- Troubleshooting | Dépannage
- Router / Switch Basic Configuration | Configuration de base des commutateurs/Routeurs
- Enable/Disable Cisco Discovery Protocol (CDP) | Activation/Désactivation du protocole CDP
- Common Port Numbers and Protocols | Numéro de ports et protocoles courants
- Line editing commands | Raccourcis clavier
- Switch Management Interface Configuration | Configuration de l'interface de gestion des commutateurs
- VLAN Creation and Port Assignment | Création de VLANs et configuration des ports d'accès
- Trunk Creation | Configuration des ports trunk
- VLAN Trunking Protocol (VTP) Configuration
- Etherchannel (PortChannel) | Agrégation de liaisons
- Security | Sécurité
- SSH Configuration | Configuration du protocole SSH pour la gestion à distance
- Port Security Configuration on a Switch | Configuration de la sécurité des ports sur un commutateur
- Spanning Tree Protocol (STP), HSRP | Configuration du protocole STP
- Layer-3 Switch Commands | Configuration des commutateurs couche 3
- Configuring IPv4/IPv6 Router Interface | Configuration des interfaces IPv4/IPv6 d'un routeur
- Router-on-a-Stick Configuration | Routage inter-Vlan
- Hot Standby Routing Protocol (HSRP) for IPv4
- IP DHCP Snooping | Configuration de la sécurité du protocole DHCP
- Configuring Static Routes | Configuration du routage statique
- Configuring RIP (IPv4) | Configuration du routage RIP
- Additional Commands to configure RIP Version 2 | Configuration du routage RIP Version 2
- Configuring RIPng (for IPv6) | Configuration du protocole RIPng pour l'IPv6
- Configuring IPv4 EIGRP | Configuration du protocole EIGRP pour l'IPv4
- Configuring IPv4 OSPF(v2) | Configuration du protocole OSPF pour l'IPv4
- Configure IPv6 OSPF(v3) | Configuration du protocole OSPF pour l'IPv6
- Configure IPv6 EIGRP | Configuration du protocole EIGRP pour l'IPv6
- PPP and Frame-Relay | Configuration des interfaces PPP (Point-to-Point Protocol)
- Frame-Relay Commands | Commandes de configuration des interfaces WAN Frame-Relay
- Multi-Point no sub-interface; Sample Configuration 3 | Configuration Frame-Relay Multi-point sans sous-interface
- Multi-Point with sub-interface; Sample Configuration 4 | Configuration Frame-Relay Multi-point avec sous-interface
- Access-Control-Lists | Listes de contrôle d'accès
- Standard Access Lists | Listes de contrôle d'accès standard
- Applying Access Lists | Appliquer la liste de contrôle d'accès sur une interface
- Dynamic Access List (Stateful-Firewall) | Liste de controle d'accès dynamique
- Time-Based ACL | Liste de contrôle d'accès en fonction du temps
- DHCP | Configuration du protocole DHCP pour l'IPv4 et IPv6
- Configure NAT for IPv4 | Configuration du protocole NAT pour l'IPv4
Command | Additional Notes |
---|---|
show ip interface brief |
Use it all the time - Vérifier les informations d'addressage |
show ip route |
display routing table - Afficher la table de routage |
show vlan brief |
on switch |
show controllers serial x/x/x |
see if DCE or DTE connected and if clockrate is present |
show interface trunk |
what ports are trunking, native vlan, allowed vlans |
show running-config |
display the running configuration - affiche la configuration en cours |
show startup-config |
display the startup configuration - affiche la configuration de démarrage |
show ip protocol |
what routing protocol, which networks, passive interfaces, neighbors |
show cdp neighbors |
see directly connected Cisco devices - Les voisins CDP |
show cdp interface |
which interfaces are running CDP |
show interface serial x/x/x |
what encapsulation, IP address, counters |
show interface fastethernet x/x switchport |
configured mode and operating mode |
show version |
which IOS, capability, memory, configuration-register |
show ip route |
show routing table entries learned through EIGRP |
show mac-address-table or show mac address-table |
varies with different IOS |
show flash |
display filenames and directories in Flash memory |
show clock |
current date/time in this device |
show ipv6 ??? |
does the IPv6 version of many IPv4 commands |
show processes |
shows active processes running on router |
show process cpu |
shows cpu statistics |
show memory |
shows memory allocation |
show users |
show who is telnetted into this device |
show standby |
see if HSRP is active |
ping X.X.X.X |
try to reach the destination host at X.X.X.X |
trace X.X.X.X |
show the path taken to reach the destination host at X.X.X.X |
R1(config)#do show ??? |
execute show commands from configuration mode |
debug ??? |
real-time reporting about processes related to almost any function |
debug all |
very dangerous as the router can become consumed by reporting everything |
undebug all |
turn off all debugging commands – handy if this is a busy router |
Shortcut | Action |
---|---|
ctrl-a |
go to the beginning of the current line |
ctrl-e |
go to the end of the current line |
ctrl-p or up-arrow |
repeat up to 10 previous commands in the current mode |
ctrl-n or dn-arrow |
if you have gone back in command history, this moves forward |
backspace-key |
erase the character to the left of the current cursor position |
ctrl-z or end |
go out to privilege mode |
exit |
move back one level in the hierarchical command structure |
ctrl-c |
cancel current command or leave Setup mode if you accidentally get into it |
ctrl-shift-6 |
stop ping or trace |
terminal length 24 |
normal page breaks in output |
wr |
shortcut for ‘copy running-config startup-config |
Protocol Name | Protocol Number |
---|---|
FTP Control |
TCP port 21 |
FTP Data |
TCP Port 20 |
Secure Shell (SSH) |
TCP Port 22 |
Telnet |
TCP Port 23 |
Simple Mail Transfer Protocol (SMTP) |
TCP Port 25 |
Domain Name System (DNS) |
TCP/UDP Port 53 |
BOOTPS |
UDP Port 67 (DHCP request from client to server) |
BOOTPC |
UDP Port 68 (DHCP reply from server to client) |
Hypertext Transfer Protocol (HTTP) |
TCP Port 80 |
Post Office Protocol – incoming mail (POP) |
TCP Port 110 |
Network Time Protocol (NTP) |
UDP Port 123 |
Simple Network Management Protocol (SNMP) |
UDP Port 161 |
Secure Hypertext Transfer Protocol (HTTPS) |
TCP Port 443 |
To Restore a Switch or Router to Default Configuration:
Command | Action |
---|---|
S1# delete vlan.dat |
(hit ‘enter’ to accept defaults) [Note: Only do this on a switch] |
S1# erase startup-config |
(hit ‘enter’ to accept defaults [Router or Switch]) |
S1# reload |
(answer ‘no’ if asked to save current config [Router or Switch]) |
Command | Action |
---|---|
R1# configure terminal |
enter global configuration mode |
R1(config)# hostname NAME |
configure the NAME of the Router or Switch |
R1(config)# security passwords min-length 5 |
set minimum password length |
R1(config)# service password-encryption |
encrypt all passwords – except secret |
R1(config)# login block-for 60 attempts 3 within 30 |
wait 1 min if 3 bad attempts in 30 sec |
R1(config)# enable secret PASSWORD |
make the privilege level password ‘PASSWORD’ |
R1(config)# no ip domain-lookup |
suppress DNS attempt when a command is mistyped |
R1(config)# banner motd MESSAGE |
create a MESSAGE that will display when logging in |
R1(config)# line console 0 [zero] |
enter the console connection configuration mode |
R1(config-line)# password PASSWORD |
make the user level password ‘PASSWORD’ |
R1(config-line)# login |
instruct the router that you want it to check for a password |
R1(config-line)# logging synchronous |
assists by keeping command entry more orderly |
R1(config-line)# exec-timeout 0 0 [zeroes] |
no timeout while configuring the router |
R1(config)# line vty 0 4 [zero 4] |
configure the same options as line console above |
S1(config)# line vty 0 15 [zero 15] |
configure the same options in a switch |
R1# copy running-config startup-config |
save config in NVRAM |
R1# wr |
legacy command - Same as copy running-configuration startup-configuration |
R1(config)# ! |
remark – makes no configuration changes |
Command | Action |
---|---|
S1(config)# interface vlan 1 |
create a virtual host on the switch |
S1(config-if)# description Management interface for this switch |
optional description |
S1(config-if)# ip address 192.168.100.50 255.255.255.0 |
assign an IP address |
S1(config-if)# no shut |
must turn it on |
S1(config-if)# exit |
leave interface config and return to global config |
S1(config)# ip default-gateway 192.168.100.1 |
must be on same subnet as Mgt interface |
S1(config)# enable secret class |
must have an enable password for remote config |
S1(config)# line vty 0 15 |
switches may have 16 VTY connections at once |
S1(config-line)# password cisco |
must set a login password for telnet to be possible |
S1(config-line)# login |
tell the VTY ports to ask for password from remote user |
S1(config-line)# transport input telnet |
allows only telnet for remote config – default |
Command | Action |
---|---|
R1(config)# interface INTERFACE-TYPE |
enter configuration mode for an interface |
R1(config-if)# ip address ADDRESS SNM |
assign the IP Address and subnet mask |
R1(config-if)# description WORDS |
document what this interface is used for |
R1(config-if)# clock rate CLOCK |
on serial DCE interfaces, set the speed of the link |
R1(config-if)# bandwidth VALUE |
used by the routing protocol for the speed of the link |
R1(config-if)# no shutdown |
turn the interface on |
R1(config-if)# shutdown |
turn the interface off |
Command | Action |
---|---|
R1(config)# ipv6 unicast-routing |
activate IPv6 routing – off by default |
R1(config)# interface Gi1/1 |
enter interface configuration |
R1(config-if)# ipv6 enable |
turn on ipv6 in this interface |
R1(config-if)# ipv6 address 3ffe:b00:c18:1::3 /64 |
manually enter complete address |
R1(config-if)# ipv6 address 3ffe:b00:c18:1:: /64 eui-64 |
auto configure host portion |
R1(config-if)# ipv6 address fe80::4 link-local |
configure link-local address |
Command | Action |
---|---|
S1(config)# ip routing |
activate IPv4 routing within the switch |
S1(config)# ipv6 routing |
activate IPv6 routing within the switch |
S1(config-if)# no switchport |
used to designate that this is a router port, not a switchport |
S1(config-if)# switchport trunk encapsulation dot1q |
to configure trunking for dot1Q |
Command | Action |
---|---|
S1(config)# vlan 10 |
create VLAN 10 in the VLAN.DAT database |
S1(config-vlan)# name Management |
optionally name the VLAN |
S1(config)# interface fa0/12 |
select a port on the switch |
S1(config)# interface range fa0/12 – 20 |
select a range of ports to be configured the same |
S1(config-if)# switchport mode access |
set the port to Access mode |
S1(config-if)# switchport access vlan 10 |
assign this port-s- to VLAN 10 |
Command | Action |
---|---|
S1(config)# interface gi1/1 |
select port for trunking |
S1(config-if)# switchport trunk encapsulation dot1q |
NOTE: on Layer 3 switch only |
