Difference between revisions of "Cisco IOS"

From wikieduonline
Jump to navigation Jump to search
Line 10: Line 10:
 
* <code>[[show interfaces switchport]]</code>. To display the administrative and operational status of a switching (nonrouting) port
 
* <code>[[show interfaces switchport]]</code>. To display the administrative and operational status of a switching (nonrouting) port
  
* <code>[[/show configuration/]]</code> or <code>sh conf</code>
+
* <code>[[show configuration]]</code> or <code>sh conf</code>
* <code>[[/show running-config/]]</code> or <code>sh run</code> An enable mode command that displays the current configuration
+
* <code>[[show running-config]]</code> or <code>sh run</code> An enable mode command that displays the current configuration
 
* <code>configure terminal</code> or <code>conf t</code> Logs you into configuration mode
 
* <code>configure terminal</code> or <code>conf t</code> Logs you into configuration mode
  

Revision as of 12:41, 8 January 2020

Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches

Basic commands

Interfaces:

  • interface Te1/0/1


  • show ip
  • show ip interface
    • show ip interface brief or sh ip int br
  • enable Logs into enable mode. Also known as user exec mode or privileged mode. See also: show privilege
    • enable 5 Change to level 5
    • no enable password


  • ip route-cache
  • no ip route-cache
  • include, similar to grep linux command

Access List

Configuring IP Access Lists: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html#acltypes

Types of ACLs: Standard ACLs, Extended ACLs, Lock and Key (Dynamic ACLs), IP Named ACLs, Reflexive ACLs, Time-Based ACLs Using Time Ranges, Commented IP ACL Entries, Context-Based Access Control, Authentication Proxy, Turbo ACLs, Distributed Time-Based ACLs, Receive ACLs, Infrastructure Protection ACLs, Transit ACLs.

  • show access-list
  • show ip access-list
  • router(config)#access-list 101 deny icmp any any
  • router(config)#access-list 101 permit ip any any


  • router(config)#ip access-list extended test
  • router(config-ext-nacl)#permit ip host 2.2.2.2 host 3.3.3.3
  • router(config-ext-nacl)#permit tcp host 1.1.1.1 host 5.5.5.5 eq www
  • router(config-ext-nacl)#permit icmp any any
  • router(config-ext-nacl)#permit udp host 6.6.6.6 10.10.10.0 0.0.0.255 eq domain


  • ip access-group

HTTP Server

  • sh ip http server all
  • R1(config)#ip http authentication local
  • R1(config)#ip http secure-server

Configuration Guides

Activities

  1. Read wikipedia article about Cisco Internetwork Operating System
  2. Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
  3. Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
  4. Configure a user with public key access /Configure public RSA key authentication/
  5. /Associate a user with default higher privileges/ using /username/ command


See also


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.Source: https://en.wikiversity.org/wiki/Cisco_IOS

Advertising: