Cisco Commands Cheat Sheet
Cisco Commands Cheat Sheet
Cheat Sheet
Introduction
Cisco IOS is the backbone software that powers many of Cisco’s network devices. For professionals working with
these systems, knowing the right commands is crucial.
This article provides a Cisco commands cheat sheet, outlining the most common Cisco IOS commands for
configuring, securing and troubleshooting Cisco network equipment. It includes the list of Cisco switch commands,
a Cisco router commands list and Cisco network commands. Being familiar with the basic Cisco console commands
will aid network administrators in managing Cisco devices efficiently and in line with best practices.
Command Modes
Cisco IOS has several command modes that fall into further categories such as operational and configuration.
Each mode serves a slightly unique purpose. For instance, Setup Mode provides the user with an interactive menu
guide the user to create an initial configuration file for the device.
▪ User exec mode — This mode is the mode you land in when you first log onto a Cisco device. It provides
limited access to commands and configuration settings. For instance, this mode enables you to view status
using certain show commands but does not enable you to view or edit configurations.
▪ Privileged exec mode — This mode provides access to all commands, enabling more detailed examination
and control of the device’s operation and configuration.
▪ Global Configuration mode: Global configuration commands apply to features that affect the device as
a whole. While Exec and Privileged Exec are read only modes, Global Configuration mode gives the user
writable access to modify the active configuration file. To use Global Configuration mode, you first need to
enter Privileged EXEC Mode and then execute the configure terminal command although numerous shortcuts
are accepted such as config t. Global Configuration mode can be further divided into the following command
modes, which permit you to configure different components:
Enable Moves a user from user exec mode into Privileged EXEC mode. Privileged exec
mode is indicated by the # symbol in the command prompt.
interface fastethernet/number Enters interface configuration mode for the specified fast ethernet interface
Basic Configuration Commands List
Command Description
hostname name Sets a host name to the current Cisco network device
copy from-location to-location Copies files from one file location to another
copy running-config startup-config Replaces the startup config with the active config when the Cisco network
device initializes
copy startup-config running-config Merges the startup config with the currently active config in RAM
ip address ip-address mask Assigns the specified IP address and subnet mask
show startup-config Displays the saved configuration stored in the device’s NVRAM, which will be
loaded when the device starts up
show running-config interface Displays the running configuration for the specified interface
interface slot/number
show ip interface [type number] Displays the status of a network interface as well as a detailed listing of its IP
configurations and related characteristics.
ip name-server serverip-1 serverip-2 Sets the IP address of or more DNS servers that the device can use to resolve
hostnames to IP addresses.
Troubleshooting Cisco Commands List
Command Description
speed {10 | 100 | 1000 | auto} Either configures the transmission speed of a network interface to the
specified value in megabits per second (Mbps), or enables automatic speed
detection for the port
cdp run Enables or disables Cisco Discovery Protocol (CDP) for the device
no cdp run
show cdp neighbors[detail] Lists summary (or detailed) information about each neighbor connected to
the device
show interfaces Displays detailed information about interface status, settings and counters
show interfaces switchport Displays many configuration settings and current operational status, including
VLAN trunking details
show interfaces trunk Lists information about the currently operational trunks and the VLANs
supported by those trunks
show vlan Lists each VLAN and all interfaces assigned to that VLAN but does not include
show vlan brief trunks
show vtp status Lists the current VLAN Trunk Protocol (VTP) status, including the current mode
Routing and VLAN Commands
Command Description
show ip route Displays the current state of the IP routing of all known routes that are either
statically configured or learned dynamically through a routing protocol
router rip Enables a Routing Information Protocol (RIP) routing process, which places
you in router configuration mode
version 2 Configures the software to receive and send only RIP version 2 packets
passive-interface interface Sets the specified interface to passive RIP mode, which means RIP routing
updates are accepted by, but not sent out of, the interface
show ip rip database Displays the contents of the RIP routing database
ip nat [inside | outside] Configure Network Address Translation (NAT), which allows private IP
addresses on a local network to be translated into public IP addresses before
being sent over the internet
ip nat inside source {list{access-list- Establishes dynamic source translation. Use of the “list” keyword enables you
number | access-list-name}} interface to use an ACL to identify the traffic that will be subject to NAT. The “overload”
type number[overload] option enables the router to use one global address for many local addresses.
