Chapter 15. Network Management Protocols

This chapter covers the following subjects:

Simple Network Management Protocol

Other Network Management Protocols

This chapter introduces the following network management protocols and components: Simple Network Management Protocol (SNMP), Management Information Base (MIB), Remote Monitoring (RMON) protocol, Cisco Discovery Protocol (CDP), and the use of NetFlow and system logging (syslog).

“Do I Know This Already?” Quiz

The “Do I Know This Already?” quiz helps you identify your strengths and deficiencies in this chapter’s topics.

The ten-question quiz, derived from the major sections in the “Foundation Topics” portion of the chapter, helps you determine how to spend your limited study time.

Table 15-1 outlines the major topics discussed in this chapter and the “Do I Know This Already?” quiz questions that correspond to those topics.

Image

Table 15-1 “Do I Know This Already?” Foundation Topics Section-to-Question Mapping

1. Which version of SNMP introduces security extensions for authentication and encryption?

a. SNMPv1

b. SNMPv2

c. SNMPv3

d. SNMPv4

2. SNMP runs over which protocol?

a. TCP

b. UDP

c. IP

d. MIB

3. Which SNMP component contains an agent?

a. Managed device

b. Agent

c. NMS manager

d. MIB

4. Which SNMP component is a collection of information that is stored on the local agent?

a. Managed device

b. Agent

c. NMS manager

d. MIB

5. CDP is an acronym for which Cisco function?

a. Collection Device Protocol

b. Cisco Device Protocol

c. Campus Discovery Protocol

d. Cisco Discovery Protocol

6. Which SNMP operation obtains full table information from an agent?

a. Get

b. GetNext

c. GetBulk

d. Inform

7. RMON1 provides information at what levels of the OSI model?

a. Data link and physical

b. Network, data link, physical

c. Transport and network

d. Application to network

8. Which of the following is not an SNMP operation?

a. Get

b. Community

c. Set

d. Trap

9. Which solution gathers information that can be used for accounting and billing applications?

a. RMON

b. NetFlow

c. CDP

d. Syslog

10. What is CDP?

a. Client/server protocol

b. Hello-based protocol

c. Network management agent

d. Request-response protocol

Foundation Topics

After a new network is designed, installed, and configured, it must be managed by the operations team. Network management tools are used to gather operating statistics and to manage devices. Statistics are gathered on WAN bandwidth utilization, router CPU and memory utilization, and interface counters. Configuration changes are also made through network management tools such as Cisco Prime. The ISO defines five types of network management processes that are commonly known as FCAPS. These processes are as follows:

Image Fault management: Refers to detecting and correcting network fault problems

Image Configuration management: Refers to baselining, modifying, and tracking configuration changes

Image Accounting management: Refers to keeping track of circuits for billing of services

Image Performance management: Measures the network’s effectiveness at delivering packets

Image Security management: Tracks the authentication and authorization information

Network management is supported by the elements listed in Table 15-2.

Image
Image

Table 15-2 Network Management Elements

The protocols and tools described in this chapter perform some of these functions. SNMP is the underlying protocol used for network management. Agents are configured in managed devices (routers) that allow the NMS to manage the device. RMON is used for advanced monitoring of routers and switches. CDP is a Cisco proprietary protocol that allows the discovery of Cisco devices. NetFlow is a network monitoring solution that allows for greater scalability than RMON. Syslog allows system messages and error events to be gathered for review.

Simple Network Management Protocol

Image

Simple Network Management Protocol (SNMP) is an IP application layer protocol that has become the standard for the exchange of management information between network devices. SNMP was initially described in RFC 1157. It is a simple solution that requires little code to implement, which allows vendors to build SNMP agents on their products.

SNMP runs over User Datagram Protocol (UDP) and therefore does not inherently provide for sequencing and acknowledgment of packets, but it still reduces the amount of overhead used for management information.

SNMP Components

SNMP has three network-managed components:

Image The managed devices

Image The agent that resides on the managed device

Image The NMS

Figure 15-1 shows the relationship between these components.

Image

Figure 15-1 SNMP components

A managed device is a router or LAN switch or any other device that contains an SNMP agent. These devices collect and store management information and make this information available to the NMS. SNMP community strings (passwords) are configured on routers and switches to allow for SNMP management.

The agent is the network management software that resides in the managed device. The agent gathers the information and puts it in SNMP format. It responds to the manager’s request for information and also generates traps.

The NMS has applications that are used to monitor and configure managed devices. It is also known as the manager. The NMS provides the bulk of the processing resources used for network management. It polls agents on the network and correlates and displays the management information.

MIB

A Management Information Base (MIB) is a collection of information that is stored on the local agent of the managed device. MIBs are organized hierarchically and are accessed by the NMS. MIBs are databases of objects organized in a tree-like structure, with each branch containing similar objects. Each object has an object identifier (number) that uniquely identifies the managed object of the MIB hierarchy. Read and write community strings are used to control access to MIB information.

The top-level MIB object IDs belong to different standards organizations, and lower-level object IDs are allocated to associated organizations. Standard MIBs are defined by RFCs. Vendors define private branches that include managed objects for their products. Figure 15-2 shows a portion of the MIB tree structure. RFC 1213 describes the MIBs for TCP/IP. Cisco defines the MIBs under the Cisco head object. For example, a Cisco MIB can be uniquely identified by either the object name, iso.org.dod.private.enterprise.cisco, or the equivalent object descriptor, 1.3.6.1.4.1.9.

Image

Figure 15-2 MIB tree structure

Each individual manageable feature in the MIB is called an MIB variable. The MIB module is a document that describes each manageable feature that is contained in an agent. The MIB module is written in Abstract Syntax Notation 1 (ASN.1). Three ASN.1 data types are required: name, syntax, and encoding. The name serves as the object identifier. The syntax defines the object’s data type (integer or string). The encoding data describes how information associated with a managed object is formatted as a series of data items for transmission on the network. Some examples of standard managed objects that can be obtained from the MIB tree follow:

Image Interfaces

Image Buffers

Image Memory

Image Standard protocols

From the Cisco private tree, you can obtain the following additional information:

Image Small, medium, large buffers

Image Primary and secondary memory

Image Proprietary protocols (Enhanced Interior Gateway Routing Protocol [EIGRP]), for example)

You can find more specific information about Cisco MIBs at www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.

SNMP Message Versions

SNMPv1 was initially defined by RFC 1157. Since then, SNMP has evolved with a second and third version, each adding new message types. The CCDA should understand each message type and the version associated with each.

SNMPv1

SNMPv1 is defined by RFC 1157. It is a simple request-and-response protocol. The NMS manager issues a request, and managed devices return responses. The data types are limited to 32-bit values. SNMPv1 uses four protocol operations, with five message types to carry out the communication:

Image Get request: Retrieves the value of a specific MIB variable.

Image GetNext request: Retrieves the next instance of the MIB variable.

Image Get response: Contains the values of the requested variable.

Image Set request: This is a request from the manager to the agent to set a MIB variable. It can be used to modify the agent’s configuration.

Image Trap: Transmits an unsolicited alarm condition.

Figure 15-3 shows the SNMPv1 message types.

Image

Figure 15-3 SNMPv1 message types

The NMS manager uses the Get operation to retrieve the value-specific MIB variable from an agent. The GetNext operation is used to retrieve the next object instance in a table or list within an agent. The Get Response contains the value of the requested variable.

The NMS manager uses the Set operation to set values of the object instance within an agent. For example, the Set operation can be used to set an IP address on an interface or to bring an interface up or down. Agents use the Trap operation to inform the NMS manager of a significant alarm event. For example, a trap is generated when a WAN circuit goes down.

SNMPv2

SNMPv2 is an evolution of the initial SNMPv1 and is defined in RFCs 1901 and 1902. SNMPv2 offers improvements to SNMPv1, including additional protocol operations. The Get, GetNext, and Set operations used in SNMPv1 are exactly the same as those used in SNMPv2. The SNMP Trap operation serves the same function as in SNMPv1, but it uses a different message format.

