Time
1 hour 43 minutes
Difficulty
Intermediate
CEU/CPE
2

Video Transcription

00:00
welcome everyone to our first demo on S and M. P.
00:04
This lab will demonstrate a simple configuration for using S and MP version one
00:10
from our previous module became across term, such as M I B files. Oh, I ds and will be looking into this a little bit mawr to help you gain better understanding of the theory we discussed.
00:22
And if you understand how version one works from this demo, I'm sure you'll be able to manage with the other S and MP versions
00:29
S and M p version three maybe slightly tricky efforts. But as long as you have the idea of how S and P ISS successfully configured and with a little bit of practice, you'll be able to get the hang of things.
00:41
In our current set up I p addresses are put in place with brought a zero already configured with us and then p
00:47
we will then configure switch zero with S and M p. In the moment,
00:51
let's begin with a simple pink test from PC zero to switch zero around zero.
00:59
Now let's open the PC zero.
01:03
That's a justice A little bit.
01:07
Okay, let's head over to death. Stop
01:11
command prompt
01:12
and let's pain to switch. 01 that fires.
01:23
Okay, great. And now rather zero
01:26
one that one.
01:33
Now let's do a quick verification on Broad A zero on the community string name already configured.
01:41
This will be needed on the M I B bronzer on PC zero.
01:45
Let's open up ground zero.
01:49
Let's go to cli
01:55
Enable
01:57
and let's use the symbol command show running config.
02:02
So, as you can see here, we use the community string broader S and P.
02:08
Now let's go to PC zero and open up M I B browser.
02:21
The M I B is structured in a tree like hierarchy. As you can see,
02:25
each parameter has its own object. Identify here or oh, I D's.
02:31
Thankfully, you won't have to memorize all these oh id's in actual network operations. However, when you wish to wanted to a parameter in your system
02:40
just copied the specified oh I d for that parameter
02:45
and enter it into your enemies for monitoring.
02:52
Let's say, for example, system up time, as we discussed in our previous module
02:58
uses this Oh, I d number
03:01
and system description
03:05
uses this'll a different Oh, I d number.
03:07
You can see the difference in the last three digits, where description uses 1.1 dot zero
03:14
and up time uses 1.3 dot zero.
03:17
All right, let's try to get some information on ground zero. So let's head over to the advanced settings
03:29
and configure.
03:30
Wanting to was, if you got one, that one as rather zeros I p address read, Read Community is router and send them P
03:39
and will leave. The right community is blank.
03:43
I'm sure you're wondering what this community is all about. Well, it basically sets or modify settings on the device.
03:50
Normally, however, read only is all you need to simply monitor the system, and any configurations need to be made. You would simply access into the system and make the changes.
04:01
All right, so if we're done,
04:08
it's just click OK,
04:12
and let's try to see what we can grab from here. Let's see System description,
04:19
right? Let's expect this a little bit Mawr
04:25
or I hope everyone's able to see this properly. It's expend this a better view. All right, so PC zero
04:34
this try to
04:38
grab system description, for example.
04:42
Ah, he can see there is already grabbing some data
04:46
so we can see there the software or IOS version off rather zero.
04:51
That's the with around zero to verify this.
04:56
So just enter the command show version.
05:00
It's swirl up a little bit,
05:03
and you can see it's the same
05:06
to 100 software.
05:09
Okay,
05:11
now that we've verified this,
05:13
let's try another parameter weaken test on,
05:16
let's say interface table, maybe
05:21
into face description.
05:26
Okay, see
05:27
Villain one and Fast Ethernet or the physical interfaces of rodders zero,
05:33
which is first eating at zero slash zero and Fast Ethernet zero slash one
05:39
and the Land one as the defaults villain interface.
05:43
Let's see if we added a new
05:46
the line interface,
05:47
this head of with your brother's ear and creates and you really under face. Let's say it interface well and fine.
05:58
So what happens from ECRI? Grabbed the data
06:00
and look at that. It adds it on
06:03
so you can see their real and five.
06:08
Now let's head over the switch zero to configure a centipede. Let's
06:14
closets and this for a moment
06:18
and let's hide the
06:23
broader zero
06:26
and that's open up switch zero.
06:32
All right, let's
06:34
of this over
06:38
this move switch zeros configuration over here.
06:43
You're right.
06:45
Let's begin and evil
06:47
figure Terminal.
06:49
But before we begin, let's see what happens when you try to configure a device
06:56
that has no s and MP enabled on it.
07:00
So that's how the words of PC zero
07:03
and defense sittings.
07:09
All right, let's change this to one. The five and the committee string that we planted, a figure would be
07:15
switch as an MP.
07:19
Right? So,
07:23
goods,
07:24
let's test it out. For example, from PC zero has tried to grab for the interfaces.
07:30
You can see that there's no information displayed
07:34
at all
07:40
on and there's an error message that prompts up throwing the SNP command Error isn't to be request time doubts.
07:49
All right. So, Director, five insolence. Enter the command s and then peace server
07:57
community.
08:00
So which s and M p
08:03
r o or read on Lee and enter
08:07
And always remember that any new configurations you make
08:11
safe your configurations with the command copy runs start a right. Selous tried to re grab the data again.
08:20
And there you have it. It's working. Cisco
08:26
2950 Let's head over to switch zero to verify this again
08:31
with show of version.
08:39
All right, so yes, it is C 2950
08:45
All right.
08:46
And let's say, for example,
08:50
to verify the
08:54
interface.
08:56
Let's check over here. Show pikey interface brief.
09:03
You can see that it has
09:05
physical interfaces up to port 24 with default. Villain one.
09:11
I see it grabs the same data as well,
09:16
Go.
09:16
All right. So you can see the villain. 1123
09:22
all the way up to
09:24
fast Ethernet 24.
09:28
Just the chair with you, access to devices with Reed and or right s and M P permissions should be strictly controlled.
09:37
And one way you could limit the access is through the use of access control lists or a C l's.
09:48
And we're done with their systolic dembo. Thank you, everyone. Its head over Tauron next module, which is about that flow.

Up Next

Network Operational Management

This course is designed to help network specialists understand the responsibilities and best practices involved with monitoring and managing network operations.

Instructed By

Instructor Profile Image
Sheane Jayne
Network Engineer
Instructor