Your partner for Success. CCIE Security v5 Lab Access Guide

Size: px
Start display at page:

Download "Your partner for Success. CCIE Security v5 Lab Access Guide"

Transcription

1 Your partner for Success CCIE Security v5 Lab Access Guide Version 1.8 Author: Cloudmylab Support

2 Contents Introduction... 3 Audience... 3 Disclaimer... 3 Legal Liability... 3 Topology... 3 Devices Used... 6 Physical Devices... 6 Virtual Devices... 6 Getting Access to the POD... 7 DEVICE ACCESS... 8 How to access the devices... 8 Guest Machine Reload... 8 Retrieve Snapshots Setup ISE for Lab Accessing the Devices console Device List Devices CLI Credentials Quick Device access Virtual Device Access Example Method 1 for Virtual Devices with CLI access Example Method 2 for Virtual Devices with CLI Access Accessing Windows Based machines Example Method 1 for windows based Device: Example Method 2 for windows based Device LAB Devices IP Details Physical Connectivity FIREWALLS Switches IP And VLAN MAP Virtualization Logic Lab Shortcuts... 25

3 Introduction Cloudmylab offers a platform to run any lab topology. CCIE Security v5 lab has been adopted from various vendors and is built on the topology and configuration provided by them. We have designed this lab with customers and online forum feedback. The Lab topology mentioned below is mostly virtual and it aligns with Cisco s CCIE V5 blueprint. Audience This lab guide is intended for the students who are preparing for CCIE Security V5 and wish to use our platform for practicing the CCIE labs. Disclaimer These labs have been designed and built by topology provided by vendors selling CCIE workbooks and online student forums. Cloudmylab is not responsible for the accuracy of the labs or workbooks. Cloudmylab does not endorse any CCIE workbook vendor or company. We have designed our platform per Cisco s blueprint and it can be used for any lab scenario. Students will be responsible for loading any pre-configuration. Cloudmylab does not sell any workbooks or CCIE topology. Legal Liability Cloudmylab is an IAAS (Infrastructure as a service), PAAS (Platform as a service) and LAAS (LAB as a service) provider. Cloudmylab either owns or lease the equipment used in the certification labs or proof of concept labs. Cloudmylab uses all genuine software either procured or evaluation from the manufacturer. Cloudmylab encourages its users to use their own licensing and/or lease it from Cloudmylab. Cloudmylab doesn t resell hardware, software or licensing. Cloudmylab has no liability for software and licensing used by the customer in their purchased service instance. Cloudmylab doesn t endorse any Cisco Certification labs workbook Vendors. Cloudmylab doesn t endorse any Juniper Certification labs workbook Vendors. Cloudmylab doesn t endorse any Microsoft Certification labs workbook Vendors. Cloudmylab doesn t endorse any VMware Certification labs workbook Vendors. Topology The following topology has been adopted from CCIE University, this is a topology available on online forums and vendors page. Cloudmylab offers a platform to run topologies and in no way own or endorse any vendor topology.

4 Figure 1

5 Figure 2 Figure 3

6 Devices Used Physical Devices This section details physical devices and software version in the topology. Virtual Devices Device Name Device Model Software Version ASA1 ASA5515X ASA2 ASA5515X ASA3 ASA5512X ASA4 ASA5512X SW1 C3750X (SE) SW2 C3560X (SE) Table 1 This section details virtual devices and the software version used in the topology. Device Name Device Model Software Version R1 CSR1000v S R2 CSR1000v S R3 CSR1000v S R4 CSR1000v S R5 CSR1000v S R6 CSR1000v S R7 CSR1000v S R8 CSR1000v S R9 CSR1000v S R10 CSR1000v S R11 CSR1000v S R12 CSR1000v S R13 CSR1000v S R14 CSR1000v S R15 CSR1000v S R16 CSR1000v S R17 CSR1000v S R18 CSR1000v S ASAv1 ASAv ASAv11 ASAv ASAv2 ASAv ASAv22 ASAv ISE ISE-VM-K9 2.1 vwlc WLC-VM 8.5 WSA WSA-VM NGIPS FP-NGIPS 6.1 FMC FP-FMC 6.1 AMP FP-AMP 6.1 Table 2

7 Getting Access to the POD 1. There are two methods you can get access to the access detail as mentioned below: a.) Check for the URL and Port Number in the from Figure 4 b.) You can alternatively log in to your account and under my account > Rack access, you will see the details Figure 5

8 2. Please login with the credentials provided. Figure 6 3. After logging in successfully, you will see a customized Desktop from where you can access all the devices. DEVICE ACCESS This section details how to access the physical and virtual devices. How to access the devices Starting the lab environment: (Needs updating) Guest Machine Reload 1. Once you get the access to the Guest Desktop Environment, A.) Open the VMware vsphere client and login with the details in table below: Rack Rack-1 Rack-2 IP Address/hostname Username ccisesec ccisesec Password Ccie123! Ccie123! Table 3

