Difference between revisions of "Cisco IOS"

From wikieduonline
Jump to navigation Jump to search
 
(34 intermediate revisions by the same user not shown)
Line 2: Line 2:
  
  
== Basic commands ==
+
= Basic commands =
 
* <code>[[show version]]</code> or <code>sh ver</code> (includes [[uptime]] information)
 
* <code>[[show version]]</code> or <code>sh ver</code> (includes [[uptime]] information)
 
* <code>[[show clock]]</code>
 
* <code>[[show clock]]</code>
  
 
* <code>[[debug (IOS)|debug]]</code>
 
* <code>[[debug (IOS)|debug]]</code>
 +
* <code>[[show platform]]</code>
 +
* <code>[[show cdp neighbors]]</code>
  
Interfaces:
+
== Interfaces ==
 
{{show interface TOC}}
 
{{show interface TOC}}
  
Line 19: Line 21:
 
* interface Te1/0/1
 
* interface Te1/0/1
  
 
+
* <code>[[show mac address-table]] interface <switchport></code>
  
 
* <code>show ip [OPTION]</code>
 
* <code>show ip [OPTION]</code>
 
* <code>[[show ip interface]]</code>
 
* <code>[[show ip interface]]</code>
 
** <code>show ip interface brief</code> or <code>sh ip int br</code>
 
** <code>show ip interface brief</code> or <code>sh ip int br</code>
* <code>enable</code> Logs into enable mode. Also known as user exec mode or privileged mode. See also: <code>show privilege</code>
+
* <code>[[enable]]</code> Logs into enable mode. Also known as user exec mode or privileged mode. See also: <code>[[show privilege]]</code>
 
** <code>enable 5</code> Change to level 5
 
** <code>enable 5</code> Change to level 5
 
** <code>no enable password</code>
 
** <code>no enable password</code>
Line 70: Line 72:
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
 
* <code>include</code>, similar to <code>[[linux/Basic commands/grep|grep]]</code> linux command
  
 +
== [[VLAN]] ==
 
* <code>[[show vlan]] [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
 
* <code>[[show vlan]] [brief | id <vlan-id> | name <name> [ifindex] | <ifindex>]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>[[show vlan brief]]</code> or <code>[[sh vlan br]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 
** <code>show vlan summary</code> or <code>[[sh vlan s]]</code>
 +
* <code>[[show vtp status]]</code>
  
* <code>[[aaa new model]]</code>
+
* [[IOS: Create a VLAN|Create a new VLAN]]
  
 +
== [[show ip]] ==
 
* <code>[[show ip route]]</code> or  <code>[[show ip route|sh ip ro]]</code>
 
* <code>[[show ip route]]</code> or  <code>[[show ip route|sh ip ro]]</code>
  
 
* <code>[[show ip arp]]</code>
 
* <code>[[show ip arp]]</code>
 
* <code>[[show ip ssh]]</code>
 
* <code>[[show ip ssh]]</code>
* <code>show privilege</code>
+
 
 +
== [[Stacking]] ==
 +
* <code>[[show switch stack-ports]]</code>
 +
 
 +
== Users ==
 +
* <code>[[show privilege]]</code>
  
 
* <code>[[username]]</code> Create and delete users
 
* <code>[[username]]</code> Create and delete users
* <code>[[show users]]</code>
+
* <code>[[Cisco IOS: show users]]</code>
  
 
* <code>[[write]]</code>
 
* <code>[[write]]</code>
Line 90: Line 100:
 
* <code>[[show crypto ca certificates]]</code>
 
* <code>[[show crypto ca certificates]]</code>
  
* <code>[[show vtp status]]</code>
 
  
=== Access List ===
+
* <code>[[aaa new model]]</code>
Configuring IP Access Lists: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/23602-confaccesslists.html#acltypes
+
[[IOS: Access List (ACLs)]]
 
 
Types of ACLs: Standard ACLs, Extended ACLs, Lock and Key (Dynamic ACLs), IP Named ACLs, Reflexive ACLs, Time-Based ACLs Using Time Ranges, Commented IP ACL Entries, Context-Based Access Control, Authentication Proxy, Turbo ACLs, Distributed Time-Based ACLs, Receive ACLs, Infrastructure Protection ACLs, Transit ACLs.
 
