In the previous article in this CCP series, we went through common discovery issues with the CCP tool and how to resolve them. We concluded that article by looking at the different parts of the CCP tool including the status bar, menu bar and toolbar. In this 3rd article, we will familiarize ourselves with the CCP interface so that navigating through the tool will be easy for our later articles when we begin using the CCP tool for configuration tasks.
Our network diagram remains the same as shown:
I have discovered both routers as shown below:
The default view of the CCP interface has the Community view selected and utilities under that pane as shown below:
The Home button is like the Home button of a website – it takes you back to the homepage (default) of the CCP interface. The Configure button is where we will spend time in later articles when configuring features like NAT and Access Control Lists. The Monitor button is used for monitoring purposes including general router overview, interface status, firewall status and so on. Below is a screenshot of the Router overview monitor.
Under the Home, Configure and Monitor buttons, we have the option to select what community member we want to work with. In our case, there are two community members identified by their IP address.
The Utilities box contains helpful features like ping and traceroute, Telnet and saving your configuration to a PC or writing the running configuration to the start-up configuration.
Let’s now take a look at the configuration options we have on the CCP interface. I will select the 126.96.36.199 router and click on the Configure button.
Configuration options are grouped into four categories: Interface Management, Router, Security, and Unified Communications.
Interface Management contains one sub-option: Interface and Connections. This is where we configure all our interface settings including IP addresses and subnet masks. The CCP tool also has wizards to create connections such as LAN and WAN connections.
The Interface and Connections sub-option contains two tabs: Create Connection and Edit Interface/Connection. If you are using GNS3 devices, the Create Connection tab may tell you that there are some unsupported interfaces on your devices so you may not see anything of use there.
In my case, my FastEthernet interfaces are the unsupported ones so I cannot edit IP/Subnet details on those unsupported ones. Let me show you what I mean. If I double-click on FastEthernet0/0 for example, notice I have four tabs in the dialog box that pops up: Association, NAT, General, and Application Service:
However, if I select the Loopback0 interface, notice that now I have five tabs (Connection is the new one) with the option of editing the IP address and subnet mask details of that interface.
For me, this is not a deal breaker because interface configurations can be easily done from the CLI.
Moving on now to the next option, you will notice that now we have a lot of sub-options to configure. In fact, for the CCNA Security exam, you will be using this option and the next one (Security) a lot.
It is through this Router configuration option that we configure features like NTP, management access, logging and so on. Also, features like AAA, ACL and NAT that I will expect to be under the Security configuration option are also placed here. This may be a bit confusing at first when you find yourself looking for AAA under the Security options while it is under the Router options. With time and use though, you become familiar with it.
The screenshot below shows the Static and Dynamic Routing sub-option. Notice that EIGRP is enabled on AS 10 (remember our configuration from the first article?).
A Network security geek should be grinning at this point because we have come to the part that contains many of the features they will be using in their exam prep. The Security configuration option contains sub-options like Firewall (Zone-based Firewall and CBAC), VPN, NAC and Security audit.
Keep in mind though that the CCP tool was not created for the CCNA Security exam so there are features there that are beneficial for normal use and not exam testable. For example, as far as I know, the CCNA Security exam will not test you on NAC and Web Filter configurations, so you don’t need to worry about those.
This is the last configuration option which allows us to configure unified communication features.
The monitor options are also grouped into categories: Router, Security and Traffic Monitoring. The Router monitoring options gives information about general router activities like interface status and QoS status. The Security monitoring option is focused on security features like Firewall, VPN, and 802.1x. Traffic Monitoring gives information about Bandwidth usage, throughput and traffic volume.
This brings us to the end of this article where we have taken a look at the configuration and monitoring options on the CCP interface. This sets the stage for the upcoming articles where we will be creating and solving labs using the CCP tool.
I hope you have found this article insightful and I look forward to the next article in this series.
Cisco Configuration Professional: http://www.cisco.com/c/en/us/products/cloud-systems-management/configuration-professional/index.html