CCNA Commands
CCNA Commands
IOS Commands:
Privileged Mode
Setting Passwords
Configuring the Router
General
Processes
CDP
Miscellaneous
IP
IPX
Routing Protocols:
RIP
IGRP
Access Lists
WAN Configurations
PPP
Frame-Relay
Keyboard Shortcuts
Notes:
Static and Dynamic Routing
Distance-Vector and Link-State
Routing
Interior and Exterior Routing
Protocols
Problems with Routing Protocols
Encapsulation Types
WAN Service Providers
WAN Devices
ISDN
Classful and Classless Protocols
Administrative Distances for IP
Routes
Switching Terminology
Access Lists
Troubleshooting Tools
Accessing Router with Terminal
Emulation
Router Startup Sequence
Miscellaneous Notes
IOS Commands
Privileged Mode
enable - get to privileged mode
disable - get to user mode
enable password <password_here> - sets privileged mode password
enable secret <password_here> - sets encrypted privileged mode password
Setting Passwords
enable secret <password_here> - set encrypted password for privileged access
enable password <password_here> - set password for privileged access (used when there is no enable
secret and when using older software)
Set password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password <password_here>
Set password for virtual terminal (telnet) access (password must be set to access router through
telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password <password_here>
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password <password_here>
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry <cdp_neighbor_here> - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP
holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface
Miscellaneous Commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)
IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0
Other IP Commands:
sh ip route - view ip routing table
ip route <remote_network> <mask> <default_gateway>
[administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 <gateway_of_last_resort> - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized
subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an
interface
sh ip protocol
IPX Commands
Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A
Other Commands:
sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets
Routing Protocols
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists (see notes below for details)
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which
int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out
Notes
Static and Dynamic Routing
Static Routing - manually assigned by the Admin user entering the routes (Routed
Protocols - IP, IPX and AppleTalk)
Dynamic Routing - generated/determined by a Routing Protocol (Routing Protocols RIP I, RIP II, IGRP, EIGRP, OSPF, NLSP, RTMP)
Dynamic
1) With Dynamic Routing, routers pass information between each other so that routing
tables are regularly maintained.
2) The routers then determine the correct paths packets should take to reach their
destinations.
3) Information is passed only between routers.
4) A routing domain is called an Autonomous System, as it is a portion of the
Internetwork under common admin authority.
5) Consists of routers that share information over the same protocol. Can be split into
routing areas.
Routing Protocols
I) Interior (within an autonomous system - AS - group of routers under the same
administrative authority)
a) Distance Vector - understands the direction and distance to any network
connection on the internetwork. Knows how
many hops (the metric) to get there. All routers w/in the internetwork listen for
messages from other routers, which are sent
every 30 to 90 seconds. They pass their entire routing tables. Uses hop count for
measurement. 1) Used in smaller networks
that are have fewer than 100 routers. 2) Easy to configure and use. 3) As routers
increase in number, you need to consider
CPU utilization, convergence time, and bandwidth utilization. 4) Convergence is due
to routing updates at set intervals. 5) When
a router recognizes a change it updates the routing table and sends the whole table
to all of its neighbors.
1) RIP - 15 hop count max
2) IGRP - 255 hop count max, uses reliability factor (255 optimal), and
bandwidth
3) RTMP
b) Link State - understands the entire network, and does not use secondhand
information. Routers exchange LSP?s (hello
packets). Each router builds a topographical view of the network, then uses SPF
(shortest path first) algorithm to determine the
best route. Changes in topology can be sent out immediately, so convergence can be
quicker. Uses Bandwidth, congestion for measurement; Dijkstra's algorithm;
1) Maintains Topology Database. 2) Routers have formal neighbor relationship. 3)
Exchanges LSA (Link State Advertisement) or
hello packets with directly connected interfaces. 4) These are exchanged at short
intervals (typically 10 sec). 5) Only new info is
exchanged. 6) Scales well, however link?state protocols are more complex. 7)
Requires more processing power, memory, and bandwidth.
1) OSPF - decisions based on cost of route (metric limit of 65,535)
2) EIGRP - hybrid protocol (both Distance-Vector and Link State), Cisco
proprietary
3) NLSP
4) IS-IS
II) Exterior
1) EGP (Exterior Gateway Protocol)
2) BGP (Border Gateway Protocol)
Routing Protocols used for each Routed Protocol
IP - RIP, IGRP, OSPF, IS-IS, EIGRP
IPX - IPX RIP, NLSP, EIGRP
AppleTalk - RTMP, AURP, EIGRP
Problems with Routing Protocols
1) Routing Loops - occur when routing tables are not updated fast enough when one
of the networks becomes unreachable. Due to the slow convergence (updates of routing
table between all routers), some routers will end up with incorrect routing table and will
broadcast that routing table to other routers. This incorrect routing tables will cause
packets to travel repeatedly in circles.
