200-105 Interconnecting Cisco Networking Devices part 2 CCNA CCNA R&S CCNA routing and switching Certifications Cisco Cisco Certified Network Associate v3.0 (200-125) Cisco Lab CCNA SNMP

Configure and verify SNMP version 3.0 using GNS3

Published by:

Configure and verify SNMP version 3.0 using GNS3

Configure and verify SNMP version 3.0, in a Cisco IOS Software, 7200 Software (C7200-ADVENTERPRISEK9-M), Version 15.2(4) using GNS3

R5(config)#snmp-server ?
chassis-id String to uniquely identify this chassis
community Enable SNMP; set community string and access privs
contact Text for mib object sysContact
context Create/Delete a context apart from default
drop Silently drop SNMP packets
enable Enable SNMP Traps
engineID Configure a local or remote SNMPv3 engineID
file-transfer File transfer related commands
group Define a User Security Model group
host Specify hosts to receive SNMP notifications
ifindex Enable ifindex persistence
inform Configure SNMP Informs options
ip IP ToS configuration for SNMP traffic
location Text for mib object sysLocation
manager Modify SNMP manager parameters
packetsize Largest SNMP packet size
queue-length Message queue length for each TRAP host
queue-limit Message queue size for different queues
source-interface Assign an source interface
system-shutdown Enable use of the SNMP reload command
tftp-server-list Limit TFTP servers used via SNMP
trap SNMP trap options

R5(config)#snmp-server group ?
WORD Name of the group

R5(config)#snmp-server group CompleteCCNA ?
v1 group using the v1 security model
v2c group using the v2c security model
v3 group using the User Security Model (SNMPv3)

R5(config)#snmp-server group CompleteCCNA v3 ?
auth group using the authNoPriv Security Level
noauth group using the noAuthNoPriv Security Level
priv group using SNMPv3 authPriv security level

R5(config)#snmp-server group CompleteCCNA v3 auth ?
access specify an access-list associated with this group
context specify a context to associate these views for the group
match context name match criteria
notify specify a notify view for the group
read specify a read view for the group
write specify a write view for the group

R5(config)#snmp-server group CompleteCCNA v3 auth access ?
Std IP accesslist allowing access with this group
WORD Access-list name
ipv6 Specify IPv6 Named Access-List

R5(config)#snmp-server group CompleteCCNA v3 auth access mysnmp

Now, configuring a user
R5(config)#snmp-server user ?

WORD Name of the user

R5(config)#snmp-server user UpassCCNA ?
WORD Group to which the user belongs

R5(config)#snmp-server user UpassCCNA CompleteCCNA ?
remote Specify a remote SNMP entity to which the user belongs
v1 user using the v1 security model
v2c user using the v2c security model
v3 user using the v3 security model

R5(config)#snmp-server user UpassCCNA CompleteCCNA v3 ?
access specify an access-list associated with this group
auth authentication parameters for the user
encrypted specifying passwords as MD5 or SHA digests

R5(config)#snmp-server user UpassCCNA CompleteCCNA v3 auth ?
md5 Use HMAC MD5 algorithm for authentication
sha Use HMAC SHA algorithm for authentication

R5(config)#snmp-server user UpassCCNA CompleteCCNA v3 auth md5 ?
WORD authentication pasword for user

R5(config)#snmp-server user UpassCCNA CompleteCCNA v3 auth md5 passedccna
R5(config)#
*Sep 25 10:49:37.155: Configuring snmpv3 USM user, persisting snmpEngineBoots. Please Wait…

R5(config)#end
R5(config)#snmp-server engine?
engineID

R5(config)#snmp-server engineID ?
local engineID of the local agent
remote engineID of the remote agent

R5(config)#snmp-server engineID remote ?
WORD Hostname or IP/IPv6 address of SNMP notification host

R5(config)#snmp-server engineID remote 10.3.1.11 ?
WORD engine ID octet string
udp-port The remote notification host’s UDP port number
vrf The remote notification host’s VPN routing instance

R5(config)#snmp-server engineID remote 10.3.1.11 udp-port ?
><0-65535> The remote notification host’s UDP port number
R5(config)#snmp-server engineID remote 10.3.1.11 udp-port 120 ?
WORD engine ID octet string
vrf The remote notification host’s VPN routing instance

R5(config)#snmp-server engineID remote 10.3.1.11 udp-port 120 ?
WORD engine ID octet string
vrf The remote notification host’s VPN routing instance

R5(config)#snmp-server engineID remote 10.3.1.11 udp-port 120 005079666800

Verify the SNMP configuration

 
R5#show snmp group
groupname: ILMI security model:v1
contextname: storage-type: permanent
readview : *ilmi writeview: *ilmi
notifyview:
row status: active

groupname: ILMI security model:v2c
contextname: storage-type: permanent
readview : *ilmi writeview: *ilmi
notifyview:
row status: active

groupname: CompleteCCNA security model:v3 auth
contextname: storage-type: nonvolatile
readview : v1default writeview:
notifyview:
row status: active access-list: mysnmp

R5#show snmp user

User name: UpassCCNA
Engine ID: 800000090300CA0515940000
storage-type: nonvolatile active
Authentication Protocol: MD5
Privacy Protocol: None
Group-name: CompleteCCNA

R5#show snmp engineID
Local SNMP engineID: 800000090300CA0515940000
Remote Engine ID IP-addr Port
005079666800 remote 10.3.1.11 120

Some example of configuration of snmpv3
1 -noAuthNoPriv
2-authNoPriv
3-priv

 

200-105 Interconnecting Cisco Networking Devices part 2 CCNA CCNA routing and switching Certifications Cisco Cisco Lab CCNA Common commads router IP Service Level Agreement SLA

Configure and schedule IP SLA

Published by:

Configure and schedule IP SLA
The example is how configure IP SLA 13 and 14 on a Cisco router, version of Cisco IOS Software, 7200 Software (C7200-ADVENTERPRISEK9-M), Version 15.2(4) using GNS3

R3(config)#ip sla 13
R3(config-ip-sla)#?
IP SLAs entry configuration commands:
dhcp         DHCP Operation
dns          DNS Query Operation
ethernet     Ethernet Operations
exit         Exit Operation Configuration
ftp          FTP Operation
http         HTTP Operation
icmp-echo    ICMP Echo Operation
icmp-jitter  ICMP Jitter Operation
mpls         MPLS Operation
path-echo    Path Discovered ICMP Echo Operation
path-jitter  Path Discovered ICMP Jitter Operation
tcp-connect  TCP Connect Operation
udp-echo     UDP Echo Operation
udp-jitter   UDP Jitter Operation
voip         Voice Over IP Operation

R3(config-ip-sla)#icmp-echo 172.14.0.3 source-ip 192.168.2.1
R3(config-ip-sla)#frequency 300
R3(config-ip-sla)#ip sla schedule 13 life forever start-time now

Configure the IP SLA 14

R3(config)#ip sla 14
R3(config-ip-sla)#icmp-echo 192.168.16.1 source-ip 192.168.2.1
R3(config-ip-sla)#ip sla schedule 14 life forever start-time now
Configure IP SLA, cisco IOS 15 GNS3
Verify IP SLA

R3#show ip sla summary
IPSLAs Latest Operation Summary
Codes: * active, ^ inactive, ~ pending

ID Type Destination Stats Return Last
(ms) Code Run
———————————————————————–
*13 icmp-echo 172.14.0.3 – Timeout 2 minutes, 57 seconds ago

*14 icmp-echo 192.168.16.1 RTT=76 OK 25 seconds ago

Download complete simulate CCNA, ICND2 v3.0 lab done with GNS3 (0 downloads)
ACLs CCENT CCNA CCNA R&S CCNA routing and switching Certifications Cisco Cisco Certified Network Associate v3.0 (200-125) Cisco Lab CCNA EIGRP for IPv4 EIGRP for IPv6 EtherChannel o Port-Channel Generic Route Encapsulation GRE Hot Standby Router Protocol OSPFv2 multi area OSPFv2 single area PPP PPPoE

Complete simulate CCNA, ICND2 v3.0 lab done with GNS3

Published by:

Complete simulate CCNA, ICND2 v3.0 lab done with GNS3

The complete CCNA lab simulate network done with GNS3 include:
HSRP,
DUAL OSPF for where OSPFv2 for IPv4 and OSPFv3 IPv6
Dual EIGRP, EIGRP for IPv4 and EIGRP for IPv6
PPPoE
ACL
GRE tunnel
eBGP
Inter-vlan trunking
Etherchannel
Multilink

 

Complete CCNA lab ICND2 v3.0

Download now, the complete simulate CCNA, ICND2 v3.0 lab done with GNS3
Download complete simulate CCNA, ICND2 v3.0 lab done with GNS3 (0 downloads)

CCENT CCNA CCNA routing and switching Certificate Cisco

Which of the following network statements will announce the 172.14.0.0/24 network using eBGP ?

Published by:

Which of the following network statements will announce the 172.14.0.0/24 network using eBGP ?

  • 1- 172.14.0.0 0.0.0.255
  • 2- 172.14.0.0 0.0.0.255 area 0
  • 3- 172.14.0.0 mask 255.255.255.0
  • 4- 172.14.0.0/24


  • The correct answer is:

  • 3- 172.14.0.0 mask 255.255.255.0 
  • Verify BGP.

    Practice Cisco ICND2 v3.0(200-105) exam or IT skills
    Practice Cisco ICND2 v3.0(200-105)

    CCENT CCNA CCNA routing and switching Certificate Cisco

    Which stages will a port skip when PortFast is enabled?

    Published by:

    Which stages will a port skip when PortFast is enabled?

  • 1- Blocking
  • 2- Forwarding
  • 3- Learning
  • 4- Listening


  • The correct answer is:

  • 3- Learning 
  • 4- Listening 
  • When the PortFast feature is enabled on a switch port that is configured as an access port, that port bypasses the typical STP listening and learning states. This feature allows the port to transition from the blocking state to the forwarding state immediately. .

    Practice Cisco ICND2 v3.0(200-105) exam or IT skills
    Practice Cisco ICND2 v3.0(200-105)

    CCENT CCNA CCNA routing and switching Certificate Cisco

    You need to add an IP phone to a user’s office with the least amount of cost and administrative effort. What should you do?

    Published by:

    You need to add an IP phone to a user’s office with the least amount of cost and administrative effort. What should you do?

  • 1- Add a new dual port NIC to the user’s computer.
  • 2- Add a new network drop to the office.
  • 3- Configure the VLAN to also transport voice data.
  • 4- Configure VTP


  • The correct answer is:

  • 3- Configure the VLAN to also transport voice data. 
  • CISCO, SWITCHPORT VOICE VLAN 43
    .

    Practice Cisco ICND2 v3.0(200-105) exam or IT skills
    Practice Cisco ICND2 v3.0(200-105)

    CCENT CCNA CCNA routing and switching Certificate Cisco

    What Spanning Tree Protocol (STP) mechanism disables a PortFast enabled port if a BPDU is received?

    Published by:

    What Spanning Tree Protocol (STP) mechanism disables a PortFast enabled port if a BPDU is received?

  • 1- BPDU filter
  • 2- BPDU guard
  • 3- Loop guard
  • 4- Root guard


  • The correct answer is:

  • 2- BPDU guard 
  • BPDU guard protects the integrity of ports that are PortFast-enabled. If any BPDUs are received on a PortFast-enabled port, that port is put into an error-disabled state. The port is shut down and must be manually re-enabled or automatically recovered through the error-disabled timeout function.

    BPDU Guard by Cisco.

    Practice Cisco ICND2 v3.0(200-105) exam or IT skills
    Practice Cisco ICND2 v3.0(200-105)