- Specify the Host name.
Router(config)#hostname <host name>
- Define a default domain name.
Router(config)#ip domain-name <Domain Name>
- Generate RSA key pairs.
Router(config)#crypto key generate rsa
- Configure SSH-RSA keys for user and server authentication.
Router(config)#ip ssh pubkey-chain
- Configure the SSH username.
Router(conf-ssh-pubkey)#username <user name>
- Specify the RSA public key of the remote peer.
Router(conf-ssh-pubkey-user)#key-string
- Specify the SSH key type and version. (optional)
Router(conf-ssh-pubkey-data)#key-hash ssh-rsa <key ID>
- Exit the current mode and return to privileged EXEC mode.
Router(conf-ssh-pubkey-data)#end
Showing posts with label Cisco. Show all posts
Showing posts with label Cisco. Show all posts
Thursday, June 21, 2012
SSH configuration
Tuesday, June 19, 2012
some troubleshooting skill related to CPU usage
process cpu threshold type total rising 80 interval 5
event syslog pattern "%SYS-1-CPURISINGTHRESHOLD"
action 1 cli command "enable"
action 1 cli command "<enable password>"
action 3 cli command "show clock | append flash:risecpu_info"
action 4 cli command "show proc cpu sorted | append flash:risecpu_info"
action 5 cli command "show proc cpu history | append flash:risecpu_info"
action 6 cli command "show interface | append flash:risecpu_info"
action 7 cli command "show int switching | append flash:risecpu_info"
action 8 cli command "show ip traffic | append flash:risecpu_info"
action 9 cli command "show ip cef switching stat feature | append flash:risecpu_info"
action 10 cli command "show debug | append flash:risecpu_info"
action 11 cli command "show align | append flash:risecpu_info"
Wednesday, February 16, 2011
route-map case
There is a someone wants to configure such scenario.
if the router see some port then use a gateway, the solution is using route-map and apply it to the interface.
conf t
route-map port80
match ip address matchport80
set ip next-hop xxx.xxx.xxx.xxx <----------- the gateway ip you set for next-hop for the http traffic
ip access-list extended matchport80
permit tcp any any eq www
interface FastEthernet0/0
ip policy route-map port80
if the router see some port then use a gateway, the solution is using route-map and apply it to the interface.
conf t
route-map port80
match ip address matchport80
set ip next-hop xxx.xxx.xxx.xxx <----------- the gateway ip you set for next-hop for the http traffic
ip access-list extended matchport80
permit tcp any any eq www
interface FastEthernet0/0
ip policy route-map port80
Tuesday, February 1, 2011
Cisco IP advance feature - sweep range of sizes
To check the destination ip mtu, please use the following method.
router#ping
Protocol [ip]:
Target IP address: 10.30.30.1
Repeat count [5]: 1
Datagram size [100]: 1
% A decimal number between 36 and 18024.
Datagram size [100]: 100
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface:
Type of service [0]:
Set DF bit in IP header? [no]: y
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]: 1470
Sweep max size [18024]: 1500
Sweep interval [1]:
Type escape sequence to abort.
Sending 31, [1470..1500]-byte ICMP Echos to 10.30.30.1, timeout is 2 seconds:
!!!!!..........................
Success rate is 16 percent (5/31), round-trip min/avg/max = 52/67/88 ms
router#ping
Protocol [ip]:
Target IP address: 10.30.30.1
Repeat count [5]: 1
Datagram size [100]: 1
% A decimal number between 36 and 18024.
Datagram size [100]: 100
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface:
Type of service [0]:
Set DF bit in IP header? [no]: y
Validate reply data? [no]:
Data pattern [0xABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]: 1470
Sweep max size [18024]: 1500
Sweep interval [1]:
Type escape sequence to abort.
Sending 31, [1470..1500]-byte ICMP Echos to 10.30.30.1, timeout is 2 seconds:
!!!!!..........................
Success rate is 16 percent (5/31), round-trip min/avg/max = 52/67/88 ms
Wednesday, December 8, 2010
some common cisco command
ip name-server xxx.xxx.xxx.xxx
sntp server hk.pool.ntp.org
clear interface virtual-access [number]
logging buffer 51200 debug
clock set 10:50:00 Oct 26 2006
clock timezone HKT 8
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
show process cpu
show process cpu sorted
sh ip cac flow – show current traffic of specified interface**
sh ip accounting – show accumulated traffic of specified interface**
clear ip flow stats
clear counter [interface]
show process memory
show process memory sorted
show memory allocating-process totals
show memory summary
show memory statistics
show memory dead
show memory free
show memory bigger
show buffers
show buffer old
router#config t
router(config)#int vlan1
router(config-if)#ip route-cache flow
OR
router(config-if)#ip accounting (may cause memory low/exhaust, remember to deactivate!)
router(config-if)#^Z
router#sh ip cac flow
Router#reload in 5
ip nat translation tcp-timeout 300
ip nat translation udp-timeout 200
ip nat translation max-entries list 2 100
access-list 2 permit 10.1.68.173
sntp server hk.pool.ntp.org
clear interface virtual-access [number]
logging buffer 51200 debug
clock set 10:50:00 Oct 26 2006
clock timezone HKT 8
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
show process cpu
show process cpu sorted
sh ip cac flow – show current traffic of specified interface**
sh ip accounting – show accumulated traffic of specified interface**
clear ip flow stats
clear counter [interface]
show process memory
show process memory sorted
show memory allocating-process totals
show memory summary
show memory statistics
show memory dead
show memory free
show memory bigger
show buffers
show buffer old
router#config t
router(config)#int vlan1
router(config-if)#ip route-cache flow
OR
router(config-if)#ip accounting (may cause memory low/exhaust, remember to deactivate!)
router(config-if)#^Z
router#sh ip cac flow
Router#reload in 5
ip nat translation tcp-timeout 300
ip nat translation udp-timeout 200
ip nat translation max-entries list 2 100
access-list 2 permit 10.1.68.173
Monday, December 6, 2010
CCIE R&S check list
- Implement Layer 2 Technologies
- Implement Spanning Tree Protocol (STP)
- 802.1d (STP) -
- Transparent Bridging
- Process: learning, flooding, filtering, forwarding, aging
- 802.1w (RSTP)
- 801.1s (MST)
- Portfast
- Loop guard
- Root guard
- Bridge protocol data unit (BPDU) guard
- BPDU Filters
- UplinkFast
- BackboneFast
- MSTP
- Storm control
- Unicast flooding
- Port roles, failure propagation, and loop guard operation
- Optimizing STP by STP Timers
- Selecting the Root Bridge for an MST Instance in an MST Environment
- Setting the Port Priority to Designate the Forwarding Ports
- Implement VLAN and VLAN Trunking Protocol (VTP)
- Configuration
- Creating, Deleting, and Editing VLANs
- VTP in Client/Server Mode
- VTP in Transparent Mode
- VTP Authentication
- VTP Pruning
- Controlling VLANs That Cross a Trunk
- Selecting the Root Bridge for VLANS in a PVST Environment
- Implement trunk and trunk protocols, EtherChannel, and load-balance
- Configuration
- Trunks Using an Industry Standard Encapsulation
- Trunks Using a Cisco Proprietary Encapsulation
- EtherChannel Using an Industry-Standard Protocol
- EtherChannel Using a Cisco Proprietary Protocol
- Disabling Protocols on the EtherChannel
- Load-Balancing Type on the EtherChannel
- Implement Ethernet technologies
- Speed and duplex
- Ethernet, FastEthernet, and Gigabit Ethernet
- PPP over Ethernet (PPPoE)
- Implement Switched Port Analyzer (SPAN), Remote Switched Port Analyzer (RSPAN), and flow control
- Implement Frame Relay
- Local Management Interface (LMI)
- Traffic shaping
- Full mesh
- Hub and spoke
- Discard eligiable (DE)
- Configuration:
- Frame Relay Multipoint Link on a Physical Interface Using Inverse ARP
- Frame Relay Multipoint Link on a Physical Interface Without Using Inverse ARP
- Frame Relay Multipoint Link on a Subinterface Using Inverse ARP
- Frame Relay Multipoint Link on a Subinterface Without Using Inverse ARP
- Frame Relay Point-to-Point Subinterfaces
- PVC with a Multipoint Interface on One Side and a Subinterface on the Other side
- Authentication on a Frame Relay Link Using PPP
- Implement High-Level Data Link Control (HDLC) and PPP
- Implement IPv4
- Implement IP version 4 (IPv4) addressing, subnetting, and variable-length subnet masking (VLSM)
- Implement IPv4 tunneling and Generic Routing Encapsulation (GRE)
- Implement IPv4 RIP version (RIPv2)
- Implement IPv4 Open Shortest Path First (OSPF)
- OSPF on a Broadcast Multicast Access Network (Ethernet)
- OSPF over a Frame Relay Multipoint Network by changing Network Types
- OSPF over a Frame Relay Multipoint Network by Using the neighbor Command
- OSPF over a Frame Relay Point-to-Point Network
- Virtual Links
- Standard OSPF areas
- Stub area
- Totally stubby area
- Not-so-stubby-area (NSSA)
- Totally NSSA
- Link-state advertisement (LSA) types
- Adjacency on a point-to-point and on a multi-access network
- OSPF graceful restart
- Implement IPv4 Enhanced Interior Gateway Routing Protocol (EIGRP)
- Basic EIGRP
- Passive Interfaces
- EIGRP Stub on Router and Switches
- EIGRP Update -Bandwidth Control
- Changing the Administrative Distance of EIGRP
- Best path
- Loop-free paths
- EIGRP operations when alternate loop-free paths are available, and when they are not available
- EIGRP queries
- Unequal-cost Load Balancing for EIGRP
- Manual summarization and auto summarization
- Implement IPv4 Border Gateway Protocol (BGP)
- IBGP
- IBGP Peering
- Advertising Routes in iBGP
- Next-Hop Attribute
- Route Reflectors
- Redundancy by Neighbor Relationships Based on Loopbacks
- EBGP
- EBGP Peering
- EBGP Peering Based on Loopbacks
- BGP Advanced Features
- Filtering Using ACLs
- Filtering Using Prefix Lists
- Filtering Using AS Path Filters
- Redistributing Connected Routes into BGP
- Redistributing Dynamic Routing Protocols into BGP
- BGP Aggregation
- BGP Aggregation with the Summary Only Parameter
- BGP Aggregation with Suppress Maps
- BGP Aggregation with Unsuppressed Maps
- BGP Best-Path Selection - Weight
- BGP Best-Path Selection - Local Preference
- BGP Best-Path Selection - MED
- BGP Communities - No-Export
- BGP Communities - No-Advertise
- BGP Confederation BGP Local AS
- Working with Private AS Numbers
- Route Dampening
- Conditional Advertising
- Peer Groups
- Implement policy routing
- Implement Performance Routing (PfR) and Cisco Optimized Edge Routing (OER)
- Implement filtering, route redistribution, summarization, synchronization, attributes, and other advanced features.
- Route Filtering for OSPF within the Area Using Distribute List with an ACL and Prefix
- Route Filtering for OSPF Between Areas
- Summarization of OSPF Routes between Areas
- Summarization of External routers Within OSPF
- Filtering with a Distribute List Using an ACL and Prefix Lists
- Using Advanced ACLs and a Prefix List for Filtering Routes
- Summarizing Routes with EIGRP
- Route Summarization for RIP
- Redistribution Between OSPF and EIGRP
- Redistribution Between RIP and EIGRP
- Redistribution Between RIP and OSPF
- Redistribution of Directly Connected Routes
- Redistribution of Staic Routes
- Redistribution with Filtering Using ACLs and Prefix Lists
- Redistribution with Filtering Using Route Tagging
- Implement IPv6
- Implement IP version (IPv6) addressing and different addressing types
- Implement IPv6 neighbour discovery
- Implement basic IPv6 functionality protocols
