Week2 Lab 2 - Configure Cisco IOS Resilience Management and Reporting-Modified-1
Week2 Lab 2 - Configure Cisco IOS Resilience Management and Reporting-Modified-1
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway Switch Port
R2
G0/0/1 10.2.2.2 255.255.255.252 N/A N/A
R3 G0/0/0 10.2.2.1 255.255.255.252 N/A N/A
R3
G0/0/1 192.168.3.1 255.255.255.0 N/A S3 F0/5
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 1 of 12 www.netacad.com
OFFICIAL
OFFICIAL
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure SNMPv3 Security using an ACL.
Part 3: Configure a router as a synchronized time source for other devices using NTP.
Part 4: Configure syslog support on a router.
Background / Scenario
The router is a critical component in any network. It controls the movement of data into and out of the network
and between devices within the network. It is particularly important to protect network routers because the
failure of a routing device could make sections of the network, or the entire network, inaccessible. Controlling
access to routers and enabling reporting on routers is critical to network security and should be part of a
comprehensive security policy.
In this lab, you will build a multi-router network and configure the routers and hosts. You will configure SNMP,
NTP, and syslog support to monitor router configuration changes.
Note: The routers used with hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.6 (universalk9
image). The switches used in the labs are Cisco Catalyst 2960+ with Cisco IOS Release 15.2(7) (lanbasek9
image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco
IOS version, the commands available and the output produced might vary from what is shown in the labs.
Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: Before you begin, ensure that the routers and the switches have been erased and have no startup
configurations.
Required Resources
3 Routers (Cisco 4221 with Cisco XE Release 16.9.6 universal image or comparable with a Security
Technology Package license)
2 Switches (Cisco 2960+ with Cisco IOS Release 15.2(7) lanbasek9 image or comparable)
2 PCs (Windows OS with a terminal emulation program, such as PuTTY or Tera Term installed)
Console cables to configure Cisco networking devices
Ethernet cables as shown in the topology
Instructions
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 2 of 12 www.netacad.com
OFFICIAL
OFFICIAL
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 3 of 12 www.netacad.com
OFFICIAL
OFFICIAL
b. Issue the show ip route command to verify that all networks display in the routing table on all routers.
R1# show ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
a - application route
+ - replicated route, % - next hop override, p - overrides from PfR
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 4 of 12 www.netacad.com
OFFICIAL
OFFICIAL
Part 2: Configure SNMPv3 Security using an ACL. (Skip part 2 if you do this lab on
packet tracer as PT doesn’t support SNMPv3)
Simple Network Management Protocol (SNMP) enables network administrators to monitor network
performance, mange network devices, and troubleshoot network problems. SNMPv3 provides secure access
by authenticating and encrypting SNMP management packets over the network. You will configure SNMPv3
using an ACL on R1.
Step 1: Configure an ACL on R1 that will restrict access to SNMP on the 192.168.1.0 LAN.
Open configuration window
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 5 of 12 www.netacad.com
OFFICIAL
OFFICIAL
b. Use the command show snmp user to view the SNMP user information.
Note: The snmp-server user command is hidden from view in the configuration for security reasons.
However, if you need to make changes to a SNMP user, you can issue the command no snmp-server
user to remove the user from the configuration, and then re-add the user with the new parameters.
R1# show snmp user
a. Use the show clock command to display the current time set on the router.
R2# show clock
*18:18:25.443 UTC Sun Jan 31 2021
b. To set the time on the router, use the clock set time command.
R2# clock set 11:17:00 Jan 31 2021
R2#
*Jan 31 11:17:00.001: %SYS-6-CLOCKUPDATE: System clock has been updated from
18:19:03 UTC Sun Jan 31 2021 to 11:17:00 UTC Sun Jan 31 2021, configured from
console by console.
Jan 31 11:17:00.001: %PKI-6-AUTHORITATIVE_CLOCK: The system clock has been
set.
c. Configure NTP authentication by defining the authentication key number, hashing type, and password
that will be used for authentication. The password is case sensitive.
R2# config t
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 6 of 12 www.netacad.com
OFFICIAL
OFFICIAL
b. Configure NTP authentication by defining the authentication key number, hashing type, and password
that will be used for authentication.
R1# config t
R1(config)# ntp authentication-key 1 md5 NTPpassword
R1(config)#
*Jan 31 18:41:23.707: NTP Core(INFO): keys initilized.
*Jan 31 18:41:23.712: NTP Core(NOTICE): proto: precision = usec
*Jan 31 18:41:23.712: %NTP : Drift Read Failed (String Error).
*Jan 31 18:41:23.712: NTP Core(DEBUG): drift value read: 0.000000000
*Jan 31 18:41:23.712: NTP Core(NOTICE): ntpd PPM
*Jan 31 18:41:23.712: NTP Core(NOTICE): trans state : 1
*Jan 31 18:41:23.712: NTP: Initialized interface GigabitEthernet0/0/0
*Jan 31 18:41:23.712: NTP: Initialized interface GigabitEthernet0/0/1
*Jan 31 18:41:23.712: NTP: Initialized interface LIIN0
R1(config)#
*Jan 31 18:41:23.713: NTP Core(INFO): more memory added for keys.
*Jan 31 18:41:23.713: NTP Core(INFO): key (1) added.
c. Configure the trusted key that will be used for authentication. This command provides protection against
accidentally synchronizing the device to a time source that is not trusted.
R1(config)# ntp trusted-key 1
R1(config)#
*Jan 31 18:43:56.191: NTP Core(INFO): key (1) marked as trusted.
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 7 of 12 www.netacad.com
OFFICIAL
OFFICIAL
e. R1 and R3 will become NTP clients of R2. Use the command ntp server hostname. The host name can
also be an IP address.
Note: The command ntp update-calendar may be necessary to periodically updates the calendar with
the NTP time for other IOS images.
R1(config)# ntp server 10.1.1.2
R1(config)#
*Jan 31 18:45:29.714: NTP message sent to 10.1.1.2, from interface
'GigabitEthernet0/0/0' (10.2.2.1).
*Jan 31 18:45:29.715: NTP message received from 10.1.1.2 on interface
'GigabitEthernet0/0/0' (10.2.2.1).
*Jan 31 18:45:29.716: NTP Core(DEBUG): ntp_receive: message received
*Jan 31 18:45:29.716: NTP Core(DEBUG): ntp_receive: peer is 0x80007FA135BB32F8, next
action is 1.
*Jan 31 18:45:29.716: NTP Core(DEBUG): Peer becomes reachable, poll set to 6.
f. Issue the undebug all or the no debug ntp all command to turn off debugging.
R1# undebug all
g. Verify that R1 has made an association with R2 with the show ntp associations command. You can also
use the more verbose version of the command by adding the detail argument. It might take some time for
the NTP association to form.
R1# show ntp associations
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 8 of 12 www.netacad.com
OFFICIAL
OFFICIAL
Step 2: Configure R1 to log messages to the syslog server using the CLI.
a. Start the syslog server.
b. Verify that you have connectivity between R1 and PC-A by pinging the R1 G0/0/1 interface IP address
192.168.1.1. If it is not successful, troubleshoot as necessary before continuing.
c. NTP was configured in a previous part to synchronize the time on the network. Displaying the correct time
and date in syslog messages is vital when using syslog to monitor a network. If the correct time and date
of a message is not known, it can be difficult to determine what network event caused the message.
Verify that the timestamp service for logging is enabled on the router using the show run command. Use
the following command if the timestamp service is not enabled.
Open configuration window
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 9 of 12 www.netacad.com
OFFICIAL
OFFICIAL
b. Define the level of severity for messages sent to the syslog server. To configure the severity levels, use
either the keyword or the severity level number (0–7).
Severity Level Keyword Meaning
0 emergencies System is unusable
1 alerts Immediate action required
2 critical Critical conditions
3 errors Error conditions
4 warnings Warning conditions
5 notifications Normal but significant condition
6 informational Informational messages
7 debugging Debugging messages
Note: The severity level includes the level specified and anything with a lower severity number. For
example, if you set the level to 4, or use the keyword warnings, you capture messages with severity level
4, 3, 2, 1, and 0.
c. Use the logging trap command to set the severity level for R1.(use “logging trap debugging” on PT)
R1(config)# logging trap warnings
Question:
What is the problem with setting the level of severity too high or too low?
Type your answers here.
If the command logging trap critical were issued, which severity levels of messages would be logged?
Type your answers here.
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 10 of 12 www.netacad.com
OFFICIAL
OFFICIAL
Step 5: Make changes to the router and monitor syslog results on the PC.
a. Verify that the syslog server is already started on PC-A. Start the server as necessary.
b. To verify that syslog server is logging the message, disable and enable R1's G0/0/0 interface.
R1(config)# interface g0/0/0
R1(config-if)# shut
.Jan 31 12:02:50.376: %LINK-5-CHANGED: Interface GigabitEthernet0/0/0, changed state
to administratively down
.Jan 31 12:02:51.376: %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0/0, changed state to down
R1(config-if)# no shut
.Jan 31 12:03:11.302: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 192.168.1.4 port
514 started - CLI initiated
.Jan 31 12:03:14.365: %LINK-3-UPDOWN: Interface GigabitEthernet0/0/0, changed state to
up
.Jan 31 12:03:15.365: %LINEPROTO-5-UPDOWN: Line protocol on Interface
GigabitEthernet0/0/0, changed state to up
.Jan 31 12:03:59.894: %OSPF-5-ADJCHG: Process 1, Nbr 10.2.2.2 on GigabitEthernet0/0/0
from LOADING to FULL, Loading Done
Close configuration window
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 11 of 12 www.netacad.com
OFFICIAL
OFFICIAL
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.
end of document
© 2015 - 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public. Page 12 of 12 www.netacad.com
OFFICIAL