Вы находитесь на странице: 1из 4

Final Cisco study Notes

Router commands
User EXEC Mode:

Enable: Enter privileged EXEC mode

Privileged EXEC Mode:

Copy running-conifg startup-conifg: ..................copy the active configuration to NVRAM


Copy startup-conifg running-conifg:................... copy the config in NVRAM to RAM
Erase startup-config:........................................... Erase the configuration located in NVRAM
Ping ip_address: .................................................ping to that IP
Traceroute ip_address: ......................................trace hops to that IP
Show interfaces: ................................................displays statistics for all interfaces on a device
Show clock: ........................................................show the time set on the router
Show version: .....................................................Display currently loaded IOS version,
hardware and device information
Show arp:........................................................... Display the arp table of the device
Show startup-config: .........................................display the saved configuration located in
NVRAM
Show running-config:........................................ display the contents of the currently running
configuration
Show ip interface:..............................................display IP statistics for interface (s) on a
router
Configure terminal:............................................enter terminal configuration mode

Terminal Configuration Mode

Hostname (insert name):..................................assign a host name to device


Enable password (inset password):...................set an unencrypted enable password
Enable secret (insert password):.......................set a strongly encrypted enable password
Service password-encryption:............................encrypt display of all passwords except secret
Banner motd # message # :...............................sets message-of-the-day banner
Line console 0: ..................................................enter console line configuration mode
Line vty 0 15:.....................................................enter virtual terminal (telnet) line
configuration mode
Interface (interface name):...............................enter interface configuration mode

Line Configuration Mode

Login:...............................................................enable password checking at login


Password (insert password)............................set line password

Interface Configuration Mode

Ip address (insert IP, netmask).......................set interface IP address and subnet mask.


Description (insert description).........................set interface description
Clock rate (value)...............................................set clock rate DCE device
No shutdown......................................................set interface to up
Shutdown............................................................administratively set interface to down

Other commands...

?..................................................................tells you what you are missing/options to


add.
Exit...........................................................goes back one mode
CTRL-Z......................................................back to EXEC mode
Do............................................................ is able to do commands on any level of
interface

Ping commands

-t...........................ping the specified host until stopped


-a...........................resolve address to host name
-n count................Number of echo requests to send
-L size....................send buffer size
-f...........................set dont fragment flag in packet
-i TTL.....................time to live
-v tos.....................type of service
-r count.................record route for count hops
-s count.................Timestamp for count hops
-j host-list..............loose source route along host-list
-k host-list.............strict source route along host list
-w timeout.............Timeout in milliseconds to wait for each reply
-R...........................use routing header to test reverse route also
-S srcaddr...............source address to use
-4............................force using ipv4
-6...........................force using ipv6

Netstat Commands

-a.....................displays all connections and listening ports


-b.....................displays the executable involved in creating each connection or listening port
-e.....................displays Ethernet statistics
-f......................displays fully qualified Domain Names FQDN for foreign addresses
-n.....................displays address and port no. In numerical form

-o.....................displays the owning process ID associated with each connection.


-p proto............shows connections for the protocol specified by proto.
-r........................ displays the routing table
-s.........................display pre-protocol statistics
-t..........................displays the current connection offload state
Interval................Redisplays selected statistics, pausing interval seconds between each
display.

Port Numbers

0-1023 is well known port no.


21= FTP
22= SSH
23= Telnet
25= SMTP
53=DNS
80= HTTP
110= POP3
443=HTTPS
69=TFTP
1024-49151= registered ports
49151-65535= dynamic ports (can be randomly used)

Ethernet frames
Fields included in an Ethernet frame are:

Preamble, 7 bytes and start delimiter, 1 byte: are used for synchronisation
Destination MAC address, 6 bytes
Source MAC address, 6 bytes
Lenght/Type field, 2 bytes
Data and pad field, 46-1500 bytes
Frame check sum, 4 bytes
Total is 1526 bytes

IP Packets
Fields included in an IPv4 header are:

IP source address: Contains 32-bit binary value, represents source IP


IP Destination address: contains 32-bit binary value, represent destination IP
Time-to-live: 8-bit Binary value that indicates the remaining life of the packet
Type of service: 8-Bit binary value that determines the priority of the packet

Protocol: 8-Bit binary value which indicates the data payload type that the packet is carrying.
Fragmentation offset: used by routers to reconstruct fragmented packets.

Вам также может понравиться