Preview

Useful Cisco Commands

Satisfactory Essays
Open Document
Open Document
580 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Useful Cisco Commands
Syntax for Static Routing (ip route command)
Router(config)#ip route <Destination Network> <Subnet Mask> <Next-hop Address> or <Exit Interface>

Syntax for Default Routing (ip route command)
Router(config)#ip route 0.0.0.0 0.0.0.0 <Next-hop Address> or <Exit Interface>

Syntax for Routing Information Protocol (router rip command)
Router(config)#router rip
Router(config-router)#network <Subnet Address>

Useful Cisco Commands:

Syntax that lists all commands available in the current command mode
Router#?

Command that lists all show commands available
Router#show ?

Command that moves user from user mode to privileged mode
Router>enable
Command that performs the same function as exit
Router#logout
Command that displays information about current IOS
Router#show version

Command that configures a router name (name can be any word you choose)
Router#hostname <router's name>

Command that sets enable password in a router
Router(config)#enable password <password>

Command that removes enable (not encrypted) password in a router
Router(config)#no enable password

Command that sets enable secret (encrypted) in a router
Router(config)#enable secret <password>

Command that removes enable secret in a router
Router(config)#no enable secret

Command that applies a weak encryption to passwords
Router(config)#service password-encryption
Command that turns off password encryption
Router(config)#no service password-encryption
Command that sets console-line mode password to console
Router(config)#line con 0
Router(config-line)#password <password>
Router(config-line)#login

Command that removes console-line mode password to console
Router(config)#line con 0
Router(config-line)#no password
Router(config-line)#no login

Command that sets vty password to telnet
Router(config)#line vty 0 4
Router(config-line)#password <password> (e.g.P@$$w0rd)

You May Also Find These Documents Helpful

  • Good Essays

    The user EXEC mode allows only a limited number of basic monitoring commands. The privileged EXEC mode provides access to all router commands.…

    • 1170 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    enable secret ciscousername local1 privilege 1 password 0 pass1username local2 privilege 1 password 0 pass2memory-size iomem 10!ip subnet-zero!interface FastEthernet0/0 ip address 192.168.100.1 255.255.255.0 ip nat inside duplex auto speed auto!interface Serial0/0 bandwidth 1544 no ip address shutdown!interface FastEthernet0/1 no ip address shutdown duplex auto speed auto!interface Serial0/1 bandwidth 1544 ip address 200.100.10.2 255.255.255.0 ip nat outside ip access-group 100 in!router rip version 2 passive-interface FastEthernet0/0 passive-interface FastEthernet0/1 network 200.100.0.0 network 192.168.100.0!ip nat inside source static 192.168.100.10 10.100.10.10 extendableip nat inside source static 192.168.100.11 10.100.10.11 extendableip classlessip http serverno ip http secure-server!access-list 100 deny ip host 200.100.20.10 any logaccess-list 100 deny ip host 200.100.0.10 any logaccess-list 100 permit ip any any…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 237 Toolwire Tutorial

    • 287 Words
    • 2 Pages

    Bent Brick has been the leader in selling brick, stone, and other masonry in the Atlanta area for more than 50 years. Of course, we are known throughout this area as being the primary seller of our special preformed curved brick. Our products are noted not only for their beauty, but also for their durability. We offer a 20-year guarantee on every product we sell.† We don't just sell the finest brick and stone, we also install it. We will come to your site and plan your project from start to finish. Let our expert designers and masons take care of every detail of your project. We know that these days both residential and commercial properties have both eyes on the budget, so we will work with you to create a package that meets not only your structural needs, but also your financial needs as well.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    5. When using SSH to remotely access a Cisco router, can you see the terminal password? why or why not?…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    12. What summary route includes the subnets 99.1.1.0, 99.1.2.0, and 99.1.3.0, mask 255.255.255.0 but does not include more prefixes than necessary?…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    Use the ifconfig command to verify your IP Address and Subnet Mask. Make a note of the interface (eth0 or eth1). Use the route command to determine the Default Gateway. Record this information in the table below:…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The very first thing you should need to do with your connection is to change the password and it was quite easy as you just need to login the router settings page and change the password that is impossible…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Incident Command System (ICS) was developed in 1970 in response to the California fires, which “resulted in 16 deaths, 700+ destroyed structures, more than 500,000 acres burned, and over $234 million in damage” (A working history of the incident command system , n.d.). In the 1970's California was preparing for fire season and a group of interagency from Southern California created Firefighting Resources of Southern California Organized for Potential Emergencies (FIRESCOPE). The FIRESCOPE developed two systems to respond to wildfires called, Multiagency Coordination System (MACS) and Incident Command System (ICS), these plans failed in being able to respond adequately to the wildfires, “command Posts and fire camps were established by multiple…

    • 138 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Through my experience I saw many examples of how Incident Command Systems functioned in small scale incidents. Each shift as part of the morning briefings a layout of responsibilities on a medical call was established to ensure efficient and effective treatment of the patient. However, there was a mutual aid call that I experienced where this structure of responsibilities was not present by the neighboring department. The call was for a full arrest and we were transporting. The situation that caused the issue was that all the individuals that were part of the initial response were paramedics. It was an engine company that was staffed with a firefighter paramedic, engineer, and captain; however each had their paramedic certification and participated…

    • 213 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SNC gave a well versed brief, maintaining eye contact and command presence with his FT. SNC had decided on an initial plan, communicated it to the FT and they acted on his command. Once they began executing, SNC lost any sense of command presence. SNC never passed any visual or vocal commands and not once did he look around at his FT members to assess their status. When the navigator took it upon himself to stop and recheck the azimuth, SNC did not pass any commands or set his FT into any kind of security posture. Once contact with the enemy took place, SNC did step back into the leadership role giving clear commands. There was a long pause in the rushing process so that SNC could reload, but this will only get better with additional…

    • 158 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    When John Chambers assumed the CEO position, he outlined some very specific objectives for Cisco’s future success. His plans included creating a one-stop shop for business networks by creating a comprehensive product line, to make acquisitions an efficient business process, to create industry-wide software standards for networking, and to choose the right strategic partners. All of these efforts would change the way companies and industries operated by creating an infrastructure of networked voice, data and video.…

    • 1866 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Syniverse Command Center (SCC) has reached out to Josh ( on call duty manger) to request at Detailed engineering drawing for the Syniverse to Bluegrass circuit. Syniverse would like the information before the 10 am call this morning. Furthermore, Syniverse would also like a plan of action for this circuit.…

    • 51 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Module 6 Cisco Commands

    • 228 Words
    • 1 Page

    Global command that sets the password that this router expects to use when authenticating the router with the listed hostname.…

    • 228 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cisco's Web Enablement

    • 467 Words
    • 2 Pages

    CEO John Chambers believed that “by providing the end-to-end network plumbing, we can change the way entire companies and industries operate.” How did Cisco’s IT web-enablement initiatives reinforce and demonstrate that belief? Explain your answer with examples.…

    • 467 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Diivine Command Theory

    • 350 Words
    • 2 Pages

    Some deontologists are moral absolutists, believing that certain actions are absolutely right or wrong, regardless of the intentions behind them as well as the consequences. Immanuel Kant, for example, argued that the only absolutely good thing is a good will, and so the single determining factor of whether an action is morally right is the will, or motive of the person doing it. If they are acting on a bad maxim, e.g. "I will lie", then their action is wrong, even if some good consequences come of it. Non-absolutist deontologists, such as W. D. Ross, hold that the consequences of an action such as lying may sometimes make lying the right thing to do. Jonathan Baron and Mark Spranca use the term "protected values" when referring to values governed by deontological rules.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays