SlideShare a Scribd company logo
Router Commands OverviewIn this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage. You will find here some basic terminology of a router.Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.First of all you should remember the keyboard shortcuts of a router.Keyboard ShortcutsCTRL-N - show next commandCTRL-P - show previous commandSHIFT-CTRL-6 – BreakConfiguring the Router You will be able to learn the basic commands for configuring a router.sh running-config - details the running configuration file (RAM)sh startup-config - displays the configuration stored in NVRAMsetup - Will start the the automatic setup; the same as when you first boot the routerconfig t - use to execute configuration commands from the terminalconfig mem - executes configuration commands stored in NVRAM; copies startup-config to running-configconfig net - used to retrieve configuration info from a TFTP servercopy running-config startup-config - copies saved config in running config (RAM) to NVRAM or \"
write memory\"
 for IOS under ver.11copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)boot system flash  - tells router which IOS file in flash to boot fromboot system tftp - tells router which IOS file on the tftp server to boot fromboot system rom - tell router to boot from ROM at next bootcopy flash tftp - Copies flash to tftp servercopy tftp flash - Restores flash from tftp servercopy run tftp - Copies the current running-config to tftp servercopy tftp run - Restores the running-config from tftp server General CommandsHere is a list of the general commands. These are the basic level commands and most commonly usedno shutdown - (enables the interface)reload - restarts the routersh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration registersh clock - shows date and time on routersh history - shows the history of your commandssh debug - shows all debugging that is currently enabledno debug all - turns off all debuggingsh users - shows users connected to routersh protocols - shows which protocols are configuredbanner motd # Your customized message here # - Set/change bannerhostname  - use to configure the hostname of the routerclear counters - clear interface counters Privileged Mode commands of a routerLearn how to work in the privileged mode of a router.enable - get to privileged modedisable - get to user modeenable password  - sets privileged mode passwordenable secret  - sets encrypted privileged mode passwordSetting Passwords on routerHere you will be able to learn how to set the password on a router.enable secret  - set encrypted password for privileged accessenable password  - set password for privileged access (used when there is no enable secret and when using older software)Setting the password for console access:(config)#line console 0(config-line)#login (config-line)#password Set password for virtual terminal (telnet) access (password must be set to access router through telnet):(config)#line vty 0 4 (config-line)#login (config-line)#password  Set password for auxiliary (modem) access:(config)#line aux 0(config-line)#login (config-line)#password  Router Processes & StatisticsBy these command you can see the statistics and different processes of the router.sh processes - shows active processes running on routersh process cpu - shows cpu statisticssh mem - shows memory statisticssh flash - describes the flash memory and displays the size of files and the amount of free flash memorysh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Bufferssh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines IP CommandsHere is a list of the IP CommandsConfigure IP on an interface:int serial 0ip address 157.89.1.3 255.255.0.0int eth 0 ip address 2008.1.1.4 255.255.255.0 Other IP Commands:sh ip route - view ip routing tableip route    [administrative_distance] - configure a static IP routeip route 0.0.0.0 0.0.0.0  - sets default gatewayip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible routesh arp - view arp cache; shows MAC address of connected routersip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interfacesh ip protocol CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):sh cdp neighbor - shows directly connected neighborssh cdp int - shows which interfaces are running CDPsh cdp int eth 0/0 - show CDP info for specific interfacesh cdp entry  - shows CDP neighbor detailcdp timer 120 - change how often CDP info is sent (default cdp timer is 60)cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)sh cdp run - shows if CDP turned onno cdp run - turns off CDP for entire router (global config)no cdp enable - turns off CDP on specific interfaceIPX CommandsEnable IPX on router:ipx routingConfigure IPX + IPX-RIP on an int: int ser 0ipx network 4AOther Commands:sh ipx route - shows IPX routing tablesh ipx int e0 - shows ipx address on intsh ipx servers - shows SAP tablesh ipx traffic - view traffic statisticsdebug ipx routing activity - debugs IPS RIP packetsdebug ipx sap - debugs SAP packets Routing ProtocolsRIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.Configure RIP:router ripnetwork 157.89.0.0network 208.1.1.0Other RIP Commands: debug ip rip - view RIP debugging infoConfigure IGRP:router IGRP 200network 157.89.0.0network 208.1.1.0Other IGRP Commands:debug ip igrp events - view IGRP debugging infodebug ip igrp transactions - view IGRP debugging info Access Lists Here is a list of the Access list command of a router.sh ip int ser 0 - use to view which IP access lists are applies to which intsh ipx int ser 0 - use to view which IPX access lists are applies to which intsh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which intView access lists:sh access-listssh ip access-listssh ipx access-listssh appletalk access-listsApply standard IP access list to int eth 0:access-list 1 deny 200.1.1.0 0.0.0.255access-list 1 permit anyint eth 0ip access-group 1 inApply Extended IP access list to int eth 0:access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80int eth 0ip access-group 100 outApply Standard IPX access list to int eth 0:access-list 800 deny 7a 8000access-list 800 permit -1int eth 0ipx access-group 800 outApply Standard IPX access list to int eth 0:access-list 900 deny sap any 3378 -1access-list 900 permit sap any all -1int eth 0ipx access-group 900 out WAN Configurations CommandsNetworking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.PPP ConfigurationPoint to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.encapsulation pppppp authentication ppp chap hostname ppp pap sent-username sh int ser 0 - use to view encapsulation on the interfaceFrame-Relay ConfigurationOne of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco routerframe-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and upframe-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)keep alive 10 - use to set keep alivesh int ser 0 - use to show DLCI, LMI, and encapsulation infosh frame-relay pvc - shows the configured DLCI's; shows PVC traffic statssh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info Miscellaneous CommandsIn the last but not least here is a list of the some miscellaneous and useful commandssh controller t1 - shows status of T1 linessh controller serial 1 - use to determine if DCE or DTE device(config-if)#clock rate 6400 - set clock on DCE (bits per second)(config-if)#bandwidth 64 - set bandwidth (kilobits)
Router Commands Overview
Router Commands Overview
Router Commands Overview
Router Commands Overview
Router Commands Overview
Ad