2) Counting to infinity - occurs when packets end up in a routing loop; hop count
increases with every pass through a router on the network
Solutions to Problems with Routing Protocols
1) Define the maximum number of hops - When the number of hops reaches this
predefined value, the distance is considered infinite, thus the network is considered
unreachable. This does stop routing loops, but only limit the time that packet can travel
inside the loop.
2) Split horizon - The packets can not be sent back to the same interface that they
originally came from. During the updates, one router does not send updates to the
router that it received the information from.
3) Route poisoning - The router sets the cost/distance of routes that are unreachable
to infinity. Used with hold-down timers
4) Triggered updates - The router sends updates of the routing table as soon as it
detects changes in the network. Does not wait for the prescribed time to expire.
5) Hold-Downs - After the router detects unreachable network, the routers waits for a
specified time before announcing that a network is unreachable. The router will also
wait for a period of time before it updates its routing table after it detects that another
router came online (Router keeps an entry for the network possibly down state, allowing
time for other routers to re-compute for this topology change). Hold-downs can only
partially prevent counting to infinity problem. Prevents routes from changing too rapidly
in order to determine if a link has really failed, or is back up
Encapsulation Types
Encapsulation
802.2
802.3
sap
novell-ether
snap
Administrative
Distance
Directly
connected
interface
Static route
using
connected
interface
Static route
using IP
address
EIGRP
summary
route
External
BGP route
20
Internal
90
EIGRP route
IGRP route
100
OSPF route
110
IS-IS route
115
RIP route
120
EGP route
140
External
170
EIGRP route
Internal BGP
200
route
Route of
unknown
origin
255
Switching Terminology
Store-and-Forward ? copies entire frame into buffer, checks for CRC errors before
forwarding. Higher latency.
Cut-Through ? reads only the destination address into buffer, and forwards
immediately; Low latency; "wire-speed"
Fragment free ? modified form of cut-through; switch will read into the first 64 bytes
before forwarding the frame. Collisions will usually occur within the first 64 bytes.
(default for 1900 series).
Access Lists
1-99
100-199
200-299
300-399
600-699
700-799
800-899
900-999
Standard
IP
Source IP
address field in
the packet's IP
header
Source IP or
Destination IP,
or TCP or UDP
Extended
Source or
IP
Destination
Ports, or
Protocol
Standard
IPX
Packets sent by
clients and
servers, and
SAP updates
sent by servers
and routers
Wildcard Masks
Additional Notes
To put simply,
when the IP is
broken down to
binary, the 1's
allow everything
and the 0's must
match exactly.
Configured as a
-1 means any and all network
hexadecimal
number instead of numbers ( works like ANY)
binary
Match multiple
The most practical use of the
networks with one protocol type is for NetBIOS
statement, again
in hexadecimal
11
Socket, or SAP
Sent and
received SAP
traffic
SAP
N/A
Troubleshooting Tools:
Ping Results
!
,
success
timeout
destination
unreachable
unknown
packet type
&
TTL exceeded
Traceroute Results
!H
P
network unreachable
port unreachable
timeout
your distribution).
Miscellaneous Notes
Multiple Loop Problems ? complex topology can cause multiple loops to occur. Layer
2 has no mechanism to stop the loop. This is the main reason for Spanning ? Tree
Protocol.
Spanning-Tree Protocol (STP) IEEE 802.1d. ? developed to prevent routing loops;
uses STA (Spanning-Tree Algorithm) to calculate a loop-free network topology; allows
redundant paths without suffering the effects of loops in the network
Virtual LAN?s (VLAN's) ? sets different ports on a switch to be part of different subnetworks. Some benefits: simplify moves, adds, changes; reduce administrative costs;
have better control of broadcasts; tighten security; and distribute load. Relocate the
server into a secured location.
HDLC (High-Level Data Link Control) - Link layer protocol for Serial links. Cisco
Default. Supports the following modes: Normal Response Mode ? as per Secondary
under SDLC; Asynchronous Response Mode allows secondary to communicate without
permission; Asynchronous Balanced mode combines the two stations. Has lower
overhead than LAPB but less error checking.
Modular Switch/VIP Syntax
type slot/port (example: e 2/1)
type slot/port-adapter/port (example: e 2/0/1)