This quick reference page provides a summary of the specifications of this topology.

For the implementation of the VMware vSphere ICM 6.7 Pod it is necessary to request virtual machine templates from CSSIA. Using these templates will simplify your setup, since the virtual machines will be pre-configured. The installation guides listed below provide details.

Legacy CPUs are no longer supported in VMware vSphere ICM 6.7, as per VMware's release notes. Please review your current CPU architecture, using the VMware Compatibility Guide to verify that your CPU is compatible to support vSphere 6.7 software.

Please be aware of the robust server requirements that are necessary in order to run nested virtual machines. Review the virtual machine server recommendations.

Topology Supports... Documentation
VMware vSphere ICM 6.7 Pod v6.7

VMware ICM 6.7 Pod v6.6
 

Lab Topology

ICM 6.7 Pod

Virtual Machines

A description of the virtual machines in the pod is provided in the table below.

Virtual Machine Role
sa-esxi-01 Virtualized ESXi server.
sa-esxi-02 Virtualized ESXi server.
sa-aio A virtual server that runs multiple services for the environment.
sa-student A virtual workstation that runs the VMware vSphere client.
sa-vcsa A virtual server that runs an instance of VMware vCenter server.
 

Virtual Machine Templates

The Center for Systems Security and Information Assurance (CSSIA) provides virtual machine templates to install on the pod.

To request access to the preconfigured virtual machine templates from CSSIA:

  1. Go to the CSSIA Resources page: https://www.cssia.org/cssiaresources/
  2. Select CSSIA VM Image Sharing Agreement.
  3. Complete and submit your access request by following the instructions on the request form.
  4. CSSIA will provide, via email, password-protected download links. Access to the download links is provided only to customers who are current with their NETLAB+ support contract and are participants in the appropriate partner programs (i.e., Cisco Networking Academy, VMware IT Academy, Red Hat Academy, and/or Palo Alto Networks Cybersecurity Academy).
  5. Once all virtual machines have been downloaded, they can be deployed following the steps in the appropriate pod installation guide. Each virtual machine is deployed individually.