EVE-NG For Education

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

1:1 Instance Ratio with Zero downtime.
24/7/365 Student/Faculty Priority Support.
No special hardware or software needed to operate.
No expensive hardware or maintenance for the Institutes.
Special Education Pricing.
No long term contact, pricing by semester.
Scholarships and Internship For Gifted Students.
Economy of scales.
Licensing for Various Vendors.
Any Technology, Any Vendor.
99.1% SLA.
Highly Secure, Multi-factor Authentication for every user.
Class control for infrastructors/teacher.
Customized Labs for each Student.
Previous
Next

Supported Virtual Devices

EVE-NG Cisco

Supported Virtual Devices on EVE-NG Cisco

  • Cisco Viptela SD-WAN
  • Cisco StealthWatch
  • Cisco ACS
  • Cisco AMP Private Cloud
  • Cisco ISE
  • Cisco ASA
  • Cisco ASAv
  • Cisco IPS
  • Cisco Firepower Management Center (FMC)
  • Cisco Firepower Threat Defense ASAv (FTD)

Supported Devices on EVE-NG

  • Juniper vSRX
  • Juniper Olive
  • Juniper vSrX NG
  • Juniper vMX Juniper
  • Juniper vQFX 10K VRE (routing engine)
  • Juniper vQFX 10K VFE (forwarding engine)
  • Juniper VRR
  • Junos Space
  • Alcatel 7750SR
  • A10, vThunder

Vendor Image Licensing

0%
  • We encourage our customers to get their own licensing/trial licensing.
  • License is available on demand on all platforms at a price.
  • Licensing can be priced based on the time period that the labs are hired.
  • Licensing turn around time is based on vendors, Cloudmylab is not responsible for the vendors delay.

Access to System

Access to all labs are done through a Jumpbox is a windows based system aith all the access utilities like secure CRT, ASDM, Syslog, TFTP server etc.

Jump Box can be accessed through the following methods:

Client Based Remote Desktop

Web Based Remote Desktop

Cisco Any-Connect VPN Client

  • Apple OSX
  • Aruba Clearpass
  • Aruba Virtual Mobility Controller
  • Arista vEOS
  • VMWare vCenter
  • Barracuda NGFW
  • Brocade vADX
  • Checkpoint
  • Dell SonicWall
  • CumulusVX
  • Cyberoam FW
  • ExtremeOS
  • F5-BIG-IP/IQ
  • Fortinet Manager
  • Fortinet Mail
  • Fortinet FGT
  • Fortinet
  • Huawei USG
  • Huawei Ar1000v
  • HP VSR 1000
  • Infoblox
  • Mikrotik
  • PaloAlto Panorama
  • PaloAlto FW
  • Pulse SEcur
  • pfSense
  • Radware Alteon
  • Riverbed VCX
  • Silver Peak SD-WAN
  • Sophos XG Firewall, SG UTM 
  • S-Terra FW, Gate 4.1
  • S-Terra CSP-VPN gate 
  • TrendMicro FW VTPS
  • Versa Networks SD-WAN 16.x
  • VMware ESXi/Vcenter 6.X
  • VMWare NSX 6.4
  • VMWare SD-WAN/Velocloud 3.x
  • VyOS 1.1.6
  • Windows 7/8.1/10
  • Windows Server 2003/2008/2012/2016/2019
  • Linux TinyCore/SLAC/MINT/DSL/WEBMIN
  • Linux Kali x64 Full/x386 light
  • Linux Ubuntu Desktop/Server/WEbmin
  • Linux NETem
  • Ostinato Traffic generator 0.7, 0.8, 9.0
  • The Scenario-A provides access to cloud lab environment via windows Remote Desktop protocol (RDP) access to a jump server from where we can access the cloud labs. We use higher tcp port range excluding 1023 (well known) ports and translate the standard TCP port 3389 to a higher range randomized port number for access.
  • Also, the RDP access is associated with a username and a strong password authorized using LDAP Server.
  • The firewall will handle the NAT for Jump server and we use a dedicated VLAN or network for JUMP server not shared by another CloudMyLab customer.
  • All the inbound RDP requests will be inspected by firewall and being checked for any illegitimate connections and if found any then it will be dropped by firewall.
  • The Scenario-B provides access to CloudMyLab environment via web-rdp which uses SSL connection.
  • The firewall will handle the NAT for WEB RDP service and we use a dedicated VLAN or network for web RDP service not shared by another CloudMyLab customer.
  • All the inbound WEB RDP requests will be inspected by firewall and being checked for any illegitimate connections and if found any then it will be dropped by firewall.
  • The Scenario-C provides access to CloudMyLab environment over CiscoAnyConnect VPNClient.
  • In this scenario CloudMyLab firewall will terminate the VPN connection and inspect the connection.
  • For monitoring and user access/accounting, we use Paessler PRTG to monitor and log the network events activity and Cisco Identity Services Engine for Authentication Authorization and Accounting.

Contact Us

  • Cisco Firepower NGIPSv
  • Cisco Firepower 5.4 (NGIPS, FMC)
  • Cisco CSR 1000v
  • Cisco vIOS L3
  • Cisco vIOS L2
  • Cisco DCNM
  • Cisco ESA/WSA
  • Cisco CDA
  • Cisco NxOS9k (VPC/VXLAN Supported)
  • Cisco vWLC 
  • Cisco NAM 
  • Cisco CUCM
  • Cisco vWAAS
  • Cisco XRvK9