More Related Content

What's hot (19)

In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
Thanawan Tuamyim
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
DH Da Lat
 
Router commands
Router commandsRouter commands
Router commands
Laura Lahbib
 
Juniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route ConfigurationJuniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationJuniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP Route Configuration
Juniper JNCIA – Juniper RIP Route ConfigurationJuniper JNCIA – Juniper RIP Route Configuration
Juniper JNCIA – Juniper RIP Route Configuration
Hamed Moghaddam
 
25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples
Teja Bheemanapally
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
Bud Siddhisena
 
Cisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 ConfigurationCisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 Configuration
Hamed Moghaddam
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
Areej Khasawneh
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Alejandro Marin
 
Cisco CCNA CCNP VACL Configuration
Cisco CCNA CCNP VACL ConfigurationCisco CCNA CCNP VACL Configuration
Cisco CCNA CCNP VACL Configuration
Hamed Moghaddam
 
Cisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel ConfigurationCisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel Configuration
Hamed Moghaddam
 
Packet Filtering Using Iptables
Packet Filtering Using IptablesPacket Filtering Using Iptables
Packet Filtering Using Iptables
Ahmed Mekkawy
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
Huanetwork
 
Juniper JNCIA – Juniper Floating Static Route Configuration
Juniper JNCIA – Juniper Floating Static Route ConfigurationJuniper JNCIA – Juniper Floating Static Route Configuration
Juniper JNCIA – Juniper Floating Static Route Configuration
Hamed Moghaddam
 
Iptables fundamentals
Iptables fundamentalsIptables fundamentals
Iptables fundamentals
ram_b17
 
Ccna command
Ccna commandCcna command
Ccna command
Siddhartha Rajbhatt
 
Cisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink ConfigurationCisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink Configuration
Hamed Moghaddam
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
Thanawan Tuamyim
 
Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)Cisco commands List for Beginners (CCNA, CCNP)
Cisco commands List for Beginners (CCNA, CCNP)
DH Da Lat
 
Juniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route ConfigurationJuniper JNCIA – Juniper OSPF Route Configuration
Juniper JNCIA – Juniper OSPF Route Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route ConfigurationJuniper JNCIA – Juniper RIP and OSPF Route Configuration
Juniper JNCIA – Juniper RIP and OSPF Route Configuration
Hamed Moghaddam
 
Juniper JNCIA – Juniper RIP Route Configuration
Juniper JNCIA – Juniper RIP Route ConfigurationJuniper JNCIA – Juniper RIP Route Configuration
Juniper JNCIA – Juniper RIP Route Configuration
Hamed Moghaddam
 
25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples25 most frequently used linux ip tables rules examples
25 most frequently used linux ip tables rules examples
Teja Bheemanapally
 
Introduction to firewalls through Iptables
Introduction to firewalls through IptablesIntroduction to firewalls through Iptables
Introduction to firewalls through Iptables
Bud Siddhisena
 
Cisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 ConfigurationCisco CCNA OSPF IPV6 Configuration
Cisco CCNA OSPF IPV6 Configuration
Hamed Moghaddam
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
Areej Khasawneh
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
Alejandro Marin
 
Cisco CCNA CCNP VACL Configuration
Cisco CCNA CCNP VACL ConfigurationCisco CCNA CCNP VACL Configuration
Cisco CCNA CCNP VACL Configuration
Hamed Moghaddam
 
Cisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel ConfigurationCisco CCNA GRE Tunnel Configuration
Cisco CCNA GRE Tunnel Configuration
Hamed Moghaddam
 
Packet Filtering Using Iptables
Packet Filtering Using IptablesPacket Filtering Using Iptables
Packet Filtering Using Iptables
Ahmed Mekkawy
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
Huanetwork
 
Juniper JNCIA – Juniper Floating Static Route Configuration
Juniper JNCIA – Juniper Floating Static Route ConfigurationJuniper JNCIA – Juniper Floating Static Route Configuration
Juniper JNCIA – Juniper Floating Static Route Configuration
Hamed Moghaddam
 
Iptables fundamentals
Iptables fundamentalsIptables fundamentals
Iptables fundamentals
ram_b17
 
Cisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink ConfigurationCisco CCNA- PPP Multilink Configuration
Cisco CCNA- PPP Multilink Configuration
Hamed Moghaddam
 

Viewers also liked (7)

A f detailed power point for s-boe 11.7.11
A f detailed power point  for s-boe 11.7.11A f detailed power point  for s-boe 11.7.11
A f detailed power point for s-boe 11.7.11
Blacketor Consultants, LLC
 
Evisit Mneug B
Evisit Mneug BEvisit Mneug B
Evisit Mneug B
johncbutler
 
Hit the Bullseye with Targeted Marketing
Hit the Bullseye with Targeted MarketingHit the Bullseye with Targeted Marketing
Hit the Bullseye with Targeted Marketing
hardcastlegeddes
 
Journal pysho 2
Journal pysho 2Journal pysho 2
Journal pysho 2
Anthony Chew
 
Unit33 small businessenterprise_spec
Unit33 small businessenterprise_specUnit33 small businessenterprise_spec
Unit33 small businessenterprise_spec
EHWLC
 
Superindent's Bulletin 3 26 10
Superindent's Bulletin 3 26 10Superindent's Bulletin 3 26 10
Superindent's Bulletin 3 26 10
Wellesley Public School
 
Hit the Bullseye with Targeted Marketing
Hit the Bullseye with Targeted MarketingHit the Bullseye with Targeted Marketing
Hit the Bullseye with Targeted Marketing
hardcastlegeddes
 
Unit33 small businessenterprise_spec
Unit33 small businessenterprise_specUnit33 small businessenterprise_spec
Unit33 small businessenterprise_spec
EHWLC
 
Ad

Similar to Router Commands Overview (20)

introduction-to-cisco-routers.ppt
introduction-to-cisco-routers.pptintroduction-to-cisco-routers.ppt
introduction-to-cisco-routers.ppt
RobelTsada
 
introduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .pptintroduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .ppt
nazeem1977
 
Mod11
Mod11Mod11
Mod11
Alam Garcia
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
Ccnacommand 140205001152-phpapp01
Ccnacommand 140205001152-phpapp01Ccnacommand 140205001152-phpapp01
Ccnacommand 140205001152-phpapp01
A.S.M Shmimul Islam.
 
CCNA presentation.
CCNA presentation.CCNA presentation.
CCNA presentation.
Ajaigururaj R
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
abhijitgnbbl
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
Eng. Emad Al-Atoum
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
CCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptxCCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptx
SanathKumarV3
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
Netwax Lab
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig  SyntaxArp Dan Ipconfig  Syntax
Arp Dan Ipconfig Syntax
guestcc37e8c
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
111
111111
111
gadoosh
 
111
111111
111
gadoosh
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
scooby_doo
 
introduction-to-cisco-routers.ppt
introduction-to-cisco-routers.pptintroduction-to-cisco-routers.ppt
introduction-to-cisco-routers.ppt
RobelTsada
 
introduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .pptintroduction-to-cisco-routers basic .ppt
introduction-to-cisco-routers basic .ppt
nazeem1977
 
Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)Cisco Internetworking Operating System (ios)
Cisco Internetworking Operating System (ios)
Netwax Lab
 
General lab documentation~cisco router configuration
General lab documentation~cisco router configurationGeneral lab documentation~cisco router configuration
General lab documentation~cisco router configuration
sayedatif
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
Saurav Pandey
 
CCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptxCCNA_LAB_MANUAL_part1.pptx
CCNA_LAB_MANUAL_part1.pptx
SanathKumarV3
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
Netwax Lab
 
Arp Dan Ipconfig Syntax
Arp Dan Ipconfig  SyntaxArp Dan Ipconfig  Syntax
Arp Dan Ipconfig Syntax
guestcc37e8c
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
VESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.pptVESIT WORKSHOP SIMULATIONS.ppt
VESIT WORKSHOP SIMULATIONS.ppt
zmulani8
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
IT Tech
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
scooby_doo
 
Ad

Recently uploaded (20)

IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 
IT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information TechnologyIT484 Cyber Forensics_Information Technology
IT484 Cyber Forensics_Information Technology
SHEHABALYAMANI
 
Building the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdfBuilding the Customer Identity Community, Together.pdf
Building the Customer Identity Community, Together.pdf
Cheryl Hung
 
Dark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanizationDark Dynamism: drones, dark factories and deurbanization
Dark Dynamism: drones, dark factories and deurbanization
Jakub Šimek
 
Bepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firmBepents tech services - a premier cybersecurity consulting firm
Bepents tech services - a premier cybersecurity consulting firm
Benard76
 
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptxReimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
Reimagine How You and Your Team Work with Microsoft 365 Copilot.pptx
John Moore
 
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptxSmart Investments Leveraging Agentic AI for Real Estate Success.pptx
Smart Investments Leveraging Agentic AI for Real Estate Success.pptx
Seasia Infotech
 
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Challenges in Migrating Imperative Deep Learning Programs to Graph Execution:...
Raffi Khatchadourian
 
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent LasterAI 3-in-1: Agents, RAG, and Local Models - Brent Laster
AI 3-in-1: Agents, RAG, and Local Models - Brent Laster
All Things Open
 
