CCIE SECv5 Lab Access Guide Version1.7
CCIE SECv5 Lab Access Guide Version1.7
Version 1.7
Audience
This lab guide is intended for the students who are preparing for CCIE Security V5 and wish to use our platform for
practicing the CCIE labs.
Disclaimer
These labs have been designed and built by topology provided by vendors selling CCIE workbooks and online
student forums. Cloudmylab is not responsible for the accuracy of the labs or workbooks. Cloudmylab does not
endorse any CCIE workbook vendor or company. We have designed our platform per Cisco’s blueprint and it can
be used for any lab scenario. Students will be responsible for loading any pre-configuration.
Legal Liability
Cloudmylab is an IAAS (Infrastructure as a service), PAAS (Platform as a service) and LAAS (LAB as a service)
provider. Cloudmylab either owns or lease the equipment used in the certification labs or proof of concept labs.
Cloudmylab uses all genuine software either procured or evaluation from the manufacturer. Cloudmylab
encourages its users to use their own licensing and/or lease it from Cloudmylab. Cloudmylab doesn’t resell
hardware, software or licensing.
Cloudmylab has no liability for software and licensing used by the customer in their purchased service instance.
Topology
The following topology has been adopted from CCIE University, this is a topology available on online forums and
vendors page. Cloudmylab offers a platform to run topologies and in no way own or endorse any vendor topology.
Figure 1
Figure 2
Figure 3
Devices Used
Physical Devices
This section details physical devices and software version in the topology.
Virtual Devices
This section details virtual devices and the software version used in the topology.
1. There are two methods you can get access to the access detail as mentioned below:
a.) Check for the URL and Port Number in the email from [email protected]
Figure 4
b.) You can alternatively log in to your account and under ‘my account’ > Rack access, you will see the details
Figure 5
2. Please login with the credentials provided.
Figure 6
3. After logging in successfully, you will see a customized Desktop from where you can access all the devices.
DEVICE ACCESS
This section details how to access the physical and virtual devices.
A.) Open the VMware vSphere client and login with the details in table below:
2. Reload the Guest Virtual Machines in the table below using the VMware vSphere Client before you start your
lab.
Windows machine
Wireless-PC
MS-AD
MAB-CLIENT
DOT1X-PC
Table 4
Step 1: After your successful login to ESX host, select the guest machine.
Figure 8
Step 2: Right Click on the guest machine, click on power and select Power Off.
Figure 9
Step 3: Wait for VM to power off, then right click on the guest machine, click on power and select Power On
Figure 10
Retrieve Snapshots
1. Retrieve the snapshot for the Guest Virtual Machines in the table below using the VMware
vSphere Client before you start your lab.
Virtual Machines
NGIPS
FMC
AMP
WSA
vWLC
Table 5
Figure 11
Figure 12
Setup ISE for Lab
This section defines how to setup ISE for the lab use. Please follow the steps carefully.
Figure 13
Note: You will have to again join the AD and re-generate the CA certificates.
A.) Device Access – All the devices are pre-setup for console access and follow the screenshots for a quick access.
Device List
The table below contains the list of devices and their console access details. Terminal Server is a server which
host the console connections, do not confuse this with actual device IP.
Table below contains the credentials to access CLI for the undermentioned devices:
1. Click on SecureCRT.
Figure 14
1. Using Secure CRT CLI. Its strongly recommended to use terminal emulator to access all the Virtual Routers and
Firewall.
2. Using the vSphere Console
Example Method 1 for Virtual Devices with CLI access
Open SecureCRT >> Click on the Plus Sign against Virtual Device >> Select the relevant device
Figure 15
Example Method 2 for Virtual Devices with CLI Access
Open Vmware Vsphere Client >> right click on the relevant machine >> click open console
Figure 16
Open Vmware Vsphere Client >> right click on the relevant machine >> click open console
Figure 18
Open the physical device console > login > dir flash:
Reload
2. Clearing console line to get access: Under SecureCRT click on the plus sign against
3. Reloading the devices: All the devices are connected to managed power PDU and you can use the
shortcut to boot the devices
-------------------------------------------------------END OF Document-------------------------------------------------------