Complete CCNA CLI Reference Guide - Expanded With Every Detail and Variation
Complete CCNA CLI Reference Guide - Expanded With Every Detail and Variation
1.1 Routers
Router Configuration Modes & Navigation:networkwalks+2
bash
Router> enable # User EXEC to
Privileged EXEC
Router# configure terminal # Enter global
configuration
Router(config)# exit # Back to privileged
EXEC
Router(config)# end # Direct to
privileged EXEC
Router# disable # Back to user EXEC
Router> ? # Show available
commands
Router# show ? # Show all show
commands
bash
# Basic Interface Configuration
Router(config)# interface GigabitEthernet0/0 # Enter interface
config
Router(config)# interface Gi0/0 # Abbreviated form
Router(config)# interface g0/0 # Short form
Router(config)# interface range gi0/0-1 # Configure multiple
interfaces
bash
# Configuration Verification
Router# show running-config # Current
configuration
Router# show startup-config # Saved configuration
Router# show running-config | section interface # Show only interface
config
Router# show running-config | include hostname # Show hostname line
only
Router# show running-config | exclude ! # Exclude comment
lines
# System Information
Router# show version # IOS version and
hardware
Router# show clock # Current time/date
Router# show users # Current users
Router# show history # Command history
Router# show processes # Running processes
Router# show memory # Memory usage
Router# show flash # Flash memory contents
# Configuration Management
Router# copy running-config startup-config # Save configuration
Router# copy run start # Abbreviated save
Router# write memory # Alternative save
Router# write erase # Erase startup config
Router# erase startup-config # Erase startup config
Router# reload # Restart router
Router# reload in 5 # Reload in 5 minutes
Router# reload cancel # Cancel scheduled
reload
bash
# Switch Configuration Modes
Switch> enable # User to privileged
EXEC
Switch# configure terminal # Global configuration
mode
Switch(config)# hostname SW1 # Set hostname
bash
# Access Port Configuration
Switch(config)# interface fastethernet 0/1 # Enter interface
Switch(config)# interface fa0/1 # Abbreviated
Switch(config)# interface f0/1 # Short form
Switch(config)# interface range f0/1-24 # Multiple ports
bash
# Enable IP routing
Switch(config)# ip routing # Enable routing
capability
bash
# VLAN Information
Switch# show vlan brief # VLAN summary
Switch# show vlan # Detailed VLAN info
Switch# show vlan id 10 # Specific VLAN
Switch# show vlan name Users # VLAN by name
# Interface Status
Switch# show interfaces status # Port status
Switch# show interfaces trunk # Trunk ports
Switch# show interfaces switchport # Switchport info
Switch# show interface f0/1 switchport # Specific port
# Port Security
Switch# show port-security # Port security summary
Switch# show port-security interface f0/1 # Specific port
Switch# show port-security address # Secure MAC addresses
1.3 Next-Generation Firewalls and IPS
Zone-Based Firewall Configuration:
bash
# Create Security Zones
Router(config)# zone security INSIDE # Internal zone
Router(config)# zone security OUTSIDE # External zone
Router(config)# zone security DMZ # DMZ zone
IPS Configuration:
bash
# Enable IPS
Router(config)# ip ips name IPS_RULE # Create IPS rule
Router(config)# ip ips config location flash:/ipsdir/ # IPS directory
# Signature Categories
Router(config)# ip ips signature-category # Enter signature
config
Router(config-ips-category)# category all # All categories
Router(config-ips-category-action)# retired true # Retired signatures
Router(config-ips-category-action)# exit
# IPS Monitoring
Router# show ip ips all # Show all IPS info
Router# show ip ips interfaces # IPS-enabled
interfaces
Router# show ip ips signatures # Active signatures
Router# show ip ips statistics # IPS statistics
bash
# Basic AP Setup
AP> enable
AP# configure terminal
AP(config)# hostname AP1 # Set hostname
AP(config)# enable secret cisco123 # Enable password
# VLAN Configuration
AP(config)# interface dot11radio 0.10 # Subinterface
AP(config-subif)# encapsulation dot1q 10 # VLAN 10
AP(config-subif)# bridge-group 10 # Bridge group
# Security Modes
AP(config-if)# encryption mode ciphers aes-ccmp # AES encryption
AP(config-if)# encryption mode ciphers tkip # TKIP encryption
AP(config-if)# encryption mode ciphers aes-ccmp tkip # Both
# WPA3 Configuration (newer APs)
AP(config-if)# authentication key-management wpa3 # WPA3
AP(config-if)# authentication key-management sae # SAE (WPA3-
Personal)
bash
# Basic WLC Setup
(Cisco Controller) > config network ssh enable # Enable SSH
(Cisco Controller) > config network telnet disable # Disable Telnet
(Cisco Controller) > config network http disable # Disable HTTP
(Cisco Controller) > config network https enable # Enable HTTPS
# WPA3 Configuration
(Cisco Controller) > config wlan security wpa3 enable 1 #
Enable WPA3
(Cisco Controller) > config wlan security wpa3 sae enable 1 # SAE
key mgmt
(Cisco Controller) > config wlan security pmf required 1 # PMF
required
# AP Management
(Cisco Controller) > config ap name Office-AP-01 001122334455 # Name
AP by MAC
(Cisco Controller) > config ap location "Building A Floor 1" Office-
AP-01
(Cisco Controller) > config ap country US Office-AP-01 #
Country code
(Cisco Controller) > config ap mode local Office-AP-01 # Local
mode
(Cisco Controller) > config ap mode flexconnect Office-AP-01 #
FlexConnect mode
# Show Commands
(Cisco Controller) > show ap summary # AP summary
(Cisco Controller) > show wlan summary # WLAN summary
(Cisco Controller) > show client summary # Client summary
(Cisco Controller) > show interface summary # Interface summary
text
# IP Configuration
ipconfig # Basic IP info
ipconfig /all # Detailed IP info
ipconfig /release # Release DHCP lease
ipconfig /renew # Renew DHCP lease
ipconfig /flushdns # Flush DNS cache
ipconfig /displaydns # Display DNS cache
ipconfig /registerdns # Register DNS
# Network Information
arp -a # ARP table
netstat -an # Network connections
netstat -rn # Routing table
nslookup google.com # DNS lookup
route print # Routing table
# Static IP Configuration
netsh interface ip set address "Local Area Connection" static
192.168.1.100 255.255.255.0 192.168.1.1
netsh interface ip set dns "Local Area Connection" static 8.8.8.8
bash
# Interface Information
ip addr show # Show IP addresses
ip a # Abbreviated form
ip link show # Show interface status
ip route show # Show routing table
ip r # Abbreviated form
# Network Testing
ping -c 4 8.8.8.8 # Ping 4 times
traceroute 8.8.8.8 # Trace route
dig google.com # DNS lookup
nslookup google.com # DNS lookup
ss -tuln # Socket statistics
netstat -tuln # Network statistics
bash
# PoE Port Configuration
Switch(config)# interface fastethernet 0/1 # Enter interface
Switch(config-if)# power inline auto # Auto PoE detection
Switch(config-if)# power inline static # Force PoE on
Switch(config-if)# power inline never # Disable PoE
Switch(config-if)# power inline consumption 15500 # Set consumption
in mW
# Debug Commands
Switch# debug power inline events # Debug PoE events
Switch# show power inline police # PoE policing info
bash
# Core/Distribution Switch Configuration
CoreSwitch(config)# spanning-tree mode rapid-pvst
CoreSwitch(config)# spanning-tree vlan 1-100 priority 4096 # Root
bridge
CoreSwitch(config)# ip routing # Enable Layer 3
Three-Tier Configuration:
bash
# Core Layer (Layer 3)
CoreSwitch(config)# ip routing
CoreSwitch(config)# interface vlan 10
CoreSwitch(config-if)# ip address 192.168.10.1 255.255.255.0
Spine-Leaf Architecture:
bash
# Spine Switch Configuration (BGP/OSPF)
SpineSwitch(config)# router bgp 65001
SpineSwitch(config-router)# neighbor 10.0.1.1 remote-as 65002
SpineSwitch(config-router)# neighbor 10.0.1.1 update-source loopback 0
bash
# Serial WAN Interface
Router(config)# interface serial 0/0/0
Router(config-if)# ip address 203.0.113.1 255.255.255.252
Router(config-if)# encapsulation ppp # PPP encapsulation
Router(config-if)# clock rate 64000 # DCE clock rate
Router(config-if)# bandwidth 64 # Bandwidth for routing
# Frame Relay
Router(config-if)# encapsulation frame-relay # Frame Relay encap
Router(config-if)# frame-relay map ip 203.0.113.2 100 broadcast
# HDLC (Default)
Router(config-if)# encapsulation hdlc # HDLC encapsulation
bash
# Copper Interface Configuration
Switch(config)# interface fastethernet 0/1 # 100BASE-TX
Switch(config-if)# speed 100 # Force 100 Mbps
Switch(config-if)# duplex full # Full duplex
# 10 Gigabit Interfaces
Switch(config)# interface tengigabitethernet 0/1 # 10GbE interface
Switch(config-if)# speed 10000 # 10 Gbps
bash
# Interface Statistics and Errors
Switch# show interfaces gi0/1 # Detailed interface
info
Switch# show interfaces gi0/1 | include error # Show only errors
Switch# show interfaces gi0/1 | include collision # Show collisions
Switch# show interfaces counters errors # Error counters
Switch# show interfaces counters # All counters
bash
# Show Protocol Statistics
Router# show ip traffic # IP protocol
statistics
Router# show tcp brief # TCP connections
Router# show udp brief # UDP connections
Router# show sockets # Socket information
bash
# Basic IPv4 Configuration
Router(config)# interface gi0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0 # /24
network
Router(config-if)# ip address 10.1.1.1 255.255.255.128 # /25
network
Router(config-if)# ip address 172.16.1.1 255.255.254.0 # /23
network
Router(config-if)# ip address 203.0.113.1 255.255.255.252 # /30
network
# Secondary IP Addresses
Router(config-if)# ip address 192.168.2.1 255.255.255.0 secondary
Router(config-if)# ip address 192.168.3.1 255.255.255.0 secondary
# Verification Commands
Router# show ip interface brief # IP interface summary
Router# show ip interface gi0/0 # Detailed IP interface
info
Router# show ip arp # ARP table
Router# ping 192.168.1.100 # Test connectivity
Router# traceroute 192.168.1.100 # Trace path
bash
# Enable IPv6 Routing
Router(config)# ipv6 unicast-routing # Enable IPv6 routing
globally
# DHCPv6 Configuration
Router(config)# ipv6 dhcp pool POOL1 # Create
DHCP pool
Router(dhcp-config)# address prefix 2001:db8:1::/64 lifetime infinite
infinite
Router(dhcp-config)# dns-server 2001:4860:4860::8888
Router(config)# interface gi0/0
Router(config-if)# ipv6 dhcp server POOL1 # Assign
pool to interface
# 5 GHz Configuration
AP(config)# interface dot11radio 1 # 5GHz radio
AP(config-if)# ssid CORPORATE_5G # SSID for 5GHz
AP(config-if)# channel 36 # 5GHz channel
AP(config-if)# channel width 80 # 80MHz channel width
bash
# VRF Definition
Router(config)# vrf definition CUSTOMER_A # Create VRF
Router(config-vrf)# rd 100:1 # Route distinguisher
Router(config-vrf)# route-target export 100:1 # Export route target
Router(config-vrf)# route-target import 100:1 # Import route target
Router(config-vrf)# description "Customer A VRF" # Description
Router(config-vrf)# exit
# VRF Routing
Router(config)# router ospf 1 vrf CUSTOMER_A # OSPF in VRF
Router(config-router)# network 10.1.1.0 0.0.0.255 area 0
# VRF Verification
Router# show vrf # Show all VRFs
Router# show ip route vrf CUSTOMER_A # VRF routing table
Router# ping vrf CUSTOMER_A 10.1.1.2 # Ping in VRF context
Router# traceroute vrf CUSTOMER_A 192.168.1.1 # Traceroute in VRF
bash
# Docker Network Commands
$ docker network create --driver bridge mynetwork # Create bridge
network
$ docker network create --driver host hostnet # Host networking
$ docker network create --driver none isolated # No networking
# Network Inspection
$ docker network ls # List networks
$ docker network inspect mynetwork # Inspect network
$ docker exec web1 ip addr show # Container IP info
1.17 Switching Concepts
MAC Address Table Management:
bash
# MAC Address Learning and Aging
Switch(config)# mac address-table aging-time 300 # 5 minutes
aging
Switch(config)# mac address-table aging-time 0 # Disable aging
2. Network Access
bash
