24.1.4 Lab – Implement Flexible Netflow Answers
CCNP ENCOR v8 & 8.01 | |
Final Exam Answers | |
This Chapters 22 - 24 | |
Chapters 22 - 24 Exam Answers | Online Test |
Chapters 22 - 24 Quizzes Answers | Online Test |
Next Chapters 25 - 26 | |
Chapters 25 - 26 Exam Answers | Online Test |
Chapters 25 - 26 Quizzes Answers | Online Test |
CCNP ENCOR Packet Tracer Activity Files Answers | |
24.2.1 Packet Tracer – Configure Syslog and NTP Answers | |
24.2.2 Packet Tracer – Logging from Multiple Sources Answers | |
CCNP ENCOR Student Lab Source Files Answers | |
24.1.2 Lab – Use Connectivity Tests and Debug for Network Assurance Answers | |
24.1.3 Lab – Implement SNMP and Syslog Answers | |
24.1.4 Lab – Implement Flexible Netflow Answers | |
24.1.5 Lab – Implement SPAN Technologies Answers | |
24.1.6 Lab – Implement IP SLA Answers |
Lab – Implement Flexible Netflow (Answers Version)
Answers Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Topology
Addressing Table
Device |
Interface |
IP Address |
IPv6 Address |
IPv6 Link Local |
R1 |
G0/0/1 |
192.168.1.1/24 |
2001:db8:acad:1000::1/64 |
fe80::1:1 |
R1 |
Loopback0 |
10.0.0.1/24 |
2001:db8:acad:10::1/64 |
fe80::1:2 |
D1 |
VLAN 1 |
192.168.1.2/24 |
2001:db8:acad:1000::2/64 |
fe80::d1:1 |
A1 |
VLAN 1 |
192.168.1.3/24 |
2001:db8:acad:1000::3/64 |
fe80::a1:1 |
PC1 |
NIC |
192.168.1.50/24 |
2001:db8:acad:1000::50/64 |
EUI-64 |
PC2 |
NIC |
192.168.1.75/24 |
Assigned by SLAAC |
EUI-64 |
Objectives
Part 1: Build the Network and Configure Basic Device Settings and Interface Addressing
Part 2: Configure and Verify Flexible Netflow
Part 3: (Optional) Configure and Verify Netflow
Background / Scenario
NetFlow is a Cisco IOS technology that provides statistics on packets flowing through the router. NetFlow is the standard for acquiring IP operational data from IP networks. NetFlow provides data to enable network and security monitoring, network planning, traffic analysis, and IP accounting.
Flexible NetFlow improves on original NetFlow by adding the capability to customize the traffic analysis parameters for your specific requirements. Flexible NetFlow facilitates the creation of more complex configurations for traffic analysis and data export through the use of reusable configuration components.
Note: This lab is an exercise in configuring options available for Flexible Netflow and does not necessarily reflect network troubleshooting best practices.
Note: The routers used with CCNP hands-on labs are Cisco 4221 with Cisco IOS XE Release 16.9.4 (universalk9 image). The switches used in the labs are Cisco Catalyst 3650s with Cisco IOS XE Release 16.9.4 (universalk9 image) and Cisco Catalyst 2960s with Cisco IOS Release 15.2(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and the output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of the lab for the correct interface identifiers.
Note: IOS XE does not support classic Netflow. If your lab has ISR G2 series routers, skip Part 2 of this lab and do Part 3, which covers classic Netflow.
Note: Make sure that the switches have been erased and have no startup configurations. If you are unsure, contact your instructor.
Note: The default Switch Database Manager (SDM) template on a Catalyst 2960 does not support IPv6. You must change the default SDM template to the dual-ipv4-and-ipv6 default template using the sdm prefer dual-ipv4-and-ipv6 default global configuration command. Changing the template will require a reboot.
Answers Note: Refer to the Answers Lab Manual for the procedures to initialize and reload devices.
Required Resources
- 1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
- 1 Switch (Cisco 3650 with Cisco IOS XE Release 16.9.4 universal image or comparable)
- 1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
- 2 PCs (Choice of operating system with terminal emulation program and a packet capture utility installed, such as Wireshark)
- Console cables to configure the Cisco IOS devices via the console ports
- Ethernet cables as shown in the topology
Instructions
Part 1:Build the Network and Configure Basic Device Settings and Interface Addressing
In Part 1, you will set up the network topology and configure basic settings and interface addressing on routers.
Step 1:Cable the network as shown in the topology.
Attach the devices as shown in the topology diagram, and cable as necessary.
Step 2:Configure basic settings for each device.
- Console into each device, enter global configuration mode, and apply the basic settings. The startup configurations for each device are provided below.
Router R1
hostname R1
no ip domain lookup
ipv6 unicast-routing
banner motd # R1, Implement Flexible Netflow #
line con 0
exec-timeout 0 0
logging synchronous
exit
line vty 0 4
privilege level 15
exec-timeout 0 0
password cisco123
login
exit
interface g0/0/1
ip address 192.168.1.1 255.255.255.0
ipv6 address fe80::1:1 link-local
ipv6 address 2001:db8:acad:1000::1/64
no shutdown
exit
interface loopback 0
ip address 10.0.0.1 255.255.255.0
ipv6 address fe80::1:2 link-local
ipv6 address 2001:db8:acadd:10::1/64
no shutdown
exit
ntp master 3
end
Switch D1
hostname D1
no ip domain lookup
ipv6 unicast-routing
banner motd # D1, Implement Flexible Netflow #
line con 0
exec-timeout 0 0
logging synchronous
exit
line vty 0 4
privilege level 15
exec-timeout 0 0
password cisco123
login
exit
interface vlan 1
ip address 192.168.1.2 255.255.255.0
ipv6 address fe80::d1:1 link-local
ipv6 address 2001:db8:acad:1000::2/64
no shutdown
exit
ip default-gateway 192.168.1.1
interface g1/0/23
spanning-tree portfast
switchport mode access
no shutdown
exit
interface g1/0/11
spanning-tree portfast
switchport mode access
no shutdown
exit
interface range g1/0/5-6
switchport mode trunk
channel-group 1 mode active
no shutdown
exit
interface range g1/0/1-4, g1/0/7-10, g1/0/12-22, g1/0/24, g1/1/1-4
shutdown
exit
ntp server 192.168.1.1
end
Switch A1
hostname A1
no ip domain lookup
ipv6 unicast-routing
banner motd # A1, Implement Flexible Netflow #
line con 0
exec-timeout 0 0
logging synchronous
exit
line vty 0 4
privilege level 15
exec-timeout 0 0
password cisco123
login
exit
interface vlan 1
ip address 192.168.1.3 255.255.255.0
ipv6 address fe80::a1:1 link-local
ipv6 address 2001:db8:acad:1000::3/64
no shutdown
exit
ip default-gateway 192.168.1.1
interface range f0/1-2
switchport mode trunk
channel-group 1 mode active
no shutdown
exit
interface f0/23
switchport mode access
spanning-tree portfast
no shutdown
exit
interface range f0/3-22, f0/24, g0/1-2
shutdown
exit
ntp server 192.168.1.1
end
- Set the clock on each device to UTC time.
- Save the running configuration to startup-config.
- Configure IPv4 and IPv6 addresses on hosts PC1 and PC2 as shown in the addressing table.
- Verify that R1, D1, A1, and PC2 can successfully ping PC1 at 192.168.1.50.
Part 2:Configure and Verify Flexible Netflow
As previously stated, Flexible Netflow provides the ability to customize traffic analysis parameters. The workflow for Flexible Netflow consists of four steps:
Step 1.Create Flow Records. Flow records define the information to be collected. There are predefined flow records that match the flow caching done by Classic Netflow, or you can configure your own custom flow record to suit your needs.
Step 2.Create Flow Exporter. This defines where compiled statistic information is sent.
Step 3.Create Flow Monitor and associate Flow Records and Flow Exporters with it.
Step 4.Configure the appropriate interface for input or output caching associated with the appropriate Flow Monitor.
In this part of the lab, you will configure Flexible Netflow to send statistical information about R1 interface g0/0/1 to PC1.
Step 1:Create flow records.
- For our first flow record, we will use the predefined ipv4 original-input flow record. Because it is predefined, there is no configuration necessary.
- For our second flow record, we will create a custom flow record. Because the first flow record is focused on input traffic, the second will focus on output traffic. Create a flow record named CCNP8-CUSTOM-OUT.
R1(config)# flow record CCNP8-CUSTOM-OUT
1)Give the flow record a description.
R1(config-flow-record)# description Custom Flow Record for outbound traffic
2)Set up the flow record to match ipv4 destination address and transport destination.
R1(config-flow-record)# match ipv4 destination address
R1(config-flow-record)# match transport destination-port
3)Set up the flow record to collect bytes and packets.
R1(config-flow-record)# collect counter bytes
R1(config-flow-record)# collect counter packets
4)Use the show flow record CCNP8-CUSTOM-OUT command to examine the results.
R1# show flow record CCNP8-CUSTOM-OUT
flow record CCNP8-CUSTOM-OUT:
Description:Custom Flow Record for outbound traffic
No. of users:0
Total field space:14 bytes
Fields:
match ipv4 destination address
match transport destination-port
collect counter bytes
collect counter packets
Step 2:Create a flow exporter.
- The flow exporter configuration defines where the cached information will be sent. Create a flow exporter named CCNP8-COLLECTOR-HOST. Further specify that the exporter should use Netflow version 9, and point to 192.168.1.50 udp port 9999.
R1(config)# flow exporter CCNP8-COLLECTOR-HOST
R1(config-flow-exporter)# destination 192.168.1.50
R1(config-flow-exporter)# export-protocol netflow-v9
R1(config-flow-exporter)# transport UDP 9999
R1(config-flow-exporter)# exit
- Use the show flow exporter CCNP8-COLLECTOR-HOST command to examine the results.
R1# show flow exporter CCNP8-COLLECTOR-HOST
Flow Exporter CCNP8-COLLECTOR-HOST:
Description:User defined
Export protocol:NetFlow Version 9
Transport Configuration:
Destination IP address: 192.168.1.50
Source IP address:192.168.1.1
Transport Protocol:UDP
Destination Port:9999
Source Port:63275
DSCP:0x0
TTL:255
Output Features:Used
Step 3:Create flow monitors.
The flow monitor associates a flow record with the flow exporter. For our exercise, we need to create two flow monitors, one for each flow record.
- Create the first flow monitor and name it CCNP8-INBOUND-MONITOR using the flow monitor CCNP8-INBOUND-MONITOR command. As part of the flow monitor, specify that it will record the netflow ipv4 original-input flow record, export the cache to the exporter every 30 seconds, and identify CCNP8-COLLECTOR-HOST as the exporter.
R1(config)# flow monitor CCNP8-INBOUND-MONITOR
R1(config-flow-monitor)# record netflow ipv4 original-input
R1(config-flow-monitor)# cache timeout active 30
R1(config-flow-monitor)# exporter CCNP8-COLLECTOR-HOST
R1(config-flow-monitor)# exit
- Create the second flow monitor and name it CCNP8-OUTBOUND-MONITOR using the flow monitor CCNP8-OUTBOUND-MONITOR command. As part of the flow monitor, specify that it will record the CCNP8-CUSTOM-OUT flow record, export the cache to the exporter every 30 seconds, and identify CCNP8-COLLECTOR-HOST as the exporter.
R1(config)# flow monitor CCNP8-OUTBOUND-MONITOR
R1(config-flow-monitor)# record CCNP8-CUSTOM-OUT
R1(config-flow-monitor)# cache timeout active 30
R1(config-flow-monitor)# exporter CCNP8-COLLECTOR-HOST
R1(config-flow-monitor)# exit
- Use the show flow monitor command to examine the results.
R1# show flow monitor
Flow Monitor CCNP8-INBOUND-MONITOR:
Description:User defined
Flow Record:netflow ipv4 original-input
Flow Exporter:CCNP8-COLLECTOR-HOST
Cache:
Type:normal (Platform cache)
Status:not allocated
Size:200000 entries
Inactive Timeout:15 secs
Active Timeout:30 secs
Trans end aging:off
Flow Monitor CCNP8-OUTBOUND-MONITOR:
Description:User defined
Flow Record:CCNP8-CUSTOM-OUT
Flow Exporter:CCNP8-COLLECTOR-HOST
Cache:
Type:normal (Platform cache)
Status:not allocated
Size:200000 entries
Inactive Timeout:15 secs
Active Timeout:30 secs
Trans end aging:off
Step 4:Configure the interface for flow caching.
The last step is to configure the appropriate interface(s) so that they will cache information. In our lab, we will focus on the input and output from interface g0/0/0 on R1. Use the ip flow monitor <name> <direction> command on g0/0/1 to specify the inbound and outbound flow monitors you have created.
R1(config)# interface g0/0/1
R1(config-if)# ip flow monitor CCNP8-INBOUND-MONITOR input
R1(config-if)# ip flow monitor CCNP8-OUTBOUND-MONITOR output
R1(config-if)# exit
Step 5:Create some traffic.
To gather statistics, we will need some traffic.
- From PC2, start a continuous ping to R1 using IPv4 and IPv6. As a part of each set of ping parameters, set the size of the packets to 1475 bytes.
The windows commands are as follows:
C:\> ping 10.0.0.1 -t -l 1475
C:\> ping 2001:db8:acad:1000::1 -t -l 1475
- From switch A1, telnet to R1. Login and leave the session running.
- From switch D1, use the extended ping utility to send pings to R1 Loopback 0 using a sweep range of 36 bytes to 18024 bytes. Set the repeat count to 1,000,000 and the sweep interval to 1.
D1# ping
Protocol [ip]:
Target IP address: 10.0.0.1
Repeat count [5]: 100000
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Ingress ping [n]:
Source address or interface:
DSCP Value [0]:
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [0x0000ABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]:
Sweep max size [18024]:
Sweep interval [1]:
Type escape sequence to abort.
Sending 89945, [36..18024]-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- On PC1, start Wireshark and apply the filter ip.src == 192.168.1.1 && udp.dstport == 9999 && ! icmp. This filters the display to show packets from 192.168.1.1 destined for UDP port 9999 and not ICMP packets.
Step 6:Wait 60 seconds then examine the results.
- On PC1, observe the Wireshark display window. There should be traffic matching the filter being displayed.
- On R1, issue the command show flow monitor CCNP8-INBOUND-MONITOR statistics.
R1# show flow monitor CCNP8-INBOUND-MONITOR statistics
Cache type:Normal (Platform cache)
Cache size:200000
Current entries:2
High Watermark:12
Flows added:103
Flows aged:101
– Active timeout(30 secs)38
– Inactive timeout(15 secs)63
- On R1, issue the command show flow monitor CCNP8-INBOUND-MONITOR cache. Note: Output will vary depending upon how long within the 30-second window traffic has been caching.
R1# show flow monitor CCNP8-INBOUND-MONITOR cache
Cache type:Normal (Platform cache)
Cache size:200000
Current entries:1
High Watermark:12
Flows added:112
Flows aged:111
– Active timeout(30 secs)43
– Inactive timeout(15 secs)68
IPV4 SOURCE ADDRESS:192.168.1.75
IPV4 DESTINATION ADDRESS:10.0.0.1
TRNS SOURCE PORT:0
TRNS DESTINATION PORT:2048
INTERFACE INPUT:Gi0/0/1
FLOW SAMPLER ID:0
IP TOS:0x00
IP PROTOCOL:1
ip source as:0
ip destination as:0
ipv4 next hop address:0.0.0.0
ipv4 source mask:/0
ipv4 destination mask:/0
tcp flags:0x00
interface output:Null
counter bytes:12024
counter packets:8
timestamp first:20:43:34.189
timestamp last:20:43:41.263
- Stop all the pings and exit the telnet session.
Part 3:(Optional) Configure and Verify Netflow
IOS-XE, which is the baseline operating system version for the routers in CCNPv8, only supports Flexible Netflow. However, the CCNP ENCOR blueprint says you must also be able to configure and verify classic Netflow. So the configuration and verification steps are presented here for your reference, or if your school only has ISR G1 or ISR G2 series routers.
Step 1:Configure Netflow.
- Set the Netflow export version to version 9.
R1(config)# ip flow-export version 9
- Set the Netflow export destination to 192.168.1.50 port 9999.
R1(config)# ip flow-export destination 192.168.1.50 9999
- On R1 interface G0/1, configure Netflow to monitor ingress and egress traffic.
R1(config)# interface g0/1
R1(config-if)# ip flow ingress
R1(config-if)# ip flow egress
R1(config-if)# exit
Step 2:Create some traffic.
To gather statistics, we will need some traffic.
- From PC 2, start a continuous ping to R1 using IPv4 and IPv6. As a part of each set of ping parameters, set the size of the packets to 1475 bytes.
The windows commands are as follows:
C:\> ping 10.0.0.1 -t -l 1475
C:\> ping 2001:db8:acad:1000::1 -t -l 1475
- From switch A1, telnet to R1. Login and leave the session running.
- From switch D1, use the extended ping utility to send pings to R1 Loopback 0 with the df-bit set and using a sweep range of 36 bytes to 18024 bytes. Set the repeat count to 1,000,000 and the sweep interval to 1.
D1# ping
Protocol [ip]:
Target IP address: 10.0.0.1
Repeat count [5]: 100000
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Ingress ping [n]:
Source address or interface:
DSCP Value [0]:
Type of service [0]:
Set DF bit in IP header? [no]: y
Validate reply data? [no]:
Data pattern [0x0000ABCD]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [n]: y
Sweep min size [36]:
Sweep max size [18024]:
Sweep interval [1]:
Type escape sequence to abort.
Sending 89945, [36..18024]-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
- On PC1, start Wireshark and apply the filter ip.src == 192.168.1.1 && udp.dstport == 9999 && ! icmp. This filters the display to show packets from 192.168.1.1 destined for UDP port 9999 and not ICMP packets.
Step 3:Verify Netflow.
- Issue the command show ip flow interface to verify the interface(s) involved in flow capture.
R1# show ip flow interface
GigabitEthernet0/1
ip flow ingress
ip flow egress
- Issue the command show ip flow export to show the collection host IP address and how many flows have been exported.
R1# show ip flow export
Flow export v9 is enabled for main cache
Export source and destination details :
VRF ID : Default
Destination(1)192.168.1.50 (9999)
Version 9 flow records
117 flows exported in 55 udp datagrams
0 flows failed due to lack of export packet
0 export packets were sent up to process level
0 export packets were dropped due to no fib
0 export packets were dropped due to adjacency issues
0 export packets were dropped due to fragmentation failures
0 export packets were dropped due to encapsulation fixup failures
- Issue the command show ip cache flow to see flow information.
R1# show ip cache flow
IP packet size distribution (2597 total packets):
1-326496128160192224256288320352384416448480
.172 .023 .070 .016 .012 .016 .016 .017 .016 .012 .012 .012 .012 .012 .012
512544576 1024 1536 2048 2560 3072 3584 4096 4608
.012 .012 .012 .172 .355 .000 .000 .000 .000 .000 .000
IP Flow Switching Cache, 278544 bytes
3 active, 4093 inactive, 97 added
2551 ager polls, 0 flow alloc failures
Active flows timeout in 30 minutes
Inactive flows timeout in 15 seconds
IP Sub Flow Cache, 34056 bytes
3 active, 1021 inactive, 93 added, 93 added to flow
0 alloc failures, 0 force free
1 chunk, 1 chunk added
last clearing of statistics never
ProtocolTotalFlowsPackets BytesPackets Active(Sec) Idle(Sec)
——–Flows/Sec/Flow/Pkt/Sec/Flow/Flow
TCP-Telnet30.07420.00.815.5
UDP-NTP360.01760.00.615.7
UDP-other190.061060.05.115.4
SrcIfSrcIPaddressDstIfDstIPaddressPr SrcP DstPPkts
ICMP360.0417500.01.315.0
Total:940.0186750.01.815.4
SrcIfSrcIPaddressDstIfDstIPaddressPr SrcP DstPPkts
Gi0/1192.168.1.50Local192.168.1.101 0000 03031
Gi0/1192.168.1.75Local10.0.0.101 0000 0800447
Gi0/1192.168.1.75Local10.0.0.101 0000 0000447
- You should be seeing packets collected in Wireshark.
- Stop all the pings and exit the telnet session
Router Interface Summary Table
Router Model |
Ethernet Interface #1 |
Ethernet Interface #2 |
Serial Interface #1 |
Serial Interface #2 |
1800 |
Fast Ethernet 0/0 (F0/0) |
Fast Ethernet 0/1 (F0/1) |
Serial 0/0/0 (S0/0/0) |
Serial 0/0/1 (S0/0/1) |
1900 |
Gigabit Ethernet 0/0 (G0/0) |
Gigabit Ethernet 0/1 (G0/1) |
Serial 0/0/0 (S0/0/0) |
Serial 0/0/1 (S0/0/1) |
2801 |
Fast Ethernet 0/0 (F0/0) |
Fast Ethernet 0/1 (F0/1) |
Serial 0/1/0 (S0/1/0) |
Serial 0/1/1 (S0/1/1) |
2811 |
Fast Ethernet 0/0 (F0/0) |
Fast Ethernet 0/1 (F0/1) |
Serial 0/0/0 (S0/0/0) |
Serial 0/0/1 (S0/0/1) |
2900 |
Gigabit Ethernet 0/0 (G0/0) |
Gigabit Ethernet 0/1 (G0/1) |
Serial 0/0/0 (S0/0/0) |
Serial 0/0/1 (S0/0/1) |
4221 |
Gigabit Ethernet 0/0/0 (G0/0/0) |
Gigabit Ethernet 0/0/1 (G0/0/1) |
Serial 0/1/0 (S0/1/0) |
Serial 0/1/1 (S0/1/1) |
4300 |
Gigabit Ethernet 0/0/0 (G0/0/0) |
Gigabit Ethernet 0/0/1 (G0/0/1) |
Serial 0/1/0 (S0/1/0) |
Serial 0/1/1 (S0/1/1) |
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.
End of document
Device Configs – Final
Router R1
R1# show run
Building configuration…
Current configuration : 4327 bytes
!
version 16.9
service timestamps debug datetime msec
service timestamps log datetime msec
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
!
hostname R1
!
boot-start-marker
boot-end-marker
!
no aaa new-model
!
no ip domain lookup
!
login on-success log
!
subscriber templating
!
ipv6 unicast-routing
multilink bundle-name authenticated
!
flow record CCNP8-CUSTOM-OUT
description Custom Flow Record for outbound traffic
match ipv4 destination address
match transport destination-port
collect counter bytes
collect counter packets
!
flow exporter CCNP8-COLLECTOR-HOST
destination 192.168.1.50
transport udp 9999
!
flow monitor CCNP8-INBOUND-MONITOR
exporter CCNP8-COLLECTOR-HOST
cache timeout active 30
record netflow ipv4 original-input
!
flow monitor CCNP8-OUTBOUND-MONITOR
exporter CCNP8-COLLECTOR-HOST
cache timeout active 30
record CCNP8-CUSTOM-OUT
!
spanning-tree extend system-id
!
redundancy
mode none
!
!
interface Loopback0
ip address 10.0.0.1 255.255.255.0
ipv6 address FE80::1:2 link-local
!
interface GigabitEthernet0/0/0
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/0/1
ip flow monitor CCNP8-INBOUND-MONITOR input
ip flow monitor CCNP8-OUTBOUND-MONITOR output
ip address 192.168.1.1 255.255.255.0
negotiation auto
ipv6 address FE80::1:1 link-local
ipv6 address 2001:DB8:ACAD:1000::1/64
!
interface Serial0/1/0
no ip address
shutdown
!
interface Serial0/1/1
no ip address
shutdown
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
control-plane
!
banner motd ^C R1, Implement Flexible Netflow ^C
!
line con 0
exec-timeout 0 0
logging synchronous
transport input none
stopbits 1
line aux 0
stopbits 1
line vty 0 4
exec-timeout 0 0
privilege level 15
password cisco123
login
!
ntp master 3
!
end
Switch D1
D1# show run
Building configuration…
Current configuration : 4467 bytes
!
version 16.9
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no platform punt-keepalive disable-kernel-core
!
hostname D1
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
no aaa new-model
switch 1 provision ws-c3650-24ps
!
no ip domain lookup
!
login on-success log
ipv6 unicast-routing
!
license boot level ipservicesk9
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
transceiver type all
monitoring
!
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data, LOGGING
class-map match-any system-cpp-default
description Inter FED, EWLC control, EWLC data
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, High Rate App, Exception, EGR Exception, NFLSAMPLED DATA, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
!
policy-map system-cpp-policy
!
interface Port-channel1
switchport mode trunk
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
negotiation auto
!
interface GigabitEthernet1/0/1
shutdown
!
interface GigabitEthernet1/0/2
shutdown
!
interface GigabitEthernet1/0/3
shutdown
!
interface GigabitEthernet1/0/4
shutdown
!
interface GigabitEthernet1/0/5
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/0/6
switchport mode trunk
channel-group 1 mode active
!
interface GigabitEthernet1/0/7
shutdown
!
interface GigabitEthernet1/0/8
shutdown
!
interface GigabitEthernet1/0/9
shutdown
!
interface GigabitEthernet1/0/10
shutdown
!
interface GigabitEthernet1/0/11
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
shutdown
!
interface GigabitEthernet1/0/13
shutdown
!
interface GigabitEthernet1/0/14
shutdown
!
interface GigabitEthernet1/0/15
shutdown
!
interface GigabitEthernet1/0/16
shutdown
!
interface GigabitEthernet1/0/17
shutdown
!
interface GigabitEthernet1/0/18
shutdown
!
interface GigabitEthernet1/0/19
shutdown
!
interface GigabitEthernet1/0/20
shutdown
!
interface GigabitEthernet1/0/21
shutdown
!
interface GigabitEthernet1/0/22
shutdown
!
interface GigabitEthernet1/0/23
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/24
shutdown
!
interface GigabitEthernet1/1/1
shutdown
!
interface GigabitEthernet1/1/2
shutdown
!
interface GigabitEthernet1/1/3
shutdown
!
interface GigabitEthernet1/1/4
shutdown
!
interface Vlan1
ip address 192.168.1.2 255.255.255.0
ipv6 address FE80::D1:1 link-local
ipv6 address 2001:DB8:ACAD:1000::2/64
!
ip default-gateway 192.168.1.1
ip forward-protocol nd
ip http server
ip http secure-server
!
!
control-plane
service-policy input system-cpp-policy
!
banner motd ^C D1, Implement Flexible Netflow ^C
!
line con 0
exec-timeout 0 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
exec-timeout 0 0
privilege level 15
password cisco123
login
line vty 5 15
login
!
ntp server 192.168.1.1
!
end
Switch A1
A1# show run
Building configuration…
Current configuration : 2066 bytes
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname A1
!
boot-start-marker
boot-end-marker
!
no aaa new-model
system mtu routing 1500
!
no ip domain-lookup
ipv6 unicast-routing
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/2
switchport mode trunk
channel-group 1 mode active
!
interface FastEthernet0/3
shutdown
!
interface FastEthernet0/4
shutdown
!
interface FastEthernet0/5
shutdown
!
interface FastEthernet0/6
shutdown
!
interface FastEthernet0/7
shutdown
!
interface FastEthernet0/8
shutdown
!
interface FastEthernet0/9
shutdown
!
interface FastEthernet0/10
shutdown
!
interface FastEthernet0/11
shutdown
!
interface FastEthernet0/12
shutdown
!
interface FastEthernet0/13
shutdown
!
interface FastEthernet0/14
shutdown
!
interface FastEthernet0/15
shutdown
!
interface FastEthernet0/16
shutdown
!
interface FastEthernet0/17
shutdown
!
interface FastEthernet0/18
shutdown
!
interface FastEthernet0/19
shutdown
!
interface FastEthernet0/20
shutdown
!
interface FastEthernet0/21
shutdown
!
interface FastEthernet0/22
shutdown
!
interface FastEthernet0/23
switchport mode access
spanning-tree portfast edge
!
interface FastEthernet0/24
shutdown
!
interface GigabitEthernet0/1
shutdown
!
interface GigabitEthernet0/2
shutdown
!
interface Vlan1
ip address 192.168.1.3 255.255.255.0
ipv6 address FE80::A1:1 link-local
ipv6 address 2001:DB8:ACAD:1000::3/64
!
ip default-gateway 192.168.1.1
ip http server
ip http secure-server
!
banner motd ^C A1, Implement Flexible Netflow ^C
!
line con 0
exec-timeout 0 0
logging synchronous
line vty 0 4
exec-timeout 0 0
privilege level 15
password cisco123
login
line vty 5 15
login
!
ntp server 192.168.1.1
end
CCNP ENCOR v8 & 8.01 | |
Final Exam Answers | |
This Chapters 22 - 24 | |
Chapters 22 - 24 Exam Answers | Online Test |
Chapters 22 - 24 Quizzes Answers | Online Test |
Next Chapters 25 - 26 | |
Chapters 25 - 26 Exam Answers | Online Test |
Chapters 25 - 26 Quizzes Answers | Online Test |
CCNP ENCOR Packet Tracer Activity Files Answers | |
24.2.1 Packet Tracer – Configure Syslog and NTP Answers | |
24.2.2 Packet Tracer – Logging from Multiple Sources Answers | |
CCNP ENCOR Student Lab Source Files Answers | |
24.1.2 Lab – Use Connectivity Tests and Debug for Network Assurance Answers | |
24.1.3 Lab – Implement SNMP and Syslog Answers | |
24.1.4 Lab – Implement Flexible Netflow Answers | |
24.1.5 Lab – Implement SPAN Technologies Answers | |
24.1.6 Lab – Implement IP SLA Answers |