Your partner for Success. CCIE Security Lab Access Guide

Similar documents
Your partner for Success. CCIE Security Lab Access Guide

CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Security v5 Lab Access Guide

Your partner for Success. CCIE Collaboration Lab Access Guide V1.1

Remote Access to the CIS VLab (308)

Deploying Cisco ASA Firewall Solutions (FIREWALL) v2.0. Global Knowledge European Remote Labs Instructor Guide

Lab Student Lab Orientation

Installing the Cisco Virtual Network Management Center

LAB: Configuring LEAP. Learning Objectives

ITCorporation HOW DO I INSTALL A FRESH INSTANCE OF ANALYZER? DESCRIPTION RESOLUTION. Knowledge Database KNOWLEDGE DATABASE

Configuring Administrative Operations

DEPLOYING BASIC CISCO WIRELESS LANS (WDBWL)

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Readme for ios 7 WebAuth on Cisco Wireless LAN Controller, Release 7.4 MR 2

Deploying Cisco UCS Central

Lab Configure Basic AP security through GUI

Administration of Cisco WLC

Cisco Exam Questions & Answers

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Managing Virtual Machines

SPB SE Remote LAB Platform Information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

S38 Basic Configuration

RSA SecurID Ready with Wireless LAN Controllers and Cisco Secure ACS Configuration Example

ISE Primer.

Installing Cisco MSE in a VMware Virtual Machine

ACE Live on RSP: Installation Instructions

TCPWave DDI Virtual Machine Installation Guide

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Installing Cisco CMX in a VMware Virtual Machine

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example

Remote Access User Guide for Mac OS (Citrix Instructions)

IT Quick Reference Guides Using the Online Ticketing System (mysupport)

202 Lab Introduction Connecting to the Lab Environment

Wireless LAN Controller Web Authentication Configuration Example

Persistent Data Transfer Procedure

Contents Overview... 2 Part I Connecting to the VPN via Windows OS Accessing the Site with the View Client Installing...

Deployment of FireSIGHT Management Center on VMware ESXi

Cisco Exam Questions & Answers

Lab Student Lab Orientation

1) Use either Chrome of Firefox to access the VMware vsphere web Client. FireFox

Configuring the SMA 500v Virtual Appliance

ISE Express Installation Guide. Secure Access How -To Guides Series

Managing Virtual Machines

Configuring Client Profiling

Managing NCS User Accounts

FireFox. CIS 231 Windows 10 Install Lab # 3. 1) Use either Chrome of Firefox to access the VMware vsphere web Client.

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 3: Configuring VMware ESXi

Cisco Mobility Services Engine Virtual Appliance Installation Guide for Cisco CMX Release 10.4

VMware vsphere 5.5: Install, Configure, Manage Lab Addendum. Lab 21: VMware vsphere Distributed Resource Scheduler

Cisco Mobility Services Engine Virtual Appliance Installation Guide

Lab Manage AP Configuration and Image Files

Demo Lab Guide OS 9 Emulator

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

Lab - Connect to a Router for the First Time

Verify Radius Server Connectivity with Test AAA Radius Command

Deploying the Cisco ASA 1000V

Lab Manage AP Configuration and Image Files

Configure Smartport Properties on a Switch through the CLI

Post-Installation and Maintenance Tasks

Important! Read this Information Bulletin before Upgrading Switched Rack PDU products to rpdu Firmware Version or 3.5.8

Your instructor will assign you a Cloud Labs username during class. Fill out the details in the fields below for easy reference.

Introduction to 802.1X Operations for Cisco Security Professionals (802.1X)

CIS 231 Windows 10 Install Lab # 3

NETCONF Client GUI. Client Application Files APPENDIX

Lab Configure Basic AP Security through IOS CLI

Perform Backup and Restore

Lab 3.4.6a Configure the PIX Security Appliance using Setup Mode and ASDM Startup Wizard

Contents. Introduction

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Configuring Administrative Operations

Hochschule Bremen Networking Lab

Install and Configure FindIT Network Manager and FindIT Network Probe on a VMware Virtual Machine

MAC Filtering for Lobby Ambassadors

Send document comments to

Integration of FireSIGHT System with ISE for RADIUS User Authentication

Lab Configuring and Verifying Extended ACLs Topology

NetVanta 7100 Exercise Small Office Key System

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

Cisco VDS Service Broker Software Installation Guide for UCS Platforms

Using ANM With Virtual Data Centers

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Zebra Mobile Printer, Zebra Setup Utility, Cisco ACS, Cisco Controller PEAP and WPA-PEAP