- Implement tunnelling techniques
- Implement RIPng
- Implement OSPF version 3 (OSPFv3)
- Implement EIGRP version 6 (EIGRPv6)
- Implement IPv6 on a Frame Relay Network - Multipoint
- Implement IPv6 on a Frame Relay Network - Point-toPoint
- Implement filtering with a Distribute List Using an ACL and Prefix Lists
- Implement Route Redistribution Between OSPFv3 and EIGRPv6
- Implement MPLS Layer 3 VPNs
- Implement Multiprotocol label Switching (MPLS)
- MPLS Unicast Routing Using LDP
- Controlling Label Distribution
- Implement Layer 3 virtual private networks (VPNs) on provider edge (PE), provider (P), and customer edge (CE) routers
- MPLS VPN Using Static Routing Between PE-CE
- MPLS VPN Using EIGRP as the PE-CE Routing Protocol
- MPLS VPN Using OSPF as the PE-CE Routing Protocol
- MPLS VPN Using EBGP as the PE-CE Routing Protocol
- Controlling Route Propagation Using the Route Target with Import and Export Maps
- Implement virtual routing and forwarding (VRF) and Multi-VRF Customer Edge (VRF-Lite)
- Implement IP Multicast
- Implement PIM Dense Mode
- PIM on an NMBA Network
- Implement Protocol Independent Multicast (PIM) sparse mode
- Static Rendezvous Point
- Multiple Statuc Rendezvous Points
- Auto Rendezvous Points
- PIM Sparse Mode with Multiple Rendezvous Points Using the Auto Rendezvous Point
- Bidirectional PIM
- Implement Multicast Source Discovery Protocol (MSDP)
- MSDP
- MSDP to an Anycast Rendezvous Point
- Implement interdomain multicast routing
- Implement PIM Auto-Rendezvous Point (Auto-RP), unicast rendezvous point (RP), and bootstrap router (BSR)
- Implement multicast tools, features, and source-specific multicast
- Multicast Rate Limiting
- IGMP Filtering on the Switch
- Use of teh Switch to Block Multicast Traffic
- Multicasting Through a GRE Tunnel
- Multicast Helper Address
- Implement IPv6 multicast
- IPv6 Multicast Routing Using PIM
- IPv6 Multicast Listener discovery (MLD) Protocol
- Implement Network Security
- Implement access lists
- Standard Access Lists
- Extended Access Lists
- Time-Based Access Lists
- Reflexive Access Lists
- Implement Unicast Reverse Path Forwarding (uRPF)
- Implemenet IP Source Guard
- Implement authentication, authorization, and accounting (AAA) (configuring AAA server is not required, only the client-side (IOS) is configured)
- Use of a Router to Authenticate Against a AAA Server Using TACACS+
- Use of a Router to Authenticate Against a AAA Server Using RADIUS
- Local Privilege Authorization
- Accounting to a AAA Server Using TACACS+
- Accounting to a AAA Server Using RADIUS
- Implement Control Plane Policing (CoPP)
- Implement Cisco IOS and Zone-Based Firewalls
- Basic Cisco IOS Firewall
- DoS Protection on a Cisco IOS Firewall
- Basic Zone-Based Firewall
- Zone-Based Firewall with Deep Packet Inspection
- Implement Cisco IOS Intrusion Prevention System (IPS)
- Implement Secure Shell (SSH)
- Implement 802.1x
- Implement NAT
- Dynamic NAT
- PAT
- Static NAT
- Policy-Based NAT
- Implement routing protocol authentication
- Routing Protocol Authentication for EIGRP
- Routing Protocol Authentication for OSPF-Area-Wide
- Routing Protocol Authentication for OSPF-Interface-Specific
- Routing Protocol Authentication for OSPF Virtual Links
- Routing Protocol Authentication for BGP
- Implement device access control
- Implement security features
- Storm Control
- Switch Port Security
- Dot1x Authentication
- Dot1x Authentication for VLAN Assignment
- VLAN Access Maps
- DHCP Snooping
- DAI
- IP Source Guard
- Private VLANs
- Configuring the TCP Intercept Feature
- Configuring Blocking of Fragment Attacks
- Configuring Switch Security Features
- Configuring Antispoofing Using ACL
- Configuring Antispoofing Using uRPF
- Implement Network Service
- Implement Hot Standby Router Protocol (HSRP)
