Cisco VIRL (Virtual Internet Routing Lab)

List of supported features for IOSv:
Features likely to work for IOSv:
HSRP, VRRP, GLBP, EZVPN, QoS, LISP, ZBFW, Performance Monitor• Read more for IOSv: of supported features for IOSvL2:
Layer-2 forwarding (auto-config’d), Switchport (auto-config’d), 802.1q trunk, 802.1q VLANs (auto-config’d), Spanning Tree (auto-config’d), Port-Channel (Pagp and Lacp), 802.1x passthrough, Port-ACLs, Dynamic Arp Inspection, DHCP Snooping, IP device tracking, Switched Virtual Interfaces, Layer-3 forwarding over SVIs, Routing protocol support, VTP v1-3, PVST, QoS, Inter-VLAN routing, VLAN Access Maps (VACLs / access control lists for VLANs), ACL functionality for both layer2 and layer3 protocol packets, Dynamic Trunking Protocol support, Switchport protected mode

• Read more for IOSvL2:

List of supported features for IOS-XRv:

• Read more for IOS-XRv:

List of supported features for NX-OSv:
802.1x, AAA, AMT, BGP, CDP/LLDP, EIGRP, FHRP-HSRP, GLBP, VRRP, ICMP, IGMP, IPv4, IPv4/6, IPv6, ISIS, L3 Routing Protocols, LDAP, LISP, MLD, MSDP, NTP, OSPF, PIM/PIM6, Radius, RIP, SNMP, Syslog, TACACS+, VRF, XML/Netconf, NX-API

• Read more for NX-OSv:

UPDATE 4/10/2016: NX-OSv (Titanium) – end of development
The NX-OSv virtual machine image that has been provided with VIRL is based on the Titanium development platform, using the NXOS operating system with a hardware model based on the NEXUS 7000-series platform.
The virtual machine provides Layer-3 and management-plane features taken from the 7.x.x version of the NXOS operating system. As many of you will be aware, Layer-2 switching functionality is not present in the image.
Development efforts in the NXOS operating system, are now strongly focused on moving to the next generation NXOS as implemented today on the NEXUS 9000-series platform. To that end, Layer-2 and Layer-3 feature development is aligned toward the next generation NXOS virtual machine platform. As a result, there are no plans to deliver Layer-2 switching features on the NX-OSv (Titanium) virtual machine platform.
The first virtual machine platform using the next generation NXOS operating system will be NXOSv9000, which is expected to be available on VIRL in late 2016.

List of supported features for CSR1000v:
Features likely to work for CSR1000v:
HSRP, VRRP, GLBP, EZVPN, QoS, LISP, ZBFW, Performance Monitor

• Read more for CSR1000v:

List of supported features for ASAv:

• Read more for ASAv:


Smoothwall GNS3 step by step Lab setup

VirtualBox and GNS3 (Smoothwall Virtual Test Labs)

GNS3 Test Labs (Smoothwall Labs):
Lab Scenarios:
(Please add more Lab scenarios that you think could be useful)

1. Cisco IOS Router (7200 series) with NATTing connected to the internet (ACLs configured for specific subnets being used behind the Smoothwall).

2. Smoothwall UTM Master and Failover with Multiple External connections (Primary/Secondary) to test HA and LLB

3. Apache Server on an internal Windows 7 machine to test port-forwarding rules from the internet facing VM.

4. VLANs using NM-16ESW (3725 series router network module) trunk linked to the Smoothwall (VLANs 10, 20 and 1)

5. Child node (bridged) for a Windows 7 machine getting replication from a parent node.

6. Windows 7 machine externally connected to the UTM (between the external router and the Master UTM ) to test L2TP, SSL VPNs, Global Proxy, Mobile Proxy and Syslog server.