Examples of Cisco APE Scenarios

FireFox. CIS 231 Windows 2012 R2 Server Install Lab #1

Overview of the Cisco NCS Command-Line Interface

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

Cisco CISCO Securing Networks with ASA Advanced. Practice Test. Version

Administration of Cisco WLC

VPN Solutions for Zerto Virtual Replication to Azure. IPSec Configuration Guide

What Is Wireless Setup

Logging In and Setting Up

Cisco. Small Business SBCS Technical Enablement Lab (TEL) UC500 SWP Upgrade with CCA 3.0

Lab 7 Configuring Basic Router Settings with IOS CLI

Executing PowerShell Agent Commands

CIS 231 Windows 7 Install Lab #2

Establishing two-factor authentication with Cisco and HOTPin authentication server from Celestix Networks

Logging into the Firepower System

Transcription:

Your partner for Success CCIE Security Lab Access Guide

Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e... 5 Accessing the Devices console... 6 A.) Physical Device Access... 6 B.) Virtual Device Access... 9 Authentication Details for CLI based Devices... 10 Example Method 1 for Virtual Devices with CLI access... 10 Example Method 2 for Virtual Devices with CLI Access... 11 Example Method 1 for windows based Device:... 11 Example Method 2 for windows based Device:... 13 Lab Shortcuts... 14 SECURITY POD 1 DEVICE LIST... 15 SECURITY POD 2 DEVICE LIST... 16

Getting Access to the POD 1. There are two methods you can get access to the access detail as mentioned below a.) Check for the Url and Port Number in the email from support@cloudmylab.com b.) You can alternately log in to your account and under my account Rack access, you will see the details

2. Login with the credentials provided 3. Once you login you will see a customized Desktop from where you can access all the devices

DEVICE ACCESS How to access the devices Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e 1. Once you are get the access to the Guest Desktop Environment A.) Open the VMware vsphere client and login with the following details Rack Rack-1 Rack-2 IP Address/hostname 10.10.10.104 20.20.20.104 Username Student Student Password ccie123 ccie123 B.) Reload all following Guest Virtual Machines from the VMware VSphere Client before you start your lab WSA ISE-1 ISE-2 Prime NCS Windows-TestPC-1 Windows Wireless PC Windows VPN-Test-PC2 ACS Windows Server 2008

B1) follow the screen shot on how to reload the machine Step 1: After you login and select the guest machine. Step 2: Right Click on the guest machine, click on power and select Power Off

Step 3: Wait for VM to power off, then right click on the guest machine, click on power and select Power On

Accessing the Devices console A.) Physical Device Access All the devices are pre-setup for console access and follow the screenshots for a quick access A1) List of devices Rack-1 Rack-2 Device Port No IP address Port No IP address R1 2082 10.10.10.105 2086 20.20.20.105 R2 2081 10.10.10.105 2080 20.20.20.105 R3 2080 10.10.10.105 2079 20.20.20.105 R4 2079 10.10.10.105 2078 20.20.20.105 R5 2078 10.10.10.105 2077 20.20.20.105 R6 2077 10.10.10.105 2076 20.20.20.105 SW1 2073 10.10.10.105 2066 20.20.20.105 SW2 2072 10.10.10.105 2067 20.20.20.105 SW3 2071 10.10.10.105 2068 20.20.20.105 SW4 2068 10.10.10.105 2069 20.20.20.105 SW5 2069 10.10.10.105 2070 20.20.20.105 SW6 2070 10.10.10.105 2071 20.20.20.105 ASA1 2066 10.10.10.105 2072 20.20.20.105 ASA2 2067 10.10.10.105 2073 20.20.20.105 ASA3 2074 10.10.10.105 2074 20.20.20.105 ASA4 2075 10.10.10.105 2075 20.20.20.105 IPS 2076 10.10.10.105 2082 20.20.20.105 AP1 2084 10.10.10.105 2085 20.20.20.105 AP2 2085 10.10.10.105 2084 20.20.20.105 WLC 2083 10.10.10.105 2083 20.20.20.105 Terminal Server 23 10.10.10.105 23 20.20.20.105