9 Figure 7 2. Reload the Guest Virtual Machines in the table below using the VMware vsphere Client before you start your lab. Windows machine Wireless-PC MS-AD MAB-CLIENT DOT1X-PC Table 4 The steps below explain how to reload a Virtual Machine: Step 1: After your successful login to ESX host, select the guest machine. Figure 8

10 Step 2: Right Click on the guest machine, click on power and select Power Off. Figure 9 Step 3: Wait for VM to power off, then right click on the guest machine, click on power and select Power On Figure 10

11 Retrieve Snapshots 1. Retrieve the snapshot for the Guest Virtual Machines in the table below using the VMware vsphere Client before you start your lab. Virtual Machines NGIPS FMC AMP WSA vwlc Table 5 Step1: Right Click on the machine - Snapshot snapshot manager Figure 11 Step2: Under Snapshot Manager Click on the BASE-CONF - GO To Figure 12

12 Setup ISE for Lab This section defines how to setup ISE for the lab use. Please follow the steps carefully. 1. Go to Administration > Backup & Restore. 2. Select FTP from the drop-down menu for History for Repository. 3. Select the lab you want to restore to. When prompted for encryption key, type ISEisC00L and select Restore ADE-OS configuration. Figure 13 Note: You will have to again join the AD and re-generate the CA certificates. Accessing the Devices console A.) Device Access All the devices are pre-setup for console access and follow the screenshots for a quick access. Device List The table below contains the list of devices and their console access details. Terminal Server is a server which host the console connections, do not confuse this with actual device IP. Device Name Rack-1 Rack-2 Port No Terminal IP address Port No IP address R R R R R R R R R

13 R R R R R R R R R SW SW ASA ASA ASA ASA AP Terminal Server ASAv ASAv ASAv ASAv ASAv ISE vwlc WSA NGIPS FMC AMP Table 6

14 Devices CLI Credentials Table below contains the credentials to access CLI for the undermentioned devices: Device Name Username Password R1 cisco cisco R2 cisco cisco R3 cisco cisco R4 cisco cisco R5 cisco cisco R6 cisco cisco R7 cisco cisco R8 cisco cisco R9 cisco cisco R10 cisco cisco R11 cisco cisco R12 cisco cisco R13 cisco cisco R14 cisco cisco R15 cisco cisco R16 cisco cisco R17 cisco cisco R18 cisco cisco SW1 cisco cisco SW2 cisco cisco ASA1 cisco cisco ASA2 cisco cisco ASA3 cisco cisco ASA4 cisco cisco AP1 Cisco Cisco Terminal Server cisco cisco ASAv1 cisco cisco ASAv11 cisco cisco ASAv2 cisco cisco ASAv22 cisco cisco ASAv1 cisco cisco ISE Admin Ccie123 vwlc Admin Ccie123 WSA Admin ironport NGIPS Admin Ccie123 FMC Admin Ccie123 AMP Admin Ccie123 Table 7

15 Quick Device access This section details on how to access the devices via CLI: 1. Click on SecureCRT. Virtual Device Access Virtual devices can be accessed using two methods: Figure Using Secure CRT CLI. Its strongly recommended to use terminal emulator to access all the Virtual Routers and Firewall. 2. Using the vsphere Console

16 Example Method 1 for Virtual Devices with CLI access Open SecureCRT >> Click on the Plus Sign against Virtual Device >> Select the relevant device Figure 15

17 Example Method 2 for Virtual Devices with CLI Access Open Vmware Vsphere Client >> right click on the relevant machine >> click open console Figure 16 Accessing Windows Based machines There are 4 Windows Based machines as follows: Machine Rack-1 MGMT IP Rack-2 MGMT IP Username Password Wireless-PC admin Ccie123 Windows Server admin Ccie123 Dot1x PC admin Ccie123 MAB-PC admin Ccie123 Table 8 Example Method 1 for windows based Device: Click on the remote desktop shortcut on the desktop, you will see 4 shortcuts and named appropriately. Enter the username and password when prompted

18 Figure 17

19 Example Method 2 for windows based Device Open Vmware Vsphere Client >> right click on the relevant machine >> click open console LAB Devices IP Details Figure 18 This section details the management IP assigned to the following virtual machines in the table below. Please do refer to the topology as well. IP Address Device Name AD Candidate PC Wireless PC NGIPS FMC ISE WSA vwlc CUCM AMP AMP Table 9

