Articles & Blogs


Deploying Cisco Practice Lab

Deploying Cisco Practice Lab

The Cisco Online Lab consists of 17 virtual appliances, including NX-OS, ASA FW, Cisco routers, and switches. It also includes two small servers for testing end-to-end configurations and topologies. On this page, you can find useful information about lab equipment, links, useful tutorials, and troubleshooting information. The network is based on VIRL and is built on a machine that provides 8 vCPUs, 21 GB RAM and 200 GB HDD storage.


Cisco Online Lab Setup


There may be a total of 17 nodes in different configurations (see the device list section below)

You can choose to use an existing topology or design your own exercise.

Once configured, local devices can be accessed via SSH / Putty.

Access the browser-based console session to configure the device.

The ready topology is shown on this page and can also be downloaded.


LAN server:


Two ubuntu servers are also provided in the topology

These are ubuntu machines that can be used for end-to-end testing of the network.

Find the server's IP address by running the "ifconfig" command from the console


Device List:


6x Cisco IOSv Router

4x Cisco IOSvL2 Switch

2x Mode Cisco ASA Firewall

2 NX-OS devices

2x Ubuntu Application Test Server

1 Windows 7 PC to configure


Internal network: DATA network


Download Network Diagram      


Laboratory information and instructions:


If you have already booked your server time, log in to the lab console below and email your credentials during the booking process. To book a new time, click here.


Online laboratory console

Log in to email user/pass via link above

Level 2 certification, will be emailed

List of Devices Available for Connection - Windows PC, Cisco Devices

Connect from listed connection to Windows 7 PC, with - labuser/Labroot12! @

Cisco Device Login - Cisco/Cisco

The laboratory will automatically destroy after 10 minutes from the end of the meeting

All lab devices are accessible via browser-based console/CLI access

To enable SSH to access the device from the Internet, add a default route to


Device IP Addressing and SSH Port (Available after adding a default route from the CLI console access)


Public IP SSH Access Port Cisco Device IP Device Type

No 2001 2002 LXC 2003 ASA 1 2004 ASA 2 2005 CSR 2006 Router 1 2007 Router 2 2008 Router 3 2009 Router 4 2010 Router 5 2011 Router 6 2012 Switch 1 2013 Switch 2 2014 Switch 3 2015 Switch 4 2016 NX-OS 1 2017 NX-OS 2

No NA Ubuntu 1

No NA Ubuntu 2

Useful links:


Cisco ASA Firewall Configuration Guides

Cisco ASA Firewall Configuration using CLI 8.2

Cisco NX-OS Configuration Guide


For troubleshooting and technical discussions, use this forum:


Discussion Forum

Questions during the experiment class


Have problems during the lab meeting? Please email and we will respond to your question within 10 minutes. Frequently asked questions can also be discussed and supported through the forum. Loss of connectivity, loss of connectivity to the lab portal, topology changes, etc. can be sent directly to

Go Back