NETLAB+ AE and NETLAB+ PE servers use OpenSSL 0.9.8 to communicate with the VMware vSphere API. NETLAB+ is an SSL client in this case. This version of OpenSSL is not vulnerable to the Heartbleed CVE-2014-0160 vulnerability. Inbound HTTPS/SSL (tcp 443) is currently not enabled on NETLAB+ servers. As discussed in my previous posts, we will […]
Read More →The NETLAB+ curriculum web server feature was designed to locally serve Cisco Networking Academy curriculum. The current and new curriculum is designed for Cisco Netspace. Cisco strongly recommends that users access their curriculum from Netspace. As mentioned in previous posts, NDG is making some major changes to the NETLAB+ web server components to support SSL […]
Read More →Users communicate with NETLAB+ using a web browser. Currently this communication uses unencrypted HTTP. Many users have requested that we use HTTPS and SSL to provide secure encrypted communication — and we are working on that. I mentioned in my last post that HTTPS and SSL will eventually be required to eliminate Java from our client applications. […]
Read More →Users communicate with NETLAB+ using a web browser. This is a logical choice since all computing platforms (PC, tablet, phone) have a web browser which is already installed. Just point your browser to the NETLAB+ server URL and you are good to go. That’s how it should work in theory anyway… Until recently, browsers […]
Read More →NDG has identified a conflict with the new Java 7 Update 51 software update (released January 14, 2014). The Java update prevents the NETLAB+ CLI Terminal and Remote PC Viewers from functioning properly. NETLAB+ 2014.R1 addresses these issues and will be automatically distributed to all systems in the next several days. If you are experiencing […]
Read More →