Cloudmylab offers a platform to run any lab topology. CCIE Security v5 lab has been adopted
various vendors and is built on the topology and configuration provided by them. We have designed this lab with customers and online forum feedback. The Lab topology mentioned below is mostly virtual and it aligns with Cisco’s CCIE v5 blueprint.
This lab guide is intended for the students who are preparing for CCIE Security V5 and wish to use our platform for practicing the CCIE labs.
These labs have been designed and built by topology provided by vendors selling CCIE workbooks and online student forums. Cloudmylab is not responsible for the accuracy of the labs or workbooks. Cloudmylab does not endorse any CCIE workbook vendor or company. We have designed our platform per Cisco’s blueprint and it can be used for any lab scenario. Students will be responsible for loading any pre-configuration. Cloudmylab does not sell any workbooks or CCIE topology.
Cloudmylab is an IAAS (Infrastructure as a service), PAAS (Platform as a service) and LAAS (LAB as a service) provider. Cloudmylab either owns or lease the equipment used in the certification labs or proof of concept labs. Cloudmylab uses all genuine software either procured or evaluation from the manufacturer. Cloudmylab encourages its users to use their own licensing and/or lease it from Cloudmylab. Cloudmylab doesn’t resell hardware, software or licensing. Cloudmylab has no liability for software and licensing used by the customer in their purchased service instance. Cloudmylab doesn’t endorse any Cisco Certification labs workbook Vendors. Cloudmylab doesn’t endorse any Juniper Certification labs workbook Vendors. Cloudmylab doesn’t endorse any Microsoft Certification labs workbook Vendors. Cloudmylab doesn’t endorse any VMware Certification labs workbook Vendors.
Do's and Don'ts
1. Do not restart the EVE-NG server with a running topology. This will corrupt the files.
2. Do not power off the devices while they are booting up.
3. We recommend using Mozilla Firefox for the best experience.
4. Use Google Chrome while using
ISE and Firepower devices. It gives better performance.
5. Use Firefox for Cisco WSA and WLC.
LAB WALK THROUGH VIDEO
The above topology has been built on EVE-NG community edition, ESXi, and real Hardware devices.
Once you login you will see a customized Desktop from where you can access all the devices
How to reset the lab
Note: After resetting the lab, AD server and client PCs inside the topology will lose their IP addresses.
Reset devices inside EVE-NG topology:
Make sure you first turn off all the devices inside the EVE-NG topology. To turn off, hover your mouse on the sidebar and click on More Actions > Stop all nodes.
Select all the images. To select, simply left click on an empty region and drag the selection.
Right-click on any selected image and select the Wipe Selected option.
When prompted, click Yes.
Reset FMC and FireAMP cloud:
Log in to VMware vSphere using the credentials provided in the access email. If you are using a session-based access, please use the following credentials: IP: 192.168.130.31 Username: student Password: [email protected]
Select the guest virtual machine.
Right-click on the guest machine, click on the Snapshot and select Revert to current snapshot.
Reset Cisco ISE:
On Secure CRT, close all the tabs before proceeding.
Under Reset to Base folder, double-click on ISE-CONFIG or ISE-TS based on the topology that you want to run. This will start the automatic restoration of base configurations.
Note: that this process can take several minutes. Please don't close the tab, it will be closed automatically when the restoration is finished.
Manual Reset Cisco ISE:
This section defines how to setup ISE manually for the lab use. Please follow the steps carefully.
Go to Administration > Backup & Restore.
Select from the drop-down menu for ‘History for Repository’.
Select the lab you want to restore to. When prompted for
the encryption key, type ISEisC00L and select ‘Restore ADE-OS configuration’.
Reset physical switch:
On Secure CRT, close all the tabs before proceeding.
Under Reset to Base folder, double-click on HW-SW. This will start the automatic restoration of base configurations.
Login to EVE-NG Server.
You will see the following window.
EVE-NG server address: Provided in access mail
Note: Choose Native console.
Select the lab from the list
Once you click on the required lab, a preview opens up on the right side of the page.
Click on the Open button at the bottom of the preview. You will be redirected to the lab.
To start the nodes, hover the mouse on the left sidebar then click on More action > Start all nodes. Wait for all the nodes to turn blue.
Hover the mouse again over the sidebar and click on Pictures which will open up a dialog box. Click on the text inside the dialog box to open the topology.
Click on the devices inside the topology to open their session.
How to stop the Lab
Hover your mouse over the sidebar and click on More actions > Stop all nodes.
Hover your mouse over the sidebar and click on the Close lab.
Devices CLI Credentials
This section details the management IP assigned to the following virtual machines in the table below. Please do refer to the topology as well.
The table below contains the credentials to access CLI for the undermentioned devices:
Note: There is no password for ASA. Simply hit enter when prompted for the password.
TSHOOT LAB WALK THROUGH VIDEO
Note: Cisco ISE reset process can take several minutes. Please don't close the tab, it will be closed automatically when the restoration is finished.
FMC-TS Device in TSHOOT Topology
Note: FMC-TS is seprate in TSHOOT Topology with IP Address 126.96.36.199.