SNMPv2 defines two new protocol operations:

Image GetBulk: Reduces repetitive requests for MIB variables

Image Inform request: Alerts an SNMP manager of specific conditions with confirmation

The NMS manager uses the GetBulk operation to retrieve large blocks of data, such as multiple rows in a table. This is more efficient than repeating GetNext commands. If the agent responding to the GetBulk operation cannot provide values for all the variables in a list, it provides partial results. The Inform operation allows one NMS manager to send trap information to other NMS managers and to receive information. Another improvement is that data type values can be 64 bits.

Table 15-3 summarizes SNMP message types.

Image
Image

Table 15-3 SNMP Message Types

SNMPv3

SNMPv3 was developed to correct several deficiencies in the earlier versions of SNMP, security being a primary reason. SNMPv3 is defined in RFCs 3410 through 3415. SNMPv3 provides authentication and privacy via usernames and access control by using key management. Security levels are implemented to determine which devices a user can read, write, or create. SNMPv3 also verifies each message to ensure that it has not been modified during transmission. SNMPv3 removes the use of community-based authentication strings, which were sent in cleartext over the network. It is recommended that SNMPv1 and SNMPv2 be used only for read-only access, whereas SNMPv3 be used with read-write access.

SNMPv3 introduces three levels of security:

Image noAuthNoPriv: No authentication and no encryption

Image authNoPriv: Authentication and no encryption

Image authPriv: Authentication and encryption

The noAuthNoPriv level provides no authentication and no privacy (encryption). At the authNoPriv level, authentication is provided but not encryption. The authPriv level provides authentication and encryption.

Authentication for SNMPv3 is based on Hash-based Message Authentication Code–Message Digest 5 (HMAC-MD5) or HMAC – Secure Hash (HMAC-SHA) algorithms. The Cipher Block Chaining–Data Encryption Standard (CBC-DES) standard is used for encryption.

Table 15-4 summarizes SNMP security levels.

Image
Image

Table 15-4 SNMP Security Levels

Other Network Management Technologies

This section covers RMON, NetFlow, CDP, LLDP, and syslog technologies used to gather network information.

RMON
Image

RMON is a standard monitoring specification that enables network monitoring devices and console systems to exchange network monitoring data. RMON provides more information than SNMP, but more sophisticated data collection devices (network probes) are needed. RMON looks at MAC-layer data and provides aggregate information on the statistics and LAN traffic.

Enterprise networks deploy network probes on several network segments; these probes report back to the RMON console. RMON allows network statistics to be collected even if a failure occurs between the probe and the RMON console. RMON1 is defined by RFCs 1757 and 2819, and additions for RMON2 are defined by RFC 2021.

The RMON MIB is located at iso.org.dod.internet.mgt.mib.rmon or by the equivalent object descriptor, 1.3.6.1.2.1.16. RMON1 defines nine monitoring groups; each group provides specific sets of data. One more group is defined for Token Ring. Each group is optional, so vendors do not need to support all the groups in the MIB. Table 15-5 shows the RMON1 groups.

Image

Table 15-5 RMON1 Groups

RMON2

RMON1 is focused on the data link and physical layers of the OSI model. As shown in Figure 15-4, RMON2 provides an extension for monitoring upper-layer protocols.

Image

Figure 15-4 RMON1 and RMON2 compared to the OSI model

Defined by RFC 2021, RMON2 extends the RMON group with the MIB groups listed in Table 15-6.

Image

Table 15-6 RMON2 Groups

NetFlow
Image

Cisco NetFlow allows the tracking of IP flows as they are passed through routers and multilayer switches. An IP flow is a set of IP packets within a specific timeslot that share a number of properties, such as the same source address, destination address, type of service, and protocol number. NetFlow information is forwarded to a network data analyzer, network planning tools, RMON applications, or accounting and billing applications. NetFlow allows for network planning, traffic engineering, usage-based network billing, accounting, Denial of Service monitoring capabilities, and application monitoring. One big benefit is that NetFlow provides the necessary data for billing of network usage. The most recent version of NetFlow is NetFlow Version 9, which is defined in RFC 3954. The NetFlow protocol itself has been superseded by Internet Protocol Flow Information eXport (IPFIX). Based on the NetFlow Version 9 implementation, IPFIX is on the IETF standards track with RFCs 7011 and 7015.

As shown in Figure 15-5, NetFlow consists of three major components:

Image NetFlow accounting: Collects IP data flows entering router or switch interfaces and prepares data for export. It enables the accumulation of data on flows with unique characteristics, such as IP addresses, application, and class of service (CoS).

Image Flow collector engines: Captures exported data from multiple routers and filters and aggregates the data according to customer policies, and then stores this summarized or aggregated data. Examples of collectors are Cisco NetFlow Collector, SolarWinds, and CA NetQoS.

Image Network data analyzers: Displays a graphical user interface (GUI) and analyzes NetFlow data collected from flow collector files. This allows users to complete near-real-time visualization or trending analysis of recorded and aggregated flow data. Users can specify the router and aggregation scheme and the desired time interval.

Image

Figure 15-5 NetFlow components

The benefits of using NetFlow include the following:

Image Ability to obtain detailed information with minimal impact to the network devices

Image Ability to customize the data captures for each interface

Image Ability to include data timestamping across a large number of devices

Image Ability to meter network traffic providing data for billing based on network usage

Image Used to detect and mitigate threats

Routers and switches are the network accounting devices that gather the statistics. These devices aggregate data and export the information. Each unidirectional network flow is identified by both source and destination IP addresses and transport layer port numbers. NetFlow can also identify flows based on IP protocol number, type of service, and input interface. NetFlow data records contain the following information:

Image Source and destination IP address

Image Source and destination TCP/UDP ports

Image Type of service (ToS)

Image Packet and byte counts

Image Start and end timestamps

Image Input and output interface numbers

Image TCP flags and encapsulated protocol (TCP/UDP)

Image Routing information (next-hop address, source and destination autonomous system number, destination prefix mask)

Image Data analyzers

The NetFlow export or transport mechanism sends the NetFlow data to a collection engine or network management collector. Flow collector engines perform data collection and filtering. They aggregate data from several devices and store the information. Different NetFlow data analyzers can be used based on the intended purpose. NetFlow data can be analyzed for the following key applications:

Image Accounting and billing: Used by service providers for charging based on bandwidth and application usage and quality of service (QoS).

Image Network planning and analysis: Link and router capacity.

Image Network and security monitoring: Visualize real-time traffic patterns.

Image Application monitoring and profiling: Time-based view of application usage.

Image User monitoring and profiling: Identifies customer and user network utilization and resource application.

Image NetFlow data warehousing and mining: NetFlow data can be warehoused for later retrieval and analysis.

Looking ahead, Cisco has introduced Flexible NetFlow as the next generation in flow technology. Flexible NetFlow has many benefits beyond the Cisco traditional NetFlow functionality available for years in Cisco hardware and software.

The key advantages to using Flexible NetFlow are as follows:

Image Flexibility, scalability of flow data beyond traditional NetFlow

Image The ability to monitor a wider range of packet information to produce new information about network behavior not available previously

Image Enhanced network anomaly and security detection

Image User configurable flow information to perform customized traffic identification and the ability to focus and monitor specific network behavior

Image Convergence of multiple accounting technologies into one accounting mechanism

Flexible NetFlow is an integral part of Cisco IOS Software that collects and measures data, allowing all routers or switches in the network to become a source of telemetry and a monitoring device. Flexible NetFlow allows extremely granular and accurate traffic measurements and high-level aggregated traffic collection. Because it is part of Cisco IOS Software, Flexible NetFlow enables Cisco product-based networks to perform traffic flow analysis without external probes being purchased, thus making traffic analysis economical for large IP networks.

