{"id":470,"date":"2018-09-23T14:16:46","date_gmt":"2018-09-23T14:16:46","guid":{"rendered":"https:\/\/www.secureethics.com\/?p=470"},"modified":"2018-09-23T14:26:03","modified_gmt":"2018-09-23T14:26:03","slug":"cisco-ios-access-levels-and-mode-of-command-hierarchy","status":"publish","type":"post","link":"https:\/\/secureethics.com\/?p=470","title":{"rendered":"Cisco IOS access levels and mode of command hierarchy"},"content":{"rendered":"<p><span style=\"color: #000000;\">Cisco router&#8217;s and switch&#8217;s having two levels of access modes as below<\/span><\/p>\n<h5><span style=\"color: #000000;\">1. U<a style=\"color: #000000;\">ser EXEC level<\/a><\/span><\/h5>\n<p><span style=\"color: #000000;\">This level allows you to access only basic monitoring commands.<\/span><\/p>\n<h5><span style=\"color: #000000;\">2. P<a style=\"color: #000000;\">rivileged EXEC level<\/a><\/span><\/h5>\n<ul>\n<li><span style=\"color: #000000;\">This level allows you to access all router commands. Privileged EXEC level can be password protected to allow only authorized users the ability to configure or manage the router<\/span><\/li>\n<li><span style=\"color: #000000;\">From privileged EXEC level, you can access all the <a style=\"color: #000000;\">command modes <\/a><\/span><\/li>\n<li><span style=\"color: #000000;\">There are five command modes and <a style=\"color: #000000;\">each command mode permits you to configure different configuration components.<\/a>:<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 1. global configuration mode<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 2. interface configuration mode<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 3. subinterface configuration mode<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 4. router configuration mode<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 5. line configuration mode<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">The following table is a summary of command prompts and the corresponding location within the command structure<\/span><\/p>\n<table style=\"height: 220px;\" border=\"\" width=\"634\" cellspacing=\"1\" cellpadding=\"2\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router&gt;<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; User EXEC mode<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router#<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; Privileged EXEC mode<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router(config)#<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; global configuration mode (# sign indicates this is accessible only at privileged EXEC mode)<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router(config-if)#<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; Interface level within configuration mode<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router(config-router)#<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; Routing engine level within configuration mode<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" bgcolor=\"#FFF7D6\" width=\"174\"><span style=\"color: #000000;\">Router(config-line)#<\/span><\/td>\n<td style=\"text-align: left;\" bgcolor=\"#E7FBFF\" width=\"228\"><span style=\"color: #000000;\">&#8211; Line level (<a style=\"color: #000000;\">vty<\/a>, tty, async) within configuration mode<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco router&#8217;s and switch&#8217;s having two levels of access modes as below 1. User EXEC level This level allows you to access only basic monitoring commands. 2. Privileged EXEC level This level allows you to access all router commands. Privileged&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":473,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking"],"_links":{"self":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=470"}],"version-history":[{"count":0,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/media\/473"}],"wp:attachment":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}