How to interact with a simple network topology built using Cisco’s VIRL

Home > Blogs > Cisco > How to interact with a simple network topology built using Cisco’s VIRL

How to interact with a simple network topology built using Cisco’s VIRL

Like This Blog 0Mark Jacob
Added by August 28, 2015

For those of you who are interested in investigating Cisco’s VIRL product, I recently posted a blog to show how to create a very simple network topology. Today’s blog will continue where that one left off. I recommend performing, or at least reviewing, the steps in the previous blog so that today’s steps make sense.

For instructor-led training, check out our complete Cisco CCNA Certification schedule.

Let’s begin.

We left off after dropping two nodes into our topology, seen in figure 1:

001-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 1

The default names applied to our nodes are somewhat uninspiring, so let’s pick something more memorable.  To change node names, click directly on the current name, then click it again (not too quickly, or your input will be misinterpreted as a double-click. Once the name is highlighted, type a new name. In figure 2, I have already renamed the first node and am in the process of renaming the second one:

002-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 2

They have much better names now – Router1 and Router2. If you want a better look at the properties of any individual node, select it so it is highlighted and then view its properties information. See figure 3 for some of the available options:

003-config-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 3

In my previous blog I mentioned that configurations can be auto-generated. Let’s see it happen. Click the icon along the top which will Build Initial Configurations, as shown in figure 4:

004-config-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 4

Upon completion, you will be presented with the window shown in figure 5:

005-view-config-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 5

For this example, check the box to remember and click Yes. You will also see a window which shows the old (in our case, empty) configuration, and in the other pane, the newly created configuration. This is shown in figure 6:

You may also like:  What Happens when there are duplicate MAC Addresses. How many MAC Addresses can a Switch learn?

006-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 6

You will also see another window pop up with a choice. It is shown if figure 7:

007-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 7

Once again, for our example we will check the box to remember and say yes. This will launch your default browser and show you a visual on your topology. See figure 8 for an example:

008-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 8

Now our topology exists, but is not running. Let’s kick it. Click on the Start button back in VMMaestro (figure 9) to launch our newly created simulation:

009-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 9

Simulation launches, then you will be asked if you want to view it, as shown in figure 10:

010-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 10

Of course you will click Yes! The window before this one was informational regarding the ID of the simulation. Just click OK to get past it. Depending on the power of your box and the number of nodes in your topology, it may take a while to get fully up and running, but when this happens, you will see the word Active alongside your nodes in the Simulation view, shown in figure 11:

011-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 11

Figure 12 shows how to access the console of one of your nodes. Right-click on the node, select Telnet, and choose ‘to its Console port.’

012-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 12

Do the same thing for the second node. Now feel free to drag things around your screen to situate your views as desired. You see in my screen I can see both of my console sessions – side-by-side. I can click either one and issue Cisco IOS commands. I will click on console 2 and display the output of show run in figure 13 (note that I had to enable with a password of cisco to get to privileged exec mode):

You may also like:  What does aaa new-model do to your Cisco logins?

013-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 13

The IP addresses were placed on the interfaces for me. Routing protocols were configured for me. As an example, figure 14 shows a portion of the running-config that displays the dynamic routing protocol information:

014-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 14

I get OSPF, OSPFv3, BGP, hey is this great or what?! I did not have to configure any of that myself. Of course, anything you want to modify is wide open. Feel free to modify and manipulate your topology as you see fit.

You can even verify connectivity. Figure 15 shows that Router1 can successfully ping Router2:

015-interact-with-simple-network-topology-in-Cisco-VIRL

Figure 15

I hope this step-by-step guide makes it a little easier to get VIRL out of the box. It takes a little time to get used to it, but I have barely scratched the surface of what it can do for you as a network admin practicing and honing your skills, without jeopardizing a production network in the process. Feel free to post any comments regarding your VIRL experiences.

Until next time.

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Agile Methodology in Project Management

0 51 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 79 1

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

2 157 1

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.