A2) Physical Devices Authentication Details Rack-1 Rack-2 Device Username Password Username Password R1 cisco cisco cisco cisco R2 cisco cisco cisco cisco R3 cisco cisco cisco cisco R4 cisco cisco cisco cisco R5 cisco cisco cisco cisco R6 cisco cisco cisco cisco SW1 cisco cisco cisco cisco SW2 cisco cisco cisco cisco SW3 cisco cisco cisco cisco SW4 cisco cisco cisco cisco SW5 cisco cisco cisco cisco SW6 cisco cisco cisco cisco ASA1 cisco cisco cisco cisco ASA2 cisco cisco cisco cisco ASA3 cisco cisco cisco cisco ASA4 cisco cisco cisco cisco IPS cisco cisco cisco CCIE12345 AP1 cisco cisco cisco cisco AP2 cisco cisco cisco cisco WLC cisco cisco cisco cisco Terminal Server Student ccie123 Student ccie123

A3) Follow the Screen shots for Quick Access 1. Click on SecureCRT B.) Virtual Device Access : You can access the virtual devices in two ways Device Device Type Method 1 Method 2 WSA CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console ISE-1 CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console ISE-2 CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Prime NCS CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Windows-TestPC-1 Graphical User Interface RDP to mgmt interface Using Vmware guest Console Windows Wireless PC Graphical User Interface RDP to mgmt interface Using Vmware guest Console Windows VPN-Test-PC2 Graphical User Interface RDP to mgmt interface Using Vmware guest Console ACS CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Windows Server 2008 Graphical User Interface RDP to mgmt interface Using Vmware guest Console

Access Details for CLI based Devices Device IP address CLI Username Password GUI Username Password Database Password ACS 150.1.7.30 Admin Ccie123 Acsadmin Ccie123 - ISE1 150.1.7.20 Admin Ccie123 Admin Ccie123 Cccciiee112233 ISE2 150.1.7.21 Admin Ccie123 Admin Ccie123 Cccciiee112233 ISE2-1 150.1.7.23 Admin Ccie123 Admin Ccie123 - WSA - Admin ironport Admin ironport - Example Method 1 for Virtual Devices with CLI access Open SecureCRT >>Click on the Plus Sign against Virtual Device >> Select the relevant device

Example Method 2 for Virtual Devices with CLI Access Open Vmware Vsphere Client>>right click on the relevant machine>>click open console B1.2) Accessing Windows Based machines: There are 4 Windows Based machines as follows Machine Rack-1 MGMT IP Rack-2 MGMT IP LABIP Username Password TEST-PC-1 10.10.10.131/32 20.20.20.131/32 150.1.7.25 Student Ccie123 TEST-PC-2 10.10.10.132/32 20.20.20.132/32 150.1.7.26 Student Ccie123 Wireless-PC 10.10.10.133/32 20.20.20.133/32 NA Student Ccie123 Windows Server AD 10.10.10.134/24 20.20.20.134/24 150.1.7.10 Student Ccie123 Example Method 1 for windows based Device: Click on the remote desktop shortcut on the desktop, you will see 4 shortcuts and named appropriately Enter the username and password when prompted

Example Method 2 for windows based Device: Open Vmware Vsphere Client>>right click on the relevant machine>>click open console

Lab Shortcuts 1. Starting a lab with Specific configuration Open the physical device console > login > dir flash: #copy flash: lab1.cgf startup Reload Check out the video: https://www.youtube.com/watch?v=i72exqunifa 2. Clearing console line to get access : Under SecureCRT click on the plus sign against Clear line and Select relevant device to clear 3. Reloading the devices : All the devices are connected to managed power PDU and you can use the shortcut to boot the devices

SECURITY POD 1 DEVICE LIST Device Device Type R1 CISCO2811 R2 CISCO2811 R3 CISCO1921 R4 CISCO2811 R5 CISCO2811 R6 CISCO2921 SW1 WS-C3560X SW2 WS-C3560X SW3 WS-C3560X SW4 SW5 SW6 ASA1 ASA5585X ASA2 ASA5585X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811

SECURITY POD 2 DEVICE LIST Device Device Type R1 CISCO1941 R2 CISCO1941 R3 CISCO1921 R4 CISCO1921 R5 CISCO2901 R6 CISCO2901 SW1 SW2 SW3 SW4 SW5 SW6 ASA1 ASA5515-X ASA2 ASA5515-X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811 Support To get support open a ticket on Support Page or send an email to support@cloudmylab.com Please check the documentation and FAQs before hand