Alibabacloud.com offers a wide variety of articles about cisco router commands list, easily find your cisco router commands list information here online.
) # distribute-list access-list-number | name out [interface-name] routing-process | autonomous-system-number
Router configuration-SNMP
Set snmp Command Options:
Set snmp community {read-only | ready-write | read-write-all} [community_string]
The format of the set snmp trap Command is as follows:
setsnmptrap{enable|disable}
[all|moudle|classis|bridge|repe
Cisco plays a very important role in vro enterprises. It is very important to know some knowledge about common configuration commands of Cisco vrouters. So I studied how to use common configuration commands for Cisco routers. I would like to share them with you here for your
(Forbidden) Protocol Source IP address/network segment Anti-mask destination IP address/network segment anti-mask eq Port ****** Prohibit a network segment (source network segment) under a protocol (or a port) access to the B segment (destination network segment) router (config) #access-list table number permit ip any Any note: Extended ACLs By default all networks are also set to prohibit, so
This document lists frequently-used configuration commands for Cisco routers in alphabetical order.
Access-enable allows the router to create a temporary Access list entry in the dynamic Access listAccess-group: Apply the Access control list (ACL) to the interface.Access-
in the subnet to access the test serverDeny host access to test server in 10.10.2.0 subnetAdd commands on the experimental routerAccess-list 1 Permit 10.10.1.10 0.0.0.255Interface f0/0IP Access-group 1 in2. Extending ACLSAllow network segment one and network segment two ping pass test serverTelnet service that allows network segment one but does not allow network segment two access to the internal networkA
used in the route selection protocol.
Router rip activates the RIP Protocol
Network + direct connection CIDR Block publish direct connection CIDR Block
Interface lookback 0 activation logic interface
Passive-interface + interface Type + interface number configuration interface is passive mode
Debug ip + protocol dynamic view of route update information
Undebug all disable all DEBUG information
Activate the network routing protocol of th
Common commands for Cisco switches -- set the switch Password
A. Change the remote TELNNET Password
Switch#configureterminal
Switch(config)#linevty04
Switch(config-line)#passwordqycx123
Switch(config-line)#login
Switch(config-line)#exit
B. Change the password when entering the global configuration mode.
Switch#configureterminal
Switch(config)#enablesecretqycx123
, configure the appropriate IP addressrl# Ping 10.0.0.2 Use the ping command to view the connectivity of neighborsrl# show ip route to view the routing table, you can see the routing information in C, which is a direct-attached routing information;You can see the routing information at the beginning of R, which is the routing information learned from RIP, and you can seeI begin with routing information that replaces the routing information that begins with R because the IGRP pipeDistance is 100,
neighbors detail.Show CDP Entry * Protocols shows the IP address of a direct-attached neighbor.Show CDP Entry * Version shows the iOS version of the Direct connect neighbor.Show CDP traffic shows the CDP packets sent and received by the device.Show CDP interface shows the CDP information used by each interface, including the package type, timer, and hold time of the line.Close CDP Service no CDP run, turn off CDP for an interface in interface mode no CDP enableWhen you see the above command, im
One of the biggest challenges ISP faces today is tracking and blocking denial of service (DoSattacks ). there are three steps to deal with DoS attack: intrusion detection, source tracking, and blocking. this command is for source tracking.1. Configuration example:This example describes how to use line cards/port adapters on a router to collect data streams from the host 100.10.0.1 (attacked machine) for each line card or port adapter. Log logs are gen
configurationRouter>enableRouter#configure TerminalRouter (config) #interfiguer f0/0Router (config-if) #ip address 192.168.1.2 255.255.255.0Router (config-if) #no shutdownThen back into privileged modeRouter#write Memory for storageThen test if you can ping the IP of the serverRouter#ping 192.168.1.1Then make a copy.Router#copy Running-config TFTPAddress or name of the remote host[]?192.168.1.1 enter the IP of the server after the question markThen leave the default hit enter to finish.4.
Cisco handles several commands for the local file systemThe commands here are somewhat similar to some of the commands under WindowsDir: Browse the list of files or directories in the current or specified directoryCD: Enter the specified directory or return to the specified
) # Service-policy input name applies policy to this interface3550 (config) # MLS QoS start QoS3550 (config-if) # Auto QoS VoIP initiates automatic quality of service on the interface3550 (config) # priority-list priority_queue_# Protocol Protocol High|medium|normal|low [list acl_#] Define the flow of information for the priority queue3550 (config) # priority-list
Tags: Cisco switchBasic configuration and management of switches• Technical Principles• The switch is managed in two basic ways: in-band management and out-of-band management.• The console port management switch through the switch is out-of-band management, which does not occupy the network port of the switch, and the first configuration switch must be configured with the console port.• In-band management via remote telnet, dialing, etc.• The switch's
privileged mode password?
Enter the corresponding password after "enable" is entered during vro operations. To set the password, use the following command in configuration mode:
Router (config) # enable secret mypassword
To change the password to mypassword.
3. Configure Ethernet port information
In configuration mode, enter the following command:
Router (config) # interface ethernet? 0/0
The author understands the clear list rules in the Huawei router configuration command. This article describes the statistics of clear access-list counters clear access list rules. Master the following knowledge points. You only need to spend a few minutes to understand the clear l
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.