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier VroomAI x Accessibility UXPA by Stew Smith and Olivier Vroom
AI x Accessibility UXPA by Stew Smith and Olivier Vroom
UXPA Boston
 
fennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solutionfennec fox optimization algorithm for optimal solution
fennec fox optimization algorithm for optimal solution
shallal2
 
IT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information TechnologyIT488 Wireless Sensor Networks_Information Technology
IT488 Wireless Sensor Networks_Information Technology
SHEHABALYAMANI
 
AI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of DocumentsAI Agents at Work: UiPath, Maestro & the Future of Documents
AI Agents at Work: UiPath, Maestro & the Future of Documents
UiPathCommunity
 
Unlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web AppsUnlocking Generative AI in your Web Apps
Unlocking Generative AI in your Web Apps
Maximiliano Firtman
 
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient CareAn Overview of Salesforce Health Cloud & How is it Transforming Patient Care
An Overview of Salesforce Health Cloud & How is it Transforming Patient Care
Cyntexa
 
Developing System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptxDeveloping System Infrastructure Design Plan.pptx
Developing System Infrastructure Design Plan.pptx
wondimagegndesta
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Q1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor PresentationQ1 2025 Dropbox Earnings and Investor Presentation
Q1 2025 Dropbox Earnings and Investor Presentation
Dropbox
 
Top-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptxTop-AI-Based-Tools-for-Game-Developers (1).pptx
Top-AI-Based-Tools-for-Game-Developers (1).pptx
BR Softech
 
How to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabberHow to Install & Activate ListGrabber - eGrabber
How to Install & Activate ListGrabber - eGrabber
eGrabber
 
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
The No-Code Way to Build a Marketing Team with One AI Agent (Download the n8n...
SOFTTECHHUB
 

Router Commands Overview

  • 1. Router Commands OverviewIn this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage. You will find here some basic terminology of a router.Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.First of all you should remember the keyboard shortcuts of a router.Keyboard ShortcutsCTRL-N - show next commandCTRL-P - show previous commandSHIFT-CTRL-6 – BreakConfiguring the Router You will be able to learn the basic commands for configuring a router.sh running-config - details the running configuration file (RAM)sh startup-config - displays the configuration stored in NVRAMsetup - Will start the the automatic setup; the same as when you first boot the routerconfig t - use to execute configuration commands from the terminalconfig mem - executes configuration commands stored in NVRAM; copies startup-config to running-configconfig net - used to retrieve configuration info from a TFTP servercopy running-config startup-config - copies saved config in running config (RAM) to NVRAM or \" write memory\" for IOS under ver.11copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)boot system flash - tells router which IOS file in flash to boot fromboot system tftp - tells router which IOS file on the tftp server to boot fromboot system rom - tell router to boot from ROM at next bootcopy flash tftp - Copies flash to tftp servercopy tftp flash - Restores flash from tftp servercopy run tftp - Copies the current running-config to tftp servercopy tftp run - Restores the running-config from tftp server General CommandsHere is a list of the general commands. These are the basic level commands and most commonly usedno shutdown - (enables the interface)reload - restarts the routersh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration registersh clock - shows date and time on routersh history - shows the history of your commandssh debug - shows all debugging that is currently enabledno debug all - turns off all debuggingsh users - shows users connected to routersh protocols - shows which protocols are configuredbanner motd # Your customized message here # - Set/change bannerhostname - use to configure the hostname of the routerclear counters - clear interface counters Privileged Mode commands of a routerLearn how to work in the privileged mode of a router.enable - get to privileged modedisable - get to user modeenable password - sets privileged mode passwordenable secret - sets encrypted privileged mode passwordSetting Passwords on routerHere you will be able to learn how to set the password on a router.enable secret - set encrypted password for privileged accessenable password - set password for privileged access (used when there is no enable secret and when using older software)Setting the password for console access:(config)#line console 0(config-line)#login (config-line)#password Set password for virtual terminal (telnet) access (password must be set to access router through telnet):(config)#line vty 0 4 (config-line)#login (config-line)#password Set password for auxiliary (modem) access:(config)#line aux 0(config-line)#login (config-line)#password Router Processes & StatisticsBy these command you can see the statistics and different processes of the router.sh processes - shows active processes running on routersh process cpu - shows cpu statisticssh mem - shows memory statisticssh flash - describes the flash memory and displays the size of files and the amount of free flash memorysh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Bufferssh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines IP CommandsHere is a list of the IP CommandsConfigure IP on an interface:int serial 0ip address 157.89.1.3 255.255.0.0int eth 0 ip address 2008.1.1.4 255.255.255.0 Other IP Commands:sh ip route - view ip routing tableip route [administrative_distance] - configure a static IP routeip route 0.0.0.0 0.0.0.0 - sets default gatewayip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible routesh arp - view arp cache; shows MAC address of connected routersip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interfacesh ip protocol CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):sh cdp neighbor - shows directly connected neighborssh cdp int - shows which interfaces are running CDPsh cdp int eth 0/0 - show CDP info for specific interfacesh cdp entry - shows CDP neighbor detailcdp timer 120 - change how often CDP info is sent (default cdp timer is 60)cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)sh cdp run - shows if CDP turned onno cdp run - turns off CDP for entire router (global config)no cdp enable - turns off CDP on specific interfaceIPX CommandsEnable IPX on router:ipx routingConfigure IPX + IPX-RIP on an int: int ser 0ipx network 4AOther Commands:sh ipx route - shows IPX routing tablesh ipx int e0 - shows ipx address on intsh ipx servers - shows SAP tablesh ipx traffic - view traffic statisticsdebug ipx routing activity - debugs IPS RIP packetsdebug ipx sap - debugs SAP packets Routing ProtocolsRIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.Configure RIP:router ripnetwork 157.89.0.0network 208.1.1.0Other RIP Commands: debug ip rip - view RIP debugging infoConfigure IGRP:router IGRP 200network 157.89.0.0network 208.1.1.0Other IGRP Commands:debug ip igrp events - view IGRP debugging infodebug ip igrp transactions - view IGRP debugging info Access Lists Here is a list of the Access list command of a router.sh ip int ser 0 - use to view which IP access lists are applies to which intsh ipx int ser 0 - use to view which IPX access lists are applies to which intsh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which intView access lists:sh access-listssh ip access-listssh ipx access-listssh appletalk access-listsApply standard IP access list to int eth 0:access-list 1 deny 200.1.1.0 0.0.0.255access-list 1 permit anyint eth 0ip access-group 1 inApply Extended IP access list to int eth 0:access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80int eth 0ip access-group 100 outApply Standard IPX access list to int eth 0:access-list 800 deny 7a 8000access-list 800 permit -1int eth 0ipx access-group 800 outApply Standard IPX access list to int eth 0:access-list 900 deny sap any 3378 -1access-list 900 permit sap any all -1int eth 0ipx access-group 900 out WAN Configurations CommandsNetworking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.PPP ConfigurationPoint to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.encapsulation pppppp authentication ppp chap hostname ppp pap sent-username sh int ser 0 - use to view encapsulation on the interfaceFrame-Relay ConfigurationOne of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco routerframe-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and upframe-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)keep alive 10 - use to set keep alivesh int ser 0 - use to show DLCI, LMI, and encapsulation infosh frame-relay pvc - shows the configured DLCI's; shows PVC traffic statssh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info Miscellaneous CommandsIn the last but not least here is a list of the some miscellaneous and useful commandssh controller t1 - shows status of T1 linessh controller serial 1 - use to determine if DCE or DTE device(config-if)#clock rate 6400 - set clock on DCE (bits per second)(config-if)#bandwidth 64 - set bandwidth (kilobits)
  翻译: