This Cisco online lab consists of 17x virtual appliances, with combination of NX-OS, ASA FWs, Cisco routers and switches. It also includes 2x small servers for testing end-to-end configuration and topology. On this page you will find useful information about the lab devices, links, useful tutorials and troubleshooting information. This network is based on VIRL and built on machine providing 8 vCPUs, 21 GB RAM and 200 GB of HDD Storage.
Cisco Online Lab Setup
- Total 17 nodes are possible in different configurations (please refer to List of Devices section below)
- You can choose to use the existing topology or design your own for practice.
- Possibility of accessing lab devices natively via SSH / Putty once configured.
- Access to browser based console sessions to configure devices.
- Ready topology diagram is the one shown on this page and can also be downloaded.
LAN Servers :
- Two ubuntu servers are also provided in topology
- These are ubuntu machines, can be used for end-to-end testing of network.
- IP address of server can be found out by running “ifconfig” command from console
List of Devices :
- 6x Cisco IOSv Routers
- 4x Cisco IOSvL2 Switches
- 2x Cisco ASA Firewalls in HA mode
- 2x NX-OS Appliances
- 2x Ubuntu Servers for Application Testing
- 1x Windows 7 PC for Configuration
Internal Network : DATA Network 10.1.1.0/24
Lab Information and Instructions :
If you have booked server time already please login to Lab Console below, credentials delivered via email used during booking. For booking new time slot, click here.Online Lab Console
- connect via above link, login with emailed user/pass
- second level of authentication, will be sent via email
- list of devices available to connect – Windows pc, Cisco Devices
- connect to Windows 7 pc from listed connections, connect as – labuser / Labroot12!@
- Cisco device Login – cisco/cisco
- Lab will be auto-destroyed after 10 minutes from end of session
- All lab devices will be accessible via browser based console / CLI access
- To enable SSH access to a device from internet, please add a default route pointing to 192.168.80.1
Device IP Addressing and SSH Ports (available once default route added from CLI console access)
|Public IP||SSH Access Port||Cisco Device IP||Device Type|
Useful Links :
- Cisco ASA Firewall Configuration Guides
- Cisco ASA Firewall Configuration using CLI 8.2
- Cisco NX-OS Configuration Guide
For Troubleshooting and technical discussion please use this forum :Discussion Forum
Issues During Lab Session
- Please use live chat option on bottom right of this page. (In case no response within 5 mins, please use option below)
- Red “Technical Support” button on top right hand corner of page is provided to open tickets and advance support.