20 Physical Connectivity This Section explains the physical Connectivity FIREWALLS Switches PHYSICAL FIREWALL CONNECTIONS From interface To interface ASA3 Management0/0 SW2 GigabitEthernet0/3 ASA3 GigabitEthernet0/1 SW2 GigabitEthernet0/1 ASA3 GigabitEthernet0/0 SW2 GigabitEthernet0/2 ASA4 Management0/0 SW2 GigabitEthernet0/6 ASA4 GigabitEthernet0/1 SW2 GigabitEthernet0/4 ASA4 GigabitEthernet0/0 SW2 GigabitEthernet0/5 ASA1 GigabitEthernet0/0 SW1 GigabitEthernet 1/0/1 ASA1 GigabitEthernet0/1 SW1 GigabitEthernet 1/0/2 ASA1 GigabitEthernet0/2 SW1 GigabitEthernet 1/0/3 ASA1 GigabitEthernet0/3 SW1 GigabitEthernet 1/0/4 ASA2 GigabitEthernet0/0 SW1 GigabitEthernet 1/0/5 ASA2 GigabitEthernet0/1 SW1 GigabitEthernet 1/0/6 ASA2 GigabitEthernet0/2 SW1 GigabitEthernet 1/0/7 ASA2 GigabitEthernet0/3 SW1 GigabitEthernet 1/0/8 Table 10 PHYSICAL SWITCHES From interface To interface SW1 GigabitEthernet1/0/12 ESX Server 0 SW1 GigabitEthernet1/0/10 SW2 GigabitEthernet0/10 SW2 GigabitEthernet0/7 AP G0 SW2 GigabitEthernet0/9 IP PHONE GigabitEthernet0 Table 11

21 IP And VLAN MAP R1 GigabitEthernet1 150 NA vswitch-mgmt N/A GigabitEthernet ASA1_V GigabitEthernet0/1 GigabitEthernet ASA2_V GigabitEthernet0/1 GigabitEthernet NGIPS GigabitEthernet0/1 R2 GigabitEthernet VSWITCH-MGMT N/A GigabitEthernet NGIPS GigabitEthernet0/0 GigabitEthernet R3 GigabitEthernet2 GigabitEthernet4 R3 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet R2 GigabitEthernet3 GigabitEthernet SW1 GigabitEthernet1/0/9- V GigabitEthernet R6 GigabitEthernet3 GigabitEthernet R13 GigabitEthernet3 R4 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet2 TRUNK SW1_V GigabitEthernet0/1 GigabitEthernet R5 GigabitEthernet2.100 GigabitEthernet R5 GigabitEthernet2.200 GigabitEthernet R5 GigabitEthernet2.20 R5 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet2 TRUNK R4 G2 GigabitEthernet R4 GigabitEthernet2.100 GigabitEthernet R4 GigabitEthernet2.200 g R4 GigabitEthernet2.20 R6

22 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet ASA1 GigabitEthernet0/1 GigabitEthernet R3 GigabitEthernet0/4 GigabitEthernet ASA2 GigabitEthernet0/2 R7 GigabitEthernet1 150 VSWITCH-MGMT GigabitEthernet ASA1 GigabitEthernet0/1.1 R8 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet ASA2 GigabitEthernet0/1.2 R9 GigabitEthernet1 150 VSWITCH-MGMT GigabitEthernet ASA1 GigabitEthernet0/2.1 GigabitEthernet ASA2 GigabitEthernet0/2.1 GigabitEthernet R12 GigabitEthernet0/2 R10 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet R12 GigabitEthernet2 R11 GigabitEthernet1 150 VSWITCH-MGMT GigabitEthernet R12 GigabitEthernet4 R12 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet R9 GigabitEthernet2 GigabitEthernet R10 GigabitEthernet2 GigabitEthernet R11 GigabitEthernet2 R13

23 GigabitEthernet1 150 NA NA GigabitEthernet NA ASA4 GigabitEthernet0/0 GigabitEthernet NA ASA4 GigabitEthernet0/1 GigabitEthernet R3 GigabitEthernet4 R14 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet NA ASA4 GigabitEthernet0/0 GigabitEthernet NA ASA4 GigabitEthernet0/1 GigabitEthernet4 NA R15 GigabitEthernet VSWITCH-MGMT NA GigabitEthernet ASA4 GigabitEthernet0/0 GigabitEthernet ASA4 GigabitEthernet0/1 GigabitEthernet R18 GigabitEthernet2 R16 GigabitEthernet VSWITCH-MGMT NA GigabitEthernet R18 GigabitEthernet4 R17 GigabitEthernet VSWITCH-MGMT NA GigabitEthernet R18 GigabitEthernet3 R18 GigabitEthernet1 150 NA VSWITCH-MGMT NA GigabitEthernet R15 GigabitEthernet4 GigabitEthernet R17 GigabitEthernet2 GigabitEthernet R16 GigabitEthernet2 Table 12

24 Virtualization Logic The diagram explains how the devices are connected virtually and physically. ESX server is connected over a trunk and that is how all logical devices are logically connected to the switch Example: Follow the red dotted line for the Traffic Flow. If I was sending a Packet from R13 to ASA 4, here is how the packet will get to the ASA 1. VSWITCH will add a tag of VLAN 1008 and forward it to the SWITCH 2. Switch 1 will Forward it to the trunk based on the ARP info to SW2 3. SW2 will look for ARP and forward it to the Firewall. 4. Now based on the Firewall Rules, Firewall will allow or drop the packet

25 Lab Shortcuts 1. Starting a lab with Specific configuration: Open the physical device console > login > dir flash: #copy flash: lab1.cgf startup Reload Check out the video: 2. Clearing console line to get access: Under SecureCRT click on the plus sign against Clear line and Select relevant device to clear 3. Reloading the devices: All the devices are connected to managed power PDU and you can use the shortcut to boot the devices To get support open a ticket on Support Page or send an to support@cloudmylab.com. Please check the documentation and FAQs beforehand END OF Document

Your partner for Success. CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Security v5 Lab Access Guide Your partner for Success CCIE Security v5 Lab Access Guide Version 1.9 Author: Cloudmylab Support Contents Introduction... 4 Audience... 4 Disclaimer... 4 Legal Liability... 4 Topology... 4 Devices Used...

More information

CCIE Security v5 Lab Access Guide

CCIE Security v5 Lab Access Guide Your partner for Success CCIE Security v5 Lab Access Guide Version 1.7 Author: Cloudmylab Support Contents Introduction... 3 Audience... 3 Disclaimer... 3 Legal Liability... 3 Topology... 3 Devices Used...

More information

Your partner for Success. CCIE Security Lab Access Guide

Your partner for Success. CCIE Security Lab Access Guide Your partner for Success CCIE Security Lab Access Guide Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e...

More information

Your partner for Success. CCIE Security Lab Access Guide

Your partner for Success. CCIE Security Lab Access Guide Your partner for Success CCIE Security Lab Access Guide Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e...

More information

Your partner for Success. CCIE Collaboration Lab Access Guide V1.1

Your partner for Success. CCIE Collaboration Lab Access Guide V1.1 Your partner for Success CCIE Collaboration Lab Access Guide V1.1 1 Dear Ms./Mr. Future CCIE Collaboration, Hello! The CCIE Collaboration Lab Access Guide inculcates the details on how to access all the

More information

Managing Virtual Machines

Managing Virtual Machines CHAPTER 7 A virtual machine is a software computer (just like a physical computer), which runs an operating system and applications. Virtual machines run on the VMware vsphere Hypervisor TM. You can use

More information

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0 Global Knowledge European Remote Labs Instructor Guide 1. Contents 1. Contents... 2 2. Introduction... 3 3. Remote Labs Topology, Connections and

More information

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo

Vendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo Vendor: Cisco Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access Solutions Version: Demo QUESTION 1 By default, how many days does Cisco ISE wait before it purges the expired guest accounts?

More information

ISE Primer.

ISE Primer. ISE Primer www.ine.com Course Overview Designed to give CCIE Security candidates an intro to ISE and some of it s features. Not intended to be a complete ISE course. Some topics are not discussed. Provides

More information

Demo Lab Guide OS 9 Emulator

Demo Lab Guide OS 9 Emulator Demo Lab Guide OS 9 Emulator Quick Start Guide Example OSPF Configuration Product Domain: Networking Author: Ruairi Mongan Version: 1.01 Date: 01/01/2016 Table of Contents 1 Product Overview... 3 1.1 Lab

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

Configuring Administrative Operations

Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Managing Backup Operations, page 1 Restoring a Backup Configuration, page 6 Managing Export Operations, page 10

More information

Lab - Building a Switch and Router Network

Lab - Building a Switch and Router Network Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway G0/0 192.168.0.1 N/A G0/1 192.168.1.1 N/A PC-A NIC 192.168.1.3 192.168.1.1 PC-B NIC 192.168.0.3 192.168.0.1 R1 Objectives

More information

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) The goal of the course is to provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1x

More information

Configuring Administrative Operations

Configuring Administrative Operations Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page

More information

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configure to Secure a Flexconnect AP Switchport with Dot1x Configure to Secure a Flexconnect AP Switchport with Dot1x Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Verify Troubleshoot Introduction This document describes

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Well Trained People Better Served Customers CCIE SECURITY 5.0. Silver Learning

Well Trained People Better Served Customers CCIE SECURITY 5.0. Silver Learning Well Trained People Better Served Customers CCIE SECURITY 5.0 Silver Learning OVERVIEW The Cisco Certified Internetwork Expert Security (CCIE Security) program recognizes security experts who have the

More information

DEPLOYING BASIC CISCO WIRELESS LANS (WDBWL)