# VLAN Creation - Multiple Methods
Switch(config)# vlan 10 # Create single
VLAN
Switch(config-vlan)# name Users # Name the VLAN
Switch(config-vlan)# state active # VLAN state
Switch(config-vlan)# exit
# VLAN Troubleshooting
Switch# show interfaces switchport # All switchport
info
Switch# show interfaces fa0/1 switchport # Specific port
Switch# show vlan dynamic # Dynamic VLANs
(VMPS)
bash
# Basic Trunk Configuration
Switch(config)# interface gigabitethernet 0/1
Switch(config-if)# switchport mode trunk # Static trunk
Switch(config-if)# switchport trunk encapsulation dot1q # 802.1Q (if
needed)
# Pruning Configuration
Switch(config-if)# switchport trunk pruning vlan 10,20 # Pruning
eligible
# Trunk Verification
Switch# show interfaces trunk # All trunk
ports
Switch# show interfaces gi0/1 trunk # Specific
trunk
Switch# show interfaces gi0/1 switchport # Detailed
switchport info
Switch# show dtp interface gi0/1 # DTP status
# VTP Verification
Switch# show vtp status # VTP status
Switch# show vtp counters # VTP
counters
Switch# show vtp password # VTP
password status
bash
# Global CDP Configuration
Switch(config)# cdp run # Enable CDP
globally
Switch(config)# no cdp run # Disable CDP
globally
Switch(config)# cdp timer 60 # CDP timer
(seconds)
Switch(config)# cdp holdtime 180 # CDP hold
time
Switch(config)# cdp advertise-v2 # Advertise
CDPv2
# Interface-Level CDP Configuration
Switch(config)# interface gi0/1
Switch(config-if)# cdp enable # Enable on
interface
Switch(config-if)# no cdp enable # Disable on
interface
bash
# Global LLDP Configuration
Switch(config)# lldp run # Enable LLDP
globally
Switch(config)# lldp timer 30 # LLDP timer
Switch(config)# lldp holdtime 120 # LLDP hold
time
Switch(config)# lldp reinit 2 #
Reinitialize delay
bash
# Static EtherChannel (Manual - no negotiation)
Switch(config)# interface range gi0/1-2
Switch(config-if-range)# channel-group 1 mode on # Static mode
Switch(config-if-range)# exit
# Layer 3 EtherChannel
Switch(config)# interface range gi0/9-10
Switch(config-if-range)# no switchport # Layer 3
ports
Switch(config-if-range)# channel-group 5 mode active
Switch(config)# interface port-channel 5
Switch(config-if)# ip address 10.1.1.1 255.255.255.0 # Layer 3 IP
# EtherChannel Verification
Switch# show etherchannel summary #
EtherChannel summary
Switch# show etherchannel detail # Detailed
info
Switch# show etherchannel load-balance # Load
balancing
Switch# show etherchannel port-channel # Port-
channel info
Switch# show interfaces port-channel 1 # Specific
channel
Switch# show lacp neighbor # LACP
neighbors
Switch# show lacp counters # LACP
counters
Switch# show pagp neighbor # PAgP
neighbors
Switch# show pagp counters # PAgP
counters
# EtherChannel Troubleshooting
Switch# test etherchannel load-balance interface port-channel 1 mac
0012.3456.789A 0012.3456.789B
Switch# debug etherchannel # Debug
EtherChannel
Switch# debug lacp # Debug LACP
Switch# debug pagp # Debug PAgP
bash
# STP Mode Configuration
Switch(config)# spanning-tree mode pvst # PVST+
Switch(config)# spanning-tree mode rapid-pvst # Rapid PVST+
(default)
Switch(config)# spanning-tree mode mstp # Multiple
STP
# STP Troubleshooting
Switch# debug spanning-tree events # Debug STP
events
Switch# clear spanning-tree detected-protocols # Clear
detected protocols
bash
# PortFast Configuration - Interface Level
Switch(config)# interface fastethernet 0/1
Switch(config-if)# spanning-tree portfast # Enable
PortFast
Switch(config-if)# spanning-tree portfast trunk # PortFast on
trunk (rare)
Switch(config-if)# no spanning-tree portfast # Disable
PortFast
bash
# AP Mode Configuration (WLC)
(Cisco Controller) > config ap mode local AP-01 # Local mode
(Cisco Controller) > config ap mode flexconnect AP-01 # FlexConnect
mode
(Cisco Controller) > config ap mode monitor AP-01 # Monitor
mode
(Cisco Controller) > config ap mode rogue-detector AP-01 # Rogue
detector
(Cisco Controller) > config ap mode sniffer AP-01 # Sniffer
mode
(Cisco Controller) > config ap mode bridge AP-01 # Bridge mode
# FlexConnect Configuration
(Cisco Controller) > config flexconnect group create BRANCH1 # Create
group
(Cisco Controller) > config ap flexconnect group BRANCH1 AP-01 #
Assign AP
(Cisco Controller) > config flexconnect group BRANCH1 vlan add 10 10
# Add VLAN
# Mesh Configuration
(Cisco Controller) > config ap mode mesh AP-01 # Mesh mode
(Cisco Controller) > config mesh parent preferred AP-01 AP-02 # Set
parent
# Show AP Information
(Cisco Controller) > show ap config general AP-01 # AP
configuration
(Cisco Controller) > show ap status # All AP
status
(Cisco Controller) > show ap summary # AP summary
bash
# Basic WLC Network Configuration
(Cisco Controller) > config network ssh enable # Enable SSH
(Cisco Controller) > config network telnet disable # Disable
Telnet
(Cisco Controller) > config network http disable # Disable
HTTP
(Cisco Controller) > config network https enable # Enable
HTTPS
# WLAN Configuration
(Cisco Controller) > config wlan create 1 CORPORATE # Create WLAN
(Cisco Controller) > config wlan ssid CORPORATE 1 # Set SSID
(Cisco Controller) > config wlan interface 1 management # Assign
interface
(Cisco Controller) > config wlan broadcast-ssid enable 1 # Broadcast
SSID
(Cisco Controller) > config wlan enable 1 # Enable WLAN
# RF Management
(Cisco Controller) > config 802.11b disable network # Disable
2.4GHz
(Cisco Controller) > config 802.11a disable network # Disable
5GHz
(Cisco Controller) > config 802.11b channel global auto # Auto
channel
(Cisco Controller) > config 802.11b txPower global auto # Auto power
bash
# SSH Configuration
(Cisco Controller) > config network ssh enable # Enable SSH
(Cisco Controller) > config network ssh version 2 # SSH version
2
# HTTPS Configuration
(Cisco Controller) > config network https enable # Enable
HTTPS
(Cisco Controller) > config network https port 443 # HTTPS port
# SNMP Configuration
(Cisco Controller) > config network snmp version v2c enable # SNMPv2c
(Cisco Controller) > config network snmp community create public ro #
Read-only
(Cisco Controller) > config network snmp trapreceiver create
192.168.1.200 public
3. IP Connectivity
bash
# Basic Static Routes
Router(config)# ip route 192.168.10.0 255.255.255.0 10.1.1.2 #
Next-hop
Router(config)# ip route 192.168.20.0 255.255.255.0 gi0/1 #
Exit interface
Router(config)# ip route 192.168.30.0 255.255.255.0 gi0/1 10.1.1.2 #
Fully specified
# Default Routes
Router(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.1 #
Default route
Router(config)# ip route 0.0.0.0 0.0.0.0 gi0/1 #
Default via interface
# Administrative Distance
Router(config)# ip route 192.168.10.0 255.255.255.0 10.1.1.2 100 # AD
100
Router(config)# ip route 192.168.10.0 255.255.255.0 10.1.1.3 200 #
Floating static
bash
# Basic OSPF Configuration
Router(config)# router ospf 1 # OSPF process
1
Router(config-router)# router-id 1.1.1.1 # Router ID
Router(config-router)# network 10.1.1.0 0.0.0.255 area 0 # Network
statement
Router(config-router)# network 192.168.1.0 0.0.0.255 area 0 # Another
network
# Passive Interfaces
Router(config-router)# passive-interface default # All
interfaces passive
Router(config-router)# no passive-interface gi0/1 # Remove
passive
# Interface-Level OSPF
Router(config)# interface gi0/0
Router(config-if)# ip ospf 1 area 0 # Enable OSPF
directly
# OSPF Areas
Router(config-router)# area 0 range 192.168.0.0 255.255.0.0 # Area
summarization
# OSPF Verification
Router# show ip ospf # OSPF process
info
Router# show ip ospf neighbor # OSPF
neighbors
Router# show ip ospf interface # OSPF
interfaces
Router# show ip ospf database # Link-state
database
Router# show ip route ospf # OSPF routes
EIGRP Configuration:
bash
# Basic EIGRP Configuration
Router(config)# router eigrp 100 # EIGRP AS 100
Router(config-router)# network 10.0.0.0 0.255.255.255 # Classful
network
Router(config-router)# network 192.168.1.0 0.0.0.255 # Subnet mask
Router(config-router)# no auto-summary # Disable auto-
summary
# EIGRP Router ID
Router(config-router)# eigrp router-id 2.2.2.2 # Set router ID
# Passive Interfaces
Router(config-router)# passive-interface default # All passive
Router(config-router)# no passive-interface gi0/1 # Enable on
interface
# EIGRP Verification
Router# show ip eigrp neighbors # EIGRP
neighbors
Router# show ip eigrp topology # Topology
table
Router# show ip eigrp interfaces # EIGRP
interfaces
Router# show ip route eigrp # EIGRP routes
Router# show ip protocols # Routing
protocols
bash
# Routing Table Analysis
Router# show ip route # Complete
routing table
Router# show ip route 192.168.10.5 # Specific
destination
Router# show ip route longer-prefixes 192.168.10.0/24 # More specific
routes
Router# show ip route summary # Routing
summary
bash
# Recursive Static Routes
Router(config)# ip route 10.10.10.0 255.255.255.0 192.168.1.1 #
Next-hop IP
bash
# OSPF Process Configuration
Router(config)# router ospf 1
Router(config-router)# router-id 1.1.1.1 # Manual router
ID
Router(config-router)# log-adjacency-changes # Log neighbor
changes
Router(config-router)# auto-cost reference-bandwidth 10000 #
Reference BW
# Network Advertisements
Router(config-router)# network 10.1.1.0 0.0.0.255 area 0
Router(config-router)# network 192.168.1.1 0.0.0.0 area 0 # Host
route
# OSPF Troubleshooting
Router# debug ip ospf hello # Debug hello
packets
Router# debug ip ospf adj # Debug
adjacency
Router# clear ip ospf process # Clear OSPF
process
# HSRPv2 Configuration
Router(config-if)# standby version 2 # HSRPv2
Router(config-if)# standby 1 ip 192.168.1.1
Router(config-if)# standby 1 priority 110
Router(config-if)# standby 1 preempt
# HSRP Verification
Router# show standby # All HSRP
groups
Router# show standby brief # Brief HSRP
info
Router# show standby interface gi0/0 # Specific
interface
Router# debug standby # Debug HSRP
bash
# Basic VRRP Configuration
Router(config)# interface gi0/0
Router(config-if)# vrrp 1 ip 192.168.1.1 # Virtual IP
Router(config-if)# vrrp 1 priority 120 # Priority (1-
254)
Router(config-if)# vrrp 1 preempt # Enable
preemption
Router(config-if)# vrrp 1 preempt delay minimum 60 # Preemption
delay
# VRRP Verification
Router# show vrrp # All VRRP
groups
Router# show vrrp brief # Brief VRRP
info
Router# show vrrp interface gi0/0 # Specific
interface
Router# debug vrrp # Debug VRRP
bash
# Basic GLBP Configuration
Router(config)# interface gi0/0
Router(config-if)# glbp 1 ip 192.168.1.1 # Virtual IP
Router(config-if)# glbp 1 priority 120 # Priority
Router(config-if)# glbp 1 preempt # Enable
preemption
Router(config-if)# glbp 1 load-balancing round-robin # Load
balancing method
# Load Balancing Options
Router(config-if)# glbp 1 load-balancing host-dependent # Host-
dependent
Router(config-if)# glbp 1 load-balancing weighted # Weighted
# GLBP Verification
Router# show glbp # All GLBP
groups
Router# show glbp brief # Brief GLBP
info
Router# debug glbp # Debug GLBP
4. IP Services
bash
# Basic Static NAT
Router(config)# interface gi0/0
Router(config-if)# ip nat inside # Inside
interface
bash
# Access List for Inside Sources
Router(config)# access-list 1 permit 192.168.1.0 0.0.0.255
Router(config)# access-list 1 permit 192.168.2.0 0.0.0.255
bash
# PAT with Interface Overload
Router(config)# access-list 1 permit 192.168.0.0 0.0.255.255
Router(config)# ip nat inside source list 1 interface gi0/1 overload
bash
# NAT Status and Statistics
Router# show ip nat translations # Active
translations
Router# show ip nat translations verbose # Verbose
translations
Router# show ip nat statistics # NAT
statistics
Router# show ip nat pool # NAT pools
# NAT Debugging
Router# debug ip nat # Debug NAT
translations
Router# debug ip nat detailed # Detailed NAT
debug
bash
# Basic NTP Client Configuration
Router(config)# ntp server 129.6.15.28 # NIST time
server
Router(config)# ntp server 216.239.35.0 # Google time
server
Router(config)# ntp server pool.ntp.org # NTP pool
bash