Flexible NetFlow can track the following packet information for Layer 2, IPv4, and IPv6 flows:

Image Source and destination MAC addresses

Image Source and destination IPv4 or IPv6 addresses

Image Source and destination TCP/User Datagram Protocol (UDP) ports

Image Type of service (ToS)

Image DSCP

Image Packet and byte counts

Image Flow timestamps

Image Input and output interface numbers

Image TCP flags and encapsulated protocol (TCP/UDP) and individual TCP flags

Image Sections of packets for deep packet inspection

Image All fields in the IPv4 header, including IP-ID, TTL, and others

Image All fields in the IPv6 header, including Flow Label, Option Header, and others

Image Routing information such as next-hop address, source autonomous system (AS) number, destination AS number, source prefix mask, destination prefix mask, BGP Next Hop, and BGP Policy Accounting traffic index

NetFlow Compared to RMON and SNMP

NetFlow enables you to gather more statistical information than RMON with fewer resources. It provides greater detail of the collected data, with date- and timestamping. NetFlow has greater scalability and does not require network probes. As compared with SNMP, NetFlow reports on traffic statistics and is push based, whereas SNMP reports primarily on device statistics and is poll based.

NetFlow can be configured on individual Layer 3 interfaces on routers and Layer 3 switches. NetFlow provides detailed information on the following:

Image Source and destination IP addresses

Image Source and destination interface identifiers

Image TCP/UDP source and destination port numbers

Image Number of bytes and packets per flow

Image Source and destination autonomous system numbers

Image IP type of service (ToS)

CDP
Image

Cisco Discovery Protocol (CDP) is a Cisco-proprietary protocol that can be used to discover only Cisco network devices. CDP is media and protocol independent, so it works over Ethernet, Frame Relay, ATM, and other media. The requirement is that the media support Subnetwork Access Protocol (SNAP) encapsulation. CDP runs at the data link layer of the OSI model. CDP uses hello messages; packets are exchanged between neighbors, but CDP information is not forwarded. In addition to routers and switches, IP phones and Cisco Unified Communication Manager (CUCM) servers also advertise CDP information.

Being protocol and media independent is CDP’s biggest advantage over other network management technologies. CDP provides key information about neighbors, including platforms, capabilities, and IP addresses, which is significant for network discovery. It is useful when SNMP community strings are unknown when performing a network discovery.

When displaying CDP neighbors, you can obtain the following information:

Image Local interface: Local interface that is connected to the discovered neighbor

Image Device ID: Name of the neighbor device and MAC address or serial number

Image Device IP address: IP address of the neighbor

Image Hold time: How long (seconds) to hold the neighbor information

Image Device capabilities: Type of device discovered: router, switch, transparent bridge, host, IGMP, or repeater

Image Version: IOS or switch OS version

Image Platform: Router or switch model number

Image Port ID: Interface of the neighboring device

Network management devices can obtain CDP information for data gathering. CDP should be disabled on untrusted interfaces, such as those that face the Internet, third-party networks, or other secure networks. CDP works only on Cisco devices.


Note

Disable CDP on interfaces for which you do not want devices to be discovered, such as Internet connections.


LLDP
Image

The Link Layer Discovery Protocol (LLDP), defined in the IEEE 802.1AB (LLDP) specification, is an option of discovering network devices in multivendor networks. LLDP performs functions similar to CDP. With LLDP, devices send information at a fixed interval from each of their interfaces in the form of an Ethernet frame with an Ethertype of 0x88CC. The information shared includes the following:

Image System name and description

Image Port name and description

Image VLAN name

Image IP management address

Image System capabilities

Image MAC/PHY layer information

Image Link aggregation

Syslog

The syslog protocol is defined in RFC 3164. Syslog transmits event notification messages over the network. Network devices send the event messages to an event server for aggregation. Network devices include routers, servers, switches, firewalls, and network appliances. Syslog operates over UDP, so messages are not sequenced or acknowledged. The syslog messages are also stored on the device that generates the message and can be viewed locally.

Syslog messages are generated in many broad areas. These areas are called facilities. Cisco IOS has more than 500 facilities. Common facilities include

Image IP

Image CDP

Image OSPF

Image TCP

Image Interface

Image IPsec

Image SYS operating system

Image Security/authorization

Image Spanning Tree Protocol (STP)

Each syslog message has a level. The syslog level determines the event’s criticality. Lower syslog levels are more important. Table 15-7 lists the syslog levels.

Image
Image

Table 15-7 Syslog Message Levels

Common syslog messages are interface up and down events. Access lists can also be configured on routers and switches to generate syslog messages when a match occurs. Each syslog message includes a timestamp, level, and facility. Syslog messages have the following format:

mm/dd/yy:hh/mm/ss:FACILITY-LEVEL-mnemonic:description

Syslog messages can create large amounts of network bandwidth. It is important to enable only syslog facilities and levels that are of particular importance.

Table 15-8 summarizes some of the protocols just covered in this section.

Image
Image

Table 15-8 NetFlow, CDP, and Syslog

References and Recommended Reading

NetFlow Performance Analysis, www.cisco.com/en/US/tech/tk812/technologies_white_paper0900aecd802a0eb9.shtml.

NetFlow Version 9, www.cisco.com/en/US/products/ps6645/products_ios_protocol_option_home.html.

Cisco IOS Netflow Data Sheet, http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-netflow/product_data_sheet0900aecd80173f71.html.

Tutorial on Link Layer Discovery Protocol, http://www.eetimes.com/document.asp?doc_id=1272069.

MIBs Supported by Product, http://tools.cisco.com/ITDIT/MIBS/servlet/index.

RFC 1157: A Simple Network Management Protocol (SNMP).

RFC 1441: Introduction to Version 2 of the Internet-Standard Network Management Framework.

RFC 1757: Remote Network Monitoring Management Information Base.

RFC 1901: Introduction to Community-Based SNMPv2.

RFC 1902: Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2).

RFC 2021: Remote Network Monitoring Management Information Base Version 2 Using SMIv2.

RFC 2576: Coexistence Between Version 1, Version 2, and Version 3 of the Internet Standard Network Management Framework.

RFC 3164: The BSD Syslog Protocol.

RFC 3410: Introduction and Applicability Statements for Internet Standard Management Framework.

RFC 3411: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks.

RFC 3412: Message Processing and Dispatching for the Simple Network Management Protocol (SNMP).

RFC 3414: User-Based Security Model (USM) for Version 3 of the Simple Network Management Protocol (SNMPv3).

RFC 3415: View-Based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP).

RFC 3416: Protocol Operations for SNMPv2.

RFC 3418: Management Information Base for SNMPv2.

RFC 3954: Cisco Systems NetFlow Services Export Version 9.

RFC 5103: Bidirectional Flow Export Using IP Flow Information Export (IPFIX).

RFC 7011: Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of Flow Information.

RFC 7015: Flow Aggregation for the IP Flow Information Export (IPFIX) Protocol.

Cisco IOS Flexible http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/flexible-netflow/product_data_sheet0900aecd804b590b.html.

Exam Preparation Tasks

Review All Key Topics

Review the most important topics in the chapter, noted with the Key Topics icon in the outer margin of the page. Table 15-9 lists a reference of these key topics and the page numbers on which each is found.

Image
Image

Table 15-9 Key Topics

Complete Tables and Lists from Memory

Print a copy of Appendix D, “Memory Tables” (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix E, “Memory Tables Answer Key,” also on the CD, includes completed tables and lists to check your work.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

Accounting management

CDP

LLDP

configuration management

fault management

FCAPS

MIB

NetFlow

performance management

RMON

SNMP

syslog

Q&A

The answers to these questions appear in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Q&A Questions.” For more practice with exam format questions, use the exam engine on the CD.

1. What does the acronym FCAPS stand for?

2. CDP runs at what layer of the OSI model?

3. Syslog level 5 is what level of severity?

4. True or false: RMON provides more scalability than NetFlow.

5. True or false: NetFlow provides detailed information on the number of bytes and packets per conversation.

6. What information can be obtained from a neighbor using CDP?

7. What SNMP message is sent by an agent when an event occurs?

a. Get

b. Set

c. GetResponse

d. Trap

8. What SNMP message is sent to an agent to obtain an instance of an object?

a. Get

b. Set

c. GetResponse

d. Trap

9. What SNMP message is used to configure a managed device?

a. Get

b. Set

c. GetResponse

d. Trap

10. About how many facilities are available for syslog in Cisco routers?

a. 25

b. 100

c. 500

d. 1000

11. Which SNMPv3 level provides authentication with no encryption?

a. authPriv

b. authNoPriv

c. noAuthNoPriv

d. noauthPriv

12. What encryption standard does SNMPv3 use?

a. 3DES

b. CBC-DES

c. HMAC-MD5

d. MD5

13. Which technologies can you use to assess a network and create documentation? (Select two.)

a. RMON

b. MIB

c. CDP

d. NetFlow

14. Which of the following are true about CDP? (Select three.)

a. It uses UDP.

b. It is a data-link protocol.

c. It provides information on neighboring routers and switches.

d. It is media and protocol independent.

e. It uses syslog and RMON.

15. RMON2 provides information at what levels of the OSI model?

a. Data link and physical

b. Network, data link, and physical

c. Transport and network only

d. Network to application

16. Which network management technology operates over TCP?

a. SNMP

b. RMON

c. NetFlow

d. None of the above

17. Which statement is correct?

a. SNMPv1 uses GetBulk operations and 32-bit values.

b. SNMPv2 uses 32-bit values, and SNMPv3 uses 64-bit values.

c. SNMPv1 uses 32-bit values, and SNMPv2 uses 64-bit values.

d. SNMPv1 uses GetBulk operations, and SNMPv2 uses Inform operations.

18. Which SNMPv3 level provides authentication and privacy?

a. authPriv

b. authNoPriv

c. noAuthNoPriv

d. noauthPriv

19. Match the RMON group with its description.

i. Statistics

ii. Matrix

iii. Application-Layer Host

iv. Protocol Directory

a. Stores statistics for conversations between two hosts

b. Lists the protocols that the device supports

c. Contains real-time statistics for interfaces: packets sent, bytes, CRC errors, fragments

d. Contains application layer statistics for traffic sent to or from each host

20. What is the most critical syslog priority level?

a. 0

b. 1

c. 6

d. 7

21. Which management protocol will help a company concentrate on Layer 4 monitoring and gain information to assist in long-term trending analysis?

a. SNMPv3

b. RMON2

c. NetFlow

d. CDP

e. MIB

22. Which management protocol performs network traffic analysis?

a. SNMPv3

b. RMON2

c. NetFlow

d. CDP

e. MIB

23. What virtual information store is used by SNMP?

a. SNMPv3

b. RMON2

c. ASN.1

d. CDP

e. MIB

24. What standard language is used by SNMP?

a. SNMPv3

b. RMON2

c. ASN.1

d. CDP

e. MIB

25. Which SNMPv3 method provides authentication but no encryption?

a. noAuthNoPriv

b. authPriv

c. authNoPriv

d. noauthPriv

26. Which is not an SNMP operation?

a. GetNext

b. Trap

c. Inform Request

d. Community

e. GetBulk

27. Which protocol allows for vendor-specific information?

a. SNMPv3

b. RMON2

c. ASN.1

d. CDP

e. MIB

28. Which protocol allows for ISPs to bill its customers for network usage?

a. SNMPv3

b. RMON2

c. NetFlow

d. CDP

e. MIB

29. Which solution can be customized in each interface to include data timestamping across a large number of interfaces?

a. SNMPv3

b. RMON2

c. NetFlow

d. CDP

e. MIB

30. Cisco NetFlow consists of which components? (Select three.)

a. NetFlow Accounting

b. FlowCollector

c. NetFlow Billing Server

d. Network Data Analyzer

e. NetFlow Traffic Generator Tool

31. You are performing a manual network discovery using CDP when you encounter non-Cisco network devices. What options do you have to continue the manual discovery?

a. Continue to use CDP; it discovers non-Cisco devices.

b. Use CDP non-Cisco command options.

c. Use LLDP.

d. Give up; only CDP can be used.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
13.58.248.90