S1(config-if)# switchport mode trunk |
set the port to be in trunk mode |
S1(config-if)# switchport trunk native vlan 99 |
set VLAN 99 to carry native traffic |
S1(config-if)# switchport trunk allowed vlan 1,10,20,99 |
optional, don’t forget to include VLAN 1 and the native VLAN |
Command | Action |
---|---|
R1(config)# interface Fa0/0 |
select the main interface |
R1(config-if)# no ip address |
there should not be any IP Address on the main interface |
R1(config-if)# interface Fa0/0.10 |
create a sub-interface – the number can be anything |
R1(config-if)# encapsulation dot1q 10 |
use 802.1Q trunking; assign to this VLAN # |
R1(config-if)# ip address 172.16.10.1 255.255.255.255 |
define the default-gateway IP |
R1(config-if)# interface Fa0/0.99 |
create another sub-interface - this one for native traffic |
R1(config-if)# encapsulation dot1q 99 native |
802.1Q trunking; VLAN #; and native |
R1(config)# ip classless |
classless routing behavior – default in IOS 11.3+ |
R1(config)# no ip classless |
classful routing behavior |
Command | Action |
---|---|
S1(config)# vtp mode server |
configure this switch to be in server mode |
S1(config)# vtp mode client |
configure this switch to be in client mode |
S1(config)# vtp mode transparent |
configure this switch in transparent mode - Suggested |
S1(config)# vtp domain NAME |
change the VTP domain name of this switch to NAME |
S1(config)# vtp password PASSWORD |
change the VTP password for this switch |
S1(config)# vtp pruning |
activate VTP pruning – Not supported in Packet Tracer |
S1(config)# vtp version 2 |
change the VTP version to 2 |
S1# show vtp status |
see VTP mode, revision, version, domain name, pruning mode, etc |
S1# show vtp password |
only way to see the VTP password – does not show in status |
Command | Action |
---|---|
S1(config)# interface range fa0/1 – 4 |
group of physical interfaces |
S1(config-if)# switchport trunk encapsulation dot1q |
NOTE: on Layer 3 switch only |
S1(config-if)# switchport mode trunk |
set to trunk mode |
S1(config-if)# switchport trunk native vlan 777 |
Set native VLAN |
S1(config-if)# channel-protocol lacp |
set this interface to LACP portchannel |
S1(config-if)# channel-protocol pagp |
set this interface to PAgP portchannel |
S1(config-if)#in channel-group 3 mode [MODE] |
[see choices below] |
passive |
enable LACP only if a LACP device is detected |
active |
enable LACP unconditionally |
auto |
enable PAgP only if a PAgP device is detected |
desirable |
enable PAgP unconditionally |
on |
enable Etherchannel |
S1(config)# interface port-channel 3 |
configure the virtual interface from 1 to 6 |
S1(config-if)# switchport mode trunk |
set to trunk mode |
S1(config-if)# switchport trunk native vlan 777 |
set native VLAN the same as the physical |
S1(config-if)# no shutdown |
turn on the virtual interface |
Command | Action |
---|---|
SW1(config)# interface range fa0/1 – 2 |
Enter fa0/1 and fa0/2 |
SW1(config-if)# no switchport |
remove switchport configuration |
SW1(config-if)# channel-group 1 mode { active, passive, on} |
Select mode |
SW1(config)# interface port-channel 1 |
Enter interface |
SW1(config-if)# no switchport |
remove switchport configuration |
SW1(config-if)# ip address x.x.x.x m.m.m.m |
The other end is configured the same |
Source IP Address (src-ip)
Destination IP Address (dst-ip)
Both Source and Destination IP (src-dst-ip) – default L3 type
Source MAC address (src-mac) – default L2 type
Destination MAC address (dst-mac)
Both Source and Destination MAC (src-dst-mac)
Source TCP/UDP port number (src-port)
Destination TCP/UDP port number (dst-port)
Both Source and Destination port number (src-dst-port)
SW1(config)# port-channel load-balance TYPE
Command | Action |
---|---|
S1(config)# spanning-tree mode pvst |
configure for PVST – Default |
S1(config)# spanning-tree mode rapid-pvst |
configure this switch for rapid PVST |
S1(config)# spanning-tree vlan 10,20 root primary |
make root bridge for these VLANs |
S1(config)# spanning-tree vlan 10 root secondary |
make secondary root bridge for VLAN |
S1(config)# spanning-tree vlan 10 priority 8192 |
set the BID priority to 8192 in this VLAN |
S1(config)# spanning-tree portfast default |
default Portfast on all interfaces in this switch |
S1(config)# interface range fa0/10 – 20 |
must be configured as Access ports for Portfast |
S1(config-if)# spanning-tree portfast |
set interfaces for Portfast |
S1(config-if)# spanning-tree bpduguard enable |
disables interface if it receives a BPDU |
S1(config)# interface fa0/1 |
select a port to set STP port priority |
S1(config-if)# spanning-tree vlan 10 port-priority 16 |
set port priority to 16; default is 128 |
S1# show spanning-tree |
see spanning-tree status on a VLAN-by-VLAN basis |
S1# show spanning-tree vlan 10 |
see detail spanning-tree information for VLAN 10 |
S1# show spanning-tree summary |
among other things, see if this is the root bridge |
S1# show spanning-tree blockedports |
see which ports are in STP blocking status |
S1# show spanning-tree root |
see which BID is root on a VLAN-by-VLAN basis |
Command | Action |
---|---|
R1(config)# interface fastethernet 0/1 | Access interface |
R1(config)# standby version 2 | use the same version at each end |
R1(config-if)# standby [optional group#] ip [optional IP-ADDRESS] [optional secondary] | The other end is configured the same |
R1(config-if)# standby [optional group#] priority NUMBER [optional preempt] | Set a higher priority (default 100) to make this router the primary in HSRP |
Hot Standby Routing Protocol (HSRP) for IPv6
Command | Action |
---|---|
R1(config)# interface fastethernet 0/1 |
Enter interface |
R1(config-if)# standby version 2 |
use the same version at each end |
R1(config-if)# standby GROUP# ipv6 autoconfig |
create virtual IPv6 Link-Local address |
R1(config-if)# standby GROUP# ipv6 2001:CAFE:ACAD:4::1/64 |
set virtual shared IP(The other end is configured the same) |
R1(config-if)# standby GROUP# priority NUMBER [optional preempt] |
Set a higher priority (default 100) to make this router the primary in HSRP |
R1# show standby |
verify the configuration |
Command | Action |
---|---|
R1(config)# service password-encryption |
encrypt all passwords (except ‘secret’ |
R1(config)# security password min-length 8 |
set minimum 8 character passwords |
R1(config)# login block-for 120 attempts 3 within 60 |
block for 2 minutes if more than 3 failed logins within 60 seconds |
Command | Action |
---|---|
Router(config)# hostname R1 |
must change the name of the device from the default |
R1(config)# username Bob password Let-me-in! |
configure a local user and password |
R1(config)# ip domain-name ANYTHING.COM |
must set for crypto-key generation |
R1(config)# crypto key generate rsa |
make an encryption key - select 1024 bits |
R1(config)# ip ssh version 2 |
configure for SSH version 2 |
R1(config)# line vty 0 15 |
change parameters for remote access |
R1(config-line)# login local |
select to authenticate against usernames in this device |
R1(config-line)# transport input ssh |
only allow SSH for remote management |
Command | Action |
---|---|
S1(config)# interface fa0/1 or interface range fa0/1 – 15, gi1/1 | Enter interface(s) |
S1(config-if)# switchport mode access | must change from dynamic to access mode |
S1(config-if)# switchport port-security | must do to activate port-security |
S1(config-if)# switchport port-security maximum 25 | allow 25 MAC addresses |
S1(config-if)# switchport port-security mac-address sticky | memorize MAC addresses |
S1(config-if)# switchport port-security violation restrict | send SNMP message |
S1(config-if)# switchport port-security violation protect | only stop excess MACs |
S1(config-if)# switchport port-security violation shutdown | shutdown interface - default |
S1(config-if)# switchport protected | does not allow traffic to/from other protected ports |
S1(config-if)# spanning-tree bpduguard enable | disables interface if it receives a BPDU |
S1(config-if)# shutdown then no shutdown | restore individual interface if it has shutdown |
S1# errdisable recovery cause psecure_violation | restore shutdown interfaces in 5 min |
S1# show port-security interface fa0/12 | show security configuration for an interface |
Command | Action |
---|---|
R1(config)# cdp run |
activate CDP globally in the router – on by default |
R1(config)# no cdp run |
disable CDP within the entire router |
R1(config-if)# no cdp enable |
stop CDP updates leaving through this specific interface |
Command | Action |
---|---|
R1(config)# ip dhcp snooping |
globally enable DHCP snooping |
R1(config-if)# ip dhcp snooping trust |
interface with DHCP server |
Command | Action |
---|---|
R1(config)# ip route 0.0.0.0 0.0.0.0 serial0/0 | default-route goes out serial 0/0 |
R1(config)# ip route 0.0.0.0 0.0.0.0 50.77.4.13 | default-route goes to next-hop 50.77.4.13 |
R1(config)# ip route 0.0.0.0 0.0.0.0 serial0/0 150 | default-route goes out serial 0/0. An optional parameter is added to set the administrative distance to 150 |
R1(config)# ip route 47.151.2.0 255.255.255.0 172.24.2.11 | to get to network 47.151.2.0/24, go to next-hop address of 172.24.2.11 |
R1(config)# ip route 47.151.2.0 255.255.255.0 serial0/1 | to get to network 47.151.2.0/24, go out serial 0/1 |
R1(config)# ip route 47.151.2.0 255.255.255.0 192.168.12.2 fastethernet0/0 | to get to network 47.151.2.0/24, go to the next-hop 192.168.12.2 out Fastethernet0/0; on Ethernet both are needed |
Command | Action |
---|---|
R1(config)# no router rip |
remove all RIP configurations and routing table entries |
R1(config)# router rip |
enter rip configuration commands |
R1(config-router)# network 192.168.10.0 |
define which directly connected networks to include in RIP update processes. No subnet mask – always classful |
R1(config-router)# passive-interface fastethernet0/0 |
prevent RIP updates from broadcasting out this interface |
R1(config-router)# default-information originate |
configure RIP to include default-routes in updates to other routers. This is disabled by default. Only on router with default-route |
R1(config-router)# redistribute static |
configure RIP to include classful static routes in updates to other routers. This is disabled by default. Only needed if there are static routes |
R1# debug ip rip |
examine RIP updates in real-time |
Command | Action |
---|---|
R1(config-router)# version 2 |
configure RIP for RIPv2 |
R1(config-router)# no auto-summary |
turn off automatic classful summarization- suggested |
Command | Action |
---|---|
R1(config)# ipv6 route ::/0 S0/0/1 |
default route goes out S0/0/1 |
R1(config)# ipv6 router rip NAME |
start the RIPng instance |
R1(config)# interface fa0/1 |
Enter interface |
R1(config-if)# ipv6 rip NAME enable |
include this interface and subnet in routing |
R1(config-if)# ipv6 rip NAME default-information originate |
send default route |
Command | Action |
---|---|
R1(config)# no router eigrp 100 |
completely remove this instance of EIGRP in this router |
R1(config)# router eigrp 100 |
100=Process ID within this network – Cisco calls this Autonomous System |
R1(config)# eigrp router-id 5.5.5.5 |
use this ID when identifying EIGRP neighbors |
R1(config-router)# no auto-summary |
the default is to summarize to classful boundaries |
R1(config-router)# network 172.16.0.0 |
no subnet or wildcard mask is needed if classful |
R1(config-router)# network 172.16.25.0 0.0.0.255 |
wildcard mask – this is inverse of /24 |
R1(config-router)# passive-interface default |
no routing updates out any interface |
R1(config-router)# no passive-interface fastethernet 0/1 |
allow certain interfaces |
R1(config-router)# passive-interface fastethernet 0/0 |
no routing updates out Fa0/0 |
R1(config-router)# redistribute static |
one statement redistributes static routes - including the default-route |
R1(config-if)# maximum paths 2 |
load balancing paths: default=4, no load balancing=1 |
R1(config-router)# metric weights 0 k1 k2 k3 k4 k5 |
used to modify the metric multipliers |
R1(config-if)# bandwidth 768 |
indicate the serial line speed for the routing protocol – this example is 768-K |
R1(config-if)# ip summary-address eigrp 100 172.16.24.0 255.255.252.0 |
manually summarized network statement configured on outbound interface |
R1(config-if)# ip bandwidth-percent eigrp 100 40 |
ex. limit EIGRP AS=100 updates to a max of 40% of link bandwidth |
R1(config-if)# ip hello-interval eigrp 100 30 |
ex. set hello intervals on this interface to 30s for EIGRP AS=100 |
R1(config-if)# ip hold-time eigrp 100 90 |
in this example, set the hold-time on this interface to 90s for EIGRP AS=100 |
R1(config)# key chain MYCHAIN |
name the key chain – done in global config |
R1(config-keychain)# key 1 |
must assign a number – same at both ends of link |
R1(config-keychain-key)# key-string securetraffic |
‘securetraffic’ is the passphrase |
R1(config)# interface serial 0/1 |
interface to the other EIGRP router |
R1(config-subif)# ip authentication mode eigrp 10 md5 |
turn on authentication |
R1(config-subif)# ip authentication key-chain eigrp 10 MYCHAIN |
use this key |
R1# show ip eigrp neighbors |
see neighbor adjacencies |
R1# show ip eigrp topology |
see the EIGRP topology table |
R1# debug eigrp fsm |
see what DUAL does when a route is removed from the routing table |
Command | Action |
---|---|
R1(config)# interface loopback 10 |
optionally create a virtual interface for OSPF router ID |
R1(config)# router ospf 1 |
configure an OSPF routing process |
R1(config-router)# router-id 2.2.2.2 |
optionally configure the OSPF Router ID - Suggested |
R1(config-router)# network 172.16.45.0 0.0.0.255 area 0 |
include directly connected networks that match this parameter |
R1(config-router)# default-information originate |
propagate the quad-0 default route |
R1(config-router)# redistribute static |
propagate classful static routes configured on this router to other OSPF routers |
R1(config-router)# redistribute static subnets |
propagate classless static routes configured on this router to other OSPF routers |
R1(config-router)# passive-interface default |
no routing updates out any interface |
R1(config-router)# no passive-interface fastethernet 0/1 |
allow certain interfaces |
R1(config-router)# passive-interface fastethernet 0/1 |
do not send OSPF routing updates out this interface |
R1(config-router)# area 7 range 172.16.8.0 255.255.248.0 |
on ABR summarize addresses |
R1(config-router)# summary address 172.16.8.0 255.255.248.0 |
On ASBR – to summarize non-OSPF routes imported into OSPF |
R1(config-router)# auto-cost reference-bandwidth ? |
optionally change ref bw - Mbits/s 1-4294967; must be same on all routers |
R1(config-router)# area AREA-ID authentication message-digest |
globally activate MD-5 authentication within an OSPF area |
R1(config-router)# ip ospf message-digest-key 1 md5 PASSWORD |
authentication key |
R1(config-if)# ip ospf message-digest-key 1 md5 PASSWORD |
on this interface, configure the OSPF auth key – will not activate authentication |
R1(config-if)# ip ospf authentication message-digest |
activate OSPF authentication |
R1(config-if)# ip ospf cost 1562 |
optionally configure an absolute OSPF cost for a link – this example same as bandwidth 64 |
R1(config-if)# ip ospf hello-interval seconds |
change hello timer from default 10 seconds |
R1(config-if)# ip ospf dead-interval seconds |
change dead timer from default 40 seconds |
R1# show ip ospf neighbor |
display OSPF neighbor adjacencies – State should be ‘FULL’ or ‘2WAY’ |
R1# show ip protocols |
includes the OSPF Router ID of this router |
R1# clear ip ospf process |
re-calculate OSPF Router ID based on current parameters |
R1# show ip ospf |
display OSPF process and router IDs, as well as area information |
R1# show ip ospf interface serial 0/0/0 |
see DR/BDR information, hello and dead intervals |
Command | Action |
---|---|
R1(config)# ipv6 unicast-routing |
turn on ipv6 routing |
R1(config)# no ipv6 router ospf 55 |
remove this instance of OSPF in this router |
R1(config)# ipv6 router ospf 100 |
create the OSPF process in this router |
R1(config-rtr)# router-id 5.5.5.5 |
must have router id |
R1(config-rtr)# default-information originate |
