASED COMMAND-LINE INTERFACE ACCESS

Lab 5.3.9b Managing Router Configuration Files Using TFTP

How To Configure A Cisco Router With A Cio Router

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Enabling Remote Access to the ACE

Network Simulator Lab Study Plan

Simple MPLS network topology for Dynamips/Olive

Interconnecting Cisco Networking Devices Part 2

WorldSkills Hong Kong Competition Test Project IT Network Systems Administration (Linux Module) English Version only 只 提 供 英 文 版 本

Lab 3.3 Configuring QoS with SDM

Module 6 Configure Remote Access VPN

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Course Contents CCNP (CISco certified network professional)

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

How To Configure InterVLAN Routing on Layer 3 Switches

ENetwork Basic Configuration PT Practice SBA

Brest. Backup : copy flash:ppe_brest1 running-config

ASM Educational Center (ASM) Est. 1992

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Lab 5.5 Configuring Logging

: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

Basic Wireless Configuration

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

Lab 5-5 Configuring the Cisco IOS DHCP Server

Configuring Dial Backup and Remote Management

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

GLBP - Gateway Load Balancing Protocol

Cisco IOS Switch Security Configuration Guide

Lab Configuring DHCP with SDM and the Cisco IOS CLI

8 steps to protect your Cisco router

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Chapter 4: Lab A: Configuring CBAC and Zone-Based Firewalls

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

Schools Configuration Files Guide

Lab Configure Local AAA on Cisco Router

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

APPLICATION NOTES Seamless Integration of LAN and WLAN through Brocade mobility products and

Switch Configuration Required to Support Cisco ISE Functions

Configuring a Router

APNIC Members Training Course Security workshop. 2-4 July, Port Vila Vanuatu. In conjunction with PACNOG 4

INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)

Allied Telesis Solutions. Tested Solution: LAN Client Authentication. LAN Client Authentication. Introduction. Public/Private Zone x600

LAN Client Authentication

Configuring Basic Settings

How to Create VLANs Within a Virtual Switch in VMware ESXi

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

VSS-Enabled Campus Best Practice Configuration Example

Configuring Role-Based Access Control

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Leased Line PPP Connections Between IOS and HP Routers

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Interconnecting Cisco Network Devices 1 Course, Class Outline

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by

AlliedWare Plus Version AT-9000 Layer 2-4 Gigabit Ethernet EcoSwitches Software Release Notes

CCBOOTCAMP s Comprehensive ICND2 Study Guide With Sample Questions

Remote Access VPN Business Scenarios

Enabling Management Protocols: NTP, SNMP, and Syslog

Cisco Configuration Professional Quick Start Guide

Transcription:

Basic Cisco Commands By Marcus Nielson (2014) Configuring Basic Switch Settings (Switch Examples) Enter enable if the prompt has changed back to Switch>. Switch> enable Switch# Enter global configuration mode. Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# The prompt changed again to reflect global configuration mode. Assign the switch hostname. Switch(config)# hostname S1 Configure password encryption. service password-encryption Assign class as the secret password for privileged EXEC mode access. enable secret class Prevent unwanted DNS lookups. no ip domain-lookup Configure a MOTD banner. banner motd # Enter Text message. End with the character #. Unauthorized access is strictly prohibited. # Verify your access settings by moving between modes. exit *Mar 1 00:19:19.490: %SYS-5-CONFIG_I: Configured from console by console exit

S1 con0 is now available. Creating/Assigning a VLAN IP Address Example: vlan 99 S1(config-vlan)# name (name of VLAN) S1(config-vlan)# exit Configure the VLAN 99 IP address: interface vlan 99 S1(config-if)# ip address 172.16.99.11 255.255.255.0 S1(config-if)# no shutdown S1(config-if)# end Configuring IP Default Gateway: ip default-gateway 192.168.1.1 Restrict Access: line con 0 S1(config-line)# password (pw) S1(config-line)# login S1(config-line)# logging synchronous S1(config-line)# exit VTY: line vty 0 15 S1(config-line)# password (pw) S1(config-line)# login S1(config-line)# end Assign ports F0/5 and F0/6 to VLAN 99 on the switch: config t interface f0/5 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 99 S1(config-if)# interface f0/6 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 99 S1(config-if)# end Assigning ports to VLAN (range):

interface range f0/1 24,g0/1-2 S1(config-if-range)# switchport access vlan # S1(config-if-range)# exit end Configure and Verify SSH: line vty 0 15 S1(config-line)# transport input ssh S1(config-line)# login local S1(config-line)# exit Generate an RSA crypto keys: crypto key generate rsa modulus 1024 Configure general security features: interface range f0/1 4 S1(config-if-range)# shutdown S1(config-if-range)# interface range f0/7 24 S1(config-if-range)# shutdown S1(config-if-range)# interface range g0/1 2 S1(config-if-range)# shutdown S1(config-if-range)# end Enter local passwords: enable secret class line con 0 S1(config-line)# password (pw) S1(config-line)# login S1(config-line)# exit Configure a trunk port: S2(config)# interface f0/1 S2(config-if)# switchport mode trunk show interface trunk Configuring 802.1Q Trunk-Based Inter-VLAN Routing: vlan 10 S1(config-vlan)# name Students S1(config-vlan)# vlan 20 S1(config-vlan)# name Faculty S1(config-vlan)# exit interface f0/1 S1(config-if)# switchport mode trunk

S1(config-if)# interface f0/5 S1(config-if)# switchport mode trunk S1(config-if)# interface f0/6 S1(config-if)# switchport mode access S1(config-if)# switchport access vlan 10 Configure DHCPv4 : ip dhcp excluded-address 192.168.1.1 192.168.1.10 ip dhcp pool DHCP1 S1(dhcp-config)# network 192.168.1.0 255.255.255.0 S1(dhcp-config)# default-router 192.168.1.1 S1(dhcp-config)# dns-server 192.168.1.9 S1(dhcp-config)# lease 3 Configure DHCPv4 for Multiple VLANs: interface f0/6 S1(config-if)# switchport access vlan 2 ip dhcp excluded-address 192.168.2.1 192.168.2.10 ip dhcp pool DHCP2 S1(dhcp-config)# network 192.168.2.0 255.255.255.0 S1(dhcp-config)# default-router 192.168.2.1 S1(dhcp-config)# dns-server 192.168.2.9 S1(dhcp-config)# lease 3 Enable IP Routing: ip routing ip route 0.0.0.0 0.0.0.0 192.168.1.10 R1(config)# ip route 192.168.2.0 255.255.255.0 g0/1 Enable spanning-tree, rapid-pvst, portfast: spanning-tree vlan 1,10,99 root secondary spanning-tree mode rapid-pvst interface f0/6 S1(config-if)# spanning-tree portfast S1(config-if)# spanning-tree bpduguard enable Configure PAgP: interface range f0/3-4 S1(config-if-range)# channel-group 1 mode desirable Creating a port-channel interface Port-channel 1 S1(config-if-range)# no shutdown Configure trunk ports assign to VLAN:

interface port-channel 1 S1(config-if)# switchport mode trunk S1(config-if)# switchport trunk native vlan 99 Delete the VLAN database: delete vlan.dat Delete filename [vlan.dat]? Delete flash:/vlan.dat? [confirm] Configuring Basic Router Settings (Router Examples) ========================== Configure the router: Router> enable Router# Router# config terminal Router(config)# Router(config)# hostname R1. R1(config)# no ip domain- lookup R1(config)# security passwords min- length 10 R1(config)# enable secret cisco12345 Setting a console password on a router: R1(config)# line con 0 R1(config-line)# password ciscoconpass R1(config-line)# exec-timeout 5 0 R1(config-line)# login R1(config-line)# logging synchronous R1(config-line)# exit R1(config)# Assign VTY password: R1(config)# line vty 0 4 R1(config-line)# password ciscovtypass R1(config-line)# exec-timeout 5 0 R1(config-line)# login R1(config-line)# logging synchronous R1(config-line)# exit R1(config)# Encrypt the clear text passwords: R1(config)# service password-encryption

Create a MOTD banner: R1(config)# banner motd #Unauthorized access prohibited!# Configure an IP address and interface description. Activate both interfaces on the router: R1(config)# int g0/0 R1(config-if)# description Connection to PC-B R1(config-if)# ip address 192.168.0.1 255.255.255.0 R1(config-if)# int g0/1 R1(config-if)# description Connection to S1 R1(config-if)# ip address 192.168.1.1 255.255.255.0 R1(config-if)# exit Configure the router for SSH access: R1# configure terminal R1(config)# ip domain-name CCNA-lab.com R1(config)# username admin privilege 15 secret adminpass1 R1(config)# line vty 0 4 R1(config-line)# transport input ssh R1(config-line)# login local R1(config-line)# exit R1(config)# crypto key generate rsa modulus 1024 R1(config)# exit Configure IPv6: R1# configure terminal R1(config)# interface g0/0 R1(config-if)# ipv6 address 2001:db8:acad:a::1/64 R1(config-if)# ipv6 address fe80::1 link-local R1(config-if)# exit R1(config)# ipv6 unicast-routing R1(config)# exit Configure Trunk-Based Inter-VLAN Routing: R1(config)# interface g0/1.1 R1(config-subif)# encapsulation dot1q 1 R1(config-subif)# ip address 192.168.1.1 255.255.255.0 R1(config-subif)# interface g0/1.10 R1(config-subif)# encapsulation dot1q 10 R1(config-subif)# ip address 192.168.10.1 255.255.255.0 R1(config-subif)# interface g0/1.20 R1(config-subif)# encapsulation dot1q 20 R1(config-subif)# ip address 192.168.20.1 255.255.255.0 R1(config-subif)# exit R1(config)# interface g0/1

Configure IP settings on the routers: R3(config)# interface s0/0/0 R3(config-if)# ip address 10.1.1.2 255.255.255.252 R3(config-if)# clock rate 128000 R3(config-if)# no shutdown Configure RIPv2 routing: R1# config t R1(config)# router rip R1(config-router)# version 2 R1(config-router)# passive-interface g0/1 R1(config-router)# network 172.30.0.0 R1(config-router)# network 10.0.0.0 Disable automatic summarization: R1(config)# router rip R1(config-router)# no auto-summary Configure RIPng routing: R1(config)# interface g0/1 R1(config)# ipv6 rip Test1 enable R1(config)# interface s0/0/0 R1(config)# ipv6 rip Test1 enable Configure and Verify OSPF Routing: R1(config)# router ospf 1 R1(config-router)# network 192.168.1.0 0.0.0.255 area 0 R1(config-router)# network 192.168.12.0 0.0.0.3 area 0 R1(config-router)# network 192.168.13.0 0.0.0.3 area 0 Configure IPv6 Addresses Manually: R1(config)# interface g0/0 R1(config-if)# ipv6 address 2001:db8:acad:a::1/64 R1(config-if)# interface g0/1 R1(config-if)# ipv6 address 2001:db8:acad:1::1/64 R1(config-if)# end R1# Configure OSPFv6: R1(config)# interface g0/0

R1(config-if)# ipv6 ospf 1 area 0 R1(config-if)# interface s0/0/0 R1(config-if)# ipv6 ospf 1 area 0 R1(config-if)# interface s0/0/1 R1(config-if)# ipv6 ospf 1 area 0 Configure a numbered standard ACL: R3(config)# access-list 1 remark Allow R1 LANs Access R3(config)# access-list 1 permit 192.168.10.0 0.0.0.255 R3(config)# access-list 1 permit 192.168.20.0 0.0.0.255 R3(config)# access-list 1 deny any R3(config)# interface g0/1 R3(config-if)# ip access-group 1 out Configure a named extended ACL: R3(config)# ip access-list extended WEB-POLICY R3(config-ext-nacl)# permit tcp 192.168.30.0 0.0.0.255 host 10.1.1.1 eq 80 R3(config-ext-nacl)# permit tcp 192.168.30.0 0.0.0.255 209.165.200.224 0.0.0.31 eq 80 R3(config-ext-nacl)# interface S0/0/1 R3(config-if)# ip access-group WEB-POLICY out Configuring Basic DHCPv4: R1(config)# router eigrp 1 R1(config-router)# network 192.168.0.0 0.0.0.255 R1(config-router)# network 192.168.1.0 0.0.0.255 R1(config-router)# network 192.168.2.252 0.0.0.3 R1(config-router)# no auto-summary DHCP Configuration: R2(config)# ip dhcp excluded-address 192.168.0.1 192.168.0.9 R2(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.9 R2(config)# ip dhcp pool R1G1 R2(dhcp-config)# network 192.168.1.0 255.255.255.0 R2(dhcp-config)# default-router 192.168.1.1 Configure HSRP: R1(config)# interface g0/1 R1(config-if)# standby 1 ip 192.168.1.254 R1(config-if)# standby 1 priority 150 R1(config-if)# standby 1 preempt Configure GLBP: R1(config)# interface g0/1 R1(config-if)# glbp 1 ip 192.168.1.254

R1(config-if)# glbp 1 preempt R1(config-if)# glbp 1 priority 150 R1(config-if)# glbp 1 load-balancing round-robin Configure the ISP Router: ISP(config)# username Cust1 password ciscopppoe ISP(config)# ip local pool PPPoEPOOL 10.0.0.1 10.0.0.10 ISP(config)# interface virtual-template 1 ISP(config-if)# ip address 10.0.0.254 255.255.255.0 ISP(config-if)# mtu 1492 ISP(config-if)# peer default ip address pool PPPoEPOOL ISP(config-if)# ppp authentication chap callin ISP(config-if)# exit Configure G0/0 interface as passive: R1(config)# router eigrp 10 R1(config-router)# passive-interface g0/0 Configure EIGRP for IPv6 Routing R1(config)# ipv6 router eigrp 1 R1(config-rtr)# router-id 1.1.1.1 Configure an SNMP agent: R1(config)# snmp-server community ciscolab ro SNMP_ACL R1(config)# snmp-server location snmp_manager R1(config)# snmp-server contact ciscolab_admin R1(config)# snmp-server host 192.168.1.3 version 2c ciscolab R1(config)# snmp-server enable traps R1(config)# ip access-list standard SNMP_ACL R1(config-std-nacl)# permit 192.168.1.3