ip nat inside source static local-ip Establishes a static translation between an inside local address and an inside
global-ip global address
vlan Creates a VLAN and enters VLAN configuration mode for further definitions
Command Description
switchport access vlan Sets the VLAN that the interface belongs to
switchport access Configures a specific Ethernet port on a switch to operate in access mode to
accommodate an end device such as a computer, server or printer. The port
must then be assigned to a single VLAN.
switchport mode { access | trunk } Configures the VLAN membership mode of a port.
▪ The access port is set to access unconditionally and operates as a non-
trunking, single VLAN interface that sends and receives non-encapsulated
(non-tagged) frames. An access port can be assigned to only one VLAN.
▪ The trunk port sends and receives encapsulated (tagged) frames that
identify the VLAN of origination. A trunk is a point-to-point link between
two switches or between a switch and a router.
switchport trunk {encapsulation { Sets the trunk characteristics when the interface is in trunking mode. In this mode,
dot1q } the switch supports simultaneous tagged and untagged traffic on a port.
encapsulation dot1q vlan-id Defines the matching criteria to map 802.1Q frames ingress on an interface to
the appropriate service instance
show spanning-tree Provides detailed information about the Spanning Tree protocol for all VLANs
DHCP Commands
Command Description
ip dhcp pool name Used to configure a DHCP address pool on a DHCP server and enter DHCP
pool configuration mode
network network-number [mask] Configures the network number and mask for a DHCP address pool primary
or secondary subnet on a Cisco IOS DHCP server
ip dhcp excluded-address ip-address Specifies IP addresses that a DHCP server should not assign to DHCP clients
[last-ip-address]
default-router address[address2 ... Specifies the default routers for a DHCP client
address8]
DHCP Commands
Command Description
Password pass-value Lists the password that is required if the login command (with no other
parameters) is configured
username name password pass- Defines one of possibly multiple user names and associated passwords used
value for user authentication. It is used when the login local line configuration
command has been used.
enable password pass-value Defines the password required when using the enable command
enable secret pass-value Sets the password required for any user to enter enable mode
service password-encryption Directs the Cisco IOS software to encrypt the passwords, CHAP secrets and
similar data saved in its configuration file
crypto key generate rsa Creates and stores (in a hidden location in flash memory) the keys that are
required by SSH
transport input {telnet | ssh} Defines whether Telnet or SSH access is allowed into this switch. Both values
can be specified in a single command to allow both Telnet and SSH access
(default settings).
access-class Restricts incoming and outgoing connections between a particular VTY (into a
basic Cisco device) and the addresses in an access list
permit source [source-wildcard] Allows a packet to pass a named IP ACL. To remove a permit condition from
an ACL, use the “no” form of this command.
deny source [source-wildcard] Used to set conditions in a named IP ACL that will deny packets. To remove a
deny condition from an ACL, use the “no” form of this command.
ntp peer <ip-address> Configures the software clock to synchronize a peer or to be synchronized by
a peer
switchport port-security maximum Sets the maximum number of secure MAC addresses on the port
maximum
switchport port-security mac-address Adds a MAC address to the list of secure MAC addresses. The “sticky” option
{mac-addr | {sticky [mac-addr]}} configures the MAC addresses as sticky on the interface.
show port security [interface Sets the action to be taken when a security violation is detected
interface-id]
show port security [interface Displays information about security options configured on the interface
interface-id]
Monitoring and Logging Commands
Command Description
logging ip address Configures the IP address of the host that will receive the system logging
(syslog) messages
logging trap level Used to limit messages that are logged to the syslog servers based on severity.
Specify the number or name of the desired severity level at which messages
should be logged.
show logging Displays the state of system logging (syslog) and the contents of the standard
system logging buffer
terminal monitor Sends a copy of all syslog messages, including debug messages, to the Telnet
or SSH user who issues this command
Simplify Monitoring
of Cisco Devices
with Netwrix Auditor for Network Devices
Next Steps
Free Trial — Set up Netwrix software in your own test environment: netwrix.com/freetrial