7. Solarwinds Real-time SNMP bandwidth monitoring tool for testing SNMP.

8. Hardware WAP (TPLink) connected to virtual switch (NM-16ESW 3725 series) configured with RADIUS (802.1x//WPA Enterprise/BYOD) to test iOS (iPads and iPhones) or android devices (Installed Openwrt firmware on my TPLink that supports not only authentication but also accounting i.e. ports 1812 and 1813)(Smoothwall configured as a DHCP Server)(Will try to find a WAP that support framed IPs to test further RADIUS scenarios)

9. Using two Windows 2012 VMs for testing multi domains AD connection on the Smoothwall.

10. Other VMs include Win 7, Win 8, Win 10, Ubuntu, Mac OS X and Chromium.

11. Wireshark is already integrated in GNS3 and you can capture traffic on any connected links for troubleshooting.

12. Separate lab for testing IPSec VPN connectivity between two Smoothwalls or Smoothwall and ASA.

13. It will be easier with VMs on GNS3 to test further features like IDS/IPS, Upstream Proxy, Bandwidth Management (You might notice some latency), Upstream Firewall, F5 Load Balancer VMs.
14. For Cisco devices you can also use CCP (Cisco Configuration Professional) software to configure using a wizard based GUI instead of CLI.


Install GNS3 1.3.0 on Ubuntu 14.10 and 14.04 LTS :

— GNS3 CLI installation —

– After opening a terminal, I recommend changing to your user home directory.

$ cd ~

– Run apt-get update

$ sudo apt-get  update

$ sudo apt-get  upgrade

$ sudo apt-get  dist-upgrade

– Install GNS3 Python dependencies

$ sudo apt‐get install python3‐setuptools

$ sudo apt‐get install python3‐pyqt4

$ sudo apt‐get install python3‐ws4py

$ sudo apt‐get install python3‐netifaces

– Install Dynmips dependencies

$ sudo apt-get install cmake

$ sudo apt‐get install libelf‐dev

$ sudo apt‐get install uuid‐dev

$ sudo apt‐get install libpcap‐dev

 – Download and unzip GNS3 Linux source files (Download )

$ unzip

 – Build and Install Dynamips

$ unzip

$ cd  dynamips-0.2.14

$ mkdir build

$ cd build

$ cmake ..

$ make

$ sudo make install

$ sudo setcap cap_net_admin,cap_net_raw=ep /usr/local/bin/dynamips

$ cd ../..

 – Install GNS3 Server

$ unzip

$ cd gns3-server-1.3.7

$ sudo python3 install

$ cd ..

 – Install GNS3 GUI

$ unzip

$ cd gns3-gui-1.3.7

$ sudo python3 install

$ cd ..

 – Install VPCS

$ unzip

$ cd vpcs-0.6/src

$ ./

$ sudo cp vpcs /usr/local/bin/

$ cd ../..

 – Install VirtualBox

$ sudo apt-get install virtualbox

 – Install Wireshark

$ sudo apt-get install wireshark

 – Install QEMU – method 1

$ sudo apt-get install qemu

 – Install QEMU – method 2 (x86 arch. only)

$ sudo apt-get install qemu-system-x86

$ sudo apt-get install qemu-utils

 – Install cpulimit

$ sudo apt-get install cpulimit

 – Start GNS3

$ gns3


GNS3 Version 1.3: What’s new for Open-Source Routers

In 2014, the GNS3 development team launched a successful Kickstarter crowdfunding campaign to support development of a major new release, version 1.0, which was released in October that same year. I was happy to support the Kickstarter campaign and now I am finally getting around to taking a look at the new version of GNS3.

In this post, I will look at the new version 1.3.7 of GNS3 and evaluate how it works with emulated routers and hosts running open-source software.

What’s new in GNS3 1.x

Below, I describe the new GNS3 1.x features in two sections. The first section summarizes new GNS3 features that are relevant to all users of GNS3, including those who will use GNS3 to emulate networks consisting of routers and hosts running open-source software. The second section summarizes new features relevant only those who are running commercial router images in GNS3.

New features relevant to open-source routers

The following list summarizes new features in GNS3 1.x that improve the experience of working with open-source router and host software in GNS3 1.x, and are also applicable to all users of GNS3 1.x.

