- use WinSCP
Web for load WinSCP
https://sourceforge.net/projects/winscp/?source=typ_redirect
https://sourceforge.net/projects/winscp/?source=typ_redirect
- Importing FortiNet images on EVE-NG. So you're looking to get into the exciting world of network security and you would like to play around on some FortiNet devices in order to learn? Then EVE-NG has you covered! It is very easy to import a FortiNet appliance into EVE-NG and to run these appliances on a virtual topology.
- Upload any image to EVE-NG.
- The location of WinSCP
Aug 10, 2017 If the file you are trying to access is particularly large or is shared with many people, it may take up to 24 hours to be able to view or download the file. If you still can't access a file after 24 hours, contact your domain administrator. Download Cisco Nexus Switch Images For GNS3 & Eve-ng, download cisco nexus 9000v, download nexus 5k image for +eve-ng, download nexus titanium.
C:UserUserDownloadsProgramsWinSCP-5.10.1.beta-Setup.exe
- After setup WinSCP, open the WinSCP from destop
- Click login
- Click “Yes”
- Password : eve
- The interface of WinSCP which have 2 side.
left hand side of page for directory in your computer
in my computer
D:Training-CATCisco IOL
right hand side of page for directory in WinSCP
/opt/unetlab/addons/iol/bin/
- Copy (drag) the file from your computer to WinSCP
there are the file that should copy
L2-ADVENTERPRISE-M-15.1-20140814.bin
Eve-ng Images Download Free
L3-ADVENTERPRISEK9-M-15.4-2T.bin
script.py
- for file script.py copy from the internet paste into the notepad
Eve-ng Images Download Free
## create file “scripts.py” , save file, and then upload to /opt/unetlab/addons/iol/bin/
Eve Ng Cisco Labs
##———————————————————————————————–##
#! /usr/bin/python
#print “*********************************************************************”
#print “Cisco IOU License Generator – Kal 2011, python port of 2006 C version”
import os
import socket
import hashlib
import struct
# get the host id and host name to calculate the hostkey
hostid=os.popen(“hostid”).read().strip()
hostname = socket.gethostname()
ioukey=int(hostid,16)
for x in hostname:
ioukey = ioukey + ord(x)
print “hostid=” + hostid +”, hostname=”+ hostname + “, ioukey=” + hex(ioukey)[2:]
# create the license using md5sum
iouPad1=’x4Bx58x21x81x56x7Bx0DxF3x21x43x9Bx7ExACx1DxE6x8A’
iouPad2=’x80′ + 39*’0′
md5input=iouPad1 + iouPad2 + struct.pack(‘!i’, ioukey) + iouPad1
iouLicense=hashlib.md5(md5input).hexdigest()[:16]
print “nAdd the following text to ~/.iourc:”
print “[license]n” + hostname + ” = ” + iouLicense + “;n”
print “You can disable the phone home feature with something like:”
print ” echo ‘127.0.0.127 xml.cisco.com’ >> /etc/hostsn”
##———————————————————————————————–##
#! /usr/bin/python
#print “*********************************************************************”
#print “Cisco IOU License Generator – Kal 2011, python port of 2006 C version”
import os
import socket
import hashlib
import struct
# get the host id and host name to calculate the hostkey
hostid=os.popen(“hostid”).read().strip()
hostname = socket.gethostname()
ioukey=int(hostid,16)
for x in hostname:
ioukey = ioukey + ord(x)
print “hostid=” + hostid +”, hostname=”+ hostname + “, ioukey=” + hex(ioukey)[2:]
# create the license using md5sum
iouPad1=’x4Bx58x21x81x56x7Bx0DxF3x21x43x9Bx7ExACx1DxE6x8A’
iouPad2=’x80′ + 39*’0′
md5input=iouPad1 + iouPad2 + struct.pack(‘!i’, ioukey) + iouPad1
iouLicense=hashlib.md5(md5input).hexdigest()[:16]
print “nAdd the following text to ~/.iourc:”
print “[license]n” + hostname + ” = ” + iouLicense + “;n”
print “You can disable the phone home feature with something like:”
print ” echo ‘127.0.0.127 xml.cisco.com’ >> /etc/hostsn”
##———————————————————————————————–##
Note::
Here is the script:
Here is the script: