Summary of typical router configuration commands

Source: Internet
Author: User

Router configuration-CGMP

To configure cgmp on a cisco router:

Dallasr1> (config-if) # ip cgmp

Configure a multicast router to add it to a specific multicast group:

Dallasr1> (config-if) # ip igmp join-group-address

Disable CGMP:

Dallasr1> (config-if) # no ip cgmp

Start the cgmp on the switch:

Dallasr1> (enable) set cgmp enable

Verify the configuration of cgmp on the Catalyst Switch:

 
 
  1. catalystla1>(enable) show config  
  2. set prompt catalystla1> 
  3. set interface sc0 192.168.1.1 255.255.255.0  
  4. set cgmp enable 

CGMP exit settings:

Dallas_SW (enable) set cgmp leave

Router configuration-privileged level

Modify the control port password on a Cisco device:

 
 
  1. R1(config)# line console 0  
  2. R1(config-line)# login  
  3. R1(config-line)# password Lisbon  
  4. R1(config)# enable password Lilbao  
  5. R1(config)# login local  
  6. R1(config)# username student password cisco 

Set the console and vty port Session Timeout on the Cisco device:

 
 
  1. R1(config)# line console 0  
  2. R1(config-line)# exec-timeout 5 10  
  3. R1(config)# line vty 0 4  
  4. R1(config-line)# exec-timeout 5 2 

Set the privilege level on a Cisco device:

 
 
  1. R1(config)# privilege configure level 3 username  
  2. R1(config)# privilege configure level 3 copy run start  
  3. R1(config)# privilege configure level 3 ping  
  4. R1(config)# privilege configure level 3 show run  
  5. R1(config)# enable secret level 3 cisco 

Use the privilege command to define the commands used at the privileged level:

Router (config) # privilege mode level command

Set the user privilege level:

 
 
  1. router(config)# enable secret level 3 dallas  
  2. router(config)# enable secret san-fran  
  3. router(config)# username student password cisco 

Flag settings and display:

R1 (config) # banner motd 'unauthorized access will be prosecuted! '

Set vty access:

 
 
  1. R1(config)# access-list 1 permit 192.168.2.5  
  2. R1(config)# line vty 0 4  
  3. R1(config)# access-class 1 in 

Configure HTTP access:

 
 
  1. Router3(config)# access-list 1 permit 192.168.10.7  
  2. Router3(config)# ip http sever  
  3. Router3(config)# ip http access-class 1  
  4. Router3(config)# ip http authentication local  
  5. Router3(config)# username student password cisco 

To enable HTTP access, type the following command:

Switch (config) # ip http sever

Start and verify port security with setCL1 on the set command-based switch:

Switch (enable) set port security mod_num/port_num... Enable mac address

Switch (enable) show port mod_num/port_num

Start and verify port security on the CiscoIOS command-based switch:

 
 
  1. switch(config-if)# port secure [mac-mac-count maximum-MAC-count]  
  2. switch# show mac-address-table security [type module/port] 

Use the access-list command to create a record in the standard traffic filtering table:

Router (config) # access-list-number {permit | deny} source-address [source-address]

Use the access-list command to create a record in the extended traffic filtering table:

Router (config) # access-list-number {permit | deny {protocol | protocol-keyword }}{ source-wildcard | any} {destination-wildcard | any} [protocol- specific options] [log]

Router configuration-route update

For in-band route updates, the most basic command format for configuring route updates is:

R1 (config-router) # distribute-list access-list-number | name in [type number]

For out-of-band route updates, the most basic command format for configuring route updates is:

R1 (config-router) # distribute-list access-list-number | name out [interface-name] routing-process | autonomous-system-number

Router configuration-SNMP

Set snmp Command Options:

Set snmp community {read-only | ready-write | read-write-all} [community_string]

The format of the set snmp trap Command is as follows:

 
 
  1. set snmp trap {enable|disable}  
  2. [all|moudle|classis|bridge|repeater| auth|vtp|ippermit|vmps|config|entity|stpx]  
  3. set snmp trap rvcr_addr rcvr_community 

Enable the SNMP chassis trap:

Console> (enable) set snmp trap enable chassis

Enable all SNMP chassis traps:

Console> (enable) set snmp trap enable

Disable the SNMP chassis trap:

Console> (enable) set snmp trap disable chassis

Add a record to the SNMP Trap receiving table:

Console> (enable) set snmp trap 192.122.173.42 public

Show snmp output result.

Output result of the command set snmp rmon enable.

Display SPAN information:

Consile> show span

Summary and classification of vro configuration commands can be summarized for readers. In fact, if you have a certain learning base, you can also summarize your own methods and experience, welcome to our platform: http://bbs.51cto.com/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.