Difference between revisions of "Cisco IOS"

From wikieduonline
Jump to navigation Jump to search
Line 70: Line 70:
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
  
 +
== [[VLAN]] ==
 
* <code>[[show vlan]] [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
 
* <code>[[show vlan]] [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 +
* <code>[[show vtp status]]</code>
 +
  
 
* <code>[[aaa new model]]</code>
 
* <code>[[aaa new model]]</code>
Line 90: Line 93:
 
* <code>[[show crypto ca certificates]]</code>
 
* <code>[[show crypto ca certificates]]</code>
  
* <code>[[show vtp status]]</code>
+
 
  
 
=== Access List ===
 
=== Access List ===

Revision as of 14:27, 20 January 2020

Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches


Basic commands

Interfaces:

  • interface Te1/0/1


  • show ip [OPTION]
  • show ip interface
    • show ip interface brief or sh ip int br
  • enable Logs into enable mode. Also known as user exec mode or privileged mode. See also: show privilege
    • enable 5 Change to level 5
    • no enable password
  • show ip traffic
  • show tcp brief





  • show process
  • ip domain lookup
  • no ip domain lookup
  • ip domain-lookup
  • no ip domain-lookup


  • ip host HOSTNAME xx.xx.xx.xx (Similar to /etc/hosts)
  • [no] ip forward-protocol nd


  • ip route-cache
  • no ip route-cache
  • include, similar to grep linux command

VLAN



Access List

Configuring IP Access Lists: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html#acltypes

Types of ACLs: Standard ACLs, Extended ACLs, Lock and Key (Dynamic ACLs), IP Named ACLs, Reflexive ACLs, Time-Based ACLs Using Time Ranges, Commented IP ACL Entries, Context-Based Access Control, Authentication Proxy, Turbo ACLs, Distributed Time-Based ACLs, Receive ACLs, Infrastructure Protection ACLs, Transit ACLs.

  • show access-list
  • show ip access-list
  • router(config)#access-list 101 deny icmp any any
  • router(config)#access-list 101 permit ip any any


  • router(config)#ip access-list extended test
  • router(config-ext-nacl)#permit ip host 2.2.2.2 host 3.3.3.3
  • router(config-ext-nacl)#permit tcp host 1.1.1.1 host 5.5.5.5 eq www
  • router(config-ext-nacl)#permit icmp any any
  • router(config-ext-nacl)#permit udp host 6.6.6.6 10.10.10.0 0.0.0.255 eq domain


  • ip access-group

HTTP Server

  • sh ip http server all
  • R1(config)#ip http server
  • R1(config)#ip http authentication local
  • R1(config)#ip http secure-server

Configuration Guides

Activities

  1. Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
  2. Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
  3. Configure a user with public key access Configure public RSA key authentication
  4. Associate a user with default higher privileges using username command
  5. Create a new VLAN

See also


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.Source: https://en.wikiversity.org/wiki/Cisco_IOS

Advertising: