exam questions

Exam 300-410 All Questions

View all questions & answers for the 300-410 exam

Exam 300-410 topic 1 question 495 discussion

Actual exam question from Cisco's 300-410
Question #: 495
Topic #: 1
[All 300-410 Questions]

SIMULATION
-


Guidelines
-

This is a lab item in which tasks will be performed on virtual devices.

• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.


Topology
-




Tasks
-

A network is configured with CoPP to protect the CORE router route processor for stability and DDoS protection. As a company policy, a class named class-default is preconfigured and must not be modified or deleted. Troubleshoot CoPP to resolve the issues introduced during the maintenance window to ensure that:

1. Dynamic routing policies are under CoPP-CRITICAL and are allowed only from the 10.10.x.x range.

2. Telnet, SSH, and ping are under CoPP-IMPORTANT and are allowed strictly to/from 10.10.x.x to the CORE router (Hint: you can verify using Loopback1).

3. All devices ping (UDP) any CORE router interface successfully to/from the 10.10.x.x range and do not allow any other IP address.

4. All devices run a successful traceroute (UDP) to any interface on the CORE router to/from the 10.10.x.x range, are under CoPP-NORMAL, and do not allow any other IP address traceroute is to be under CoPP-NORMAL (Hint: Traceroute port range 33434 33464).

Show Suggested Answer Hide Answer
Suggested Answer:

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CiscoTerminator
3 days, 15 hours ago
I do not understand what this english means: "3. All devices ping (UDP) any CORE router interface successfully to/from the 10.10.x.x range and do not allow any other IP address." ?
upvoted 1 times
...
leipeG
3 months, 3 weeks ago
# CORE ip access-list extended CoPP-CRITICAL permit eigrp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 permit eigrp 10.10.0.0 0.0.255.255 host 224.0.0.10 ! ip access-list extended CoPP-IMPORTANT permit tcp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq telnet permit tcp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq 22 permit icmp 10.10.0.0 0.0.255.255 host 10.10.1.1 ! ip access-list extended CoPP-NORMAL permit udp 10.10.0.0 0.0.255.255 host 10.10.1.1 range 33434 33464 permit udp 10.10.0.0 0.0.255.255 host 10.10.12.1 range 33434 33464 permit udp 10.10.0.0 0.0.255.255 host 10.10.13.1 range 33434 33464 ! show ip access-list
upvoted 2 times
leipeG
3 months, 2 weeks ago
I'm still confused about task 3: "All devices ping (UDP) any CORE router interface successfully to/from the 10.10.x.x range and do not allow any other IP address.". So ping over UDP instead of ICMP? UDP does have an echo service on port 7, but it is rarely used for pings. And under which access-list? My guess: ip access-list extended CoPP-NORMAL permit udp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq echo
upvoted 2 times
...
...
jdjjoker
3 months, 4 weeks ago
Extended IP access list COPP-CRITICAL 10 permit eigrp 10.10.0.0 0.0.255.255 any Extended IP access list COPP-NORMAL 10 permit udp 10.10.0.0 0.0.255.255 host 10.10.1.1 range 33434 33464 20 permit udp 10.10.0.0 0.0.255.255 host 10.10.13.1 range 33434 33464 30 permit udp 10.10.0.0 0.0.255.255 host 10.10.12.1 range 33434 33464 Extended IP access list IMPORTANT 10 permit tcp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq telnet 20 permit tcp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq 22 30 permit tcp host 10.10.1.1 10.10.0.0 0.0.255.255 eq telnet 40 permit tcp host 10.10.1.1 10.10.0.0 0.0.255.255 eq 22 50 permit icmp 10.10.0.0 0.0.255.255 host 10.10.1.1 60 permit icmp host 10.10.1.1 10.10.0.0 0.0.255.255 My proposition as some tasks says "TO/FROM"
upvoted 2 times
...
jabal93
6 months, 1 week ago
ip access-list extended COPP-CRITICAL permit eigrp 10.10.0.0 0.0.255.255 any permit eigrp any 10.10.0.0 0.0.255.255 permit ip 224.0.0.10 10.10.0.0 any permit ip any host 224.0.0.10 ip access-list extended COPP-NORMAL permit udp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq 33434 33464 permit udp host 10.10.1.1 10.10.0.0 0.0.255.255 eq 33434 33464 ip access-list extended IMPORTANT permit tcp 10.10.0.0 0.0.255.255 host 10.10.1.1 eq 22 telnet permit tcp host 10.10.1.1 10.10.0.0 0.0.255.255 eq 22 telnet permit icmp 10.10.0.0 0.0.255.255 host 10.10.1.1 permit icmp host 10.10.1.1 10.10.0.0 0.0.255.255 permit udp 10.10.0.0 0.0.255.255 host 10.10.1.1 permit udp host 10.10.1.1 10.10.0.0 0.0.255.255
upvoted 1 times
...
Coffee_bean_master
8 months, 3 weeks ago
COPP-CRITICAL 10 permit eigrp 10.10.0.0 0.0.255.255 any 20 permit eigrp any 10.10.0.0 0.0.255.255 30 permit ip 224.0.0.10 0.0.0.0 any 40 permit ip any host 224.0.0.10 ------------------------------------ COPP-IMPORTANT 10 permit tcp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 23 20 permit tcp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 22 30 permit icmp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 ----------------------------------- COPP-NORMAL 40 permit udp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 range 33434 33464
upvoted 1 times
Pietjeplukgeluk
8 months, 2 weeks ago
"30 permit ip 224.0.0.10 0.0.0.0 any" and "10 permit eigrp 10.10.0.0 0.0.255.255." Furthermore "10.10.0.0 0.0.255.255" as destination seems not adding much here, you can take any instead. Also "20 permit eigrp any 10.10.0.0 0.0.255.255" seems not very applicable here, only when defining static eigrp neighbors will eigrp be send as unicast.
upvoted 1 times
bk989
6 months ago
EIGRP uses both unicast and multicast, unicast for convergeance, or non-broadcast, His config to me seems fine,his destination 10.10.0.0 0.0.255.255 is wrong, I would do this: permit eigrp any 10.10.12.1 permit eigrp any host 10.10.13.1 Dynamic routing policies are under CoPP-CRITICAL and are allowed only from the 10.10.x.x range. (to our router)
upvoted 1 times
...
Pietjeplukgeluk
8 months, 2 weeks ago
Correction: "30 permit ip 224.0.0.10 0.0.0.0 any" and "10 permit eigrp 10.10.0.0 0.0.255.255." are very simular, you ideally only add "10 permit eigrp 10.10.0.0 0.0.255.255 any" as that is already sufficient.
upvoted 1 times
...
...
...
buddhagaut
1 year ago
Can someone please explain the difference in ping requirement between these two- 2. Telnet, SSH, and ping are under CoPP-IMPORTANT and are allowed strictly to/from 10.10.x.x to the CORE router (Hint: you can verify using Loopback1). 3. All devices ping (UDP) any CORE router interface successfully to/from the 10.10.x.x range and do not allow any other IP address.
upvoted 3 times
...
DavideDL
1 year ago
Why in CoPP-IMPORTANT we accept ping/ssh/telnet only to 10.10.13.1 and not to 10.10.1.1 and 10.10.12.1 ? They told us " are allowed strictly to/from 10.10.x.x to the CORE router"
upvoted 4 times
DavideDL
12 months ago
If I have to follow strictly to what the exercise is asking I'll do something like this: ip access-list extended COPP-CRITICAL permit eigrp 10.10.0.0 0.0.255.255 any ip access-list extended COPP-IMPORTANT permit tcp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 22 permit tcp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 eq 23 permit icmp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 ip access-list extended COPP-NORMAL permit udp 10.10.0.0 0.0.255.255 10.10.0.0 0.0.255.255 range 33434 33464
upvoted 3 times
bk989
6 months, 1 week ago
it says only to core router, verify with loopback. hence the given answer is correct. If we permit ranges the 2 other routers can telnet/ssh to eachother,
upvoted 3 times
...
...
...
T_Cos
1 year, 2 months ago
The statement implies that you do not need to configure the policy, class-map or apply it to the control plane. Does anyone agree with me? CORE(config)#ip access-list extended COPP-CRITICAL (...-ext-nacl)#permit eigrp 10.10.0.0 0.0.255.255 any (...-ext-nacl)#permit eigrp any 10.10.0.0 0.0.255.255 (...-ext-nacl)#permit eigrp any host 244.0.0.10 CORE(config)#ip access-list extended COPP-IMPORTANT (...-ext-nacl)#permit icmp 10.10.0.0 0.0.255.255 host 10.10.13.1 (...-ext-nacl)#permit tcp 10.10.0.0 0.0.255.255 host 10.10.13.1 eq telnet (...-ext-nacl)#permit tcp 10.10.0.0 0.0.255.255 host 10.10.13.1 eq 22 CORE(config)#ip access-list extended COPP-NORMAL (...-ext-nacl)#permit udp 10.10.0.0 0.0.255.255 host 10.10.1.1 range 33434 33464 (...-ext-nacl)#permit udp 10.10.0.0 0.0.255.255 host 10.10.12.1 range 33434 33464 (...-ext-nacl)#permit udp 10.10.0.0 0.0.255.255 host 10.10.13.1 range 33434 33464
upvoted 4 times
leipeG
3 months, 3 weeks ago
Allow EIGRP packets to the multicast address 224.0.0.10, which is the correct multicast address for EIGRP (not 244.0.0.10).
upvoted 2 times
...
Pietjeplukgeluk
8 months, 2 weeks ago
I am still not understanding "permit eigrp any 10.10.0.0 0.0.255.255" this would imply eigrp send NOT to a destination multicast address, but address to a unicast address.
upvoted 1 times
bk989
6 months ago
UNICAST IS FINE. tHINK ABOUT STUCK IN ACTIVE QUERIES.
upvoted 1 times
...
bk989
6 months ago
The Enhanced Interior Gateway Routing Protocol (EIGRP) uses unicast packets for reply messages, update messages, and query messages for neighbors that don't receive an ACK. EIGRP uses five different messages to communicate with neighbor routers: hello, update, query, reply, and acknowledgement. EIGRP uses multicast packets when possible, but unicast packets when necessary. For example, update packets can be sent to a single neighbor using unicast or to a group of neighbors using multicast
upvoted 1 times
bk989
6 months ago
Especially replies to update messages about route changes are unicast. Doesn't need to be a non-broadcast network.
upvoted 1 times
...
...
...
[Removed]
1 year, 1 month ago
Agree - its just a case of creating the correct ACLs for the Class Maps.
upvoted 1 times
[Removed]
1 year, 1 month ago
Also nice catch on allowing EIGRP to the multicast IP - I missed that
upvoted 1 times
...
...
aqwsdfghjklp
1 year, 1 month ago
I don't understand why "(... -ext-nacl)#permit eigrp any host 244.0.0.10" is not clear why it is necessary
upvoted 1 times
...
...
[Removed]
1 year, 2 months ago
Anyone had this for real? The question and solution implies COPP policies/class-maps are setup and you just need to configure the ACLs? Also the wording suggests the ACLs are also applied to the interfaces?
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago