CCNA Security Lab 14 - Cisco IOS SYSLOG and SNMP Configuration - CLI
CCNA Security Lab 14 - Cisco IOS SYSLOG and SNMP Configuration - CLI
net
CCNA Security Lab 14 - Cisco IOS SYSLOG and SNMP Configuration - CLI
Lab 14
Lab Objective:
The objective of this lab exercise is for you to learn and understand how
Lab Purpose:
Syslog and SNMP are tools that can be used to provide security-related
Lab Difficulty:
Readiness Assessment:
When you are ready for your certification exam, you should complete this lab in
Lab Topology:
Task 1:
addition, configure Host 1 with the IP address specified and a default gateway
of 172.16.1.1.
NOTE:
If you do not have a Host in your lab, you can simply substitute Host 1 for another router with an Ethernet
interface and a default static route pointing to 172.16.1.1.
Task 2:
Configure the following Loopback interfaces on R1:
Task 3:
Configure an extended ACL on R1 that provides the most detailed logging on all traffic to the Loopback10,
Loopback20 and Loopback30 subnets. This ACL should deny all IP traffic to these subnets. Apply this ACL inbound on
the FastEthernet0/0 interface of R1.
Task 4:
Configure the local time on R1 as 20:00 GMT/UTC using today's date for the clock date.
Task 5:
In addition to this, configure the logs to show the date and time, as w ell as the time zone. And, finally, configure R1
so that all logs include sequence numbers for easier identification.
Task 6:
Task 7:
Clear your logs and verify your configuration by pinging from Host 1 to any of the Loopback interfaces on R1. There
should be entries that provided detailed information in the local router buffer. You can also Telnet from Host 1 to any
of the Loopback interfaces on R1.
Verify your SNMP configuration by entering/exiting configuration mode on R1. If you have configured this correctly,
you will see SNMP traps being sent by R1.
Task 1:
Router(config)#hostname R1
R1(config)#interface f0/0
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#exit
R1(config)#int lo 10
R1(config-if)#exit
R1(config)#int lo 20
R1(config-if)#exit
R1(config)#int lo 30
R1(config-if)#exit
R1(config)#exit
R1#
R1#
R1#show ip interface brief
Task 3:
To complete this Task, do not forget that there is an implicit deny all statement at the end of ACLS; therefore ensure
that you permit all other traffic once your deny statements are done.
R1(config-ext-nacl)#exit
R1(config)#int fast0/0
R1(config-if)#exit
R1(config)#exit
R1#
----[Truncated Output]----
Task 4:
R1(config)#exit
R1#
R1#show clock
Task 5:
R1(config)#logging on
R1(config)#service sequence-numbers
R1( fi )# it
R1(config)#exit
R1#
R1#show logging
filtering disabled
filtering disabled
filtering disabled
Task 6:
R1(config)#exit
R1#
R1#
R1#show snmp
Chassis: FTX0915A2V4
0 Encoding errors
0 Get-request PDUs
0 Get-next PDUs
0 Set-request PDUs
0 General errors
0 Response PDUs
2 Trap PDUs
Task 7:
R1#clear log
R1#
R1#show logging
filtering disabled
filtering disabled
filtering disabled
filtering disabled
R1#
Now, perform a ping from Host 1 to any Loopback interface on R1 and verify the logs:
R1#show logging
filtering disabled
M it l i l ld b i 0 l d l di bl d
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
filtering disabled
filtering disabled
To validate SNMP, use the debug snmp packets command and then access configuration mode. You will see SNMP
traps being sent by R1 to the SNMP server 172.16.1.254
R1#
R1#config t
R1(config)#
R1(config)#
000120: Jul 28 20:33:22.727: SNMP: V1 Trap, ent ciscoConfigManMIB.2, addr 172.16.1.1, gentrap 6,
spectrap 1
ccmHistoryEventEntry.3.32 = 1
ccmHistoryEventEntry.4.32 = 2
ccmHistoryEventEntry.5.32 = 3
R1(config)#exit
R1#
R1#conf
R1(config)#
000124: Jul 28 20:33:39.975: SNMP: V1 Trap, ent ciscoConfigManMIB.2, addr 172.16.1.1, gentrap 6,
spectrap 1
ccmHistoryEventEntry.3.33 = 1
ccmHistoryEventEntry.4.33 = 2
ccmHistoryEventEntry.5.33 = 3
R1(config)#exit
R1#
R1#undebug all
Lab 14 Configurations
R1 Configuration
R1#show running-config
Building configuration...
version 12.4
no service password-encryption
service sequence-numbers
hostname R1
boot-start-marker
boot-end-marker
no aaa new-model
no network-clock-participate slot 1
no network-clock-participate w ic 0
ip cef
!
archive
log config
hidekeys
interface Loopback10
interface Loopback20
interface Loopback30
interface FastEthernet0/0
ip access-group DETAILED-LOGGING in
duplex auto
duplex auto
speed auto
interface Serial0/0
no ip address
shutdow n
ip forward-protocol nd
ip http server
ip http secure-server
logging 172.16.1.254
control-plane
line con 0
line aux 0
line vty 0 4
privilege level 15
password cisco
login
g
end