This quick reference page provides a summary of the specifications of this topology. For a complete reference including installation details, please refer to the CCNA Cyber Ops Pod Planning and Installation Guide

Topology Supports Documentation

CYBEROPS
CCNA Cyber Ops Planning and Installation Guide

You may request virtual machine templates for the CCNA Cyber Ops Pod from CSSIA.

 

Lab Topology

cyber_ops

Virtual Machines

The deployment names of the virtual machines in the CCNA Cyber Ops Pod are provided in the table below.

VM Name Virtual Machine Deployment Name
CyberOps Workstation Cisco_CCNA_CyberOps.Workstation
Kali Cisco_CCNA_CyberOps.Kali
Metasploitable Cisco_CCNA_CyberOps.Metasploitable
Security Onion Cisco_CCNA_Cyber_Ops.Security_Onion
WinClient Cisco_CCNA_CyberOps.WinClient

Pod Resource Requirements

The CCNA Cyber Ops Pod will consume 37.1 GB of storage per each user pod instance.

Details of the storage requirements for each of the lab virtual machines in the CCNA Cyber Ops Pod are provided in the table below. Some fluctuation in the numbers may occur.

Virtual Machine OVF/OVA Initial Master Pod
(thin provisioning)
CyberOps Workstation 2.4 GB 5.7 GB
Kali 3.6 8.3 GB
Metasploitable 900MB 1.8 GB
Security Onion 3.2 GB 9.7 GB
WinClient 6 GB 11.6 GB
Total 16.2 37.1
 

Virtual Machine Templates

The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.

To request access to the preconfigured virtual machine templates from CSSIA:

  1. Go to the CSSIA Resources page: https://www.cssia.org/cssiaresources/
  2. Select CSSIA VM Image Sharing Agreement.
  3. Complete and submit your access request by following the instructions on the request form.
  4. CSSIA will provide, via email, password-protected download links. Access to thedownload links is provided only to customers who are current with their NETLAB+ support contract and are participants in the appropriate partner programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat Academy, and/or Palo Alto Networks Cybersecurity Academy).
  5. Once all virtual machines have been downloaded, they can be deployed following the steps in the appropriate pod installation guide. Each virtual machine is deployed individually.