0% found this document useful (0 votes)
329 views

Cisco Commands Cheat Sheet

The document provides a cheat sheet of basic commands for configuring, securing and troubleshooting Cisco network devices. It lists commands for configuration like enable, configure terminal, interface, hostname and commands for troubleshooting like ping, show interfaces, show ip route.

Uploaded by

redsa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
329 views

Cisco Commands Cheat Sheet

The document provides a cheat sheet of basic commands for configuring, securing and troubleshooting Cisco network devices. It lists commands for configuration like enable, configure terminal, interface, hostname and commands for troubleshooting like ping, show interfaces, show ip route.

Uploaded by

redsa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Cisco Commands Cheat Sheet

Almost all Cisco devices use Cisco IOS to operate and Cisco CLI to be managed. The basic CLI
commands for all of them are the same, which simplifies Cisco device management. Here is a
Cisco commands cheat sheet that describes the basic commands for configuring, securing and
troubleshooting Cisco network devices.

Basic Configuration Commands

Command Purpose

enable Logs you into enable mode, which is also


known as user exec mode or privileged mode

configure terminal Logs you into configuration mode

interface fastethernet/number Enters interface configuration mode for the


specified fast ethernet interface

reload An exec mode command that reboots a Cisco


switch or router

hostname name Sets a host name to the current Cisco network


device

copy from-location to-location An enable mode command that copies files


from one file location to another

copy running-config startup-config An enable mode command that saves the


active config, replacing the startup config
when a Cisco network device initializes

copy startup-config running-config An enable mode command that merges the


startup config with the currently active config
in RAM

write erase An enable mode command that deletes the


startup config
erase startup-config

ip address ip-address mask Assigns an IP address and a subnet mask

shutdown Used in interface configuration mode.


“Shutdown” shuts down the interface, while
no shutdown “no shutdown” brings up the interface.

ip default-gateway ip_address Sets the default gateway on a Cisco device

show running-config An enable mode command that displays the


current configuration

description name-string A config interface command to describe or


name an interface

show running-config interface interface An enable mode command to display the


slot/number running configuration for a specific interface

show ip interface [type number] Displays the usability status of interfaces that
are configured for IP

ip name-server serverip-1 serverip-2 A configure mode command that sets the IP


addresses of DNS servers

Troubleshooting Commands
ping {hostname | system-address} Used in enable mode to diagnose basic
[source source-address] network connectivity

speed {10 | 100 | 1000 | auto} An interface mode command that manually
sets the speed to the specified value or
negotiates it automatically

duplex {auto | full | half} An interface mode command that manually


sets duplex to half, full or auto

cdp run A configuration mode command that enables


or disables Cisco Discovery Protocol (CDP)
no cdp run for the device

show mac address-table Displays the MAC address table

show cdp Shows whether CDP is enabled globally

show cdp neighbors[detail] Lists summary information about each


neighbor connected to this device; the “detail”
option lists detailed information about each
neighbor

show interfaces Displays detailed information about interface


status, settings and counters

show interface status Displays the interface line status

show interfaces switchport Displays a large variety of configuration


settings and current operational status,
including VLAN trunking details.

show interfaces trunk Lists information about the currently


operational trunks and the VLANs supported
by those trunks

show vlan Lists each VLAN and all interfaces assigned to


that VLAN but does not include trunks
show vlan brief

show vtp status Lists the current VTP status, including the
current mode

Routing and VLAN Commands

ip routenetwork-number network-mask {ip- Sets a static route in the IP routing table


address | interface}

router rip Enables a Routing Information Protocol (RIP)


routing process, which places you in router
configuration mode

network ip-address In router configuration mode, associates a


network with a RIP routing process

version 2 In router configuration mode, configures the


software to receive and send only RIP version
2 packets

no auto-summary In router configuration mode, disables


automatic summarization

default-information originate In router configuration mode, generates a


default route into RIP

passive-interface interface In router configuration mode, sets only that


interface to passive RIP mode. In passive RIP
mode, RIP routing updates are accepted by,
but not sent out of, the specified interface.

show ip rip database Displays the contents of the RIP routing


database
ip nat [inside | outside] An interface configuration mode command to
designate that traffic originating from or
destined for the interface is subject to NAT

ip nat inside source {list{access-list- A configuration mode command to establish


number | access-list-name}} interface type dynamic source translation. Use of
number[overload] the “list” keyword enables you to use an ACL
to identify the traffic that will be subject to
NAT. The “overload” option enables the
router to use one global address for many local
addresses.

ip nat inside source static local-ip global-ip A configuration mode command to establish a
static translation between an inside local
address and an inside global address

vlan Creates a VLAN and enters VLAN


configuration mode for further definitions

switchport access vlan Sets the VLAN that the interface belongs to.

switchport trunk encapsulation dot1q Specifies 802.1Q encapsulation on the trunk


link.

switchport access Assigns this port to a VLAN

vlan vlan-id [name vlan-name] Configures a specific VLAN name (1 to 32


characters)

switchport mode { access | trunk } Configures the VLAN membership mode of a


port. The access port is set to access
unconditionally and operates as a non-
trunking, single VLAN interface that sends
and receives non-encapsulated (non-tagged)
frames. An access port can be assigned to only
one VLAN.
The trunk port sends and receives
encapsulated (tagged) frames that identify the
VLAN of origination. A trunk is a point-to-
point link between two switches or between a
switch and a router.