# Configure Router as NTP Server
Router(config)# ntp master 3 # Stratum 3
server
Router(config)# ntp master # Default
stratum 8
NTP Authentication:
bash
# NTP Authentication Configuration
Router(config)# ntp authenticate # Enable
authentication
Router(config)# ntp authentication-key 1 md5 NTPkey123 #
Authentication key
Router(config)# ntp trusted-key 1 # Trusted key
Router(config)# ntp server 192.168.1.100 key 1 # Server with
key
# Access Control
Router(config)# ntp access-group peer 10 # Peer access
list
Router(config)# ntp access-group serve 20 # Serve access
list
Router(config)# ntp access-group query-only 30 # Query-only
access
NTP Verification:scribd
bash
# NTP Status Commands
Router# show ntp status # NTP status
Router# show ntp associations # NTP
associations
Router# show ntp associations detail # Detailed
associations
Router# show clock # System clock
Router# show calendar # Hardware
calendar
# NTP Troubleshooting
Router# debug ntp packet # Debug NTP
packets
Router# debug ntp sync # Debug NTP
sync
Router# ntp clear drift # Clear drift
file
4.3 SNMP Functionality
SNMPv1/v2c Configuration:scribd
bash
# Basic SNMP Configuration
Router(config)# snmp-server community public ro # Read-only
community
Router(config)# snmp-server community private rw # Read-write
community
Router(config)# snmp-server community monitor ro 10 # With ACL
# System Information
Router(config)# snmp-server contact admin@company.com # Contact info
Router(config)# snmp-server location "Data Center 1" # Location
Router(config)# snmp-server chassis-id 12345 # Chassis ID
# SNMP Traps
Router(config)# snmp-server enable traps # Enable all
traps
Router(config)# snmp-server enable traps snmp linkdown linkup #
Specific traps
Router(config)# snmp-server host 192.168.1.200 version 2c public #
Trap destination
SNMPv3 Configuration:
bash
# SNMPv3 Groups
Router(config)# snmp-server group ADMINS v3 auth # Auth group
Router(config)# snmp-server group OPERATORS v3 noauth # No auth group
Router(config)# snmp-server group MONITORS v3 priv # Privacy group
# SNMPv3 Users
Router(config)# snmp-server user admin ADMINS v3 auth sha AuthPass123
Router(config)# snmp-server user admin ADMINS v3 auth sha AuthPass123
priv aes 128 PrivPass456
Router(config)# snmp-server user monitor MONITORS v3 auth md5
MonitorPass
# SNMPv3 Views
Router(config)# snmp-server view READONLY iso included # Read-only
view
Router(config)# snmp-server view READONLY cisco.2 excluded # Exclude
Cisco MIB
SNMP Verification:
bash
# SNMP Status Commands
Router# show snmp # SNMP status
Router# show snmp community # SNMP
communities
Router# show snmp user # SNMP users
Router# show snmp group # SNMP groups
Router# show snmp host # SNMP hosts
# SNMP Testing
Router# snmpwalk -v2c -c public localhost 1.3.6.1.2.1.1 # SNMP walk
bash
# Basic Syslog Configuration
Router(config)# logging 192.168.1.200 # Syslog server
Router(config)# logging host 192.168.1.201 # Additional
server
# Source Interface
Router(config)# logging source-interface gi0/0 # Source
interface
Router(config)# logging source-interface loopback 0 # Source
loopback
# Facility Configuration
Router(config)# logging facility local0 # Facility
local0
Router(config)# logging facility local7 # Facility
local7
# Buffer Logging
Router(config)# logging buffered 8192 # Buffer size
Router(config)# logging buffered warnings # Buffer level
Router(config)# logging buffered 16384 informational # Size and level
Syslog Verification:
bash
# Show Logging Information
Router# show logging # All logging
info
Router# show logging summary # Logging
summary
Router# show logging history # Historical
logs
Router# show logging onboard # Onboard
logging
# Clear Logs
Router# clear logging # Clear log
buffer
Router# clear logging onboard # Clear onboard
logs
bash
# Basic DHCP Pool Configuration
Router(config)# ip dhcp excluded-address 192.168.1.1 192.168.1.50
Router(config)# ip dhcp excluded-address 192.168.1.200 192.168.1.254
bash
# Interface DHCP Client
Router(config)# interface gi0/1
Router(config-if)# ip address dhcp # DHCP client
Router(config-if)# ip dhcp client class-id "ROUTER" # Class
identifier
Router(config-if)# ip dhcp client hostname R1 # Client
hostname
bash
# DHCP Helper Address (Relay)
Router(config)# interface gi0/0
Router(config-if)# ip helper-address 192.168.100.10 # DHCP server
Router(config-if)# ip helper-address 192.168.100.11 # Backup server
# DHCP Relay Information
Router(config)# ip dhcp relay information option # Option 82
Router(config)# ip dhcp relay information policy keep # Keep relay
info
DHCP Verification:
bash
# DHCP Server Verification
Router# show ip dhcp pool # DHCP pools
Router# show ip dhcp pool LAN # Specific pool
Router# show ip dhcp binding # DHCP bindings
Router# show ip dhcp conflict # IP conflicts
Router# show ip dhcp database # DHCP database
# DHCP Statistics
Router# show ip dhcp server statistics # Server
statistics
Router# debug ip dhcp server packet # Debug DHCP
packets
Router# debug ip dhcp server events # Debug DHCP
events
bash
# Class Maps - Traffic Classification
Router(config)# class-map match-all VOICE_TRAFFIC
Router(config-cmap)# match ip dscp ef # Expedited
forwarding
Router(config-cmap)# match protocol rtp audio # RTP audio
bash
# Policy Map Configuration
Router(config)# policy-map QOS_POLICY
Router(config-pmap)# class VOICE_TRAFFIC
Router(config-pmap-c)# priority percent 20 # Priority queue
Router(config-pmap-c)# set ip dscp ef # Mark DSCP
bash
# Traffic Shaping
Router(config)# policy-map SHAPING_POLICY
Router(config-pmap)# class class-default
Router(config-pmap-c)# shape average 1000000 # 1 Mbps shaping
Router(config-pmap-c)# shape peak 1500000 # Peak rate
# Traffic Policing
Router(config)# policy-map POLICING_POLICY
Router(config-pmap)# class BUSINESS_CRITICAL
Router(config-pmap-c)# police 2000000 4000 conform-action transmit
exceed-action drop
# Hierarchical QoS
Router(config)# policy-map CHILD_POLICY
Router(config-pmap)# class VOICE_TRAFFIC
Router(config-pmap-c)# priority percent 50