  • GNS3 1.x is supported by a new web site,
  • GNS3 1.x has updated graphical user interface styles.
  • GNS3 1.x now same configures all the types of virtual machines used in GNS3 in the GNS3 Preferences function: Dynamips (IOS), IOU, QEMU and VirtualBox.
  • GNS3 1.x now consists of two separate components: a GNS3 GUI and a GNS3 server.
  • GNS3 1.x adds VirtualBox linked clone support, which allows more efficient disk usage when using open-source routers running in virtual machines created by VirtualBox.
  • GNS3 1.x offers improved support for QEMU virtual machines.
  • GNS3 1.x users can now configure simulated PCs from within the GNS3 GUI.

New features for proprietary routers

The following list summarizes new features in GNS3 1.x that improve the experience of working with commercial router and switch software in GNS3 1.x. We do not discuss these features in this post.

  • Ethernet switching support improvements for Cisco switching technology.
    • An Etherswitch router may now be any router type that supports the NM-16ESW module.
    • GNS3 1.x now supports Cisco IOS on Unix (Cisco IOU) machines.
  • Instead of a single device template per OS image, GNS3 1.x now supports multiple device templates per OS Image.
  • GNS3 1.x will now import and export config files in a contextual device menu.
  • GNS3 1.x now automatically exports IOS configs when a project closes.

New GNS3 web site

The new GNS3 web site offers resources and forums for GNS3 users. The old GNS3 web site,, now just points to the new web site.

GNS3 Software and GNS3 Appliances may be downloaded from the new GNS3 web site.

How to get appliances

Appliances are located in the Download section of the GNS3 web site. Go to the bottom of the Download page and click on the relevant link listed under the heading, Appliances.

Open-source router and host appliances are available as either QEMU appliances or VirtualBox appliances.

Updated graphical user interface

The GNS3 1.x gaphical user interface is still mostly the same as in GNS3 0.8.7. All the same tools and panels are there. But the graphical design of the icons and color schemes have changed. Also, the annoying “GNS3 Jungle” panel has been added.


GNS3 1.3 supports three styles for the GNS3 GUI. The default style is “Charcoal”, which is a dark theme with “Flat”-style icons. The “Classic” theme uses the same flat icons but is a lighter style. The “Legacy” style replicates the look and feel of the GNS3 0.8 GUI.

New GNS3 1.x user interface styles

To change GUI styles, use the menu command: Edit → Preferences. Select style from the Style selector box. I chose the “Classic” style.

GNS3 Jungle panel

The new GNS3 1.3 GUI includes a panel that displays news from the GNS3 Jungle web forum. It also seems to display adds. The “GNS3 Jungle” panel cannot be closed. This is very annoying.

To reduce this annoyance, you can move the GNS3 Jungle panel out of the main GUI window as a separate window. Click on the panel and drag it away from the GUI to a corner of your computer screen where hopefully you can ignore it.


The other panels in the GUI, other than the topology window, are called docks. You can hide docks by click on the “X” icon in the upper right-had corner of each dock panel. You can restore them from the menu command: View → Docks.

You can also drag the dock panels on top of one another so they will appear as one tabbed panel, as seen below.

GNS3 1.3 with docks configures as tabs in the GNS3 GUI

GNS3 server support

GNS3 1.3 comes with two packages, the Server and the GUI. By default, they would both be installed in the same computer. The GNS3 1.x server manages emulators such as Dynamips, VirtualBox or Qemu/KVM. The GNS3 1.x GUI controls the server.

While the default configuration is to run both components on the same system, the Server and GUI may instead be installed on different computers. Once the GNS3 Server is started on its computer, start the GNS3 GUI on the other computer and enter in the network address and TCP port of the server in the GUI client appropriate preferences page. Then the GNS3 GUI controls the GNS3 Server to which it is connected. While it was possible to run hypervisors on a remote server in GNS3 0.8, this his new GNS3 1.x feature simplifies the procedure.

Configure GNS3 1.3 GUI to connect to the correct GNS3 server settings

Using a remote server may be required for complex network emulations that require a powerful computer, or if one is running GNS3 in a cloud compute environment while managing it from a local PC.

