Skip to main content

Basic configuration

How setting up a Cisco device with some standard security practices may look like.

Editing config​

Global config mode​

note

In this documentation all config without a title will assume global configuration mode. Other options are:

  • >: unprivileged exec mode
  • #: privileged exec mode (enable)
>
enable
configure terminal

! List configuration options
?

! List subcommands of an option
interface ?

Base/standard config​

warning

Make sure to change all specified passwords.

This is how a standard base configuration for a Cisco device can look like:

! Typos
no ip domain-lookup

! Authorization
service password-encryption
enable secret class
username admin password cisco
banner motd "Authorized access only!"

! Hostname
hostname Device1

! SSH setup
ip domain-name example.com
ip ssh version 2
crypto key generate rsa general-keys modulus 2048

! Block login 120s when 3 attempts fail in 60s
login block-for 120 attempts 3 within 60

! Get amount of vty lines (usually 5 or 16)
do show line
do show run | i vty

! or line vty 0 15
line vty 0 4
! or transport input ssh telnet
transport input ssh
exec-timeout 15 0

! or password <password>
login local

line console 0
exec-timeout 15 0
login local

line aux 0
exec-timeout 15 0
login local

More SSH settings in the remote administration chapter.

Viewing config​

#
! Complete config
show running-config

! List options
show ?

! Filtering using begin / include / exclude / section
show ... | include regular-expression

Saving config​

#
! Different commands saving the config to disk
copy running-config startup-config
write memory
write

! Backup the config onto a tftp server
copy running-config tftp