bash
# Apply Policy to Interface
Router(config)# interface gi0/0
Router(config-if)# service-policy input INPUT_POLICY # Inbound
policy
Router(config-if)# service-policy output OUTPUT_POLICY # Outbound
policy
# QoS on Subinterfaces
Router(config)# interface gi0/0.10
Router(config-subif)# service-policy output VLAN10_POLICY
# QoS Verification
Router# show policy-map # Show policy
maps
Router# show policy-map interface gi0/0 # Interface
policy
Router# show class-map # Show class
maps
Router# show queueing interface gi0/0 # Queueing info
bash
# Prerequisites for SSH
Router(config)# hostname R1 # Hostname
required
Router(config)# ip domain-name company.com # Domain name
required
# SSH Configuration
Router(config)# ip ssh version 2 # SSH version 2
Router(config)# ip ssh time-out 60 # Session
timeout
Router(config)# ip ssh authentication-retries 3 # Auth retries
# User Accounts
Router(config)# username admin privilege 15 secret Admin123 # Admin
user
Router(config)# username user1 privilege 1 password User123 #
Limited user
Router(config)# username netadmin secret NetPass123 # Network
admin
bash
# SSH Authentication Methods
Router(config)# ip ssh server algorithm authentication password
publickey
Router(config)# ip ssh server algorithm kex diffie-hellman-group14-
sha1
bash
# SSH Status Commands
Router# show ssh # Active SSH
sessions
Router# show ip ssh # SSH
configuration
Router# show crypto key mypubkey rsa # RSA public key
Router# show users # Active users
# SSH Debugging
Router# debug ip ssh # Debug SSH
Router# terminal monitor # Show debug on
terminal
bash
# Copy Configuration Files
Router# copy running-config tftp://192.168.1.100/router-config.cfg
Router# copy startup-config tftp://192.168.1.100/startup-config.cfg
Router# copy tftp://192.168.1.100/router-config.cfg running-config
Router# copy tftp://192.168.1.100/router-config.cfg startup-config
# Archive Configuration
Router(config)# archive
Router(config-archive)# path tftp://192.168.1.100/archive-config
Router(config-archive)# write-memory
FTP Operations:
bash
# FTP Client Configuration
Router(config)# ip ftp username ftpuser # FTP username
Router(config)# ip ftp password ftppass # FTP password
Router(config)# ip ftp passive # Passive FTP
mode
Router(config)# ip ftp source-interface gi0/0 # Source
interface
bash
# Strong Password Configuration
Router(config)# enable secret 9 $9$xyz123abc... # Type 9 password
hash
Router(config)# username admin secret 0 ComplexPass123! # Complex
password
# Privilege Levels
Router(config)# privilege exec level 5 show running-config # Custom
privilege
Router(config)# username helpdesk privilege 5 secret Help123 # Level
5 user
Router(config)# enable secret level 5 Level5Pass # Level 5 enable
bash
# Numbered Standard ACL (1-99, 1300-1999)
Router(config)# access-list 10 permit 192.168.1.0 0.0.0.255 #
Permit network
Router(config)# access-list 10 permit host 192.168.2.100 #
Permit host
Router(config)# access-list 10 permit any #
Permit any
Router(config)# access-list 10 deny 192.168.3.0 0.0.0.255 # Deny
network
# Implicit deny any at the end
Extended ACLs:
bash
# Numbered Extended ACL (100-199, 2000-2699)
Router(config)# access-list 100 permit tcp 192.168.1.0 0.0.0.255 any
eq 80
Router(config)# access-list 100 permit tcp 192.168.1.0 0.0.0.255 any
eq 443
Router(config)# access-list 100 permit udp any any eq 53 # DNS
Router(config)# access-list 100 permit icmp any any # ICMP
Router(config)# access-list 100 deny tcp any any eq 23 #
Block Telnet
Router(config)# access-list 100 permit tcp any any established #
Return traffic
# Time-Based ACLs
Router(config)# time-range BUSINESS_HOURS
Router(config-time-range)# periodic weekdays 08:00 to 18:00
Router(config)# access-list 120 permit tcp any any eq 80 time-range
BUSINESS_HOURS
bash
# Show ACL Information
Router# show access-lists # All ACLs
Router# show access-lists 100 # Specific ACL
Router# show ip access-lists # IP ACLs only
Router# show ip interface gi0/0 # Interface ACLs
# ACL Debugging
Router# debug ip packet detail # Debug IP
packets
Router# debug ip packet 100 # Debug specific
ACL
bash
# Enable DHCP Snooping Globally
Switch(config)# ip dhcp snooping # Enable
globally
Switch(config)# ip dhcp snooping vlan 10,20,30 # Enable on
VLANs
# Rate Limiting
Switch(config)# interface gi0/2
Switch(config-if)# ip dhcp snooping limit rate 15 # 15
packets/second
# DHCP Option 82
Switch(config)# ip dhcp snooping information option # Enable option
82
Switch(config)# ip dhcp snooping information policy keep # Keep
existing
bash
# Enable DAI on VLANs
Switch(config)# ip arp inspection vlan 10,20,30 # Enable on
VLANs
# Additional Validation
Switch(config)# ip arp inspection validate src-mac # Source MAC
validation
Switch(config)# ip arp inspection validate dst-mac # Destination
MAC validation
Switch(config)# ip arp inspection validate ip # IP address
validation
# Verify DAI
Switch# show ip arp inspection # DAI status
Switch# show ip arp inspection statistics # Statistics
Switch# show ip arp inspection interfaces # Interface
status
bash
# Basic Port Security
Switch(config)# interface fastethernet 0/1
Switch(config-if)# switchport mode access # Must be access
port
Switch(config-if)# switchport port-security # Enable port
security
Switch(config-if)# switchport port-security maximum 2 # Max MAC
addresses
# Violation Actions
Switch(config-if)# switchport port-security violation shutdown #
Shutdown (default)
Switch(config-if)# switchport port-security violation restrict #
Restrict
Switch(config-if)# switchport port-security violation protect #
Protect
# Aging Configuration
Switch(config-if)# switchport port-security aging time 10 # 10
minutes
Switch(config-if)# switchport port-security aging type absolute #
Absolute aging
Switch(config-if)# switchport port-security aging type inactivity #
Inactivity aging
bash
# Enable AAA
Router(config)# aaa new-model # Enable AAA
# Local Authentication
Router(config)# aaa authentication login default local # Default