DEPLOYING BASIC CISCO WIRELESS LANS (WDBWL) [Type a quote from the document or the summary of an interesting point. You can position the text box anywhere in the document. Use the Drawing Tools tab to change the formatting of the pull quote text

More information

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A Forcepoint Sidewinder Control Center, Virtual Appliance Installation Guide 5.3.x Revision A Table of contents 1 Virtual Appliance requirements...3 Two Control Center options...3 Sizing guidelines... 3

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

Installing the Server Operating System or Hypervisor

Installing the Server Operating System or Hypervisor Installing the Server Operating System or Hypervisor This chapter includes the following sections: Operating System or Hypervisor Installation Methods, page 1 KVM Console, page 1 PXE Installation Servers,

More information

Chapter 2: Configure a Network Operating System. Every computer requires an operating system to function, including computerbased

Chapter 2: Configure a Network Operating System. Every computer requires an operating system to function, including computerbased 2.0.1.1 Chapter 2: Configure a Network Operating System Every computer requires an operating system to function, including computerbased network devices such as switches, routers, access points, and firewalls.

More information

Installing the Cisco Virtual Network Management Center

Installing the Cisco Virtual Network Management Center CHAPTER 4 Installing the Cisco Virtual Network Management Center This chapter provides procedures for installing the Cisco Virtual Network Management Center (VNMC). This chapter includes the following

More information

Security. Hardware Specification. Editor: Stephen Satchell. Version 5.004

Security. Hardware Specification. Editor: Stephen Satchell. Version 5.004 Security Hardware Specification Editor: Stephen Satchell Version 5.004 GradedLabs Security Hardware Specification version 5.004 i Copyright 2011 GradedLabs, LLC Copyright Information Copyright 2011 Graded

More information

Skills Assessment Student Practice

Skills Assessment Student Practice Skills Assessment Student Practice Topology Assessment Objectives Part 1: Develop the IPv4 Address Scheme (15 points, 20 minutes) Part 2: Initialize and Reload Devices (10 points, 5 minutes) Part 3: Configure

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Time: 20 minutes Given an IP address and mask of (address / mask), design an IP addressing scheme that satisfies the following requirements. Network address/mask

More information

Skills Assessment Student Training

Skills Assessment Student Training Skills Assessment Student Training Topology Assessment Objectives Part 1: Initialize Devices (6 points, 5 minutes) Part 2: Configure Device Basic Settings (33 points, 20 minutes) Part 3: Configure Switch

More information

UC Voice Application Connectivity in a VMware UCS Environment

UC Voice Application Connectivity in a VMware UCS Environment UC Voice Application Connectivity in a VMware UCS Environment Contents Introduction Troubleshoot Introduction This document describes how to troubleshoot connectivity issues when Cisco Unified Communications

More information

Device Interface IP Address Subnet Mask R1 G0/ N/A

Device Interface IP Address Subnet Mask R1 G0/ N/A CSNB214 Packet Tracer Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway Objectives R1 G0/0 192.168.20.1 255.255.255.0 N/A S1 VLAN 10 S2 VLAN 10 G0/1 192.168.10.1 255.255.255.0

More information

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide Deploying Cisco ASA Firewall Features (FIREWALL) v1.0 Global Knowledge European Remote Labs Instructor Guide Revision Draft 0.2 11/03/2011 1. Contents 1. Contents.2 2. Introduction.3 3. Remote Labs Topology,

More information

ISE Express Installation Guide. Secure Access How -To Guides Series

ISE Express Installation Guide. Secure Access How -To Guides Series ISE Express Installation Guide Secure Access How -To Guides Series Author: Jason Kunst Date: September 10, 2015 Table of Contents About this Guide... 4 How do I get support?... 4 Using this guide... 4

More information

Remote PC Guide Series - Volume 2

Remote PC Guide Series - Volume 2 Installing and Configuring VMware vsphere 5.1 Please be aware that a more recent edition of the Remote PC Guide Series, Volume 2, Installation that is specific to VMware ESXi version 6.0 with vcenter is

More information

Lab Managing Router Configuration Files with Terminal Emulation Software

Lab Managing Router Configuration Files with Terminal Emulation Software Lab Managing Router Configuration Files with Terminal Emulation Software Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

Remote PC Guide for VMware Implementation Using ESXi Version 3.5/4.01

Remote PC Guide for VMware Implementation Using ESXi Version 3.5/4.01 Remote PC Guide for VMware Implementation Using ESXi Version 3.5/4.01 Document Version: 2010-10-22 This guide is a primer for adding remotely accessible PC or servers into your NETLAB Academy Edition or

More information

Managing Virtual Machines

Managing Virtual Machines CHAPTER 6 Last Updated: September 17, 2012 A virtual machine is a software computer (just like a physical computer) that runs an operating system and applications. Virtual machines run on the VMware vsphere

More information

Cisco Mini ACI Fabric and Virtual APICs

Cisco Mini ACI Fabric and Virtual APICs Cisco Mini ACI Fabric and Virtual APICs New and Changed 2 Cisco Mini ACI Fabric and Virtual APICs Overview 2 Installing and Configuring Physical APIC 3 Installing and Configuring Virtual APIC 3 Upgrading

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

IR829 AP803 Access Point Module

IR829 AP803 Access Point Module This chapter provides background on the Internal WLAN Access Point which runs on-board the IR829 router. The AP803 runs its own IOS software independently from the IR829 IOS, and requires configuring.

More information

Post-Installation and Maintenance Tasks

Post-Installation and Maintenance Tasks Log In to the Cisco ISE Web-Based Interface, on page 1 Cisco ISE Configuration Verification, on page 2 VMware Tools Installation Verification, on page 4 Return Material Authorization, on page 6 Reset a

More information

Retake - Skills Assessment Student Training (Answer Key)

Retake - Skills Assessment Student Training (Answer Key) Retake - Skills Assessment Student Training (Answer Key) Name:. Topology Assessment Objectives Part 1: Develop the IPv4 Address Scheme (15 points, 0 minutes) Part 2: Configure Device IPv4 and Security

More information

Using ASDM to manage a FirePOWER module on ASA

Using ASDM to manage a FirePOWER module on ASA Using ASDM to manage a FirePOWER module on ASA Contents Introduction Components used Prerequisites Architecture Background operation when a user connects to ASA via ASDM Step 1 The user initiates the ASDM

More information

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives

More information

Lab Troubleshooting VTP Configuration

Lab Troubleshooting VTP Configuration Lab 4.4.3 Troubleshooting VTP Configuration Topology Diagram Addressing Table Device (Hostname) Interface IP Address Subnet Mask S1 VLAN 99 172.17.99.11 255.255.255.0 S2 VLAN 99 172.17.99.12 255.255.255.0

More information

IEEE 802.1X Multiple Authentication

IEEE 802.1X Multiple Authentication The feature provides a means of authenticating multiple hosts on a single port. With both 802.1X and non-802.1x devices, multiple hosts can be authenticated using different methods. Each host is individually

More information

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide VPN Solutions for Zerto Virtual Replication to Azure IPSec Configuration Guide VERSION 1.0 AUGUST 2017 Table of Contents 1. Overview... 2 1.1 Use Cases... 2 2. Proofs of Concept and Lab Usage... 2 2.1

More information

NSX-T Data Center Migration Coordinator Guide. 5 APR 2019 VMware NSX-T Data Center 2.4

NSX-T Data Center Migration Coordinator Guide. 5 APR 2019 VMware NSX-T Data Center 2.4 NSX-T Data Center Migration Coordinator Guide 5 APR 2019 VMware NSX-T Data Center 2.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) Revised: November, 2013 Contents Overview, page 1 Guidelines and Limitations, page 1 Prerequisites, page 2 Installation

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

ASA 8.x to 9.x Migration with FirePOWER Services

ASA 8.x to 9.x Migration with FirePOWER Services ASA 8.x to 9.x Migration with FirePOWER Services Lab Guide Version 1.0 Another offering from team MIDAS November 17 th, 2014 2 Table of Contents Introduction... 3 Logical Topology... 4 Physical Topology...

More information

Working with Configuration Files

Working with Configuration Files This chapter contains the following sections: Finding Feature Information, page 1 Information About Configuration Files, page 1 Licensing Requirements for Configuration Files, page 2 Managing Configuration

More information

VNS3 Configuration. IaaS Private Cloud Deployments

VNS3 Configuration. IaaS Private Cloud Deployments VNS3 Configuration IaaS Private Cloud Deployments Table of Contents Requirements 3 Remote Support Operations 12 IaaS Deployment Setup 13 VNS3 Configuration Document Links 19 2 Requirements 3 Requirements

More information

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Verify that the

More information

DumpsFree. DumpsFree provide high-quality Dumps VCE & dumps demo free download

DumpsFree.   DumpsFree provide high-quality Dumps VCE & dumps demo free download DumpsFree http://www.dumpsfree.com DumpsFree provide high-quality Dumps VCE & dumps demo free download Exam : 300-208 Title : Implementing Cisco Secure Access Solutions Vendor : Cisco Version : DEMO Get

More information

CIS 231 Windows 10 Install Lab # 3

CIS 231 Windows 10 Install Lab # 3 CIS 231 Windows 10 Install Lab # 3 1) To avoid certain problems later in the lab, use Chrome as your browser: open this url: https://vweb.bristolcc.edu 2) Here again, to avoid certain problems later in

More information

Lab Using the CLI to Gather Network Device Information Topology

Lab Using the CLI to Gather Network Device Information Topology Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

NexentaStor VVOL

NexentaStor VVOL NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document

More information

Lenovo NE1032 and NE1032T Switch

Lenovo NE1032 and NE1032T Switch Lenovo NE1032 and NE1032T Switch Quickstart Guide Document Version 1.0: 10/2018 Scale Computing 2018 1 Table of Contents Introduction 3 Requirements 3 Connect to the Switch 4 Over the Network 4 Console

More information

Contents. Introduction

Contents. Introduction Contents Introduction Prerequisites Requirements Components Used Network Diagrams Configure Step 1. Modify Interface IP configuration on ASA Step 2. Modify DHCP pool settings on both inside and wifi interfaces

More information

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab)

Lab - Troubleshooting VLAN Configurations (Instructor Version Optional Lab) (Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or

More information

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Lab Configuring HSRP and GLBP Topology

Lab Configuring HSRP and GLBP Topology Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1

More information

Lab 7.5.1: Basic Wireless Configuration

Lab 7.5.1: Basic Wireless Configuration Topology Diagram Learning Objectives Configure options in the Linksys Setup tab. Configure options in the Linksys Wireless tab. Configure options in the Linksys Administration tab. Configure options in

More information

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Quick Start Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 How It Works... 2 Deploying Product... 3 System Requirements...

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Managing Virtual Machines Using the Cisco SRE-V CLI

Managing Virtual Machines Using the Cisco SRE-V CLI CHAPTER 8 Managing Virtual Machines Using the Cisco SRE-V CLI Note We recommend that you use the vsphere Client GUI instead of the Cisco SRE-V CLI to manage virtual machines. See Chapter 7, Managing Virtual

More information

Basic Router Pod Version 2 BETA

Basic Router Pod Version 2 BETA Basic Router Pod Version 2 BETA Planning and Installation Guide For Cisco Networking Academy CCNA & CCNP Curriculum Document Version: 2005-11-26 NETLAB Academy Edition features two variations of the Basic

More information

Integration Guide. ManageEngine Network Configuration Manager

Integration Guide. ManageEngine Network Configuration Manager Integration Guide ManageEngine Network Configuration Manager Revised: 16 August 2017 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating

More information

Aruba Quick Start Guide

Aruba Quick Start Guide Aruba Quick Start Guide Before you can access the Web-based Web UI tools, which is the primary configuration interface for Aruba Mobility Controllers, the switch must be configured with basic system information

More information

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV

User Guide. 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV User Guide 450Mbps/300Mbps Wireless N Access Point TL-WA901ND/TL-WA801ND REV4.0.0 1910011930 Contents About This Guide...1 Chapter 1. Get to Know About Your Access Point.................... 2 1. 1. Product

More information

Deploy the ExtraHop Discover Appliance with VMware

Deploy the ExtraHop Discover Appliance with VMware Deploy the ExtraHop Discover Appliance with VMware Published: 2018-07-17 The ExtraHop virtual appliance can help you to monitor the performance of your applications across internal networks, the public

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

Upgrading the System

Upgrading the System Preparing to Upgrade a Data Center, page 1 Automatically, page 3 Manually, page 6 Preparing to Upgrade a Data Center Your system can be upgraded by redeploying it with an upgraded OVA (Virtual Server Template)

More information

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client. CIS 231 Windows 10 Install Lab # 3 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

Deploying the Cisco ASA 1000V

Deploying the Cisco ASA 1000V CHAPTER 2 This chapter includes the following sections: Information About the ASA 1000V Deployment, page 2-1 Downloading the ASA 1000V OVA File, page 2-7 Deploying the ASA 1000V Using the VMware vsphere

More information

CIS 231 Windows 7 Install Lab #2

CIS 231 Windows 7 Install Lab #2 CIS 231 Windows 7 Install Lab #2 1) To avoid certain problems later in the lab, use Chrome as your browser: open this url: https://vweb.bristolcc.edu 2) Here again, to avoid certain problems later in the

More information

Routing & Switching. Rack Rental Access Guide. Editor: Stephen Satchell. Version 1.1

Routing & Switching. Rack Rental Access Guide. Editor: Stephen Satchell. Version 1.1 Routing & Switching Rack Rental Access Guide Editor: Stephen Satchell Version 1.1 Copyright Information Copyright 2010 Graded Labs, LLC. All rights reserved. This publication, GradedLabs R&S Rack Rental

More information

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide

NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide NetWrix VMware Change Reporter Version 3.0 Enterprise Edition Administrator s Guide Table of Contents NetWrix VMware Change Reporter Concepts... 1 Product Editions... 1 How It Works... 2 Deploying Product...

More information

VMware + OpenStack. Dan Wendlandt Director of Product Management VMware VMware Inc. All rights reserved.

VMware + OpenStack. Dan Wendlandt Director of Product Management VMware VMware Inc. All rights reserved. VMware + OpenStack Dan Wendlandt Director of Product Management OpenStack @ VMware VMware + OpenStack: A Fork in the Road? 2 VMware + OpenStack: Better Together An industry-wide APIs + tool ecosystem that

More information

SPB SE Remote LAB Platform Information

SPB SE Remote LAB Platform Information SPB SE Remote LAB Platform Information Table of Contents Introduction... 2 How to book the LAB?... 3 Using Remote Desktop... 3 Using VIA... 6 LAB Infrastructure... 8 Network diagram... 9 Video Server and

More information

If you re not using VMware vsphere Client 4.1, your screens may vary. ITEM Example s Values Your Values

If you re not using VMware vsphere Client 4.1, your screens may vary. ITEM Example s Values Your Values Quick Start Guide If you re not using VMware vsphere Client 4.1, your screens may vary. VXOA VIRTUAL APPLIANCES VMware vsphere / vsphere Hypervisor In-Line Deployment (Bridge Mode) 2012 Silver Peak Systems,

More information

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? CCNA1 v6.0 Chapter 2 Exam Answers 2017 (100%) MiPDF.COM 1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel

More information

Configuring and Administering Hyper-V in Windows Server 2012

Configuring and Administering Hyper-V in Windows Server 2012 Configuring and Administering Hyper-V in Windows Server 2012 About this course Students will learn the history of Virtualization as it pertains to Microsoft technologies. Students will learn the new features

More information

Lab Configure Basic AP security through GUI

Lab Configure Basic AP security through GUI Lab 8.3.1.1 Configure Basic AP security through GUI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following objectives:

More information

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide

SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6. Getting Started Guide SonicWall Secure Mobile Access SMA 500v Virtual Appliance 8.6 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc.

More information

Installing the Cisco CSR 1000v in VMware ESXi Environments

Installing the Cisco CSR 1000v in VMware ESXi Environments Installing the Cisco CSR 1000v in VMware ESXi Environments VMware ESXi Support Information, page 1 VMware Requirements Cisco IOS XE Fuji 16.7, page 2 Supported VMware Features and Operations, page 3 Deploying

More information

Lab Student Lab Orientation

Lab Student Lab Orientation Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and

More information

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series ISE TACACS+ Configuration Guide for Cisco ASA Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: February 2016 Table of Contents

More information

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version Cisco 642-515 CISCO 642-515 Securing Networks with ASA Advanced Practice Test Version 3.1 QUESTION NO: 1 Cisco 642-515: Practice Exam Which two statements correctly describe configuring active/active failover?

More information

Lab - Troubleshooting ACL Configuration and Placement Topology

Lab - Troubleshooting ACL Configuration and Placement Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway HQ G0/1 192.168.1.1

More information

Using SANDeploy iscsi SAN for VMware ESX / ESXi Server

Using SANDeploy iscsi SAN for VMware ESX / ESXi Server Using SANDeploy iscsi SAN for VMware ESX / ESXi Server Friday, October 8, 2010 www.sandeploy.com Copyright SANDeploy Limited 2008 2011. All right reserved. Table of Contents Preparing SANDeploy Storage...

More information

SmartPath EMS VMA Virtual Appliance Quick Start Guide

SmartPath EMS VMA Virtual Appliance Quick Start Guide LWN600VMA SmartPath Enterprise Wireless System Virtual Appliance SmartPath EMS VMA Virtual Appliance Quick Start Guide Provides the speed, range, security, adapability, and manageability to replace wired

More information

Voice. Hardware Specification. Editor: Stephen Satchell. Version 1.2 (4) Voice Hardware Specification version 1.2 i Copyright 2012 INE, Inc.

Voice. Hardware Specification. Editor: Stephen Satchell. Version 1.2 (4) Voice Hardware Specification version 1.2 i Copyright 2012 INE, Inc. Voice Hardware Specification Editor: Stephen Satchell Version 1.2 (4) Voice Hardware Specification version 1.2 i Copyright 2012 INE, Inc. INE, Inc. 500 108th Ave NE Suite 510 Bellevue, WA 98004 Voice Hardware

More information

Configuring Link Aggregation

Configuring Link Aggregation Information About Link Aggregation, page 1 Restrictions for Link Aggregation, page 2 (GUI), page 4 (CLI), page 4 Verifying Link Aggregation Settings (CLI), page 5 Configuring Neighbor Devices to Support

More information

Overview of Ports and Interfaces

Overview of Ports and Interfaces Three concepts are key to understanding how controllers connect to a wireless network: ports, interfaces, and WLANs. Information About Ports, page 1 Information About Distribution System Ports, page 2

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information