redistribute default route to other routers |
R1(config-rtr)# redistribute static |
redistribute classful static routes, including default |
R1(config-rtr)# redistribute static subnets |
redistribute classless static routes |
R1(config-rtr)# passive-interface default |
no routing updates out any interface |
R1(config-rtr)# no passive-interface gi 1/0 |
allow updates out this interface |
R1(config-rtr)# passive-interface gi 1/1 |
no routing updates out gi 1/1 |
R1(config-rtr)# no shutdown |
turn it on |
R1(config)# interface gi 1/1 |
networks are assigned through the interface |
R1(config-if)# ipv6 enable |
allow IPv6 on this interface |
R1(config-if)# ipv6 ospf 100 area 0 |
associate this interface with IPv6 OSPF 55, area 0 |
Command | Action |
---|---|
R1(config)# ipv6 unicast-routing |
turn on ipv6 routing |
R1(config)# no ipv6 router eigrp 100 |
remove this instance of EIGRP in this router |
R1(config)# ipv6 router eigrp 100 |
create the EIGRP process |
R1(config-rtr)# eigrp router-id 5.5.5.5 |
must have a router id |
R1(config-rtr)# redistribute static |
redistribute static and default routes to other routers |
R1(config-rtr)# passive-interface default |
no routing updates out any interface |
R1(config-rtr)# no passive-interface gi 1/0 |
allow updates out this interface |
R1(config-rtr)# passive-interface gi 1/1 |
no routing updates out gi 1/1 |
R1(config-rtr)# no shutdown |
must turn on EIGRP in this router |
R1(config)# interface gi 1/1 |
networks are assigned through the interface |
R1(config-if)# ipv6 enable |
allow IPv6 on this interface |
R1(config-if)# ipv6 eigrp 100 |
associate this interface with IPv6 EIGRP process 100 |
R1(config-if)# ipv6 summary-address eigrp 100 2001:123A:AAA0::/60 |
EIGRP summary address |
R1(config-if)# ipv6 bandwidth-percent eigrp 100 40 |
in this example limit EIGRP AS=100 updates to a maximum of 40% of the link bandwidth |
R1(config)# key chain MYCHAIN |
name the key chain – done in global config |
R1(config-keychain)# key 1 |
must assign a number – same at both ends of link |
R1(config-keychain-key)# key-string securetraffic |
‘securetraffic’ is the passphrase |
R1(config)# interface serial 0/1 |
interface to the other EIGRP router |
R1(config-subif)# ipv6 authentication mode eigrp 10 md5 |
turn on authentication |
R1(config-subif)# ipv6 authentication key-chain eigrp 10 MYCHAIN |
use this key |
Command | Action |
---|---|
Configuring PPP with Authentication |
Point to point protocol |
R1(config)# username R-2 password PASSWORD |
configure for PAP / CHAP |
If PAP |
the username and password must match the sent-username and password from other router. |
If CHAP |
the username must be the hostname of the other router and the passwords must be the same in each routers username configuration. |
R1(config)# interface serial 0/0/0 |
select the interface for ppp configuration |
R1(config-if)# encapsulation ppp |
set interface to PPP |
R1(config-if)# compress [predictor / stac] |
optional-configure data compression |
R1(config-if)# ppp quality [percentage] |
optional-set a threshold of throughput before the ppp link will reset |
R1(config-if)# ppp authentication pap |
optional-configure for PAP authentication |
R1(config-if)# ppp pap sent-username R-1 password PASSWORD |
if PAP is used, this must be configured |
R1(config-if)# ppp authentication chap |
optional-configure for CHAP authentication |
R1(config-if)# ppp multilink |
optional-combine multiple PPP links for more bandwidth |
R1(config-if)# encapsulation hdlc |
reset the interface to the default value of HDLC |
- There are two basic types of Frame-Relay configuration:Point-to-Point and Multi-Point.
- A Point-to-Point link involves a single IP subnet and one DLCI. It may be configured directly on the physical interface or may be done as a sub-interface.
- FR Point-to-Point no sub-interface; Sample Configuration 1:
Command | Action |
---|---|
R1(config)# interface serial 0/0/0 |
Enter interface |
R1(config-if)# ip address 192.168.5.1 255.255.255.252 |
typically /30 |
R1(config-if)# encapsulation frame-relay [ietf, cisco] |
PVC=IEFT is optional, cisco=default |
R1(config-if)# frame-relay lmi-type [ansi, q933a, cisco] |
optional, cisco=default |
R1(config-if)# frame-relay map ip 192.168.5.1 752 |
to allow local ping- 192.168.5.1 is the local interface IP, DLCI=752 is a valid DLCI for this interface |
R1(config-if)# frame-relay map ip 192.168.5.2 752 broadcast [ietf, cisco] |
192.168.5.2 is next hop, DLCI=752, broadcast is optional, PVC=IEFT is optional – cisco is default |
- FR Point-to-Point with sub-interface; Sample Configuration 2:
Command | Action |
---|---|
R1(config)# interface serial 0/0/0 |
Enter interface |
R1(config-if)# no ip addresst |
no IP address on the main interface |
R1(config-if)# encapsulation frame-relay [ietf, cisco] |
PVC=IEFT is optional, cisco=default |
R1(config-if)# frame-relay lmi-type [ansi, q933a, cisco] |
optional, cisco=default |
R1(config-if)# interface serial 0/0/0.752 point-to-point |
sub-int # is customarily DLCI # |
R1(config-subif)# ip address 192.168.5.1 255.255.255.252 |
typically /30 |
R1(config-subif)# frame-relay interface-dlci 752 |
DLCI=752, next hop and broadcast are dynamically assigned |
- Multi-point configurations are when there is one IP subnet with multiple connections (DLCIs). It may be configured directly on the physical interface or may be done as a sub-interface.
Command | Action |
---|---|
R1(config)# interface serial 0/0/0 |
Enter interface |
R1(config-if)# ip address 192.168.5.1 255.255.255.248 |
(not /30) |
R1(config-if)# encapsulation frame-relay |
set the encapsulation to frame relay |
R1(config-if)# frame-relay lmi-type [ansi, q933a, cisco] |
(optional, cisco=default) |
R1(config-if)# frame-relay map ip 192.168.5.1 752 |
(to allow local ping- 192.168.5.1 is the local interface IP, DLCI=752 is a valid DLCI for this interface) |
R1(config-if)# frame-relay map ip 192.168.5.2 752 broadcast [ietf, cisco] |
(192.168.5.2 is next hop, DLCI=752, broadcast is optional, PVC=IEFT is optional – cisco is default) |
R1(config-if)# frame-relay map ip 192.168.5.3 339 broadcast [ietf, cisco] |
(192.168.5.3 is next hop, DLCI=339, broadcast is optional, PVC=IEFT is optional – cisco is default) |
Command | Action |
---|---|
R1(config)# interface serial 0/0/0 | Enter interface |
R1(config-if)# no ip address | no IP address on the main interface |
R1(config-if)# encapsulation frame-relay | not configured on sub-interface |
R1(config-if)# frame-relay lmi-type [ansi, q933a, cisco] | optional, cisco=default |
R1(config-if)# interface serial 0/0/0.752 multipoint | sub-interface # is customarily DLCI # |
R1(config-subif)# ip address 192.168.5.1 255.255.255.248 | not /30 |
R1(config-subif)# frame-relay map ip 192.168.5.1 752 | to allow local ping- 192.168.5.1 is the local interface IP, DLCI=752 is a valid DLCI for this interface |
R1(config-subif)# frame-relay map ip 192.168.5.2 752 broadcast [ietf, cisco] | 192.168.5.2 is next hop, DLCI=752, broadcast is optional, PVC=IEFT is optional – cisco is default |
R1(config-subif)# frame-relay map ip 192.168.5.3 339 broadcast [ietf, cisco] | 192.168.5.3 is next hop, DLCI=339, broadcast is optional, PVC=IEFT is optional – cisco is default |
R1# show frame-relay map | display mapping of IPs and DLCIs |
Static | Map entry was from a ‘frame-relay map’ statement. |
Dynamic | Map entry was created through inverse-ARP. |
R1# show frame-relay lmi | see status of local link to Frame-Relay cloud |
R1# show frame-relay pvc | see which links are actually up end-to-end |
Active: PVC is fully connected and functional. | |
Inactive: Connected to FR switch, but other side isn’t seen. | |
Delete: Not talking to the FR switch. |
Command | Action |
---|---|
-Standard access lists only evaluate the source IP field. They can use the ‘host’ and ‘any’ keywords, or apply wildcard masks. They do not use port numbers. | |
Named Standard Access List : | |
R-1(config)# ip access-list standard NAME | name the list |
R-1(config-std-nacl)# deny host 192.168.20.5 log | deny a specific host / log matches |
R-1(config-std-nacl)# permit 192.168.20.0 0.0.0.255 | permit subnet 192.168.20.0 |
R-1(config-std-nacl)# deny any | deny all other IP addresses |
Numbered IP Standard Access List: | |
R-1(config)# access-list 25 deny host 192.168.20.5 | deny specific host |
R-1(config)# access-list 25 permit 192.168.20.0 0.0.0.255 | permit entire subnet |
R-1(config)# access-list 25 deny any | deny all other IP addresses |
There can be additional optional commands (log, time-of-day, established, etc) on the end of most statements. The protocol field must match destination port/protocol - if used |example: TCP=Telnet, ICMP=Ping, UDP=DNS|. Named Extended Access List:
Command | Action |
---|---|
R-1(config)# ip access-list extended NAME | (name the list) |
R-1(config-ext-nacl)# deny tcp host 192.168.20.10 172.16.0.0 0.0.255.255 eq 23 log | Deny an individual host to an entire subnet for Telnet and also log matches |
R-1(config-ext-nacl)# permit ip 192.168.20.0 0.0.0.255 any | Permit an entire subnet to go anywhere |
R-1(config-ext-nacl)# deny ip any any (this is applied by default if not configured) | Deny everything |
Command | Action |
---|---|
R-1(config)# interface fastethernet 0/0 |
Enter interface |
R-1(config-if)# ip access-group NAME in |
evaluate packets coming in to the router |
R-1(config-if)# ip access-group NAME out |
evaluate packets leaving the router |
R-1(config)# line vty 0 4 |
Enter lines |
R-1(config-line)# access-class NAME in |
evaluate packets for telnet or SSH |
R1(config)# ip access-list extended OUTBOUND-TRAFFIC
R1(config-ext-nacl)# permit tcp any any reflect TCP-TRAFFIC
R1(config-ext-nacl)# permit udp any any reflect UDP-TRAFFIC
R1(config-ext-nacl)# permit icmp any any reflect ICMP-TRAFFIC
R1(config-ext-nacl)# deny ip any any
R1(config)# ip access-list extended EVALUATE-INBOUND
R1(config-ext-nacl)# evaluate TCP-TRAFFIC
R1(config-ext-nacl)# evaluate UDP-TRAFFIC
R1(config-ext-nacl)# evaluate ICMP-TRAFFIC
R1(config)# interface serial 0/0/0
R1(config-if)# ip access-group OUTBOUND-TRAFFIC out
R1(config-if)# ip access-group EVALUATE-INBOUND in