login
Router(config)# aaa authentication login CONSOLE line # Console
method
Router(config)# aaa authentication enable default local # Enable
authentication
# Local Authorization
Router(config)# aaa authorization exec default local # EXEC
authorization
Router(config)# aaa authorization commands 15 default local # Command
authorization
# Local Accounting
Router(config)# aaa accounting exec default start-stop local # EXEC
accounting
Router(config)# aaa accounting commands 15 default start-stop local #
Command accounting
bash
# RADIUS Server Configuration
Router(config)# radius server RADIUS1 # Define server
Router(config-radius-server)# address ipv4 192.168.1.200 auth-port
1812 acct-port 1813
Router(config-radius-server)# key RadiusSecret123 # Shared secret
Router(config-radius-server)# timeout 5 # Timeout
Router(config-radius-server)# retransmit 3 # Retransmit
count
# RADIUS Authentication
Router(config)# aaa authentication login default group radius local
Router(config)# aaa authentication enable default group radius enable
# RADIUS Authorization
Router(config)# aaa authorization exec default group radius local
Router(config)# aaa authorization commands 15 default group radius
local
# RADIUS Accounting
Router(config)# aaa accounting exec default start-stop group radius
Router(config)# aaa accounting commands 15 default start-stop group
radius
bash
# TACACS+ Server Configuration
Router(config)# tacacs server TACACS1 # Define server
Router(config-server-tacacs)# address ipv4 192.168.1.201
Router(config-server-tacacs)# key TacacsSecret123 # Shared secret
Router(config-server-tacacs)# port 49 # TACACS+ port
Router(config-server-tacacs)# timeout 10 # Timeout
# TACACS+ Authentication
Router(config)# aaa authentication login default group tacacs+ local
Router(config)# aaa authentication enable default group tacacs+ enable
# TACACS+ Authorization
Router(config)# aaa authorization exec default group tacacs+ local
Router(config)# aaa authorization commands 15 default group tacacs+
local
# TACACS+ Accounting
Router(config)# aaa accounting exec default start-stop group tacacs+
Router(config)# aaa accounting commands 15 default start-stop group
tacacs+
# Verify AAA
Router# show aaa sessions # Active
sessions
Router# show radius statistics # RADIUS
statistics
Router# show tacacs # TACACS+
statistics
bash
# Phase 1 - IKE Policy
Router(config)# crypto isakmp policy 10 # IKE policy 10
Router(config-isakmp)# encryption aes 256 # AES 256
encryption
Router(config-isakmp)# hash sha256 # SHA-256 hash
Router(config-isakmp)# authentication pre-share # Pre-shared key
Router(config-isakmp)# group 14 # DH group 14
Router(config-isakmp)# lifetime 86400 # 24 hours
# Pre-shared Key
Router(config)# crypto isakmp key VPNSecretKey123 address
203.0.113.100
Router(config)# crypto isakmp key VPNSecretKey123 hostname peer-
router.com
# Apply to Interface
Router(config)# interface gi0/1
Router(config-if)# crypto map SITE_TO_SITE
bash
# IKEv2 Configuration
Router(config)# crypto ikev2 proposal IKEv2_PROPOSAL
Router(config-ikev2-proposal)# encryption aes-cbc-256
Router(config-ikev2-proposal)# integrity sha256
Router(config-ikev2-proposal)# group 14
# NAT Traversal
Router(config)# crypto isakmp nat traversal 20 # NAT-T support
# Redundancy
Router(config)# crypto map SITE_TO_SITE 20 ipsec-isakmp
Router(config-crypto-map)# set peer 203.0.113.101 # Backup peer
Router(config-crypto-map)# set transform-set ESP-AES256-SHA256
Router(config-crypto-map)# match address 110
bash
# IPsec Status Commands
Router# show crypto isakmp sa # IKE SAs
Router# show crypto ipsec sa # IPsec SAs
Router# show crypto map # Crypto map
config
Router# show crypto session # Active
sessions
# IPsec Statistics
Router# show crypto engine connections active # Active
connections
Router# show crypto ipsec transform-set # Transform sets
Router# show crypto isakmp policy # IKE policies
# IPsec Troubleshooting
Router# debug crypto isakmp # Debug IKE
Router# debug crypto ipsec # Debug IPsec
Router# clear crypto session # Clear sessions
Router# clear crypto sa # Clear SAs
bash
# WPA2-PSK Configuration
AP(config)# interface dot11radio 0 # 2.4GHz radio
AP(config-if)# ssid SECURE_NETWORK # SSID
AP(config-if)# authentication open # Open
authentication
AP(config-if)# authentication key-management wpa version 2 # WPA2
AP(config-if)# wpa-psk ascii 0 SecurePassword123 # Pre-shared key
AP(config-if)# encryption mode ciphers aes-ccmp # AES encryption
AP(config-if)# no shutdown # Enable radio
WPA2-Enterprise Configuration:tutorialsweb
bash
# WPA2-Enterprise (802.1X)
AP(config-if)# authentication key-management wpa version 2
AP(config-if)# dot1x authentication-server host 192.168.1.100 port
1812
AP(config-if)# dot1x authentication-server shared-secret RadiusKey123
AP(config-if)# dot1x accounting-server host 192.168.1.100 port 1813
AP(config-if)# encryption mode ciphers aes-ccmp # AES only
WPA3 Configuration:
bash
# WPA3-Personal (SAE)
AP(config-if)# authentication key-management wpa3 # WPA3
AP(config-if)# authentication key-management sae # SAE method
AP(config-if)# wpa3-sae password SecureWPA3Pass # WPA3 password
AP(config-if)# encryption mode ciphers aes-ccmp # AES required
# WPA3-Enterprise
AP(config-if)# authentication key-management wpa3 # WPA3 enterprise
AP(config-if)# dot1x authentication-server host 192.168.1.100
AP(config-if)# encryption mode ciphers aes-ccmp # AES encryption
bash
# Show Wireless Security Status
AP# show dot11 associations # Associated
clients
AP# show controllers dot11radio 0 # Radio controller
AP# show interface dot11radio 0 # Radio interface
AP# show dot11 statistics # Wireless
statistics
bash
# CLI-based configuration (traditional)
Router# configure terminal
Router(config)# interface gi0/1
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
Controller-Based Management:
bash
# Enable RESTCONF on Cisco Device
Router(config)# restconf # Enable RESTCONF
Router(config)# ip http server # Enable HTTP
Router(config)# ip http secure-server # Enable HTTPS
Router(config)# ip http authentication local # Local
authentication
# Create API User
Router(config)# username apiuser privilege 15 secret ApiPassword123
json
# JSON Example - Interface Configuration
{
"ietf-interfaces:interface": {
"name": "GigabitEthernet1",
"description": "Configured via REST API",
"type": "iana-if-type:ethernetCsmacd",
"enabled": true,
"ietf-ip:ipv4": {
"address": [
{
"ip": "192.168.1.1",
"netmask": "255.255.255.0"
}
]
}
}
}
python
# Python REST API Example
import requests
import json
# API Endpoint
url = "https://192.168.1.1/restconf/data/ietf-interfaces:interfaces"
headers = {
'Content-Type': 'application/yang-data+json',
'Accept': 'application/yang-data+json'
}
text
# Ansible Playbook Example
---
- name: Configure Cisco Router Interface
hosts: routers
gather_facts: no
tasks:
- name: Configure GigabitEthernet0/1
ios_config:
lines:
- ip address 192.168.1.1 255.255.255.0
- description Configured by Ansible
- no shutdown
parents: interface GigabitEthernet0/1
save_when: changed
text
[routers]
router1 ansible_host=192.168.1.10 ansible_user=admin
ansible_password=admin123 ansible_network_os=ios
router2 ansible_host=192.168.1.11 ansible_user=admin
ansible_password=admin123 ansible_network_os=ios
[switches]
switch1 ansible_host=192.168.1.20 ansible_user=admin
ansible_password=admin123 ansible_network_os=ios
puppet
# Puppet Manifest Example
node 'router1.company.com' {
cisco_interface { 'GigabitEthernet0/1':
ensure => present,
description => 'Configured by Puppet',
ipv4 => '192.168.1.1/24',
shutdown => false,
}
cisco_ospf_instance { '1':
ensure => present,
router_id => '1.1.1.1',
}
ruby
# Chef Recipe Example
cisco_interface 'GigabitEthernet0/1' do
description 'Configured by Chef'
ipv4_address '192.168.1.1'
ipv4_netmask_length 24
shutdown false
action :create
end
cisco_ospf 'Sample' do
router_id '1.1.1.1'
action :create
end
json
{
"network-device": {
"hostname": "Router1",
"management-ip": "192.168.100.10",
"interfaces": [
{
"name": "GigabitEthernet0/0",
"ip-address": "192.168.1.1",
"subnet-mask": "255.255.255.0",
"description": "LAN Interface",
"status": "up"
},
{
"name": "GigabitEthernet0/1",
"ip-address": "10.1.1.1",
"subnet-mask": "255.255.255.0",
"description": "WAN Interface",
"status": "up"
}
],
"routing": {
"protocol": "OSPF",
"process-id": 1,
"router-id": "1.1.1.1",
"networks": [
{
"network": "192.168.1.0",
"wildcard": "0.0.0.255",
"area": 0
},
{
"network": "10.1.1.0",
"wildcard": "0.0.0.255",
"area": 0
}
]
},
"vlans": [
{
"id": 10,
"name": "Users",
"status": "active"
},
{
"id": 20,
"name": "Servers",
"status": "active"
}
]
}
}
This comprehensive CCNA CLI reference covers every topic with detailed command
variations, explanations, and real-world examples. Each section includes verification
commands, troubleshooting steps, and best practices to ensure complete understanding
and practical application.
1. https://networkwalks.com/new-ccna-200-301/
2. https://networklessons.com/cisco/ccna-routing-switching-icnd1-100-
105/introduction-cisco-ios-cli-command-line-interface
3. https://www.9tut.com/cisco-command-line-interface-cli
4. https://www.networkacademy.io/ccna/ethernet/vlan-trunking
5. https://www.cisco.com/c/en/us/td/docs/net_mgmt/epn_manager/8_0_GA/user/gu
ide/bk_cepnm_8_0_user_and_administrator_guide_ga/bk_CiscoEPNManager_8_0_
UserAndAdministratorGuide_appendix_0100000.html
6. https://study-ccna.com/dynamic-nat/
7. https://www.scribd.com/document/523476861/CCNA-IP-Services
8. https://mkto.cisco.com/rs/564-WHV-323/images/ccna-security-command-
guide.pdf
9. https://thetcpstack.wordpress.com/ccna/section-4-0-ip-services/
10. https://www.examguides.com/CCNA/cisco-ccna-77.htm
11. https://www.tutorialsweb.com/networking/cisco/security-fundamentals/security-
fundamentals-12.htm
12. https://networkjourney.com/rest-api-basics-for-cisco-devices-automate-smarter-
not-harder-ccnp-enterprise/
13. https://itexamanswers.net/14-7-2-module-quiz-network-automation-answers.html
14. https://www.youtube.com/watch?v=xOqwxluUCc8
15. https://www.youtube.com/watch?v=2p7-MluKAgE
16. https://networklessons.com/cisco/ccna-200-301
17. https://subnettingpractice.com/ccna_commands.html
18. https://www.youtube.com/watch?v=W0MGLKxHk9M
19. https://www.youtube.com/watch?v=IYbtai7Nu2g
20. https://www.cbtnuggets.com/blog/technology/networking/network-device-
management-access-methods-to-know-for-ccna
21. https://www.youtube.com/watch?v=mMLF0n29fCg
22. https://networklessons.com/cisco/ccnp-encor-350-401/how-to-configure-static-
route-on-cisco-ios-router
23. https://www.scribd.com/document/837076875/Cisco-CCNA-Security-Commands
24. https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-
routing-protocol-eigrp/8606-redist.html
25. https://ccnapracticallabs.com/how-to-redistribute-rip-ospf-eigrp-static-routes/
26. https://www.slideshare.net/slideshow/5-ip-security-aaa-and-acl/236608147
27. https://www.learncisco.net/courses/icnd-1/ip-routing-technologies/static-
routing.html
28. https://www.networkacademy.io/ccna/network-services/modular-qos-cli-mqc
29. https://itexamanswers.net/module-8-quiz-access-control-lists-answers-network-
security.html
30. https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-10/config-
guide/b_cg810/wlan_security.html
31. https://www.learncisco.net/courses/icnd-2/vlans-and-spanning-tree/trunk-
operations.html
32. https://www.tutorialsweb.com/networking/cisco/automation-
programmability/automation-programmability-4.htm
33. https://www.youtube.com/watch?v=tcyR3P9PsUA
34. https://networklessons.com/cisco/ccna-200-301/introduction-to-rest-api
35. https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/technical-
reference/wpa3-dg.html
36. https://www.slideshare.net/slideshow/ccna-lab-4configuring-etherchannels-and-
optimizing-spanning-tree-protocol-on-switch-52843690/52843690
37. https://www.certificationkits.com/spanning-tree-protocol-ccna/