1 hour 43 minutes
welcome everyone to our first demo on S and M. P.
This lab will demonstrate a simple configuration for using S and MP version one
from our previous module became across term, such as M I B files. Oh, I ds and will be looking into this a little bit mawr to help you gain better understanding of the theory we discussed.
And if you understand how version one works from this demo, I'm sure you'll be able to manage with the other S and MP versions
S and M p version three maybe slightly tricky efforts. But as long as you have the idea of how S and P ISS successfully configured and with a little bit of practice, you'll be able to get the hang of things.
In our current set up I p addresses are put in place with brought a zero already configured with us and then p
we will then configure switch zero with S and M p. In the moment,
let's begin with a simple pink test from PC zero to switch zero around zero.
Now let's open the PC zero.
That's a justice A little bit.
Okay, let's head over to death. Stop
and let's pain to switch. 01 that fires.
Okay, great. And now rather zero
one that one.
Now let's do a quick verification on Broad A zero on the community string name already configured.
This will be needed on the M I B bronzer on PC zero.
Let's open up ground zero.
Let's go to cli
and let's use the symbol command show running config.
So, as you can see here, we use the community string broader S and P.
Now let's go to PC zero and open up M I B browser.
The M I B is structured in a tree like hierarchy. As you can see,
each parameter has its own object. Identify here or oh, I D's.
Thankfully, you won't have to memorize all these oh id's in actual network operations. However, when you wish to wanted to a parameter in your system
just copied the specified oh I d for that parameter
and enter it into your enemies for monitoring.
Let's say, for example, system up time, as we discussed in our previous module
uses this Oh, I d number
and system description
uses this'll a different Oh, I d number.
You can see the difference in the last three digits, where description uses 1.1 dot zero
and up time uses 1.3 dot zero.
All right, let's try to get some information on ground zero. So let's head over to the advanced settings
Wanting to was, if you got one, that one as rather zeros I p address read, Read Community is router and send them P
and will leave. The right community is blank.
I'm sure you're wondering what this community is all about. Well, it basically sets or modify settings on the device.
Normally, however, read only is all you need to simply monitor the system, and any configurations need to be made. You would simply access into the system and make the changes.
All right, so if we're done,
it's just click OK,
and let's try to see what we can grab from here. Let's see System description,
right? Let's expect this a little bit Mawr
or I hope everyone's able to see this properly. It's expend this a better view. All right, so PC zero
this try to
grab system description, for example.
Ah, he can see there is already grabbing some data
so we can see there the software or IOS version off rather zero.
That's the with around zero to verify this.
So just enter the command show version.
It's swirl up a little bit,
and you can see it's the same
to 100 software.
now that we've verified this,
let's try another parameter weaken test on,
let's say interface table, maybe
into face description.
Villain one and Fast Ethernet or the physical interfaces of rodders zero,
which is first eating at zero slash zero and Fast Ethernet zero slash one
and the Land one as the defaults villain interface.
Let's see if we added a new
the line interface,
this head of with your brother's ear and creates and you really under face. Let's say it interface well and fine.
So what happens from ECRI? Grabbed the data
and look at that. It adds it on
so you can see their real and five.
Now let's head over the switch zero to configure a centipede. Let's
closets and this for a moment
and let's hide the
and that's open up switch zero.
All right, let's
of this over
this move switch zeros configuration over here.
Let's begin and evil
But before we begin, let's see what happens when you try to configure a device
that has no s and MP enabled on it.
So that's how the words of PC zero
and defense sittings.
All right, let's change this to one. The five and the committee string that we planted, a figure would be
switch as an MP.
let's test it out. For example, from PC zero has tried to grab for the interfaces.
You can see that there's no information displayed
on and there's an error message that prompts up throwing the SNP command Error isn't to be request time doubts.
All right. So, Director, five insolence. Enter the command s and then peace server
So which s and M p
r o or read on Lee and enter
And always remember that any new configurations you make
safe your configurations with the command copy runs start a right. Selous tried to re grab the data again.
And there you have it. It's working. Cisco
2950 Let's head over to switch zero to verify this again
with show of version.
All right, so yes, it is C 2950
And let's say, for example,
to verify the
Let's check over here. Show pikey interface brief.
You can see that it has
physical interfaces up to port 24 with default. Villain one.
I see it grabs the same data as well,
All right. So you can see the villain. 1123
all the way up to
fast Ethernet 24.
Just the chair with you, access to devices with Reed and or right s and M P permissions should be strictly controlled.
And one way you could limit the access is through the use of access control lists or a C l's.
And we're done with their systolic dembo. Thank you, everyone. Its head over Tauron next module, which is about that flow.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
CompTIA Security+ 501
Empower yourself as a security professional by gaining the fundamental knowledge for securing a network ...