This quick reference page provides a summary of the specifications
of this topology. For a complete reference including installation details,
please refer to the configuration guide listed below.
You may request virtual machine templates for the Zeek Intrusion Detection pod from CSSIA.
The virtual machines in the pod are listed in the table below.
Virtual Machine Templates
The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install
on the pod.
To request access to the preconfigured virtual machine templates from CSSIA:
- Go to the CSSIA Resources page: https://www.cssia.org/cssiaresources/
- Select CSSIA VM Image Sharing Agreement.
- Complete and submit your access request by following the instructions on the request form.
CSSIA will provide, via email, password-protected download links.
Access to the download links is provided only to customers who are current with their
NETLAB+ support contract and are participants in the appropriate partner
programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat
Academy, and/or Palo Alto Networks Cybersecurity Academy).
- Once all virtual machines have been downloaded, they can be deployed
following the steps in the appropriate pod installation guide. Each virtual
machine is deployed individually.