Difference between revisions of "Cisco IOS"

From wikieduonline
Jump to navigation Jump to search
 
(91 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
[[wikipedia:Cisco IOS|Cisco Internetwork Operating System]] (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches
 
[[wikipedia:Cisco IOS|Cisco Internetwork Operating System]] (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches
  
== Basic commands ==
 
* <code>[[/show version/]]</code> or <code>sh ver</code> (includes [[uptime]] information)
 
  
Interfaces:
+
= Basic commands =
* <code>show interfaces</code>
+
* <code>[[show version]]</code> or <code>sh ver</code> (includes [[uptime]] information)
* <code>show interface trunk</code>
+
* <code>[[show clock]]</code>
* <code>show interfaces switchport</code>. To display the administrative and operational status of a switching (nonrouting) port
 
  
* <code>[[/show configuration/]]</code> or <code>sh conf</code>
+
* <code>[[debug (IOS)|debug]]</code>
* <code>[[/show running-config/]]</code> or <code>sh run</code> An enable mode command that displays the current configuration
+
* <code>[[show platform]]</code>
 +
* <code>[[show cdp neighbors]]</code>
 +
 
 +
== Interfaces ==
 +
{{show interface TOC}}
 +
 
 +
* <code>[[show configuration]]</code> or <code>sh conf</code>
 +
* <code>[[show running-config]]</code> or <code>sh run</code> An enable mode command that displays the current configuration
 
* <code>configure terminal</code> or <code>conf t</code> Logs you into configuration mode
 
* <code>configure terminal</code> or <code>conf t</code> Logs you into configuration mode
  
 +
* <code>[[switchport]] mode access|trunk</code>
 +
 +
* interface Te1/0/1
  
* <code>show ip</code>
+
* <code>[[show mac address-table]] interface <switchport></code>
* <code>show ip interface</code>
+
 
 +
* <code>show ip [OPTION]</code>
 +
* <code>[[show ip interface]]</code>
 
** <code>show ip interface brief</code> or <code>sh ip int br</code>
 
** <code>show ip interface brief</code> or <code>sh ip int br</code>
* <code>enable</code> Logs into enable mode. Also known as user exec mode or privileged mode. See also: <code>show privilege</code>
+
* <code>[[enable]]</code> Logs into enable mode. Also known as user exec mode or privileged mode. See also: <code>[[show privilege]]</code>
 
** <code>enable 5</code> Change to level 5
 
** <code>enable 5</code> Change to level 5
 
** <code>no enable password</code>
 
** <code>no enable password</code>
  
 
* <code>show ip traffic</code>
 
* <code>show ip traffic</code>
* <code>[[/show logging/]]</code>
+
 
* <code>[[/no shutdown/]]</code>. Enables an interface (brings it up).
+
* <code>show tcp brief</code>
 +
 
 +
 
 +
 
 +
 
 +
* <code>[[show logging]]</code>
 +
** <code>[[show logging history]]</code>
 +
 
 +
 
 +
* <code>[[show archive]] log config all</code>
 +
 
 +
 
 +
* <code>[[no shutdown]]</code>. Enables an interface (brings it up).
 +
 
 +
* <code>show process</code>
 +
 
 +
* <code>[[ip dns]]</code>
 +
** <code>[[ip dns spoofing]]</code>
 +
 
 +
* <code>[[debug ip domain]]</code>
 +
 
 +
* <code>ip domain lookup</code>
 +
* <code>no ip domain lookup</code>
 +
 
 +
* <code>ip domain-lookup</code>
 +
* <code>no ip domain-lookup</code>
 +
 
 +
 
 +
* <code>ip host HOSTNAME xx.xx.xx.xx</code> (Similar to <code>/etc/[[hosts]]</code>)
 +
 
 +
* [no] <code>ip forward-protocol nd</code>
  
  
Line 33: Line 72:
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
  
* <code>show vlan [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
+
== [[VLAN]] ==
 +
* <code>[[show vlan]] [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 +
* <code>[[show vtp status]]</code>
  
* <code>[[/aaa new model/]]</code>
+
* [[IOS: Create a VLAN|Create a new VLAN]]
  
* <code>[[/show ip route/]]</code> or  <code>[[/show ip ro/]]</code>
+
== [[show ip]] ==
 +
* <code>[[show ip route]]</code> or  <code>[[show ip route|sh ip ro]]</code>
  
* <code>[[/show ip arp/]]</code>
+
* <code>[[show ip arp]]</code>
* <code>[[/show ip ssh/]]</code>
+
* <code>[[show ip ssh]]</code>
* <code>show privilege</code>
 
  
* <code>[[/username/]]</code> Create and delete users
+
== [[Stacking]] ==
* <code>[[/show users/]]</code>
+
* <code>[[show switch stack-ports]]</code>
  
* <code>[[/write/]]</code>
+
== Users ==
 +
* <code>[[show privilege]]</code>
  
* <code>[[/show crypto ca certificates/]]</code>
+
* <code>[[username]]</code> Create and delete users
 +
* <code>[[Cisco IOS: show users]]</code>
  
=== Access List ===
+
* <code>[[write]]</code>
Configuring IP Access Lists: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html#acltypes
 
  
Types of ACLs: Standard ACLs, Extended ACLs, Lock and Key (Dynamic ACLs), IP Named ACLs, Reflexive ACLs, Time-Based ACLs Using Time Ranges, Commented IP ACL Entries, Context-Based Access Control, Authentication Proxy, Turbo ACLs, Distributed Time-Based ACLs, Receive ACLs, Infrastructure Protection ACLs, Transit ACLs.
+
* <code>[[show crypto ca certificates]]</code>
  
* <code>show access-list</code>
 
* <code>show ip access-list</code>
 
* <code>router(config)#access-list 101 deny icmp any any</code>
 
* <code>router(config)#access-list 101 permit ip any any</code>
 
  
 +
* <code>[[aaa new model]]</code>
 +
[[IOS: Access List (ACLs)]]
  
* <code>router(config)#ip access-list extended test</code>
+
== HTTP Server ==
* <code>router(config-ext-nacl)#permit ip host 2.2.2.2 host 3.3.3.3</code>
+
* <code>sh ip http server all</code>
* <code>router(config-ext-nacl)#permit tcp host 1.1.1.1 host 5.5.5.5 eq www</code>
 
* <code>router(config-ext-nacl)#permit icmp any any</code>
 
* <code>router(config-ext-nacl)#permit udp host 6.6.6.6 10.10.10.0 0.0.0.255 eq domain</code>
 
  
 +
* <code>R1(config)#ip [[http]] server</code>
 +
* <code>R1(config)#ip http authentication local</code>
 +
* <code>R1(config)#ip http secure-server</code>
  
* <code>ip access-group</code>
+
== [[DHCP]] Server ==
 +
* <code>[[show ip dhcp binding]]</code>
  
=== HTTP Server ===
+
== Memory ==
* <code>sh ip http server all</code>
+
* <code>[[show memory]]</code>
* <code>R1(config)#ip http authentication local</code>
+
* <code>[[show memory platform]]</code>
* <code>R1(config)#ip http secure-server</code>
 
  
 
== Configuration Guides ==
 
== Configuration Guides ==
* [[/Cisco IOS DHCP Server configuration/]]
+
{{IOS activities}}
* [[/Configure public RSA key authentication/]]: <code>[[Cisco IOS/Configure public RSA key authentication|ip ssh pubkey-chain]]</code>
 
  
 
== Activities ==
 
== Activities ==
# Read wikipedia article about [[w:Cisco IOS|Cisco Internetwork Operating System]]
 
 
# Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
 
# Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
 
# Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
 
# Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
# Configure a user with public key access [[/Configure public RSA key authentication/]]
+
# Configure a user with public key access [[Configure public RSA key authentication]]
# [[/Associate a user with default higher privileges/]] using <code>[[/username/]]</code> command
+
# [[Associate a user with default higher privileges]] using <code>[[username]]</code> command
 
+
# [[IOS: Create a VLAN|Create a new VLAN]]
 +
# Use ansible: <code>[[ansible-galaxy install ansible-network.cisco_ios]]</code>
  
 +
== Related terms ==
 +
* [[Secure Gateway OS (SGOS)]]
 +
* [[iOS]]
 +
* [[Cisco NX-OS]]
  
 
== See also ==
 
== See also ==
{{Networking}}  
+
* {{IOS}}
 +
* {{Networking}}
 +
* {{Networking OS}}
 +
* {{Firewall OS}}
 +
* {{Cisco}}
  
 
[[Category:Networking]]
 
[[Category:Networking]]
 +
[[Category:Cisco]]
  
  
{{CC license}} https://en.wikiversity.org/wiki/Cisco_IOS
+
{{CC license}}Source: https://en.wikiversity.org/wiki/Cisco_IOS

Latest revision as of 08:39, 17 April 2024

Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches


Basic commands[edit]

Interfaces[edit]

  • interface Te1/0/1
  • show ip [OPTION]
  • show ip interface
    • show ip interface brief or sh ip int br
  • enable Logs into enable mode. Also known as user exec mode or privileged mode. See also: show privilege
    • enable 5 Change to level 5
    • no enable password
  • show ip traffic
  • show tcp brief





  • show process
  • ip domain lookup
  • no ip domain lookup
  • ip domain-lookup
  • no ip domain-lookup


  • ip host HOSTNAME xx.xx.xx.xx (Similar to /etc/hosts)
  • [no] ip forward-protocol nd


  • ip route-cache
  • no ip route-cache
  • include, similar to grep linux command

VLAN[edit]

show ip[edit]

Stacking[edit]

Users[edit]


IOS: Access List (ACLs)

HTTP Server[edit]

  • sh ip http server all
  • R1(config)#ip http server
  • R1(config)#ip http authentication local
  • R1(config)#ip http secure-server

DHCP Server[edit]

Memory[edit]

Configuration Guides[edit]

Activities[edit]

  1. Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
  2. Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
  3. Configure a user with public key access Configure public RSA key authentication
  4. Associate a user with default higher privileges using username command
  5. Create a new VLAN
  6. Use ansible: ansible-galaxy install ansible-network.cisco_ios

Related terms[edit]

See also[edit]


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.Source: https://en.wikiversity.org/wiki/Cisco_IOS

Advertising: