1
0
mirror of https://github.com/GNS3/gns3-server synced 2024-12-26 00:38:10 +00:00

Merge branch '2.2'

This commit is contained in:
grossmj 2021-11-13 16:29:40 +10:30
commit 950b43a9cf
185 changed files with 571 additions and 143 deletions

View File

@ -1,5 +1,10 @@
# Change Log # Change Log
## 2.2.27 12/11/2021
* Release web UI 2.2.27
* Fix unhandled KeyError exception when starting Docker container. Ref #1991
## 2.2.26 08/10/2021 ## 2.2.26 08/10/2021
* Release web UI 2.2.26 * Release web UI 2.2.26

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "bf0a4dd0-9e1f-491e-918a-1d1ac0e23161",
"name": "6WIND Turbo Router", "name": "6WIND Turbo Router",
"category": "router", "category": "router",
"description": "6WIND Turbo Router is a high performance, ready-to-use software virtual router. It can be deployed bare metal or in virtual machines on commercial-off-the-shelf (COTS) servers. It is a carrier-grade solution for Service Prodivers aiming at using white boxes to deploy network functions. Typical use-cases are transit/peering router, IPsec VPN gateway and CGNAT.", "description": "6WIND Turbo Router is a high performance, ready-to-use software virtual router. It can be deployed bare metal or in virtual machines on commercial-off-the-shelf (COTS) servers. It is a carrier-grade solution for Service Prodivers aiming at using white boxes to deploy network functions. Typical use-cases are transit/peering router, IPsec VPN gateway and CGNAT.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "c30ea423-b6f8-443e-b599-955ea5647ef0",
"name": "IP Cop", "name": "IP Cop",
"category": "firewall", "category": "firewall",
"description": "The IPCop Firewall is a Linux firewall distribution. It is geared towards home and SOHO users. The IPCop web-interface is very user-friendly and makes usage easy.", "description": "The IPCop Firewall is a Linux firewall distribution. It is geared towards home and SOHO users. The IPCop web-interface is very user-friendly and makes usage easy.",

View File

@ -1,67 +0,0 @@
{
"name": "ParrotOS",
"category": "guest",
"description": " Parrot is a GNU/Linux distribution based on Debian Testing and designed with Security, Development and Privacy in mind. It includes a full portable laboratory for security and digital forensics experts, but it also includes all you need to develop your own software or protect your privacy while surfing the net.",
"vendor_name": "Parrot Project",
"vendor_url": "https://parrotsec.org/",
"documentation_url": "https://docs.parrotsec.org/doku.php",
"product_name": "ParrotOS",
"product_url": "https://parrotsec.org/",
"registry_version": 3,
"status": "stable",
"maintainer": "Brent Stewart",
"maintainer_email": "brent@stewart.tc",
"usage": "Passwords are set during installation.",
"symbol": "parrotlogo.png",
"qemu": {
"adapter_type": "e1000",
"adapters": 1,
"ram": 2048,
"hda_disk_interface": "ide",
"arch": "x86_64",
"console_type": "vnc",
"kvm": "require"
},
"images": [
{
"filename": "Parrot-security-4.6_amd64.iso",
"version": "Security Build 4.6",
"md5sum": "ead812edc83119e8bcb4ee9daabdc105",
"filesize": 3788668928,
"download_url": "https://www.parrotsec.org/download-security.php",
"direct_download_url": "https://download.parrotsec.org/parrot/iso/4.6/Parrot-security-4.6_amd64.iso"
},
{
"filename": "Parrot-security-3.11_amd64.iso",
"version": "Security Build 3.11",
"md5sum": "71c94474fb474f682da0844d95f0040b",
"filesize": 3788668928,
"download_url": "https://www.parrotsec.org/download.fx",
"direct_download_url": "https://www.parrotsec.org/download-full.fx"
},
{
"filename": "empty30G.qcow2",
"version": "1.0",
"md5sum": "3411a599e822f2ac6be560a26405821a",
"filesize": 197120,
"download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%30disk/",
"direct_download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/empty30G.qcow2/download"
}
],
"versions": [
{
"name": "Security Build 4.6",
"images": {
"hda_disk_image": "empty30G.qcow2",
"cdrom_image": "Parrot-security-4.6_amd64.iso"
}
},
{
"name": "Security Build 3.11",
"images": {
"hda_disk_image": "empty30G.qcow2",
"cdrom_image": "Parrot-security-3.11_amd64.iso"
}
}
]
}

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "7aa41b5b-3ae9-40a7-be38-5c109c59e086",
"name": "A10 vThunder", "name": "A10 vThunder",
"category": "router", "category": "router",
"description": "vThunder, part of A10 Networks' award-winning A10 Thunder and AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure.", "description": "vThunder, part of A10 Networks' award-winning A10 Thunder and AX Series Application Delivery Controller (ADC) family, is designed to meet the growing needs of organizations that require a flexible and easy-to-deploy application delivery and server load balancer solution running within a virtualized infrastructure.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "99920801-829d-4689-8231-7183c21ff878",
"name": "AAA", "name": "AAA",
"category": "guest", "category": "guest",
"description": "This appliance provides RADIUS and TACACS+ services with preconfigured users and groups.", "description": "This appliance provides RADIUS and TACACS+ services with preconfigured users and groups.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "4d06be08-ce6d-4ee7-b5a7-79729fa75489",
"name": "Alcatel 7750", "name": "Alcatel 7750",
"category": "router", "category": "router",
"description": "The Alcatel-Lucent 7750 Service Router (SR) portfolio is a suite of multiservice edge routing platforms that deliver high performance, service richness, and creates exceptional value for networking in the cloud era. It is designed for the concurrent delivery of advanced residential, business and wireless broadband IP services, and provides cloud, data center and branch office connectivity for enterprise networking on a common IP edge routing platform.", "description": "The Alcatel-Lucent 7750 Service Router (SR) portfolio is a suite of multiservice edge routing platforms that deliver high performance, service richness, and creates exceptional value for networking in the cloud era. It is designed for the concurrent delivery of advanced residential, business and wireless broadband IP services, and provides cloud, data center and branch office connectivity for enterprise networking on a common IP edge routing platform.",

View File

@ -0,0 +1,52 @@
{
"appliance_id": "5c09a704-0e38-48ac-8392-52e0c5890cf3",
"name": "AlmaLinux",
"category": "guest",
"description": "An Open Source, community-governed and forever-free enterprise Linux distribution, focused on long-term stability, providing a robust production-grade platform. AlmaLinux OS is 1:1 binary compatible with RHEL and pre-Stream CentOS.",
"vendor_name": "Alma Linux",
"vendor_url": "https://almalinux.org/",
"documentation_url": "https://wiki.almalinux.org/",
"product_name": "Alma Linux",
"product_url": "https://almalinux.org/",
"registry_version": 4,
"status": "stable",
"maintainer": "GNS3 Team",
"maintainer_email": "developers@gns3.net",
"usage": "Username:\talmalinux\nPassword:\talmalinux\nTo become root, use \"sudo su\".\n",
"port_name_format": "eth{0}",
"qemu": {
"adapter_type": "virtio-net-pci",
"adapters": 1,
"ram": 1536,
"hda_disk_interface": "sata",
"arch": "x86_64",
"console_type": "telnet",
"kvm": "allow"
},
"images": [
{
"filename": "AlmaLinux-8-GenericCloud-8.4-20210727.x86_64.qcow2",
"version": "8.4",
"md5sum": "999014244f676097fdeaf87612a75e81",
"filesize": 534266880,
"download_url": "https://repo.almalinux.org/almalinux/8/cloud/x86_64/images/",
"direct_download_url": "https://repo.almalinux.org/almalinux/8/cloud/x86_64/images/AlmaLinux-8-GenericCloud-8.4-20210727.x86_64.qcow2"
},
{
"filename": "almalinux-cloud-init-data.iso",
"version": "1.0",
"md5sum": "72fb52af76e9561d125dd99224e2c1d1",
"filesize": 374784,
"download_url": "https://github.com/GNS3/gns3-registry/raw/master/cloud-init/AlmaLinux/almalinux-cloud-init-data.iso"
}
],
"versions": [
{
"name": "8.4",
"images": {
"hda_disk_image": "AlmaLinux-8-GenericCloud-8.4-20210727.x86_64.qcow2",
"cdrom_image": "almalinux-cloud-init-data.iso"
}
}
]
}

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "fc520ae2-a4e5-48c3-9a13-516bb2e94668",
"name": "Alpine Linux", "name": "Alpine Linux",
"category": "guest", "category": "guest",
"description": "Alpine Linux is a security-oriented, lightweight Linux distribution based on musl libc and busybox.", "description": "Alpine Linux is a security-oriented, lightweight Linux distribution based on musl libc and busybox.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "a7eec173-9680-4c1f-bf79-1bf29d485375",
"name": "cEOS", "name": "cEOS",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "Arista cEOS\u2122 introduces the containerized packaging of EOS software and its agents for deployment in cloud infrastructure with the same proven EOS software image that runs on all Arista products. These flexible deployment options empower cloud network operators that are customizing their operating environments to provide a uniform workflow for development, testing and deployment of differentiated services.", "description": "Arista cEOS\u2122 introduces the containerized packaging of EOS software and its agents for deployment in cloud infrastructure with the same proven EOS software image that runs on all Arista products. These flexible deployment options empower cloud network operators that are customizing their operating environments to provide a uniform workflow for development, testing and deployment of differentiated services.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "c90f3ff3-4ed2-4437-9afb-21232fa92015",
"name": "Arista vEOS", "name": "Arista vEOS",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "Arista EOS\u00ae is the core of Arista cloud networking solutions for next-generation data centers and cloud networks. Cloud architectures built with Arista EOS scale to tens of thousands of compute and storage nodes with management and provisioning capabilities that work at scale. Through its programmability, EOS enables a set of software applications that deliver workflow automation, high availability, unprecedented network visibility and analytics and rapid integration with a wide range of third-party applications for virtualization, management, automation and orchestration services.\n\nArista Extensible Operating System (EOS) is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary software image across the Arista switching family. Architected for resiliency and programmability, EOS has a unique multi-process state sharing architecture that separates state information and packet forwarding from protocol processing and application logic.", "description": "Arista EOS\u00ae is the core of Arista cloud networking solutions for next-generation data centers and cloud networks. Cloud architectures built with Arista EOS scale to tens of thousands of compute and storage nodes with management and provisioning capabilities that work at scale. Through its programmability, EOS enables a set of software applications that deliver workflow automation, high availability, unprecedented network visibility and analytics and rapid integration with a wide range of third-party applications for virtualization, management, automation and orchestration services.\n\nArista Extensible Operating System (EOS) is a fully programmable and highly modular, Linux-based network operation system, using familiar industry standard CLI and runs a single binary software image across the Arista switching family. Architected for resiliency and programmability, EOS has a unique multi-process state sharing architecture that separates state information and packet forwarding from protocol processing and application logic.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "8f074218-9d61-4e99-ab89-35ca19ad44ee",
"name": "ArubaOS-CX Simulation Software", "name": "ArubaOS-CX Simulation Software",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "The ArubaOS-CX Simulation Software is a virtual platform to enable simulation of the ArubaOS-CX Network Operating System. Simulated networks can be created using many of the protocols in the ArubaOS-CX Operating system like OSPF, BGP (inc. EVPN). Key features like the Aruba Network Analytics Engine and the REST API can be simulated, providing a lightweight development platform to building the modern network.", "description": "The ArubaOS-CX Simulation Software is a virtual platform to enable simulation of the ArubaOS-CX Network Operating System. Simulated networks can be created using many of the protocols in the ArubaOS-CX Operating system like OSPF, BGP (inc. EVPN). Key features like the Aruba Network Analytics Engine and the REST API can be simulated, providing a lightweight development platform to building the modern network.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "38c9e478-4a1d-4611-ac61-945d2f2ca376",
"name": "Aruba VGW", "name": "Aruba VGW",
"category": "firewall", "category": "firewall",
"description": "Aruba Virtual Gateways allow customers to bring their public cloud infrastructure to the SD-WAN fabric and facilitate connectivity between branches and the public cloud.", "description": "Aruba Virtual Gateways allow customers to bring their public cloud infrastructure to the SD-WAN fabric and facilitate connectivity between branches and the public cloud.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "a51fbf46-6350-4db2-8dbc-e90704ed60ef",
"name": "Aruba VMC", "name": "Aruba VMC",
"category": "guest", "category": "guest",
"description": "Aruba Virtual Mobility Controller", "description": "Aruba Virtual Mobility Controller",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "b6319fe9-19d5-4a4d-a857-6eee3c92ca2d",
"name": "AsteriskNOW / FreePBX", "name": "AsteriskNOW / FreePBX",
"category": "guest", "category": "guest",
"description": "AsteriskNOW makes it easy to create custom telephony solutions by automatically installing the 'plumbing'. It's a complete Linux distribution with Asterisk, the DAHDI driver framework, and, the FreePBX administrative GUI. Much of the complexity of Asterisk and Linux is handled by the installer, the yum package management utility and the administrative GUI. With AsteriskNOW, application developers and integrators can concentrate on building solutions, not maintaining the plumbing.", "description": "AsteriskNOW makes it easy to create custom telephony solutions by automatically installing the 'plumbing'. It's a complete Linux distribution with Asterisk, the DAHDI driver framework, and, the FreePBX administrative GUI. Much of the complexity of Asterisk and Linux is handled by the installer, the yum package management utility and the administrative GUI. With AsteriskNOW, application developers and integrators can concentrate on building solutions, not maintaining the plumbing.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "8885febc-9067-4c2b-94e9-67090df0c21e",
"name": "Big Cloud Fabric", "name": "Big Cloud Fabric",
"category": "router", "category": "router",
"description": "Big Cloud Fabric\u2122 is the industry's first data center fabric built using whitebox or britebox switches and SDN controller technology. Embracing hyperscale data center design principles, Big Cloud Fabric solution enables rapid innovation, ease of provisioning and management, while reducing overall costs, making it ideal for current and next generation data centers. Big Cloud Fabric is designed from the ground up to satisfy the requirements of physical, virtual, containerized, or a combination of such workloads. Some of the typical OpenStack or VMware data center workloads include NFV, High Performance Computing, Big Data and Software Defined Storage deployments.", "description": "Big Cloud Fabric\u2122 is the industry's first data center fabric built using whitebox or britebox switches and SDN controller technology. Embracing hyperscale data center design principles, Big Cloud Fabric solution enables rapid innovation, ease of provisioning and management, while reducing overall costs, making it ideal for current and next generation data centers. Big Cloud Fabric is designed from the ground up to satisfy the requirements of physical, virtual, containerized, or a combination of such workloads. Some of the typical OpenStack or VMware data center workloads include NFV, High Performance Computing, Big Data and Software Defined Storage deployments.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "088df570-f637-46f5-8a68-85acde538e5e",
"name": "BIRD", "name": "BIRD",
"category": "router", "category": "router",
"description": "The BIRD project aims to develop a fully functional dynamic IP routing daemon primarily targeted on (but not limited to) Linux, FreeBSD and other UNIX-like systems and distributed under the GNU General Public License.", "description": "The BIRD project aims to develop a fully functional dynamic IP routing daemon primarily targeted on (but not limited to) Linux, FreeBSD and other UNIX-like systems and distributed under the GNU General Public License.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "5952eca3-fc06-4a57-a3b0-986237cb7de7",
"name": "Brocade Virtual ADX", "name": "Brocade Virtual ADX",
"category": "firewall", "category": "firewall",
"description": "The Brocade Virtual ADX (vADX\u2122) is a full-fledged Application Delivery Controller (ADC) platform with a virtual footprint that leverages Intel advanced technology to deliver remarkable performance. The software is designed to run on standardsbased hypervisors, hosted on Intel x86 COTS hardware. It offers a complete suite of Layer 4 and Layer 7 server load balancing capabilities and application security services with extensible management via rich SOAP/XML APIs.", "description": "The Brocade Virtual ADX (vADX\u2122) is a full-fledged Application Delivery Controller (ADC) platform with a virtual footprint that leverages Intel advanced technology to deliver remarkable performance. The software is designed to run on standardsbased hypervisors, hosted on Intel x86 COTS hardware. It offers a complete suite of Layer 4 and Layer 7 server load balancing capabilities and application security services with extensible management via rich SOAP/XML APIs.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "52a04aee-1046-4214-a364-18ecd776f7b3",
"name": "vRouter", "name": "vRouter",
"category": "router", "category": "router",
"description": "With proven ultra-high performance and scalability, the Brocade vRouter is the networking industry leader in software innovation. The Brocade vRouter has set a the benchmark for all software-based routers, while offering easy scalability, a broad set of capabilities, and the peace of mind that comes with rock solid reliability.", "description": "With proven ultra-high performance and scalability, the Brocade vRouter is the networking industry leader in software innovation. The Brocade vRouter has set a the benchmark for all software-based routers, while offering easy scalability, a broad set of capabilities, and the peace of mind that comes with rock solid reliability.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "cabd6cb2-1c70-4f90-b225-6601fea89cfc",
"name": "vTM DE", "name": "vTM DE",
"category": "router", "category": "router",
"description": "Take control of your online applications with Brocade virtual Traffic Manager (Developer Edition). Enhance customer experience, inspect traffic in real-time, control service levels to differentiate users and services, and reduce your costs with an extensible delivery platform that can grow with your business using ADC-as-a-Service. A fully functional Developer Edition which needs no license key, is limited to 1 Mbps/100 SSL tps throughput, and has access to the Brocade Community support web pages.", "description": "Take control of your online applications with Brocade virtual Traffic Manager (Developer Edition). Enhance customer experience, inspect traffic in real-time, control service levels to differentiate users and services, and reduce your costs with an extensible delivery platform that can grow with your business using ADC-as-a-Service. A fully functional Developer Edition which needs no license key, is limited to 1 Mbps/100 SSL tps throughput, and has access to the Brocade Community support web pages.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f28432b3-c5fe-48fa-b9e8-4024aa7cbe9e",
"name": "BSDRP", "name": "BSDRP",
"category": "router", "category": "router",
"description": "BSD Router Project (BSDRP) is an embedded free and open source router distribution based on FreeBSD with Quagga and Bird.", "description": "BSD Router Project (BSDRP) is an embedded free and open source router distribution based on FreeBSD with Quagga and Bird.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f8186e9a-5145-4da0-ac18-b5b13cf57d3b",
"name": "CentOS Cloud Guest", "name": "CentOS Cloud Guest",
"category": "guest", "category": "guest",
"description": "CentOS official image for self-hosted cloud", "description": "CentOS official image for self-hosted cloud",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "b1e84913-1c9b-49f5-bf2e-45f2b42ba404",
"name": "Centos", "name": "Centos",
"category": "guest", "category": "guest",
"description": "The CentOS Linux distribution is a stable, predictable, manageable and reproducible platform derived from the sources of Red Hat Enterprise Linux (RHEL). We are now looking to expand on that by creating the resources needed by other communities to come together and be able to build on the CentOS Linux platform. And today we start the process by delivering a clear governance model, increased transparency and access. In the coming weeks we aim to publish our own roadmap that includes variants of the core CentOS Linux.", "description": "The CentOS Linux distribution is a stable, predictable, manageable and reproducible platform derived from the sources of Red Hat Enterprise Linux (RHEL). We are now looking to expand on that by creating the resources needed by other communities to come together and be able to build on the CentOS Linux platform. And today we start the process by delivering a clear governance model, increased transparency and access. In the coming weeks we aim to publish our own roadmap that includes variants of the core CentOS Linux.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "7bfa7a66-b1fa-4e5e-9b85-95d74440ee31",
"name": "Checkpoint GAiA", "name": "Checkpoint GAiA",
"category": "firewall", "category": "firewall",
"description": "Check Point Gaia is the next generation Secure Operating System for all Check Point Appliances, Open Servers and Virtualized Gateways.\n\nGaia combines the best features from IPSO and SecurePlatform (SPLAT) into a single unified OS providing greater efficiency and robust performance. By upgrading to Gaia, customers will benefit from improved appliance connection capacity and reduced operating costs. With Gaia, IP Appliance customers will gain the ability to leverage the full breadth and power of all Check Point Software Blades.\n\nGaia secures IPv6 networks utilizing the Check Point Acceleration & Clustering technology and it protects the most dynamic network and virtualized environments by supporting 5 different dynamic routing protocols. As a 64-Bit OS, Gaia increases the connection capacity of existing appliances supporting up-to 10M concurrent connections for select 2012 Models.\n\nGaia simplifies management with segregation of duties by enabling role-based administrative access. Furthermore, Gaia greatly increases operation efficiency by offering Automatic Software Update.\n\nThe feature-rich Web interface allows for search of any command or property in a second.\n\nGaia provides backward compatibility with IPSO and SPLAT CLI-style commands making it an easy transition for existing Check Point customers.", "description": "Check Point Gaia is the next generation Secure Operating System for all Check Point Appliances, Open Servers and Virtualized Gateways.\n\nGaia combines the best features from IPSO and SecurePlatform (SPLAT) into a single unified OS providing greater efficiency and robust performance. By upgrading to Gaia, customers will benefit from improved appliance connection capacity and reduced operating costs. With Gaia, IP Appliance customers will gain the ability to leverage the full breadth and power of all Check Point Software Blades.\n\nGaia secures IPv6 networks utilizing the Check Point Acceleration & Clustering technology and it protects the most dynamic network and virtualized environments by supporting 5 different dynamic routing protocols. As a 64-Bit OS, Gaia increases the connection capacity of existing appliances supporting up-to 10M concurrent connections for select 2012 Models.\n\nGaia simplifies management with segregation of duties by enabling role-based administrative access. Furthermore, Gaia greatly increases operation efficiency by offering Automatic Software Update.\n\nThe feature-rich Web interface allows for search of any command or property in a second.\n\nGaia provides backward compatibility with IPSO and SPLAT CLI-style commands making it an easy transition for existing Check Point customers.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "c95b160b-4515-4cc9-81cc-92ac063dd250",
"name": "Chromium", "name": "Chromium",
"category": "guest", "category": "guest",
"description": "The chromium browser", "description": "The chromium browser",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "cc2b1802-3520-4963-8ff7-c19b1f6418c5",
"name": "Cisco 1700", "name": "Cisco 1700",
"category": "router", "category": "router",
"description": "Cisco 1700 Router", "description": "Cisco 1700 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ed474fea-cd3b-4e2e-be84-a855a133060a",
"name": "Cisco 2600", "name": "Cisco 2600",
"category": "router", "category": "router",
"description": "Cisco 2600 Router", "description": "Cisco 2600 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ed0f079e-a506-4cb4-b46c-714a80bbe2d3",
"name": "Cisco 2691", "name": "Cisco 2691",
"category": "router", "category": "router",
"description": "Cisco 2691 Router", "description": "Cisco 2691 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "7ada6336-7280-4306-9f32-6b1e242ae989",
"name": "Cisco 3620", "name": "Cisco 3620",
"category": "router", "category": "router",
"description": "Cisco 3620 Router", "description": "Cisco 3620 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ef119e49-19fe-4239-9c6b-16ea12f6ec01",
"name": "Cisco 3640", "name": "Cisco 3640",
"category": "router", "category": "router",
"description": "Cisco 3640 Router", "description": "Cisco 3640 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ac460a9c-9274-4ccf-a056-af50b699925f",
"name": "Cisco 3660", "name": "Cisco 3660",
"category": "router", "category": "router",
"description": "Cisco 3660 Router", "description": "Cisco 3660 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "5b9c5293-a5a7-47a3-9df4-6cf658f2f378",
"name": "Cisco 3725", "name": "Cisco 3725",
"category": "router", "category": "router",
"description": "Cisco 3725 Router", "description": "Cisco 3725 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "18737edb-e43f-4fb0-8a0f-88982cff58b1",
"name": "Cisco 3745", "name": "Cisco 3745",
"category": "router", "category": "router",
"description": "Cisco 3745 Multiservice Access Router", "description": "Cisco 3745 Multiservice Access Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "38aa3135-f169-4131-9b64-73605787b5ef",
"name": "Cisco 7200", "name": "Cisco 7200",
"category": "router", "category": "router",
"description": "Cisco 7200 Router", "description": "Cisco 7200 Router",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "fdbfc23e-413f-4b9f-b930-6cd27527d72b",
"name": "Cisco ASA", "name": "Cisco ASA",
"category": "firewall", "category": "firewall",
"description": "Cisco ASA firewall", "description": "Cisco ASA firewall",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "886c4059-4a10-4c62-ab59-7f02beeac292",
"name": "Cisco ASAv", "name": "Cisco ASAv",
"category": "firewall", "category": "firewall",
"description": "The Adaptive Security Virtual Appliance is a virtualized network security solution based on the market-leading Cisco ASA 5500-X Series firewalls. It supports both traditional and next-generation software-defined network (SDN) and Cisco Application Centric Infrastructure (ACI) environments to provide policy enforcement and threat inspection across heterogeneous multisite environments.", "description": "The Adaptive Security Virtual Appliance is a virtualized network security solution based on the market-leading Cisco ASA 5500-X Series firewalls. It supports both traditional and next-generation software-defined network (SDN) and Cisco Application Centric Infrastructure (ACI) environments to provide policy enforcement and threat inspection across heterogeneous multisite environments.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "d223e573-8de5-4f93-b26d-d5d1f2f18226",
"name": "Cisco Catalyst 8000V", "name": "Cisco Catalyst 8000V",
"category": "router", "category": "router",
"description": "The Cisco Catalyst 8000V Edge Software is a virtual, form-factor router deployed on a virtual machine (VM) running on an x86 server hardware.", "description": "The Cisco Catalyst 8000V Edge Software is a virtual, form-factor router deployed on a virtual machine (VM) running on an x86 server hardware.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "95d17663-f40a-437f-b5f1-dab4779965de",
"name": "Cisco CSR1000v", "name": "Cisco CSR1000v",
"category": "router", "category": "router",
"description": "The Cisco Cloud Services Router 1000V (CSR 1000V) is a router and network services platform in virtual form factor that is intended for deployment in cloud and virtual data centers. It is optimized to serve as a single-tenant or multitenant WAN gateway. Using proven, industry-leading Cisco IOS\u00ae XE Software networking and security features, the CSR 1000V enables enterprises to transparently extend their WANs into external provider-hosted clouds and cloud providers to offer their tenants enterprise-class networking services.", "description": "The Cisco Cloud Services Router 1000V (CSR 1000V) is a router and network services platform in virtual form factor that is intended for deployment in cloud and virtual data centers. It is optimized to serve as a single-tenant or multitenant WAN gateway. Using proven, industry-leading Cisco IOS\u00ae XE Software networking and security features, the CSR 1000V enables enterprises to transparently extend their WANs into external provider-hosted clouds and cloud providers to offer their tenants enterprise-class networking services.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ae09653b-c8eb-4ecd-9341-2d0319e16b9b",
"name": "Cisco DCNM", "name": "Cisco DCNM",
"category": "guest", "category": "guest",
"description": "Cisco Data Center Network Manager (DCNM) 10 unifies and automates Cisco Nexus and Cisco MDS 9000 Family multitenant infrastructure for data center management across Cisco Nexus 5000, 6000, 7000, and 9000 Series Switches in NX-OS mode using Cisco NX-OS Software as well as across Cisco MDS 9100 and 9300 Series Multilayer Fabric Switches, 9200 Series Multiservice Switches, and 9500 and 9700 Series Multilayer Directors. Data Center Network Manager 10 lets you manage very large numbers of devices while providing ready-to-use management and automation capabilities plus Virtual Extensible LAN (VXLAN) overlay visibility into Cisco Nexus LAN fabrics.", "description": "Cisco Data Center Network Manager (DCNM) 10 unifies and automates Cisco Nexus and Cisco MDS 9000 Family multitenant infrastructure for data center management across Cisco Nexus 5000, 6000, 7000, and 9000 Series Switches in NX-OS mode using Cisco NX-OS Software as well as across Cisco MDS 9100 and 9300 Series Multilayer Fabric Switches, 9200 Series Multiservice Switches, and 9500 and 9700 Series Multilayer Directors. Data Center Network Manager 10 lets you manage very large numbers of devices while providing ready-to-use management and automation capabilities plus Virtual Extensible LAN (VXLAN) overlay visibility into Cisco Nexus LAN fabrics.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "e36183b5-5960-4bcf-bdb9-ca258c28b3e5",
"name": "Cisco Flow Collector for NetFlow", "name": "Cisco Flow Collector for NetFlow",
"category": "firewall", "category": "firewall",
"description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nAt the heart of the Stealthwatch System is the highly scalable Stealthwatch Flow Collector. The Flow Collector is available as either a physical or a virtual appliance. The Flow Collector VE performs the same functions as its physical counterpart, but in a virtual environment. The Stealthwatch Flow Collector for NetFlow gathers NetFlow, cFlow, J-Flow, Packeteer 2, NetStream, and IPFIX data. To achieve full network visibility with a traditional probe-based approach, you would need to install a probe for each router or switch on your network. This results in many costly hardware installations. Conversely, Stealthwatch's flow-based approach provides you with full network visibility at a fraction of the cost. Each Flow Collector can process data for as many as 1,000,000 hosts from up to 2,000 flow exporters, depending on the Flow Collector model and license restrictions. ", "description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nAt the heart of the Stealthwatch System is the highly scalable Stealthwatch Flow Collector. The Flow Collector is available as either a physical or a virtual appliance. The Flow Collector VE performs the same functions as its physical counterpart, but in a virtual environment. The Stealthwatch Flow Collector for NetFlow gathers NetFlow, cFlow, J-Flow, Packeteer 2, NetStream, and IPFIX data. To achieve full network visibility with a traditional probe-based approach, you would need to install a probe for each router or switch on your network. This results in many costly hardware installations. Conversely, Stealthwatch's flow-based approach provides you with full network visibility at a fraction of the cost. Each Flow Collector can process data for as many as 1,000,000 hosts from up to 2,000 flow exporters, depending on the Flow Collector model and license restrictions. ",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "1e409568-f8d6-4f94-8804-53039eb7784a",
"name": "Cisco FMCv", "name": "Cisco FMCv",
"category": "firewall", "category": "firewall",
"description": "This is your administrative nerve center for managing critical Cisco network security solutions. It provides complete and unified management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. Easily go from managing a firewall to controlling applications to investigating and remediating malware outbreaks.", "description": "This is your administrative nerve center for managing critical Cisco network security solutions. It provides complete and unified management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. Easily go from managing a firewall to controlling applications to investigating and remediating malware outbreaks.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "709c2a9b-5dc3-4362-b147-fb848a0df963",
"name": "Cisco Flow Sensor", "name": "Cisco Flow Sensor",
"category": "firewall", "category": "firewall",
"description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nUsing the same technology as the Stealthwatch Flow Sensor appliance, the Flow Sensor VE is a virtual appliance that provides visibility into virtual environments, generating flow data for areas that are not flow-enabled. ", "description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nUsing the same technology as the Stealthwatch Flow Sensor appliance, the Flow Sensor VE is a virtual appliance that provides visibility into virtual environments, generating flow data for areas that are not flow-enabled. ",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "adce6f0c-10ae-4f4d-9e00-da833f419eae",
"name": "Cisco FTDv", "name": "Cisco FTDv",
"category": "firewall", "category": "firewall",
"description": "Cisco Firepower Threat Defense Virtual NGFW appliances combine Cisco's proven network firewall with the industry's most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.", "description": "Cisco Firepower Threat Defense Virtual NGFW appliances combine Cisco's proven network firewall with the industry's most effective next-gen IPS and advanced malware protection. All so you can get more visibility, be more flexible, save more, and protect better.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "3bf492b6-5717-4257-9bfd-b34617c6f133",
"name": "Cisco IOSv", "name": "Cisco IOSv",
"category": "router", "category": "router",
"description": "Cisco Virtual IOS allows user to run IOS on a standard computer.", "description": "Cisco Virtual IOS allows user to run IOS on a standard computer.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "4368f802-ddec-4863-adbd-a36a6d83cd4c",
"name": "Cisco IOSvL2", "name": "Cisco IOSvL2",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "Cisco Virtual IOS L2 allows user to run a IOS switching image on a standard computer.", "description": "Cisco Virtual IOS L2 allows user to run a IOS switching image on a standard computer.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "78fc5177-c399-4369-a6f8-e9c9b217c2e2",
"name": "Cisco IOS XRv", "name": "Cisco IOS XRv",
"category": "router", "category": "router",
"description": "IOS XRv supports the control plane features introduced in Cisco IOS XR.", "description": "IOS XRv supports the control plane features introduced in Cisco IOS XR.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ea678b10-fc52-4079-83de-36769fbd9bc3",
"name": "Cisco IOS XRv 9000", "name": "Cisco IOS XRv 9000",
"category": "router", "category": "router",
"description": "IOS XRv 9000 (aka Sunstone) is the 1st VM released running the 64-bit IOS XR operating system as used on the NCS-6xxx platform. This appliance requires 4 vCPUs and 16GB of memory to run!", "description": "IOS XRv 9000 (aka Sunstone) is the 1st VM released running the 64-bit IOS XR operating system as used on the NCS-6xxx platform. This appliance requires 4 vCPUs and 16GB of memory to run!",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "9593db48-558a-4914-bb78-a20605f39c65",
"name": "Cisco IOU L2", "name": "Cisco IOU L2",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "Cisco IOS on UNIX Layer 2 image.", "description": "Cisco IOS on UNIX Layer 2 image.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "87bf6f58-1e5a-4ee2-afe7-715dabffcf18",
"name": "Cisco IOU L3", "name": "Cisco IOU L3",
"category": "router", "category": "router",
"description": "Cisco IOS on UNIX Layer 3 image.", "description": "Cisco IOS on UNIX Layer 3 image.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "cf5d1f22-953a-434d-a07e-6e17de85acf1",
"name": "Cisco ISE", "name": "Cisco ISE",
"category": "firewall", "category": "firewall",
"description": "The Cisco ISE platform is a comprehensive, next-generation, contextually-based access control solution. Cisco ISE offers authenticated network access, profiling, posture, guest management, and security group access services along with monitoring, reporting, and troubleshooting capabilities on a single physical or virtual appliance.", "description": "The Cisco ISE platform is a comprehensive, next-generation, contextually-based access control solution. Cisco ISE offers authenticated network access, profiling, posture, guest management, and security group access services along with monitoring, reporting, and troubleshooting capabilities on a single physical or virtual appliance.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "587dd8e4-0c73-465d-bfdc-5cd7ab67029b",
"name": "Cisco NGIPSv", "name": "Cisco NGIPSv",
"category": "firewall", "category": "firewall",
"description": "Cisco Firepower Next-Generation IPS (NGIPS) threat appliances combine superior visibility, embedded security intelligence, automated analysis, and industry-leading threat effectiveness.", "description": "Cisco Firepower Next-Generation IPS (NGIPS) threat appliances combine superior visibility, embedded security intelligence, automated analysis, and industry-leading threat effectiveness.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "6260ec1e-8ab0-40c6-9e35-fbcc88ce935e",
"name": "Cisco NX-OSv", "name": "Cisco NX-OSv",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "NXOSv is a reference platform for an implementation of the Cisco Nexus operating system, based on the Nexus 7000-series platforms, running as a full virtual machine on a hypervisor. This includes NXAPI and MPLS LDP support.", "description": "NXOSv is a reference platform for an implementation of the Cisco Nexus operating system, based on the Nexus 7000-series platforms, running as a full virtual machine on a hypervisor. This includes NXAPI and MPLS LDP support.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f739d949-136b-4a56-8b0f-d39832e5aa30",
"name": "Cisco NX-OSv 9000", "name": "Cisco NX-OSv 9000",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "The NX-OSv 9000 is a virtual platform that is designed to simulate the control plane aspects of a network element running Cisco Nexus 9000 software. The NX-OSv 9000 shares the same software image running on Cisco Nexus 9000 hardware platform although no specific hardware emulation is implemented. When the software runs as a virtual machine, line card (LC) ASIC provisioning or any interaction from the control plane to hardware ASIC is handled by the NX-OSv 9000 software data plane.\nThe NX-OSv 9000 for the Cisco Nexus 9000 Series provides a useful tool to enable the devops model and rapidly test changes to the infrastructure or to infrastructure automation tools. This enables network simulations in large scale for customers to validate configuration changes on a simulated network prior to applying them on a production network. Some users have also expressed interest in using the simulation system for feature test ,verification, and automation tooling development and test simualtion prior to deployment. NX-OSv 9000 can be used as a programmability vehicle to validate software defined networks (SDNs) and Network Function Virtualization (NFV) based solutions.", "description": "The NX-OSv 9000 is a virtual platform that is designed to simulate the control plane aspects of a network element running Cisco Nexus 9000 software. The NX-OSv 9000 shares the same software image running on Cisco Nexus 9000 hardware platform although no specific hardware emulation is implemented. When the software runs as a virtual machine, line card (LC) ASIC provisioning or any interaction from the control plane to hardware ASIC is handled by the NX-OSv 9000 software data plane.\nThe NX-OSv 9000 for the Cisco Nexus 9000 Series provides a useful tool to enable the devops model and rapidly test changes to the infrastructure or to infrastructure automation tools. This enables network simulations in large scale for customers to validate configuration changes on a simulated network prior to applying them on a production network. Some users have also expressed interest in using the simulation system for feature test ,verification, and automation tooling development and test simualtion prior to deployment. NX-OSv 9000 can be used as a programmability vehicle to validate software defined networks (SDNs) and Network Function Virtualization (NFV) based solutions.",
@ -81,6 +82,13 @@
"filesize": 1330315264, "filesize": 1330315264,
"download_url": "https://software.cisco.com/download/home/286312239/type/282088129/release/9.2%25281%2529" "download_url": "https://software.cisco.com/download/home/286312239/type/282088129/release/9.2%25281%2529"
}, },
{
"filename": "nxosv-final.7.0.3.I7.9.qcow2",
"version": "7.0.3.I7.9",
"md5sum": "50678c719f6b822c43dd096dbdf359e8",
"filesize": 1003618304,
"download_url": "https://software.cisco.com/download/home/286312239/type/282088129/release/7.0(3)I7(9)?i=!pp"
},
{ {
"filename": "nxosv-final.7.0.3.I7.7.qcow2", "filename": "nxosv-final.7.0.3.I7.7.qcow2",
"version": "7.0.3.I7.7", "version": "7.0.3.I7.7",
@ -218,6 +226,13 @@
"hda_disk_image": "nxosv-final.9.2.1.qcow2" "hda_disk_image": "nxosv-final.9.2.1.qcow2"
} }
}, },
{
"name": "7.0.3.I7.9",
"images": {
"bios_image": "OVMF-20160813.fd",
"hda_disk_image": "nxosv-final.7.0.3.I7.9.qcow2"
}
},
{ {
"name": "7.0.3.I7.7", "name": "7.0.3.I7.7",
"images": { "images": {

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "903bbc99-6c4a-4bc7-b9b1-eb5f2e3c5470",
"name": "Cisco Stealthwatch Management Console", "name": "Cisco Stealthwatch Management Console",
"category": "firewall", "category": "firewall",
"description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nAs the control center for the Stealthwatch System, the SMC manages, coordinates, configures, and organizes all of the different components of the system. The SMC client software allows you to access the SMC's user-friendly graphical user interface from any local computer with access to a Web browser. Through the client interface, you can easily access real-time security and network information about critical segments throughout your enterprise. ", "description": "Cisco Stealthwatch is the most comprehensive visibility and network traffic security analytics solution that uses enterprise telemetry from the existing network infrastructure. It provides advanced threat detection, accelerated threat response, and simplified network segmentation using multilayer machine learning and entity modeling. With advanced behavioral analytics, you'll always know who is on your network and what they are doing.\n\nAs the control center for the Stealthwatch System, the SMC manages, coordinates, configures, and organizes all of the different components of the system. The SMC client software allows you to access the SMC's user-friendly graphical user interface from any local computer with access to a Web browser. Through the client interface, you can easily access real-time security and network information about critical segments throughout your enterprise. ",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "e632ff43-fc14-41f8-a293-b6a62f0e1788",
"name": "Cisco vWLC", "name": "Cisco vWLC",
"category": "guest", "category": "guest",
"description": "The Virtual Wireless Controller can cost-effectively manage, secure, and optimize the performance of local and branch wireless networks. Ideal for small and medium-sized businesses, the Virtual Wireless Controller facilitates server consolidation and improves business continuity in the face of outages.", "description": "The Virtual Wireless Controller can cost-effectively manage, secure, and optimize the performance of local and branch wireless networks. Ideal for small and medium-sized businesses, the Virtual Wireless Controller facilitates server consolidation and improves business continuity in the face of outages.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "a9dc537f-3093-42c2-95d9-fca800e59f82",
"name": "Web Security Virtual Appliance", "name": "Web Security Virtual Appliance",
"category": "firewall", "category": "firewall",
"description": "The Cisco WSA was one of the first secure web gateways to combine leading protections to help organizations address the growing challenges of securing and controlling web traffic. It enables simpler, faster deployment with fewer maintenance requirements, reduced latency, and lower operating costs. \"Set and forget\" technology frees staff after initial automated policy settings go live, and automatic security updates are pushed to network devices every 3 to 5 minutes. Flexible deployment options and integration with your existing security infrastructure help you meet quickly evolving security requirements.", "description": "The Cisco WSA was one of the first secure web gateways to combine leading protections to help organizations address the growing challenges of securing and controlling web traffic. It enables simpler, faster deployment with fewer maintenance requirements, reduced latency, and lower operating costs. \"Set and forget\" technology frees staff after initial automated policy settings go live, and automatic security updates are pushed to network devices every 3 to 5 minutes. Flexible deployment options and integration with your existing security infrastructure help you meet quickly evolving security requirements.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "a013860f-c65d-477d-abfc-d3d98b49e7d6",
"name": "NetScaler VPX", "name": "NetScaler VPX",
"category": "router", "category": "router",
"description": "Today's enterprises face more demands than ever, from cloud computing to 24/7 availability to increasing security threats. NetScaler ADC, an advanced software-defined application delivery controller, is your networking power player. It provides outstanding delivery of business applications-to any device and any location-with unmatched security, superior L4-7 load balancing, reliable GSLB, and 100 percent uptime. In fact, NetScaler ADC offers up to five times the performance of our closest competitor. Plus our TriScale technology saves you money by allowing your network to scale up or down without additional hardware costs.", "description": "Today's enterprises face more demands than ever, from cloud computing to 24/7 availability to increasing security threats. NetScaler ADC, an advanced software-defined application delivery controller, is your networking power player. It provides outstanding delivery of business applications-to any device and any location-with unmatched security, superior L4-7 load balancing, reliable GSLB, and 100 percent uptime. In fact, NetScaler ADC offers up to five times the performance of our closest competitor. Plus our TriScale technology saves you money by allowing your network to scale up or down without additional hardware costs.",