switchport trunk {encapsulation { dot1q } Sets the trunk characteristics when the
interface is in trunking mode. In this mode, the
switch supports simultaneous tagged and
untagged traffic on a port.

encapsulation dot1q vlan-id A configuration mode command that defines


the matching criteria to map 802.1Q frames
ingress on an interface to the appropriate
service instance

DHCP Commands

ip address dhcp A configuration mode command to acquire an


IP address on an interface via DHCP

ip dhcp pool name A configuration mode command to configure a


DHCP address pool on a DHCP server and
enter DHCP pool configuration mode

domain-name domain Used in DHCP pool configuration mode to


specify the domain name for a DHCP client

network network-number [mask] Used in DHCP pool configuration mode to


configure the network number and mask for a
DHCP address pool primary or secondary
subnet on a Cisco IOS DHCP server

ip dhcp excluded-address ip-address [last- A configuration mode command to specify IP


ip-address] addresses that a DHCP server should not
assign to DHCP clients

ip helper-address address An interface configuration mode command to


enable forwarding of UDP broadcasts,
including BOOTP, received on an interface

default-router address[address2 ... Used in DHCP pool configuration mode to


address8] specify the default router list for a DHCP
client

Security Commands

passwordpass-value Lists the password that is required if


the login command (with no other parameters)
is configured

username name password pass-value A global command that defines one of possibly
multiple user names and associated passwords
used for user authentication. It is used when
the login local line configuration command has
been used.

enable password pass-value A configuration mode command that defines


the password required when using
the enable command

enable secretpass-value A configuration mode command that sets this


Cisco device password that is required for any
user to enter enable mode

service password-encryption A configuration mode command that directs


the Cisco IOS software to encrypt the
passwords, CHAP secrets, and similar data
saved in its configuration file

ip domain-name name Configures a DNS domain name

crypto key generate rsa A configuration mode command that creates


and stores (in a hidden location in flash
memory) the keys that are required by SSH
transport input {telnet | ssh} Used in vty line configuration mode, defines
whether Telnet or SSH access is allowed into
this switch. Both values can be specified in a
single command to allow both Telnet and SSH
access (default settings).

access-list access-list-number {deny | A configuration mode command that defines a


permit} source [source-wildcard] [log] standard IP access list

access-class Restricts incoming and outgoing connections


between a particular vty (into a basic Cisco
device) and the addresses in an access list

ip access-list {standard | extended} {access- A configuration mode command that defines


list-name | access-list-number} an IP access list by name or number

permit source [source-wildcard] Used in ACL configuration mode to set


conditions to allow a packet to pass a named
IP ACL. To remove a permit condition from
an ACL, use the “no” form of this command.

deny source [source-wildcard] Used in ACL configuration mode to set


conditions in a named IP ACL that will deny
packets. To remove a deny condition from an
ACL, use the “no” form of this command.

ntp peer <ip-address> Used in global configuration mode to


configure the software clock to synchronize a
peer or to be synchronized by a peer

switchport port-security Used in interface configuration mode to enable


port security on the interface

switchport port-security Used in interface configuration mode to set the


maximum maximum maximum number of secure MAC addresses
on the port

switchport port-security mac- Used in interface configuration mode to add a


address {mac-addr | {sticky [mac-addr]}} MAC address to the list of secure MAC
addresses. The “sticky” option configures the
MAC addresses as sticky on the interface.

switchport port-security Used in interface configuration mode to set the


violation {shutdown | restrict | protect} action to be taken when a security violation is
detected

show port security [interface interface-id] Displays information about security options
configured on the interface

Monitoring and Logging Commands

logging ip address Configures the IP address of the host that will


receive the system logging (syslog) messages

logging trap level Used in configuration mode to limit messages


that are logged to the syslog servers based on
severity. Specify the number or name of the
desired severity level at which messages
should be logged.

show logging Enable mode command that displays the state


of system logging (syslog) and the contents of
the standard system logging buffer.

terminal monitor An enable mode command that tells Cisco IOS


to send a copy of all syslog messages,
including debug messages, to the Telnet or
SSH user who issues this command
Previous Best Practice
Password Policy Best Practices for Strong Security in AD

Next Best Practice


SQL Server Hardening Best Practices

Related best practices


User Termination Best PracticesPrivileged Access Management Best PracticesNetwork Security
Best Practices
Solutions

 Data Access Governance


 Ransomware Protection
 Privileged Access Management
 Active Directory Security
 Data Governance
 Data Security Platform
 Audit and Compliance
 eDiscovery
 Records Management
Freeware

 Top 7 Free Tools


 Account Lockout Examiner
 Netwrix Auditor Free Community Edition
 All Free Tools
 Add-on Store

Support

 Renew Maintenance
 Submit a Ticket
 Online Documentation
 Customer Portal
 Supported Versions

Company

 About Us
 Careers
 Management Team
 Customers
 Analyst Coverage
 News
 Events
 Contact Us

© 2023 Netwrix Corporation


Privacy Policy EU Privacy Policy EULA Modern Slavery Statement
Corporate Headquarters: 6160 Warren Parkway, Suite 100, Frisco, TX, US 75034
Phone: 1-949-407-5125 | Toll-free: 888-638-9749

Go Up ›

You might also like