Commands Flashcards

1
Q

Get into Privileged Executive Mode

A

enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Get into Global Configuration Mode

A

configuration terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Get into Interface Configuration Mode

A

interface s0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Get into Line Configuration Mode

A

line console 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Get into Router Configuration Mode

A

router ospf 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Save configurations on the device

A

copy running-config startup-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Configure privileged executive mode password

A

enable secret cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Configure telnet

A

line vty 0 15
login
password cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Show information of nearby network devices

A

show cdp neighbors detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Set the hostname

A

hostname R1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Set default gateway

A

ip default-gateway 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Configure VLAN interface

A

int vlan 1

ip address 192.168.1.200 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Set speed and duplex on an interface

A

speed 100

duplex full

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encrypt passwords

A

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Configure ssh

A
username jordan secret cisco
ip domain-name lab.local
crypto key generate rsa
line vty 0 15
transport input ssh
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

enable port security

A

switchport port security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Allow only one device at a time to access a port

A

switchport port-security max 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allow only one unique device to access a port.

A

switchport port-security mac-address FFFFFFFFFFFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Change a port to an access port and a trunk port

A

switchport mode access

switchport mode trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Display the security configurations of f0/0

A

show port-security interface f0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Configure a static route

A

ip route 192.168.2.0 255.255.255.0 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Configure a default route

A

ip route 0.0.0.0 0.0.0.0 192.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Configure a default route for OSPF

A

default-information originate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Configure router on a stick

A
interface f0/0
no ip address
interface f0/0.1
encapsulation dot1q 1 native
ip address 10.0.0.1 255.255.255.0
int f0/0.10
encapsulation dot1q 10
ip address 10.10.10.1 255.255.255.0
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Change the OSPF cost reference to 1GB
router ospf 1 | auto-cast reference-bandwidth 1000
26
Enable OSPFv2 and advertise a network
router ospf 1 | network 192.168.1.1 0.0.0.0 area 0
27
Change the priority number of f0/0 for DR/BDR to 5
int f0/0 | ip ospf priority 5
28
Change OSPFv2 cost of f0/0 to 20
int f0/0 | ip ospf cost 20
29
For OSPFv2, don't send hello packets to interface f0/0
router ospf 1 | passive-interface f0/0
30
Inject configured default routes into OSPFv2
router ospf 1 | default-information originate
31
Enable IPv6 routing and OSPFv3 and give the router an ID of 1.1.1.1
ipv6 unicast-routing | ipv6 router osrouter-id 1.1.1.1
32
Advertise f0/0 in OSPFv3
int f0/0 | ipv6 ospf 1 area 0
33
Display OSPFv2 and OSPFv3 area ID and DR/BDR info
show ip ospf interface | show ipv6 ospf interface
34
Display nearby router OSPFv2 and OSPFv3 info
show ip ospf neighbor | show ipv6 ospf neighbor
35
Display ipv4 and ipv6 routes
show ip route | show ipv6 route
36
Display ARP table
show mac address-table dynamic
37
Change OSPFv2 cost of f0/0 to 5
int f0/0 | ip ospf cost 5
38
Only send hello packets to f0/0 for OSPFv2
router ospf 1 passive-interface default no passive-interface f0/0
39
Create an access list that denies 10.0.0.1 from communicating with 10.0.1.1 in HTTP
access-list 100 deny tcp host 10.0.0.1 host 10.0.1.1 eq 80 | access-list 100 permit ip any any
40
Create an access list that denies 10.0.0.0 from echo requesting 11.0.0.0
access-list 100 deny icmp 10.0.0.0 0.255.255.255 11.0.0.0 0.255.255.255 echo access-list 100 permit ip any any
41
Run OSPFv3, add a router ID of 1.1.1.1 and advertise netowrk 192.168.1.0.
ipv6 router ospf 1 router-id 1.1.1.1 int f0/0 ipv6 ospf 1 area 0
42
Display OSPFv2 area ID and DR/BDR information
show ip ospf interface
43
Display OSPFv2 information of nearby routers
show ip ospf neighbor
44
Display OSPFv3 area ID and DR/BDR information
show ipv6 ospf interface
45
Display OSPFv3 information of nearby routers
show ipv6 ospf neighbor
46
Display ipv4 and ipv6 routes
show ip route | show ipv6 route
47
Display ARP table
show mac address-table dynamic
48
Create an access list that denies 10.0.0.1 and permits 10.0.0.0
access-list 1 deny 10.0.0.1 0.0.0.0 | access-list 1 permit 10.0.0.0 0.255.255.255
49
Apply an access list to interface g0/0 in-bound
int g0/0 | ip access-group 1 in
50
Create an access list that denies 10.0.0.1 from communicating with 10.0.1.1 in HTTP
access-list 100 deny tcp host 10.0.0.1 host 10.0.1.1 eq 80 | access-list 100 ip any any
51
Create an access list that denies 10.0.0.0 from echo requesting 11.0.0.0
access-list 100 deny icmp 10.0.0.0 0.255.255.255 11.0.0.0 0.255.255.255 echo access-list 100 permit ip any any
52
Allow only 10.0.0.50 to SSH or Telnet to the router
access-list 1 permit host 10.0.0.50 line vty 0 15 access-class 1 in
53
Deny 10.0.0.50 from sending http traffic to 11.0.0.11
``` ip access-list extended 100 deny tcp host 10.0.0.50 host 11.0.0.11 eq 80 permit any any int g0/0 ip access-group 100 in ```
54
Configure static NAT by setting 25.1.1.25 as the inside global IP for the inside private IP 192.168.1.2
``` ip nat inside source static 192.168.1.2 25.1.1.25 int g0/0 ip nat inside int g0/1 ip nat outside ```
55
Configure dynamic NAT by setting 25.1.1.25 - 30 as the inside global IP range for the inside private IP network 192.168.1.0
ip nat pool INSIDEPUBLIC 25.1.1.25 25.1.1.30 netmask 255.255.255.0 access-list 1 permit 192.168.1.0 0.0.0.255 ip nat inside source list 1 pool INSIDEGLOBAL int g0/0 ip nat inside int g0/1 ip nat outside
56
Configure PAT by setting 25.1.1.25 as the inside global IP range for the inside private IP network 192.168.1.0
access-list 1 permit 192.168.1.0 0.0.0.255 ip nat inside source list 1 interface g0/1 overload int g0/0 ip nat inside int g0/1 ip nat outside
57
Display NAT translation
show nat translations
58
Display general overview of NAT configuration
show nat statistics
59
Remove all nat translation translations
clear ip nat translation*
60
Configure 25.1.1.25 as the NTP server
ntp server 25.1.1.25 version 4
61
Display all NTP servers the router is configured to use.
show ntp associations
62
Confirm that the router is receiving info from the NTP server
show ntp status
63
Enable DHCP client
int g0/0 | ip address dhcp
64
Display which IP address have been leased to who
show ip dhcp binding
65
Display details of a pool of IP's used for DHCP
show ip dhcp pool POOLNAME
66
Confirm trunking is functioning
show interface trunk