Lab 7.4.5 Configure SNMP Messages On A Cisco Router: Objective
Lab 7.4.5 Configure SNMP Messages On A Cisco Router: Objective
Objective
In this lab, the students will complete the following tasks:
Enable SNMP community string
Establishing the Contact and location of the SNMP Agent
Testing the configuration
Limit SNMP to inside server
Disable SNMP traps, SNMP service and associated access list
Scenario
A small company has recently expanded. The IT department is having problems maintaining logs,
configuration changes, and so on. The security policy has been updated allowing SNMP
management of key devices. SNMP access must be limited to key management stations.
Topology
This figure illustrates the lab network environment.
Preparation
Begin with the standard lab topology and verify the starting configuration on the pod router. Test
the connectivity between the pod routers. Access the perimeter router console port using the
terminal emulator on the Student PC. If desired, save the router configuration to a text file for later
analysis. Refer back to the Student Lab Orientation if more help is needed.
1-5 Network Security 2 v2.0 – Lab 7.4.5 Copyright ♥ 2005, Cisco Systems, Inc.
Tools and resources or equipment
In order to complete the lab, the following is required:
Standard IOS Firewall lab topology
Console cable
HyperTerminal
Kiwi Syslog Server
Additional materials
Further information about the objectives covered in this lab can be found at the following websites:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_chapter091
86a008030c762.html
http://www.kiwisyslog.com
Command list
In this lab exercise, the following commands will be used. Refer to this list if assistance or help
is needed during the lab exercise.
Command Description
snmp-server enable traps snmp Enables the sending of traps and specifies the type of
notification to be sent.
b. After opening the Kiwi application navigate to File>Setup or click on the Setup Icon in the
menu bar.
c. Go to Inputs>SNMP.
2-5 Network Security 2 v2.0 – Lab 7.4.5 Copyright ♥ 2005, Cisco Systems, Inc.
d. Check the Listen for SNMP Traps.
e. Notice that the Syslog server can be configured to send alerts automatically via email. Also,
note the port number that SNMP uses for listening for traps, this will be used later.
f. Click the OK button.
3-5 Network Security 2 v2.0 – Lab 7.4.5 Copyright ♥ 2005, Cisco Systems, Inc.
Step 4 Configure the Router to Send Traps to a Host
a. To enable all the SNMP trap types at once, use the snmp-server enable traps snmp
command.
RouterP(config)#snmp-server enable traps snmp
b. Specify to the router what host the trap notifications will be sent to by using the snmp-
server host host community_string udp-port port_number command.
RouterP(config)#snmp-server host 10.0.P.12 writemib udp-port 162
c. Look at the applications main window to see the UDP-port that it is listening on.
1. If the default for an SNMP response is on port 162, what port is the request sent on?
__________________________________________________________________________
2. Why is it important to know the SNMP port?
__________________________________________________________________________
4-5 Network Security 2 v2.0 – Lab 7.4.5 Copyright ♥ 2005, Cisco Systems, Inc.
1. Were the new traps displayed?
__________________________________________________________________________
d. If desired, compare the running configuration with the ending configuration provided for this lab.
5-5 Network Security 2 v2.0 – Lab 7.4.5 Copyright ♥ 2005, Cisco Systems, Inc.