0% found this document useful (0 votes)
238 views3 pages

(CCNA) Cisco Commands Cheat Sheet #4 - Boubakr Tech

This document provides a summary of Cisco commands for configuring and working with access control lists (ACLs) and DHCP services. It outlines how to create standard and extended ACLs using numbers or names to permit or deny traffic. It also details how to configure a DHCP server including defining pools, scopes, and options. The summary concludes with commands for verifying and troubleshooting ACL configurations and DHCP operation.

Uploaded by

José Pedro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views3 pages

(CCNA) Cisco Commands Cheat Sheet #4 - Boubakr Tech

This document provides a summary of Cisco commands for configuring and working with access control lists (ACLs) and DHCP services. It outlines how to create standard and extended ACLs using numbers or names to permit or deny traffic. It also details how to configure a DHCP server including defining pools, scopes, and options. The summary concludes with commands for verifying and troubleshooting ACL configurations and DHCP operation.

Uploaded by

José Pedro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

[CCNA] Cisco Commands Cheat Sheet #4 | Boubakr Tech

http://boubakr92.wordpress.com/2013/09/26/ccna-cheat-sheet-part-4/

[CCNA] Cisco Commands Cheat Sheet #4


About these ads (h p://en.wordpress.com/about-these-ads/)

Access Control Lists:


Standard ACL: 1 99 and 1300 1999
Use a remark to describe the ACL (Optional): R1(config)# access-list 1 remark ACL TO DENY ACCESS FROM SALES VLAN Create the ACL, keeping the following in mind: ACL uses rst-match logic. There is an implicit deny anyat the end of the ACL. R1(config)# access-list 2 deny 192.168.1.77 R1(config)# access-list 2 deny 192.168.1.64 0.0.0.31 R1(config)# access-list 2 permit 10.1.0.0 0.0.255.255 R1(config)# access-list 2 deny 10.0.0.0 0.255.255.255 R1(config)# access-list 2 permit any Enable the ACL on the chosen router interface in the correct direction (in or out): R1(config-if)# ip access-group 2 out Using standard ACL to limit telnet and SSH access to a router: Create the ACL that denes the permi ed telnet clients: R1(config)# access-list 99 remark ALLOWED TELNET CLIENTS R1(config)# access-list 99 permit 192.168.1.128 0.0.0.15 Apply the ACL inbound the vty lines R1(config)# line vty 0 4 R1(config-line)# access-class 99 in

Extended ACL: 100 199 and 2000 2699


Extended ACL should be placed as close as possible to the source of the packet. Extended ACL matches packets based on source & des.IP addresses, protocol, source & des. Port numbers andother criteria as well

1 de 3

06/02/2014 15:18

[CCNA] Cisco Commands Cheat Sheet #4 | Boubakr Tech

http://boubakr92.wordpress.com/2013/09/26/ccna-cheat-sheet-part-4/

R1(config)# access-list 101 remark MY_ACCESS_LIST R1(config)# access-list 101 deny iphost 10.1.1.1 host 10.2.2.2 R1(config)# access-list 101 deny tcp 10.1.1.0 0.0.0.255 any eq 23 R1(config)# access-list 101 deny icmp 10.1.1.1 0.0.0.0 any R1(config)# access-list 101 deny tcphost 10.1.1.0 host 10.0.0.1 eq 80 R1(config)# access-list 101 deny udphost 10.1.1.7 eq 53 any R1(config)# access-list 101 permit ip any any R1(config)# interface fastEthernet 0/0 R1(config-if)# ip access-group 101 in

Named ACL:
Named ACLs use names to identify ACLs rather than numbers, and commands that permit or deny trac are wri en in a sub mode called named ACL mode (nacl). Named ACL enables the editing of the ACL (deleting or inserting statements) by sequencing statements of the ACL. Named standard ACL: R1(config)# ip access-list standard MY_STANDARD_ACL R1(config-std-nacl)# permit 10.1.1.0 0.0.0.255 R1(config-std-nacl)# deny 10.2.2.2 R1(config-std-nacl)# permit any R1(config)# interface fastEthernet 0/1 R1(config-if)# ip access-group MY_STANDARD_ACL out Named extended ACL: R1(config)# ip access-list extended MY_EXTENDED_ACL R1(config-ext-nacl)# deny icmp 10.1.1.1 0.0.0.0 any R1(config-ext-nacl)# deny tcphost 10.1.1.0 host 10.0.0.1 eq 80 R1(config-ext-nacl)# permit ip any any R1(config)# interface fastEthernet 0/1 R1(config-if)# ip access-group MY_EXTENDED_ACL in Editing ACL using sequence numbers: R1(config)# ip access-list extended MY_EXTENDED_ACL R1(config-ext-nacl)# no 20 ! Deletes the statement of sequence number 20 R1(config)# ip access-list standard 99 R1(config-std-nacl)# 5 deny 1.1.1.1 ! inserts a statement with sequence 5

Verifying ACLs:
Shows all ACLs congured on a router with counters at the end of each statement: R1# show access-lists ! OR R1# show ip access-list Shows only the specied ACL: R1# show ip access-list 101

2 de 3

06/02/2014 15:18

[CCNA] Cisco Commands Cheat Sheet #4 | Boubakr Tech

http://boubakr92.wordpress.com/2013/09/26/ccna-cheat-sheet-part-4/

Includes a reference to the ACLs enabled on that interface either in or out: R1# show ip interface f0/0

DHCP Server
Dene a DHCP pool and give it a name: R1(config)# ip dhcp pool MY_POOL Dene network and mask to use in this pool and the default gateway: R1(dhcp-config)# network 192.168.1.0 255.255.255.0 R1(dhcp-config)# default-router 192.168.1.1 Dene one or more DNS server (OPTIONAL): R1(dhcp-config)# dns-server 213.131.65.20 8.8.8.8 Conne the lease time (OPTIONAL): R1(dhcp-config)lease 2 ! Days Dene one or more scopes of excluded (reserved) addresses (OPTIONAL): R1(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.100 R1(config)# ip dhcp excluded-address 192.168.1.200 192.168.1.254

DHCP Verification and Troubleshooting:


Shows the status of the specied pool and the leased addresses from that pool: R1# show ip dhcp pool POOL_1 Shows all the leased ip addresses from all congured DHCP pools: R1# show ip dhcp binding Shows any conicts that occurred: R1# show ip dhcp conflict Enjoy !

3 de 3

06/02/2014 15:18

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy