SNMP Demo

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:00
welcome everyone to our first demo on S and M. P.
00:04
This lab will demonstrate a simple configuration for using S and MP version one
00:10
from our previous module became across term, such as M I B files. Oh, I ds and will be looking into this a little bit mawr to help you gain better understanding of the theory we discussed.
00:22
And if you understand how version one works from this demo, I'm sure you'll be able to manage with the other S and MP versions
00:29
S and M p version three maybe slightly tricky efforts. But as long as you have the idea of how S and P ISS successfully configured and with a little bit of practice, you'll be able to get the hang of things.
00:41
In our current set up I p addresses are put in place with brought a zero already configured with us and then p
00:47
we will then configure switch zero with S and M p. In the moment,
00:51
let's begin with a simple pink test from PC zero to switch zero around zero.
00:59
Now let's open the PC zero.
01:03
That's a justice A little bit.
01:07
Okay, let's head over to death. Stop
01:11
command prompt
01:12
and let's pain to switch. 01 that fires.
01:23
Okay, great. And now rather zero
01:26
one that one.
01:33
Now let's do a quick verification on Broad A zero on the community string name already configured.
01:41
This will be needed on the M I B bronzer on PC zero.
01:45
Let's open up ground zero.
01:49
Let's go to cli
01:55
Enable
01:57
and let's use the symbol command show running config.
02:02
So, as you can see here, we use the community string broader S and P.
02:08
Now let's go to PC zero and open up M I B browser.
02:21
The M I B is structured in a tree like hierarchy. As you can see,
02:25
each parameter has its own object. Identify here or oh, I D's.
02:31
Thankfully, you won't have to memorize all these oh id's in actual network operations. However, when you wish to wanted to a parameter in your system
02:40
just copied the specified oh I d for that parameter
02:45
and enter it into your enemies for monitoring.
02:52
Let's say, for example, system up time, as we discussed in our previous module
02:58
uses this Oh, I d number
03:01
and system description
03:05
uses this'll a different Oh, I d number.
03:07
You can see the difference in the last three digits, where description uses 1.1 dot zero
03:14
and up time uses 1.3 dot zero.
03:17
All right, let's try to get some information on ground zero. So let's head over to the advanced settings
03:29
and configure.
03:30
Wanting to was, if you got one, that one as rather zeros I p address read, Read Community is router and send them P
03:39
and will leave. The right community is blank.
03:43
I'm sure you're wondering what this community is all about. Well, it basically sets or modify settings on the device.
03:50
Normally, however, read only is all you need to simply monitor the system, and any configurations need to be made. You would simply access into the system and make the changes.
04:01
All right, so if we're done,
04:08
it's just click OK,
04:12
and let's try to see what we can grab from here. Let's see System description,
04:19
right? Let's expect this a little bit Mawr
04:25
or I hope everyone's able to see this properly. It's expend this a better view. All right, so PC zero
04:34
this try to
04:38
grab system description, for example.
04:42
Ah, he can see there is already grabbing some data
04:46
so we can see there the software or IOS version off rather zero.
04:51
That's the with around zero to verify this.
04:56
So just enter the command show version.
05:00
It's swirl up a little bit,
05:03
and you can see it's the same
05:06
to 100 software.
05:09
Okay,
05:11
now that we've verified this,
05:13
let's try another parameter weaken test on,
05:16
let's say interface table, maybe
05:21
into face description.
05:26
Okay, see
05:27
Villain one and Fast Ethernet or the physical interfaces of rodders zero,
05:33
which is first eating at zero slash zero and Fast Ethernet zero slash one
05:39
and the Land one as the defaults villain interface.
05:43
Let's see if we added a new
05:46
the line interface,
05:47
this head of with your brother's ear and creates and you really under face. Let's say it interface well and fine.
05:58
So what happens from ECRI? Grabbed the data
06:00
and look at that. It adds it on
06:03
so you can see their real and five.
06:08
Now let's head over the switch zero to configure a centipede. Let's
06:14
closets and this for a moment
06:18
and let's hide the
06:23
broader zero
06:26
and that's open up switch zero.
06:32
All right, let's
06:34
of this over
06:38
this move switch zeros configuration over here.
06:43
You're right.
06:45
Let's begin and evil
06:47
figure Terminal.
06:49
But before we begin, let's see what happens when you try to configure a device
06:56
that has no s and MP enabled on it.
07:00
So that's how the words of PC zero
07:03
and defense sittings.
07:09
All right, let's change this to one. The five and the committee string that we planted, a figure would be
07:15
switch as an MP.
07:19
Right? So,
07:23
goods,
07:24
let's test it out. For example, from PC zero has tried to grab for the interfaces.
07:30
You can see that there's no information displayed
07:34
at all
07:40
on and there's an error message that prompts up throwing the SNP command Error isn't to be request time doubts.
07:49
All right. So, Director, five insolence. Enter the command s and then peace server
07:57
community.
08:00
So which s and M p
08:03
r o or read on Lee and enter
08:07
And always remember that any new configurations you make
08:11
safe your configurations with the command copy runs start a right. Selous tried to re grab the data again.
08:20
And there you have it. It's working. Cisco
08:26
2950 Let's head over to switch zero to verify this again
08:31
with show of version.
08:39
All right, so yes, it is C 2950
08:45
All right.
08:46
And let's say, for example,
08:50
to verify the
08:54
interface.
08:56
Let's check over here. Show pikey interface brief.
09:03
You can see that it has
09:05
physical interfaces up to port 24 with default. Villain one.
09:11
I see it grabs the same data as well,
09:16
Go.
09:16
All right. So you can see the villain. 1123
09:22
all the way up to
09:24
fast Ethernet 24.
09:28
Just the chair with you, access to devices with Reed and or right s and M P permissions should be strictly controlled.
09:37
And one way you could limit the access is through the use of access control lists or a C l's.
09:48
And we're done with their systolic dembo. Thank you, everyone. Its head over Tauron next module, which is about that flow.
Up Next