This quick reference page provides a summary of the specifications of this topology. For a complete reference including installation details, please refer to the RING Cybersecurity Exploration Pod Planning and Installation Guide .
The RING Cybersecurity Exploration Pod is
designed to have internet access.
Due to the security and legal implications regarding accessing the
Internet from within the pod, we require that NETLAB+ customers indicate their acceptance of
the NETLAB+ Pod Internet Access and Use Agreement
prior to obtaining access to the pod or content for this course.
Topology | Supports | Documentation |
---|---|---|
|
RING Cybersecurity Exploration Pod Planning and Installation Guide |
The virtual machines in the pod are listed in the table below.
Virtual Machine |
---|
pfSense |
Kali Linux |
Metasploitable 3 |
PodEGW |
Windows 2019 Server |