R-1(config)# time-range MON-WED-FRI
R-1(config-time-range)# periodic Monday Wednesday Friday 8:00 to 17:00
R-1(config)# access-list 133 permit tcp 192.168.20.0 0.0.0.255 any eq telnet time-range MON-WED-FRI
R-1# show access-list |see access lists on this router and # of ‘matches’ per line|
R-1# show access-list NAME |see a specific access list and # of ‘matches’ per line|
- Configuring DHCP for IPv4 (Dynamic Host Configuration Protocol)
Command | Action |
---|---|
R-1(config)# ip dhcp excluded 172.16.2.1 172.16.2.7 |
excluded IP range |
R-1(config)# ip dhcp pool LAN-2 |
name this DHCP pool |
R-1(dhcp-config)# network 172.16.2.0 255.255.255.128 |
entire network range |
R-1(dhcp-config)# default-router 172.16.2.1 |
address on router port |
R-1(dhcp-config)# dns-server 140.198.8.14 |
DNS server – can have up to 4 |
R-1(dhcp-config)# domain-name MCC.COM |
optional domain name |
R-1(dhcp-config)# lease-time 5 |
optional - change to 5 day lease, 1 day is default |
R-3(config)# interface fastethernet 0/1 |
interface for network with DHCP clients |
R-3(config-if)# ip helper-address 192.168.15.2 |
address where DHCP server is |
R-1# show ip dhcp binding |
see what IP addresses are assigned & MAC addresses |
DOS-PROMPT>ipconfig /release |
remove dynamically assigned IP information on PC |
DOS-PROMPT>ipconfig /renew |
get new IP address from DHCP server |
Configuring DHCP for IPv6 Stateless Address Auto-Configuration |
SLAAC |
R1(config)# ipv6 unicast routing |
make sure IPv6 is activated |
R1(config)# ipv6 dhcp pool LAN-10-STATELESS |
create pool for addresses and DNS |
R1(dhcpv6-config)# dns-server 2001:345:ACAD:F::5 |
IPv6 DNS server address |
R1(dhcpv6-config)# domain-name cisco.com |
optional domain name |
R1(config)# interface g1/1 |
Enter interface |
R1(config-if)# ipv6 address 2001:A1B5:C13:10::1/64 |
configure IPv6 address |
R1(config-if)# ipv6 dhcp server LAN-10-STATELESS |
look to this DHCP pool |
R1(config-if)# ipv6 nd other-config-flag |
enable IPv6 Neighbor Discovery |
- Configuring DHCP for IPv6 Stateful Address Auto-configuration
Command | Action |
---|---|
R1(config)# ipv6 unicast routing |
make sure IPv6 is activated |
R1(config)# ipv6 dhcp pool LAN-10-STATEFUL |
create pool for addresses and DNS |
R1(dhcpv6-config)# address prefix 2001:D7B:CAFÉ:10::/64 lifetime infinite |
infinite |
R1(dhcpv6-config)# dns-server 2001:345:ACAD:F::5 |
IPv6 DNS server address |
R1(dhcpv6-config)# domain-name cisco.com |
optional domain name |
R1(config)# interface g1/1 |
Enter interface |
R1(config-if)# ipv6 address 2001:D7B:CAFE:10::1/64 |
configure IPv6 address |
R1(config-if)# ipv6 dhcp server LAN-10-STATEFUL |
look to this DHCP pool |
R1(config-if)# ipv6 nd managed-config-flag |
enable IPv6 Neighbor Discovery |
R-3(config)# interface fastethernet 0/1 |
interface for network with DHCP clients |
R-3(config-if)# ip dhcp relay destination 2001:A123:7CA1::15 |
IPv6 DHCP server address |
R1# show ipv6 dhcp pool
R1# show ipv6 dhcp binding
-For both static and dynamic NAT, designate interfaces as inside or outside:
Command | Action |
---|---|
R-1(config)# interface fa0/0 |
typically designate all interfaces except the outside one |
R-1(config-if)# ip nat inside |
designate this as an inside interface |
R-1(config)# interface serial 0/0/0 |
typically there is only one outside interface |
R-1(config-if)# ip nat outside |
designate this as an outside interface |
-Static NAT requires only one statement. The IP addresses are inside / outside: | |
R-1(config)# ip nat inside source static 192.168.10.22 73.2.34.137 | |
-Dynamic NAT may use a pool of ‘outside addresses’. If you do not use a pool, you will have to use the address on the outside interface. You can use ‘netmask’: |
R-1(config)# ip nat pool POOL-NAME 73.2.34.138 73.2.34.143 netmask 255.255.255.248
-or- You may choose to use ‘prefix-length’:
R-1(config)# ip nat pool POOL-NAME 73.2.34.138 73.2.34.143 prefix-length 29
-Dynamic NAT requires an ACL to define which internal addresses can be NATted:
R-1(config)# ip access-list standard NAT-ELIGIBLE
R-1(config-std-nacl)# permit 192.168.10.0 0.0.0.255 (include all subnets)
R-1(config-std-nacl)# deny any
-Dynamic NAT can use the pool for outside addresses:
R-1(config)# ip nat inside source list NAT-ELIGIBLE pool POOL-NAME
-or- Dynamic NAT can use the pool with overload to share outside addresses:
R-1(config)# ip nat inside source list NAT-ELIGIBLE pool POOL-NAME overload
-or- Dynamic NAT can use the exit interface – almost always will use overload:
R-1(config)# ip nat inside source list NAT-ELIGIBLE interface serial 0/0/0 overload
R-1# show ip nat translations | current translations- dynamic and static |
R-1# show ip nat statistics | see # of active translations, role of interfaces, etc |