VirtualBox linked clones

A VirtualBox linked clone creates a duplicate VM with a disk image that is linked to a parent disk image of the source VM, but only stores the differences in data compared to the source disk image. This save disk space on the host computer. Cloned disk images use copy-on-write technology to store the differences between disk images and link to the source disk image.

In GNS3 1.3, the user no longer needs to create all the virtual machines ahead of time in VirtualBox and in GNS3. This makes using VirtualBox VMs in GNS3 much easier. He or she can just create a base VM in VirtualBox and then configure it in GNS3’s VirtualBox Preferences. After that, each time the user drags the VM into the GNS3 topology window, it automatically creates a Linked Clone of the VM.

Using VirtualBox linked clones in GNS3 1.3

Linked clones work as follows. We may create one or more base VMs in VirtualBox. In this case, we created a router VM named “Quagga” and a host VM named “Linux-host” using the Core Linux appliances available on the GNS3 VirtualBox Appliances web page.

VirtualBox VMs created from GNS3 Core Linux  Appliances

Then we set up the new base VMs in GNS3 and check a box enabling linked clone support. These VMs form the “starting point” for the linked clones.

VB prefs more

Now when we drag a router “Quagga” or a host “Linux-host” into the GNS3 topology panel, GNS3 creates a linked clone based on the base VM and appends a number to the name so it is uniquely identifiable.

GNS3 topology

When the project is saved, changes to each VM’s linked filesystem are saved to a file in the project directory and, when the project is loaded again, each linked clones is created again in VirtualBox and each VM’s filesystem will have the updates saved from the previous session.

In a future post, I will cover more details about using VirtualBox VMs as open-source router nodes in GNS3.

VirtualBox preferences

GNS3 1.3 changes the way it supports VirtualBox virtual machines. The Preferences panel for VirtualBox now looks different, with a separate section for the VirtualBox VMs managed by GNS3.

Improvements to QEMU support in GNS3

GNS3 1.3 now supports up to 32 network interfaces on a QEMU VM, an increase from the 8 network interfaces supported in GNS3 0.8.7.

QEMU virtual machines in a network topology

Also, QEMU VMs may now be suspended and resumed.

Unfortunately, it is still not possible to capture traffic from an interface on a QEMU virtual machine. And, QEMU virtual machines still run slowly, except when the host operating system and the guest operating system are both Linux and are both using the same architecture (for example, AMD64).

In a future post, I will cover more details about using QEMU VMs as open-source router nodes in GNS3.

QEMU Preferences

GNS3 1.x changes the QEMU Preferences panel in the same way as the VirtualBox Preferences panel — as mentioned above — was changed.


VPCS Integration

GNS3 1.x now treats VPCS simulated PCs as devices just like VirtualBox and QEMU VMs, or Cisco and Juniper routers. It is a lot easier to use VPCS simulated PCs on GNS3 1.x, compared to GNS3 0.8.7.

VPCS PCs are shown in the Devices dock and can now be dragged to the topology window where they appear as individual PCs. A VPCS Multihost feature is available from the Tools menu, which runs the same way as VPCS used to work in GNS3 0.8.7.

VPCS simulated PCs now appear as PCs on the topology window

VPCS simulated PCs may be started and stopped like other devices. You can open a VPCS PC console by double-clicking on the PC in the topology window. VPCS support is configurable in the GNS3 Preferences dialogue boxes.

Download GNS3 Cisco IOS images

Download Cisco IOS image for GNS3

Hi dear all, that’s really a great to share my hard work  with you , After a lots of  hit in Google  I finally found trick to search Cisco IOS in free of course. So without talking much here are the link where you can free download Cisco ios image and you can upload or use this ios to the router and as well as in GNS3.
Small Collection of IOS Images.
{Updated}Big Collection of IOS Images (Almost All Cisco IOS Images)
Another Big Collection


(NEW)Cisco IOS Images Big Collection v3. **Direct HTTP Link** Binary files for GNS3
New Big IOS Collection