Your partner for Success CCIE Security Lab Access Guide
Contents Getting Access to the POD... 3 DEVICE ACCESS... 5 How to access the devices... 5 Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e... 5 Accessing the Devices console... 6 A.) Physical Device Access... 6 B.) Virtual Device Access... 9 Authentication Details for CLI based Devices... 10 Example Method 1 for Virtual Devices with CLI access... 10 Example Method 2 for Virtual Devices with CLI Access... 11 Example Method 1 for windows based Device:... 11 Example Method 2 for windows based Device:... 13 Lab Shortcuts... 14 SECURITY POD 1 DEVICE LIST... 15 SECURITY POD 2 DEVICE LIST... 16
Getting Access to the POD 1. There are two methods you can get access to the access detail as mentioned below a.) Check for the Url and Port Number in the email from support@cloudmylab.com b.) You can alternately log in to your account and under my account Rack access, you will see the details
2. Login with the credentials provided 3. Once you login you will see a customized Desktop from where you can access all the devices
DEVICE ACCESS How to access the devices Starting the lab environment: https://www.youtube.com/watch?v=rymvbjci70e 1. Once you are get the access to the Guest Desktop Environment A.) Open the VMware vsphere client and login with the following details Rack Rack-1 Rack-2 IP Address/hostname 10.10.10.104 20.20.20.104 Username Student Student Password ccie123 ccie123 B.) Reload all following Guest Virtual Machines from the VMware VSphere Client before you start your lab WSA ISE-1 ISE-2 Prime NCS Windows-TestPC-1 Windows Wireless PC Windows VPN-Test-PC2 ACS Windows Server 2008
B1) follow the screen shot on how to reload the machine Step 1: After you login and select the guest machine. Step 2: Right Click on the guest machine, click on power and select Power Off
Step 3: Wait for VM to power off, then right click on the guest machine, click on power and select Power On
Accessing the Devices console A.) Physical Device Access All the devices are pre-setup for console access and follow the screenshots for a quick access A1) List of devices Rack-1 Rack-2 Device Port No IP address Port No IP address R1 2082 10.10.10.105 2086 20.20.20.105 R2 2081 10.10.10.105 2080 20.20.20.105 R3 2080 10.10.10.105 2079 20.20.20.105 R4 2079 10.10.10.105 2078 20.20.20.105 R5 2078 10.10.10.105 2077 20.20.20.105 R6 2077 10.10.10.105 2076 20.20.20.105 SW1 2073 10.10.10.105 2066 20.20.20.105 SW2 2072 10.10.10.105 2067 20.20.20.105 SW3 2071 10.10.10.105 2068 20.20.20.105 SW4 2068 10.10.10.105 2069 20.20.20.105 SW5 2069 10.10.10.105 2070 20.20.20.105 SW6 2070 10.10.10.105 2071 20.20.20.105 ASA1 2066 10.10.10.105 2072 20.20.20.105 ASA2 2067 10.10.10.105 2073 20.20.20.105 ASA3 2074 10.10.10.105 2074 20.20.20.105 ASA4 2075 10.10.10.105 2075 20.20.20.105 IPS 2076 10.10.10.105 2082 20.20.20.105 AP1 2084 10.10.10.105 2085 20.20.20.105 AP2 2085 10.10.10.105 2084 20.20.20.105 WLC 2083 10.10.10.105 2083 20.20.20.105 Terminal Server 23 10.10.10.105 23 20.20.20.105
A2) Physical Devices Authentication Details Rack-1 Rack-2 Device Username Password Username Password R1 cisco cisco cisco cisco R2 cisco cisco cisco cisco R3 cisco cisco cisco cisco R4 cisco cisco cisco cisco R5 cisco cisco cisco cisco R6 cisco cisco cisco cisco SW1 cisco cisco cisco cisco SW2 cisco cisco cisco cisco SW3 cisco cisco cisco cisco SW4 cisco cisco cisco cisco SW5 cisco cisco cisco cisco SW6 cisco cisco cisco cisco ASA1 cisco cisco cisco cisco ASA2 cisco cisco cisco cisco ASA3 cisco cisco cisco cisco ASA4 cisco cisco cisco cisco IPS cisco cisco cisco CCIE12345 AP1 cisco cisco cisco cisco AP2 cisco cisco cisco cisco WLC cisco cisco cisco cisco Terminal Server Student ccie123 Student ccie123