  
* <code>show access-list</code>
+
== HTTP Server ==
* <code>show ip access-list</code>
 
* <code>router(config)#access-list 101 deny icmp any any</code>
 
* <code>router(config)#access-list 101 permit ip any any</code>
 
 
 
 
 
* <code>router(config)#ip access-list extended test</code>
 
* <code>router(config-ext-nacl)#permit ip host 2.2.2.2 host 3.3.3.3</code>
 
* <code>router(config-ext-nacl)#permit tcp host 1.1.1.1 host 5.5.5.5 eq www</code>
 
* <code>router(config-ext-nacl)#permit icmp any any</code>
 
* <code>router(config-ext-nacl)#permit udp host 6.6.6.6 10.10.10.0 0.0.0.255 eq domain</code>
 
 
 
 
 
* <code>ip access-group</code>
 
 
 
* <code>[[copy running-config startup-config]]</code>
 
 
 
=== HTTP Server ===
 
 
* <code>sh ip http server all</code>
 
* <code>sh ip http server all</code>
  
Line 120: Line 110:
 
* <code>R1(config)#ip http authentication local</code>
 
* <code>R1(config)#ip http authentication local</code>
 
* <code>R1(config)#ip http secure-server</code>
 
* <code>R1(config)#ip http secure-server</code>
 +
 +
== [[DHCP]] Server ==
 +
* <code>[[show ip dhcp binding]]</code>
 +
 +
== Memory ==
 +
* <code>[[show memory]]</code>
 +
* <code>[[show memory platform]]</code>
  
 
== Configuration Guides ==
 
== Configuration Guides ==
* [[Cisco IOS DHCP Server configuration]]
+
{{IOS activities}}
* [[Configure public RSA key authentication]]: <code>[[Cisco IOS/Configure public RSA key authentication|ip ssh pubkey-chain]]</code>
 
  
 
== Activities ==
 
== Activities ==
# Read wikipedia article about [[wikipedia:Cisco IOS|Cisco Internetwork Operating System]]
 
 
# Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
 
# Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
 
# Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
 
# Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
 
# Configure a user with public key access [[Configure public RSA key authentication]]
 
# Configure a user with public key access [[Configure public RSA key authentication]]
 
# [[Associate a user with default higher privileges]] using <code>[[username]]</code> command
 
# [[Associate a user with default higher privileges]] using <code>[[username]]</code> command
# [[IOS: Create a VLAN]]
+
# [[IOS: Create a VLAN|Create a new VLAN]]
 +
# Use ansible: <code>[[ansible-galaxy install ansible-network.cisco_ios]]</code>
 +
 
 +
== Related terms ==
 +
* [[Secure Gateway OS (SGOS)]]
 +
* [[iOS]]
 +
* [[Cisco NX-OS]]
  
 
== See also ==
 
== See also ==
 +
* {{IOS}}
 
* {{Networking}}  
 
* {{Networking}}  
 
* {{Networking OS}}
 
* {{Networking OS}}

Latest revision as of 08:39, 17 April 2024

Cisco Internetwork Operating System (IOS) is a family of network operating systems used on many Cisco Systems routers and current Cisco network switches


Basic commands[edit]

Interfaces[edit]

  • interface Te1/0/1
  • show ip [OPTION]
  • show ip interface
    • show ip interface brief or sh ip int br
  • enable Logs into enable mode. Also known as user exec mode or privileged mode. See also: show privilege
    • enable 5 Change to level 5
    • no enable password
  • show ip traffic
  • show tcp brief





  • show process
  • ip domain lookup
  • no ip domain lookup
  • ip domain-lookup
  • no ip domain-lookup


  • ip host HOSTNAME xx.xx.xx.xx (Similar to /etc/hosts)
  • [no] ip forward-protocol nd


  • ip route-cache
  • no ip route-cache
  • include, similar to grep linux command

VLAN[edit]

show ip[edit]

Stacking[edit]

Users[edit]


IOS: Access List (ACLs)

HTTP Server[edit]

  • sh ip http server all
  • R1(config)#ip http server
  • R1(config)#ip http authentication local
  • R1(config)#ip http secure-server

DHCP Server[edit]

Memory[edit]

Configuration Guides[edit]

Activities[edit]

  1. Read Cisco IOS command reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/command/Cisco_IOS_Configuration_Fundamentals_Command_Reference.pdf
  2. Read Cisco IOS Cheat Sheet: https://www.netwrix.com/cisco_commands_cheat_sheet.html
  3. Configure a user with public key access Configure public RSA key authentication
  4. Associate a user with default higher privileges using username command
  5. Create a new VLAN
  6. Use ansible: ansible-galaxy install ansible-network.cisco_ios

Related terms[edit]

See also[edit]


Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy.Source: https://en.wikiversity.org/wiki/Cisco_IOS

Advertising: