exam questions

Exam 300-410 All Questions

View all questions & answers for the 300-410 exam

Exam 300-410 topic 1 question 145 discussion

Actual exam question from Cisco's 300-410
Question #: 145
Topic #: 1
[All 300-410 Questions]


Refer to the exhibit. R1 is being monitored using SNMP and monitoring devices are getting only partial information.
What action should be taken to resolve this issue?

  • A. Modify the CoPP policy to increase the configured exceeded limit for SNMP.
  • B. Modify the access list to include snmptrap.
  • C. Modify the CoPP policy to increase the configured CIR limit for SNMP.
  • D. Modify the access list to add a second line to allow udp any any eq snmp.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Pb1805
Highly Voted 3 years, 6 months ago
The answer doesnt seem to be correct. D seems right. Anyone?
upvoted 14 times
Networkingguy
2 years, 9 months ago
I think i upvoted you too soon, B seems like the better answer, tcp/ipv4 connectivity is already there. Just need to add in 162 I believe.
upvoted 3 times
Pietjeplukgeluk
1 year ago
CoPP is applied inbound to protect your CPU from using to many cycles to process certain inbound management packets. The applied ACL on "10 permit udp any eq snmp any" is WRONG as it implies source port 161 to reach the actual router. This seems odd because the DESINATION port is actually 161 here and that one is listening on this actual router. To make the ACL actually match on inbound traffic hitting the SNMP server on this router, port 161 should be allowed as destination port as otherwise the management station cannot reach this router. Again, outbound traps should not be relavent for CoPP, if the traps overheat your CPU, it does not make a difference if they are blocked or not, the damage (high cpu) is already done. Summarazing here: the answer is D for sure as we need to allow inbound SNMP with having a destination port matching 161 == permit udep any any eq snmp (so the SNMP runs on the router, actually listening on that port) The management station is just a client in the dialog and generates a random source port.
upvoted 1 times
...
...
...
ytsionis
Highly Voted 3 years ago
B is the correct snmptrap uses port 161 snmp uses port 162 ip access-list extended ABC-ACL permit udp X.X.0.0 0.0.255.255 eq snmp host SERVER_IP !!source port is 161 permit udp X.X.0.0 0.0.255.255 host SERVER_IP eq snmptrap !!dest port is 162 https://community.cisco.com/t5/routing/acl-to-allow-snmp-traffic/td-p/1577251
upvoted 11 times
...
kldoyle97
Most Recent 6 days, 2 hours ago
Selected Answer: B
Looking at the diagram, traffic is being policed by the local routers control plane in the outbound direction. The ACL does not fully identify traffic, "snmp" traffic udp port 161. that will be traffic sourced by the SNMP NMS. The local router will generate udp port 162 "snmptrap" (traps/informs). The ACL entry will be: 20 permit udp any any eq snmptrap. (DEST port 162) ACL entry 10 that is currently configured is correct because the local router will respond the SNMP NMS traffic with the source port 161 or "snmp" D is not needed because there is no scenario when the local router will use DEST port 161 with the SNMP NMS
upvoted 1 times
...
[Removed]
4 months, 3 weeks ago
Selected Answer: B
B is the correct snmp = UDP port 161 snmptrap = UDP port 162
upvoted 1 times
...
Chiaretta
11 months ago
The correct answer is D. The access-list is wrong, the first part of ACL is source and not destination port.
upvoted 1 times
...
conft
1 year, 4 months ago
Selected Answer: B
B is the correct
upvoted 2 times
...
inteldarvid
1 year, 5 months ago
Selected Answer: B
acces-lsi permit : snmp and snmptraps (agent client). The option corret is B
upvoted 2 times
...
adudeguy
1 year, 5 months ago
D There are no matches for the traffic, so has to be related to ACL. This leaves us with B or D. The questions indicates they're getting some info and it looks like responses to SNMP requests are allowed through ACL/COPP Policy. Seems like this would just leave SNMP Traps that aren't getting out then.
upvoted 1 times
...
Huntkey
2 years, 1 month ago
Selected Answer: C
My apologizes... After reading the question more carefully, I would go with C. The ACL is correct. The PM is applied for outbound. So the ACL would match the response traffic from this router to the SNMP server. The class-default already matches everything so even though it is an SNMP trap, it would fall in that category and will pass. Increasing the exceed limit doesn't help because its action is to drop anyway.
upvoted 1 times
...
Huntkey
2 years, 1 month ago
1. Control-plane policing is only for the input direction. The question uses an "out" in the name to confuse us. The correct ACL to match SNMP poll would be in D. SNMP trap is the output direction and it is from the router to the monitoring server so it is not affected by the control-plane policing I would go with D
upvoted 4 times
...
[Removed]
2 years, 4 months ago
Device monitoring means collecting and analyzing the SNMP trap messages that devices send to the logging server. But ACL SNMP permits only SNMP traffic. This must be modified. A. Modify the CoPP policy to increase the configured exceeded limit for SNMP. Wrong answer. B. Modify the access list to include snmptrap. Correct answer. C. Modify the CoPP policy to increase the configured CIR limit for SNMP. Wrong answer. D. Modify the access list to add a second line to allow udp any any eq snmp. Wrong answer.
upvoted 2 times
Luvshah
1 year, 1 month ago
Hi, Can I have your email ID as I wanted to ask you something? Thanks.
upvoted 1 times
...
...
marcohichan
2 years, 6 months ago
B is correct. As the drop rate configured snmp is 0. Means that missing SNMP trap.
upvoted 2 times
...
diogodds
2 years, 8 months ago
In my opinion, C is the correct one, note that if SNMP traps are not included in the SNMP ACL, the CoPP class-map SNMP-Out will be skipped for that traffic, but the "class-default" will match it and will forward the traffic without policying it. So the only viable answer is C.
upvoted 2 times
...
wts
2 years, 9 months ago
Selected Answer: B
Zeros on the counter. It seems there is no need to do something with the traffic limit. An unspecified destination address is basically the same as "any". Only part of the information comes to the server. Perhaps the snmp traps will complement it.
upvoted 2 times
...
Hack4
2 years, 9 months ago
"10 permit udp eq snmp any " means that : Send out only snmp informaton provide from me to any destination(mainly the NMS_SERVER). If sth like TCP event occurs in the device( SNMP_Agent as an example) is not gonna be sent to the NMS; This one is going to see only everything about UDP from the Agent . In this case to get all information provide by the Agent (R1) we need to configure snmp_trap on it....
upvoted 1 times
...
Hack4
2 years, 9 months ago
The given answer is correct. B is the right answer
upvoted 1 times
...
Jenia1
2 years, 10 months ago
My opinion is C. Modify the CoPP policy to increase the configured CIR limit for SNMP. If you don't include the record to ACL the traffic will not be policed. so there is no reason to include Traps to the access list, and only SNMP ACL has action drop
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago