Your partner for Success. CCIE Security Lab Access Guide

Size: px
Start display at page:

Download "Your partner for Success. CCIE Security Lab Access Guide"

Transcription

1 Your partner for Success CCIE Security Lab Access Guide

2 Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: 5 Accessing the Devices console... 6 A.) Physical Device Access... 6 B.) Virtual Device Access... 9 Authentication Details for CLI based Devices Example Method 1 for Virtual Devices with CLI access Example Method 2 for Virtual Devices with CLI Access Example Method 1 for windows based Device: Example Method 2 for windows based Device: Lab Shortcuts SECURITY POD 1 DEVICE LIST SECURITY POD 2 DEVICE LIST... 15

3 Getting Access to the POD 1. There are two methods you can get access to the access detail as mentioned below a.) Check for the Url and Port Number in the from b.) You can alternately log in to your account and under my account Rack access, you will see the details

4 2. Login with the credentials provided 3. Once you login you will see a customized Desktop from where you can access all the devices

5 DEVICE ACCESS How to access the devices Starting the lab environment: 1. Once you are get the access to the Guest Desktop Environment A.) Open the VMware vsphere client and login with the following details IP Address/hostname Username Student Password ccie123 B.) Reload all following Guest Virtual Machines from the VMware VSphere Client before you start your lab WSA ISE-1 ISE-2 Prime NCS Windows-TestPC-1 Windows Wireless PC Windows VPN-Test-PC2 ACS Windows Server 2008

6 B1) follow the screen shot on how to reload the machine Step 1: After you login and select the guest machine. Step 2: Right Click on the guest machine, click on power and select reset Accessing the Devices console A.) Physical Device Access All the devices are pre-setup for console access and follow the screenshots for a quick access

7 A1) List of devices Device Line Number IP address R R R R R R SW SW SW SW SW SW ASA ASA ASA ASA IPS AP AP WLC Terminal Server

8 A2) Physical Devices Authentication Details Device Username Password R1 cisco cisco R2 cisco cisco R3 cisco cisco R4 cisco cisco R5 cisco cisco R6 cisco cisco SW1 cisco cisco SW2 cisco cisco SW3 cisco cisco SW4 cisco cisco SW5 cisco cisco SW6 cisco cisco ASA1 cisco cisco ASA2 cisco cisco ASA3 cisco cisco ASA4 cisco cisco IPS cisco cisco AP1 cisco cisco AP2 cisco cisco WLC cisco cisco Terminal Server Student ccie123

9 A3) Follow the Screen shots for Quick Access 1. Click on SecureCRT B.) Virtual Device Access : You can access the virtual devices in two ways Device Device Type Method 1 Method 2 WSA CLI access/ or Browser based access after initial config. Using SecureCRT access Using Vmware guest ISE-1 CLI access/ or Browser based access after initial config. Using SecureCRT access Using Vmware guest ISE-2 CLI access/ or Browser based access after initial config. Using SecureCRT access Using Vmware guest Prime NCS CLI access/ or Browser based access after initial config. Using SecureCRT access Using Vmware guest Windows-TestPC-1 Graphical User Interface RDP to mgmt interface Using Vmware guest Windows Wireless PC Graphical User Interface RDP to mgmt interface Using Vmware guest Windows VPN-Test-PC2 Graphical User Interface RDP to mgmt interface Using Vmware guest ACS CLI access/ or Browser based access after initial config. Using SecureCRT access Using Vmware guest Windows Server 2008 Graphical User Interface RDP to mgmt interface Using Vmware guest

10 Authentication Details for CLI based Devices Device CLI Username Password GUI Username Password ACS Admin Ccie123 Acsadmin Ccie123 ISE1 Admin Ccie123 Admin Ccie123 ISE2 Admin Ccie123 Admin Ccie123 WSA Admin ironport Admin ironport Example Method 1 for Virtual Devices with CLI access Open SecureCRT >>Click on the Plus Sign against Virtual Device >> Select the relevant device

11 Example Method 2 for Virtual Devices with CLI Access Open Vmware Vsphere Client>>right click on the relevant machine>>click open console B1.2) Accessing Windows Based machines: There are 4 Windows Based machines as follows Machine MGMT IP LABIP Username Password TEST-PC / Student Ccie123 TEST-PC / Student Ccie123 Wireless-PC /32 NA Student Ccie123 Windows Server AD / Student Ccie123 Example Method 1 for windows based Device: Click on the remote desktop shortcut on the desktop, you will see 4 shortcuts and named appropriately Enter the username and password when prompted

12

13 Example Method 2 for windows based Device: Open Vmware Vsphere Client>>right click on the relevant machine>>click open console Lab Shortcuts 1. Starting a lab with Specific configuration Open the physical device console > login > dir flash: #copy flash: lab1.cgf startup Reload Check out the video:

14 2. Clearing console line to get access : Under SecureCRT click on the plus sign against Clear line and Select relevant device to clear 3. Reloading the devices : All the devices are connected to managed power PDU and you can use the shortcut to boot the devices SECURITY POD 1 DEVICE LIST Device R1 R2 R3 R4 R5 R6 SW1 SW2 SW3 SW4 SW5 SW6 ASA1 Device Type CISCO2811 CISCO2811 CISCO1921 CISCO2811 CISCO2811 CISCO2921 WS-C3560X WS-C3560X WS-C3560X ASA5585X

15 ASA2 ASA5585X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811 SECURITY POD 2 DEVICE LIST Device Device Type R1 CISCO1941 R2 CISCO1941 R3 CISCO1921 R4 CISCO1921 R5 CISCO2901 R6 CISCO2901 SW1 SW2 SW3 SW4 SW5 SW6 ASA1 ASA5515-X ASA2 ASA5515-X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811 Support To get support open a ticket on Support Page or send an to support@cloudmylab.com Please check the documentation and FAQs before hand

Your partner for Success. CCIE Security Lab Access Guide

Your partner for Success. CCIE Security Lab Access Guide Your partner for Success CCIE Security Lab Access Guide Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e...

More information

CCIE Security v5 Lab Access Guide

CCIE Security v5 Lab Access Guide Your partner for Success CCIE Security v5 Lab Access Guide Version 1.7 Author: Cloudmylab Support Contents Introduction... 3 Audience... 3 Disclaimer... 3 Legal Liability... 3 Topology... 3 Devices Used...

More information

Your partner for Success. CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Security v5 Lab Access Guide Your partner for Success CCIE Security v5 Lab Access Guide Version 1.8 Author: Cloudmylab Support Contents Introduction... 3 Audience... 3 Disclaimer... 3 Legal Liability... 3 Topology... 3 Devices Used...

More information

Your partner for Success. CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Security v5 Lab Access Guide Your partner for Success CCIE Security v5 Lab Access Guide Version 1.9 Author: Cloudmylab Support Contents Introduction... 4 Audience... 4 Disclaimer... 4 Legal Liability... 4 Topology... 4 Devices Used...

More information

Your partner for Success. CCIE Collaboration Lab Access Guide V1.1

Your partner for Success. CCIE Collaboration Lab Access Guide V1.1 Your partner for Success CCIE Collaboration Lab Access Guide V1.1 1 Dear Ms./Mr. Future CCIE Collaboration, Hello! The CCIE Collaboration Lab Access Guide inculcates the details on how to access all the

More information

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0 Global Knowledge European Remote Labs Instructor Guide 1. Contents 1. Contents... 2 2. Introduction... 3 3. Remote Labs Topology, Connections and

More information

Remote Access to the CIS VLab (308)

Remote Access to the CIS VLab (308) Remote Access to the CIS VLab (308) This Howto shows to remotely access the CIS 90 Arya VMs (virtual machines) in the CIS Virtual Lab (VLab). The CIS VLab was developed to remotely provide Distance Education

More information

Lab Student Lab Orientation

Lab Student Lab Orientation Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and

More information

LAB: Configuring LEAP. Learning Objectives

LAB: Configuring LEAP. Learning Objectives LAB: Configuring LEAP Learning Objectives Configure Cisco ACS Radius server Configure a WLAN to use the 802.1X security protocol and LEAP Authenticate with an access point using 802.1X security and LEAP

More information

DEPLOYING BASIC CISCO WIRELESS LANS (WDBWL)

DEPLOYING BASIC CISCO WIRELESS LANS (WDBWL) [Type a quote from the document or the summary of an interesting point. You can position the text box anywhere in the document. Use the Drawing Tools tab to change the formatting of the pull quote text

More information

Lab Configure Basic AP security through GUI

Lab Configure Basic AP security through GUI Lab 8.3.1.1 Configure Basic AP security through GUI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following objectives:

More information

ITCorporation HOW DO I INSTALL A FRESH INSTANCE OF ANALYZER? DESCRIPTION RESOLUTION. Knowledge Database KNOWLEDGE DATABASE

ITCorporation HOW DO I INSTALL A FRESH INSTANCE OF ANALYZER? DESCRIPTION RESOLUTION. Knowledge Database KNOWLEDGE DATABASE KNOWLEDGE DATABASE HOW DO I INSTALL A FRESH INSTANCE OF ANALYZER? 3. Click on GMS/Analyzer - Virtual Appliance or GMS/Analyzer - Virtual Appliance 950GB under GMS - Virtual Appliance. Note: It is not recommended

More information

Administration of Cisco WLC

Administration of Cisco WLC Using the Controller Interface, on page 1 Enabling Web and Secure Web Modes, on page 6 Telnet and Secure Shell Sessions, on page 8 Management over Wireless, on page 13 Configuring Management using Dynamic

More information

Installing the Cisco Virtual Network Management Center

Installing the Cisco Virtual Network Management Center CHAPTER 4 Installing the Cisco Virtual Network Management Center This chapter provides procedures for installing the Cisco Virtual Network Management Center (VNMC). This chapter includes the following

More information

SPB SE Remote LAB Platform Information

SPB SE Remote LAB Platform Information SPB SE Remote LAB Platform Information Table of Contents Introduction... 2 How to book the LAB?... 3 Using Remote Desktop... 3 Using VIA... 6 LAB Infrastructure... 8 Network diagram... 9 Video Server and

More information

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create

More information

Readme for ios 7 WebAuth on Cisco Wireless LAN Controller, Release 7.4 MR 2

Readme for ios 7 WebAuth on Cisco Wireless LAN Controller, Release 7.4 MR 2 Readme for ios 7 WebAuth on Cisco Wireless LAN Controller, Release 7.4 MR 2 September, 2013 1 Contents This document includes the following sections: 1 Contents 1 2 Background 1 2.1 Captive Bypassing on

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Identity Services Engine Guest Portal Local Web Authentication Configuration Example Identity Services Engine Guest Portal Local Web Authentication Configuration Example Document ID: 116217 Contributed by Marcin Latosiewicz, Cisco TAC Engineer. Jun 21, 2013 Contents Introduction Prerequisites

More information

Deploying Cisco UCS Central

Deploying Cisco UCS Central This chapter includes the following sections: Obtaining the Cisco UCS Central Software from Cisco, page 1 Using the Cisco UCS Central OVA File, page 2 Using the Cisco UCS Central ISO File, page 4 Logging

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

Configuring Administrative Operations

Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Managing Backup Operations, page 1 Restoring a Backup Configuration, page 6 Managing Export Operations, page 10

More information

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example Document ID: 100162 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

S38 Basic Configuration

S38 Basic Configuration S38 Basic Configuration Contents 1 Web Login Summary...1 1.1 Overview...1 1.2 Management IP/ Route Configuration...1 1.3 User Configuration...2 1.4 Http Configuration...2 1.5 Web Login...3 2 Firmware upgrade...5

More information

Lab - Connect to a Router for the First Time

Lab - Connect to a Router for the First Time Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

ACE Live on RSP: Installation Instructions

ACE Live on RSP: Installation Instructions ACE Live on RSP ACE Live on RSP: Installation Instructions These installation instructions apply to OPNET ACE Live on RSP Release 7.1.3. You can find the latest version of this document at the OPNET Support

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

TCPWave DDI Virtual Machine Installation Guide

TCPWave DDI Virtual Machine Installation Guide TCPWave DDI Virtual Machine Installation Guide Version 1.1 TCPWave IPAM and Remote Virtual Server Software Born in the Cloud, Made for the Cloud 1 2017 TCPWave Inc. All Rights Reserved. TCPWave DDI Virtual

More information

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configurations Authentication

More information

Remote Access User Guide for Mac OS (Citrix Instructions)

Remote Access User Guide for Mac OS (Citrix Instructions) (Citrix Instructions) VERSION: 003 PUBLISHED: 2/2018 Page 1 of 8 Remote Access User Guide for Mac OS Please follow the steps outlined in this guide which will show you how to access the Clarion Partners

More information

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide Deploying Cisco ASA Firewall Features (FIREWALL) v1.0 Global Knowledge European Remote Labs Instructor Guide Revision Draft 0.2 11/03/2011 1. Contents 1. Contents.2 2. Introduction.3 3. Remote Labs Topology,

More information

Managing Virtual Machines

Managing Virtual Machines CHAPTER 7 A virtual machine is a software computer (just like a physical computer), which runs an operating system and applications. Virtual machines run on the VMware vsphere Hypervisor TM. You can use

More information

IT Quick Reference Guides Using the Online Ticketing System (mysupport)

IT Quick Reference Guides Using the Online Ticketing System (mysupport) IT Quick Reference Guides Using the Online Ticketing System (mysupport) isupport Guides This guide covers using the Online Ticketing System, or mysupport, to submit tickets, browse knowledgebase articles

More information

ISE Primer.

ISE Primer. ISE Primer www.ine.com Course Overview Designed to give CCIE Security candidates an intro to ISE and some of it s features. Not intended to be a complete ISE course. Some topics are not discussed. Provides

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Persistent Data Transfer Procedure

Persistent Data Transfer Procedure This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or 5.6 data into Cisco ISE, Release 1.4 system using the migration tool. Exporting Data from Cisco Secure ACS, page 1 Analyzing

More information

Deployment of FireSIGHT Management Center on VMware ESXi

Deployment of FireSIGHT Management Center on VMware ESXi Deployment of FireSIGHT Management Center on VMware ESXi Contents Introduction Prerequisites Components Used Configuration Deploy an OVF Template Power On and Complete Initialization Configure the Network

More information

Installing Cisco MSE in a VMware Virtual Machine

Installing Cisco MSE in a VMware Virtual Machine Installing Cisco MSE in a VMware Virtual Machine This chapter describes how to install and deploy a Cisco Mobility Services Engine (MSE) virtual appliance. Cisco MSE is a prebuilt software solution that

More information

202 Lab Introduction Connecting to the Lab Environment

202 Lab Introduction Connecting to the Lab Environment 202 Lab Introduction Connecting to the Lab Environment Objectives During this v7.1 Deployment lab, each student (from the Blue group or Green group) must verify access (and permissions) to their assigned

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Lab Student Lab Orientation

Lab Student Lab Orientation Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and

More information

Contents. Introduction

Contents. Introduction Contents Introduction Prerequisites Requirements Components Used Network Diagrams Configure Step 1. Modify Interface IP configuration on ASA Step 2. Modify DHCP pool settings on both inside and wifi interfaces

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing...

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing... CSEC 640 Lab Access Contents Overview... 2 Part I Connecting to the VPN via Windows OS... 2 Accessing the Site with the View Client... 2 Installing... 3 Launching Your Client... 4 Part II Windows Access

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

ISE Express Installation Guide. Secure Access How -To Guides Series

ISE Express Installation Guide. Secure Access How -To Guides Series ISE Express Installation Guide Secure Access How -To Guides Series Author: Jason Kunst Date: September 10, 2015 Table of Contents About this Guide... 4 How do I get support?... 4 Using this guide... 4

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

Managing Virtual Machines

Managing Virtual Machines CHAPTER 6 Last Updated: September 17, 2012 A virtual machine is a software computer (just like a physical computer) that runs an operating system and applications. Virtual machines run on the VMware vsphere

More information

Cisco. Small Business SBCS Technical Enablement Lab (TEL) UC500 SWP Upgrade with CCA 3.0

Cisco. Small Business SBCS Technical Enablement Lab (TEL) UC500 SWP Upgrade with CCA 3.0 Cisco Small Business SBCS Technical Enablement Lab (TEL) UC500 SWP 8.1.0 Upgrade with CCA 3.0 Contents Introduction... 3 SW Upgrade... 4 2 Introduction Before you begin, you must download the necessary

More information

Administration of Cisco WLC

Administration of Cisco WLC HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously

More information

Checklists for Configuring the Gateway

Checklists for Configuring the Gateway CHAPTER 7 The Cisco Unified Communications Manager Business Edition 3000 uses either Cisco 2901 Integrated Services Router (ISR2901) or Cisco Media Convergence Server 7890C1 (MCS7890-C1) to serve as your

More information

Installing Cisco CMX in a VMware Virtual Machine

Installing Cisco CMX in a VMware Virtual Machine Installing Cisco CMX in a VMware Virtual Machine This chapter describes how to install and deploy a Cisco Mobility Services Engine (CMX) virtual appliance. Cisco CMX is a prebuilt software solution that