A3) Follow the Screen shots for Quick Access 1. Click on SecureCRT B.) Virtual Device Access : You can access the virtual devices in two ways Device Device Type Method 1 Method 2 WSA CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console ISE-1 CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console ISE-2 CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Prime NCS CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Windows-TestPC-1 Graphical User Interface RDP to mgmt interface Using Vmware guest Console Windows Wireless PC Graphical User Interface RDP to mgmt interface Using Vmware guest Console Windows VPN-Test-PC2 Graphical User Interface RDP to mgmt interface Using Vmware guest Console ACS CLI access/ or Browser based Using SecureCRT Console Using Vmware guest access after initial config. access Console Windows Server 2008 Graphical User Interface RDP to mgmt interface Using Vmware guest Console
Access Details for CLI based Devices Device IP address CLI Username Password GUI Username Password Database Password ACS 150.1.7.30 Admin Ccie123 Acsadmin Ccie123 - ISE1 150.1.7.20 Admin Ccie123 Admin Ccie123 Cccciiee112233 ISE2 150.1.7.21 Admin Ccie123 Admin Ccie123 Cccciiee112233 ISE2-1 150.1.7.23 Admin Ccie123 Admin Ccie123 - WSA - Admin ironport Admin ironport - Example Method 1 for Virtual Devices with CLI access Open SecureCRT >>Click on the Plus Sign against Virtual Device >> Select the relevant device
Example Method 2 for Virtual Devices with CLI Access Open Vmware Vsphere Client>>right click on the relevant machine>>click open console B1.2) Accessing Windows Based machines: There are 4 Windows Based machines as follows Machine Rack-1 MGMT IP Rack-2 MGMT IP LABIP Username Password TEST-PC-1 10.10.10.131/32 20.20.20.131/32 150.1.7.25 Student Ccie123 TEST-PC-2 10.10.10.132/32 20.20.20.132/32 150.1.7.26 Student Ccie123 Wireless-PC 10.10.10.133/32 20.20.20.133/32 NA Student Ccie123 Windows Server AD 10.10.10.134/24 20.20.20.134/24 150.1.7.10 Student Ccie123 Example Method 1 for windows based Device: Click on the remote desktop shortcut on the desktop, you will see 4 shortcuts and named appropriately Enter the username and password when prompted
Example Method 2 for windows based Device: Open Vmware Vsphere Client>>right click on the relevant machine>>click open console
Lab Shortcuts 1. Starting a lab with Specific configuration Open the physical device console > login > dir flash: #copy flash: lab1.cgf startup Reload Check out the video: https://www.youtube.com/watch?v=i72exqunifa 2. Clearing console line to get access : Under SecureCRT click on the plus sign against Clear line and Select relevant device to clear 3. Reloading the devices : All the devices are connected to managed power PDU and you can use the shortcut to boot the devices
SECURITY POD 1 DEVICE LIST Device Device Type R1 CISCO2811 R2 CISCO2811 R3 CISCO1921 R4 CISCO2811 R5 CISCO2811 R6 CISCO2921 SW1 WS-C3560X SW2 WS-C3560X SW3 WS-C3560X SW4 SW5 SW6 ASA1 ASA5585X ASA2 ASA5585X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811
SECURITY POD 2 DEVICE LIST Device Device Type R1 CISCO1941 R2 CISCO1941 R3 CISCO1921 R4 CISCO1921 R5 CISCO2901 R6 CISCO2901 SW1 SW2 SW3 SW4 SW5 SW6 ASA1 ASA5515-X ASA2 ASA5515-X ASA3 ASA5510 ASA4 ASA5510 IPS IPS4240 AP1 AP1200 AP2 AP1200 WLC Cisco WLC 2504 Terminal Server Cisco 2811 Support To get support open a ticket on Support Page or send an email to support@cloudmylab.com Please check the documentation and FAQs before hand