Which statement about SNMP control plane policing is true?
A.
The SNMP management plane always has a source IP address
B.
SNMP traffic is processed via CEF in the data plane.
C.
The CoPP SNMP feature can regard and manage traffic during heavy traffic load.
D.
SNMP traps are processed by the data plane.
Explanation:
The management plane is the logical path of all traffic related to the management of a
routing platform.
One of three planes in a communication architecture that is structured in layers and
planes, the management plane performs management functions for a network and coordinates functions among all the planes (management, control, data).
The management plane also is used to manage a device through its connection to the
network.
Examples of protocols processed in the management plane are Simple Network Management Protocol (SNMP), Telnet, HTTP, Secure HTTP (HTTPS), and SSH.
These management protocols are used for monitoring and for CLI access. Restricting
access to devices to internal sources (trusted networks) is critical.
Control-plane host subinterface—Subinterface that receives all control-plane IP traffic
that is directly destined for one of the router interfaces.
Examples of control-plane host IP traffic include tunnel termination traffic, management traffic or routing protocols such as SSH, SNMP, BGP, OSPF, and EIGRP.
All host traffic terminates on and is processed by the router.
Most control-plane protection features and policies operate strictly on the controlplane host subinterface.
Since most critical router control-plane services, such as routing protocols and management traffic, is received on the control-plane host subinterface, it is critical to protect
this traffic through policing and protection policies. CoPP, port-filtering, and per-protocol queue thresholding protection features can be applied on the control-plane host
subinterface.
• Control-plane transit subinterface—Subinterface that receives all control-plane IP traffic that is software switched by the route processor.This means packets not directly destined to the router itself but rather traffic traversing
through the router.
Non-terminating tunnels handled by the router are an example of this type of controlplane traffic.
Control-plane protection allows specific aggregate policing of all traffic received at this
subinterface.
• Control-plane CEF-exception subinterface—Subinterface that receives all traffic that is
either redirected as a result of a configured input feature in the CEF packet forwarding
path for process switching or directly enqueued in the control-plane input queue by the
interface driver (for example, ARP, L2 Keepalives and all non-IP host traffic). Controlplane protection allows specific aggregate policing of this specific type of control-plane
traffic.