More information

Lab Manage AP Configuration and Image Files

Lab Manage AP Configuration and Image Files Lab 5.2.5 Manage AP Configuration and Image Files Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn to manage configuration

More information

Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX Release 10.4

Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX Release 10.4 Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX Release 10.4 First Published: 2017-04-02 Last Modified: 2017-06-27 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Verify Radius Server Connectivity with Test AAA Radius Command

Verify Radius Server Connectivity with Test AAA Radius Command Verify Connectivity with Test AAA Radius Command Contents Introduction Prerequisites Requirements Components Used Background Information How The Feature Works Command Syntax Scenario 1. Passed Authentication

More information

Lab Manage AP Configuration and Image Files

Lab Manage AP Configuration and Image Files Lab 5.2.5 Manage AP Configuration and Image Files Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn to manage configuration

More information

Configure Smartport Properties on a Switch through the CLI

Configure Smartport Properties on a Switch through the CLI Configure Smartport Properties on a Switch through the CLI Objective This article provides instructions on how to configure auto smartport properties on your switch through the CLI. To configure smartports

More information

Cisco Mobility Services Engine Virtual Appliance Installation Guide

Cisco Mobility Services Engine Virtual Appliance Installation Guide Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX Release, 10.3 and Later First Published: 2017-04-02 Last Modified: 2017-06-18 Americas Headquarters Cisco Systems, Inc.

More information

Your instructor will assign you a Cloud Labs username during class. Fill out the details in the fields below for easy reference.

Your instructor will assign you a Cloud Labs username during class. Fill out the details in the fields below for easy reference. VMware vsphere: Install, Configure, Manage [V5.5] Class Configuration Sheet Student B Your instructor will assign you a Cloud Labs username during class. Fill out the details in the fields below for easy

More information

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) The goal of the course is to provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1x

More information

NETCONF Client GUI. Client Application Files APPENDIX

NETCONF Client GUI. Client Application Files APPENDIX APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:

More information

Post-Installation and Maintenance Tasks

Post-Installation and Maintenance Tasks Log In to the Cisco ISE Web-Based Interface, on page 1 Cisco ISE Configuration Verification, on page 2 VMware Tools Installation Verification, on page 4 Return Material Authorization, on page 6 Reset a

More information

Lab Configure Basic AP Security through IOS CLI

Lab Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Lab Configuring an ISR with SDM Express

Lab Configuring an ISR with SDM Express Lab 5.2.3 Configuring an ISR with SDM Express Objectives Configure basic router global settings router name, users, and login passwords using Cisco SDM Express. Configure LAN and Internet connections on

More information

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access

More information

Important! Read this Information Bulletin before Upgrading Switched Rack PDU products to rpdu Firmware Version or 3.5.8

Important! Read this Information Bulletin before Upgrading Switched Rack PDU products to rpdu Firmware Version or 3.5.8 Important! Read this Information Bulletin before Upgrading Switched Rack PDU products to rpdu Firmware Version 3.5.7 or 3.5.8 This Information Bulletin is relevant for you if 1. The part number of your

More information

Skills Assessment Student Training

Skills Assessment Student Training Skills Assessment Student Training Topology Assessment Objectives Part 1: Initialize Devices (6 points, 5 minutes) Part 2: Configure Device Basic Settings (33 points, 20 minutes) Part 3: Configure Switch

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Verify that the

More information

Lab 7.5.1: Basic Wireless Configuration

Lab 7.5.1: Basic Wireless Configuration Topology Diagram Learning Objectives Configure options in the Linksys Setup tab. Configure options in the Linksys Wireless tab. Configure options in the Linksys Administration tab. Configure options in

More information

MAC Filtering for Lobby Ambassadors

MAC Filtering for Lobby Ambassadors MAC Filtering for Lobby Ambassadors Introduction 2 Pre requisite 2 Components Used 2 Conventions 2 Feature Introduction 2 Implementation 2 Work Flow for Administrative Privileges and Lobby Admin Role 2

More information

Integration of FireSIGHT System with ISE for RADIUS User Authentication

Integration of FireSIGHT System with ISE for RADIUS User Authentication Integration of FireSIGHT System with ISE for RADIUS User Authentication Document ID: 118541 Contributed by Todd Pula and Nazmul Rajib, Cisco TAC Engineers. Sep 29, 2014 Contents Introduction Prerequisites

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces. 2015 Cisco and/or its affiliates. All rights

More information

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP This section of the document illustrates the Cisco ACS radius server and how PEAP and WPA-PEAP was configured on

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers This document provides a configuration example for Terminal Access Controller Access Control System Plus

More information

1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu. FireFox

1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu. FireFox CIS 231 Windows 7 Install Lab #2 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

Setup Citrix Receiver Standalone App

Setup Citrix Receiver Standalone App Setup Citrix Receiver Standalone App This guide demonstrates how to setup the standalone version of the Citrix Receiver application on Windows to enable direct access to EPIC (VPN is required for off-site

More information

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi) Revised: November, 2013 Contents Overview, page 1 Guidelines and Limitations, page 1 Prerequisites, page 2 Installation

More information

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version Cisco 642-515 CISCO 642-515 Securing Networks with ASA Advanced Practice Test Version 3.1 QUESTION NO: 1 Cisco 642-515: Practice Exam Which two statements correctly describe configuring active/active failover?

More information

MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE APRIL 2019 PRINTED 17 APRIL 2019 MANAGING ANDROID DEVICES: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Audience Getting Started with Android

More information

Installing the Operating System or Hypervisor

Installing the Operating System or Hypervisor If you purchased E-Series Server or NCE Option 1 (E-Series Server or NCE without a preinstalled operating system or hypervisor), you must install an operating system or hypervisor. This chapter includes

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client. CIS 231 Windows 10 Install Lab # 3 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME At the your connection is not private message, click Advanced

More information

Deployment of a new M-Lab site

Deployment of a new M-Lab site Deployment of a new M-Lab site Deployment of a new M-Lab site Scope of the document HW deployment - on-site CHECKLIST for on-site staff, BEFORE going to the site SW configuration - on-site and off-site

More information

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 3: Configuring VMware ESXi

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 3: Configuring VMware ESXi VMware vsphere 5.5: Install, Configure, Manage Lab Addendum Lab 3: Configuring VMware ESXi Document Version: 2014-07-08 Copyright Network Development Group, Inc. www.netdevgroup.com NETLAB Academy Edition,

More information

What Is Wireless Setup

What Is Wireless Setup What Is Wireless Setup Wireless Setup provides an easy way to set up wireless flows for 802.1x, guest, and BYOD. It also provides workflows to configure and customize each portal for guest and BYOD, where

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix Networks

More information

Using SpringPeople Virtual Labs

Using SpringPeople Virtual Labs Using SpringPeople Virtual Labs Each participant will be assigned a separate, dedicated, Virtual Lab computer for the entire duration of the training + a week for completing assigned development project.

More information

Logging into the Firepower System

Logging into the Firepower System The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower

More information

Procedure to Upgrade Verizon FiOS Router and Configure Xbox 360 to connect with Microsoft USB WiFi Adapter

Procedure to Upgrade Verizon FiOS Router and Configure Xbox 360 to connect with Microsoft USB WiFi Adapter FiOS TV & Internet Verizon DSL FAQ s Wireless Verizon Bundles Verizon Support Procedure to Upgrade Verizon FiOS Router and Configure Xbox 360 to connect with Microsoft USB WiFi Adapter Overview The current

More information

Demo Lab Guide OS 9 Emulator

Demo Lab Guide OS 9 Emulator Demo Lab Guide OS 9 Emulator Quick Start Guide Example OSPF Configuration Product Domain: Networking Author: Ruairi Mongan Version: 1.01 Date: 01/01/2016 Table of Contents 1 Product Overview... 3 1.1 Lab

More information

Dr. Tom Hicks. Computer Science Department Trinity University

Dr. Tom Hicks. Computer Science Department Trinity University Dr. Tom Hicks Computer Science Department Trinity University 1 1 Remote Desktop Into CS-X That Contains Your Switch? Open Putty To Your Switch 2 What is the Command To Go Into Privilege Mode DO IT! enable

More information

Logging In and Setting Up

Logging In and Setting Up This chapter includes the following sections: Overview of, page 1 Resetting the Admin Password, page 3 Password Guidelines, page 3 Resetting the Shared Secret, page 4 Overview of You can log in and work

More information

Configure to Secure a Flexconnect AP Switchport with Dot1x

Configure to Secure a Flexconnect AP Switchport with Dot1x Configure to Secure a Flexconnect AP Switchport with Dot1x Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Verify Troubleshoot Introduction This document describes

More information