- HSRP between two Routers
- Pre-empt for HSRP
- Authentication for HSRP
- Implement Gateway Load Balancing Protocol (GLBP)
- Implement Virtual Router Redundancy Protocol (VRRP)
- Implement Network Time Protocol (NTP)
- NTP Using the NTP Master and NTP Server Commands
- NTP Without Using the NTP Server
- NTP Using NTP Broadcast Commands
- Implement DHCP
- Configuring DHCP on a Cisco IOS Router
- Configuring DHCP on a Switch
- Using a Router and a Switch to Act as a DHCP Relay Agent (Helper Address)
- Implement Web Cache Communication Protocol (WCCP)
- Use of the Router to Generate an Exception Dump Using TFTP
- Use of the Router to Generate an Exception Dump Using FTP
- Use of the Router to Generate an Exception Dump Using RCP
- Broadcast Forwarding for Protocols
- Implement Quality of Service (QoS)
- Implement Modular QoS CLI (MQC)
- Policing
- Class-based weighted fair queuing (CBWFQ)
- Low latency queuing (LLQ)
- Shaping Using MQC
- Random Early Detection Using MQC
- WRED Using MQC
- Using Network-Based Aplication Recognition (NBAR) for QoS
- Discard Eligible Marking Using MQC
- modified deficit round robin (MDRR)
- Classification
- Marking Using DSCP
- Marking Using IP Precedence
- Marking Using COS
- Congestion Management and Congestion Avoidance
- Priority Queuing
- Custom Queuing
- Weighted Fair Queuing
- Weighted random early detection (WRED), and random early detection (RED)
- Resource Reservation Protocol (RSVP)
- Policing and Shaping
- CAR Using Rate Limiting Under the Interface
- Frame Relay Traffic Using Map Classes
- Discard Eligible List
- Link Efficiency Mechanisms
- Compression
- link fragmentation and interleaving (LFI) for Frame Relay
- Implement Layer 2 QoS: weighted round robin (WRR), shaped round robin (SRR), and policies
- Implement generic traffic shaping
- Implement Cisco AutoQoS
- Troubleshoot a Network
- Troubleshoot complex Layer 2 network issues
- Troubleshooting Catalyst Switch Network Issues
- Troubleshooting Frame Relay Network Issues
- Troubleshoot complex Layer 3 network issues
- Troubleshooting IP Addressing Network Issues
- Troubleshooting Routing Protocol Network Issues
- Troubleshooting Routing Protocol Loop Issues
- Troubleshoot a network in response to application problems
- Determinig Which Aspects of the Network to Troubleshoot to Determine Network
- Troubleshoot network services
- Troubleshooting Misconfigured NTP Setup
- Troubleshooting Misconfigured DHCP Setup
- Troubleshooting Misconfigured Telnet and SSH Setup
- Troubleshooting Misconfigured SNMP Setup
- Troubleshoot network security
- Troubleshooting Misconfigured ACLs
- Troubleshooting Misconfigured NAT
- Troubleshooting Misconfigured AAA Services
- Optimize the Network
- Logging In
- Logging into a Remote Syslog Server
- Logging into the Internal Buffer
- Implement IP Service Level Agreement SLA
- Implement Netflow
- Implement SPAN, RSPAN, and router IP traffic export (RITE)
- Implement Simple Network Managemnet Protocol (SNMP)
- SNMP Management on the Switch
- Use of a Router to Communicate to an SNMP Management Station
- User of a Router to Generate SNMP Traps
- Implement Cisco IOS Embedded Event Management (EEM)
- Implement Remote Monitoring (RMON)
- Use of a Router to Generate SNMP Traps Using RMON
- Accounting
- IP Accounting
- Implement FTP
- Implement TFTP
- Implement TFTP server on router
- Implement Secure Copy Protocol (SCP)
- Implement HTTP and HTTPS
- Implement Telnet
- Telnet and SSH management on the Switch
- Disabling telnet and the SSH Client on the Switch
- Controlling Inbound and Outbound Telnet on the Switch
- Misc
- Regular and Smart Macros
- Switch Banners
- UDLD
- Switch Virtual Interface (SVIs) for IP Routing
- Router on a Stick
- IP Phones to Connect to the Catalyst Swith
- Dot1q Tunneling
Subscribe to:
Posts (Atom)