EVE-NG For Enterprise

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

1:1 Instance Ratio with Zero downtime.
24/7/365 Priority Support.
No special hardware or software needed to operate.
No expensive hardware or maintenance.
Special Corporate Pricing.
No long term contact.
Economy of scales.
Licensing for Various Vendors.
Any Technology, Any Vendor, Any Platform.
99.1% SLA.
High Secure, Multi-factor Authentication for every user.
Customized Golden Images.
100% Redundancy.
Previous
Next

Supported Devices

EVE-NG Cisco

Supported Virtual Devices on EVE-NG Cisco

  • Cisco ACS 5.6, 5.8.1.4
  • Cisco AMP Private cloud 
  • Cisco ISE 1.2, 1.4
  • Cisco ISE 2.1
  • Cisco ISE 2.2, 2.3, 2.4
  • Cisco ASA 8.0.2 (Single and Multi Context)
  • Cisco ASA 8.4 Multi Context Support
  • Cisco ASA 9.1.5 Multi Context Support
  • Cisco ASAv 9.6.2, 9.7.1 or later
  • Cisco IPS 7.1

Vendor Image Licensing

0%

Access to System

Access to all labs are done through a Jumpbox is a windows based system aith all the access utilities like secure CRT, ASDM, Syslog, TFTP server etc.

Jump Box can be accessed through the following methods:

Client Based Remote Desktop

Web Based Remote Desktop

Cisco Any-Connect VPN Client

  • The Scenario-A provides access to cloud lab environment via windows Remote Desktop Protocol (RDP) access to a jump server from where we can access the cloud labs.We use higher tcp port range excluding 1023 (well known) ports and translate the standard TCP port 3389 to a higher range randomized port number for access.
  • Also, the RDP access is associated with a username and a strong password authorized using LDAP Server.
  • The firewall will handle the NAT for Jump server and we use a dedicated VLAN or network for JUMP server not shared by another CloudMyLab customer.
  • All the inbound RDP requests will be inspected by firewall and being checked for any illegitimate connections and if found any then it will be dropped by firewall.
  • The Scenario-B provides access to CloudMyLab environment via web-rdp which uses SSL connection.
  • The firewall will handle the NAT for WEB RDP service and we use a dedicated VLAN or network for web RDP service not shared by another CloudMyLab customer.
  • All the inbound WEB RDP request will be inspected by firewall and being checked for any illegitimate connections and if found any then it will dropped by firewall. 
  • The Scenario-C provides access to CloudMyLab environment over CiscoAnyConnect VPNClient.
  • In this scenario CloudMyLab firewall will terminate the VPN connection and inspect the connection.
  • For monitoring and user access/accounting, we use Paessler PRTG to monitor and log the network events activity and Cisco Identity Services Engine for Authentication Authorization and Accounting.

Contact Us

  • Juniper vQFX 10K VRE 15.1X53 (routing engine)
  • Juniper vQFX 10K VFE 15.1X53 (forwarding engine)
  • Juniper VRR 
  • Junos Space 16.1
  • Alcatel 7750SR: 13.0.R3
  • A10, vThunder 2.7.1
  • Apple OSX ( https://github.com/kholia/OSX-KVM )
  • Aruba: Clearpass 6.4.X
  • Aruba Virtual Mobility Controller 8.X
  • Arista vEOS 4,17.2F and later versions
  • VMWare vCenter 6.5
  • VyOS 1.1.6
  • Cisco Firepower 6.1, 6.2 Management centre (FMC)
  • Cisco Firepower 6.1, 6.2 Treat Defence ASAv (FTD)
  • Cisco Firepower 6.1, 62 NGIPSv 
  • Cisco Firepoer 5.4 (NGIPS, FMC)
  • Cisco CSR 3.16, 3.17
  • Cisco CSR 16.03 Denali
  • Cisco CSR 16.04 Everest
  • Cisco vIOS L3
  • Cisco vIOS L2
  • Cisco ESA 9.7, 9.8 Email Security Appliance
  • Cisco WSA 8.6, 9.2, 10.0 Web Security Appliance
  • Cisco CDA 1.0 Context Delivery Agent 
  • Cisco NXOS Titanium 7.1.0.3
  • Cisco NXOS9k (Require source of 2xCPU and 8G RAM for single node) VPC Supported 
  • Cisco Prime Infre 3.X
  • Cisco XRv 5.2.2, 5.3.2, 6.0.1, 6.0.2, 6.3, 6.4
  • Cisco XRvK9 6.0.1, 6.1.2 (Require source of 4xCPU and 16G Ram for single node)
  • Cisco vWLC, 7.4, 8.0.100, 8.2.X, 8.3.X
  • Cisco vNAM Virtual Network Analysis Module 6.2.x
  • Cisco vWAAS 200.5.5, 6.2.3
  • Cisco CUCM 11.5.1.11900-26