View File

@ -0,0 +1,46 @@
{
"appliance_id": "2d5634dc-ad39-46cf-a2fd-17b291abab91",
"name": "Citrix SD-WAN",
"category": "router",
"description": "A software-defined wide area network (SD-WAN) is a virtual WAN architecture, in which any blend of network transport types — not only multiprotocol label switching (MPLS) but also broadband internet, cellular, and satellite — can be virtualized and bonded then centrally managed in software, to securely connect users to applications and desktops in accordance with policy. Essentially, SD-WAN is software-defined networking (SDN) for the WAN.",
"vendor_name": "Citrix",
"vendor_url": "http://www.citrix.com/",
"documentation_url": "https://docs.citrix.com/en-us/citrix-sd-wan",
"product_name": "Citrix SD-WAN",
"product_url": "https://docs.citrix.com/en-us/citrix-sd-wan",
"registry_version": 4,
"status": "stable",
"maintainer": "Kiel Czu",
"maintainer_email": "kielczu@gmail.com",
"usage": "The image file is large (3GB), make sure you have enough space. Default credentials: admin/ password",
"port_name_format": "1/{0}",
"qemu": {
"adapter_type": "virtio-net-pci",
"adapters": 4,
"ram": 4096,
"cpus": 4,
"hda_disk_interface": "ide",
"arch": "x86_64",
"console_type": "telnet",
"boot_priority": "cd",
"kvm": "require",
"options": "-cpu Nehalem"
},
"images": [
{
"filename": "ctx-sdw-os-11.4.1.27_kvm.qcow2",
"version": "11.4.1.27",
"md5sum": "e57d8fcf8c136cc3fd2359103d885462",
"filesize": 3235315712,
"download_url": "https://www.citrix.com/pl-pl/downloads/citrix-sd-wan/standard-premium-edition/vpx-release-114127.html"
}
],
"versions": [
{
"name": "11.4.1.27",
"images": {
"hda_disk_image": "ctx-sdw-os-11.4.1.27_kvm.qcow2"
}
}
]
}

View File

@ -0,0 +1,46 @@
{
"appliance_id": "9021f581-a54d-48e0-bb84-8286ce6e08f0",
"name": "Citrix SD-WAN Center",
"category": "guest",
"description": "Citrix SD-WAN Center is a centralized management system that enables you to configure, monitor, and analyze all the Citrix SD-WAN appliances on your WAN.",
"vendor_name": "Citrix",
"vendor_url": "http://www.citrix.com/",
"documentation_url": "https://docs.citrix.com/en-us/citrix-sd-wan",
"product_name": "Citrix SD-WAN Center",
"product_url": "https://docs.citrix.com/en-us/citrix-sd-wan",
"registry_version": 4,
"status": "stable",
"maintainer": "Kiel Czu",
"maintainer_email": "kielczu@gmail.com",
"usage": "The image file is large (1.6 GB), make sure you have enough space. Default credentials: admin/ password",
"port_name_format": "1/{0}",
"qemu": {
"adapter_type": "virtio-net-pci",
"adapters": 4,
"ram": 8192,
"cpus": 4,
"hda_disk_interface": "ide",
"arch": "x86_64",
"console_type": "telnet",
"boot_priority": "cd",
"kvm": "require",
"options": "-smbios type=2,product='440BX Desktop Reference Platform'"
},
"images": [
{
"filename": "ctx-sdwc-11.4.1.27.qcow2",
"version": "11.4.1.27",
"md5sum": "d788035384a53a7b73c853383efae49a",
"filesize": 1661861888,
"download_url": "https://www.citrix.com/pl-pl/downloads/citrix-sd-wan/citrix-sd-wan-standard-premium-advance-edition/management-console-release-114127.html"
}
],
"versions": [
{
"name": "11.4.1.27",
"images": {
"hda_disk_image": "ctx-sdwc-11.4.1.27.qcow2"
}
}
]
}

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "c731e7d0-5893-4072-a681-998df576a67c",
"name": "ClearOS CE", "name": "ClearOS CE",
"category": "firewall", "category": "firewall",
"description": "ClearOS is an operating system for your Server, Network, and Gateway systems. It is designed for homes, small to medium businesses, and distributed environments. ClearOS is commonly known as the Next Generation Small Business Server, while including indispensable Gateway and Networking functionality. It delivers a powerful IT solution with an elegant user interface that is completely web-based. Simply put.. ClearOS is the new way of delivering IT.", "description": "ClearOS is an operating system for your Server, Network, and Gateway systems. It is designed for homes, small to medium businesses, and distributed environments. ClearOS is commonly known as the Next Generation Small Business Server, while including indispensable Gateway and Networking functionality. It delivers a powerful IT solution with an elegant user interface that is completely web-based. Simply put.. ClearOS is the new way of delivering IT.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "e5563056-f6dc-4b51-bcff-8b566ae8b0a7",
"name": "CloudRouter", "name": "CloudRouter",
"category": "router", "category": "router",
"description": "The CloudRouter Project is a collaborative open source project focused on developing a powerful, easy to use router designed for the cloud.\nCompute resources are rapidly migrating from physical infrastructure to a combination of physical, virtual and cloud environments. A similar transition is emerging in the networking space, with network control logic shifting from proprietary hardware-based platforms to open source software-based platforms. CloudRouter is a software-based router distribution designed to run on physical, virtual and cloud environments, supporting software-defined networking infrastructure. It includes the features of traditional hardware routers, as well as support for emerging technologies such as containers and software-defined interconnection. CloudRouter aims to facilitate migration to the cloud without giving up control over network routing and governance.", "description": "The CloudRouter Project is a collaborative open source project focused on developing a powerful, easy to use router designed for the cloud.\nCompute resources are rapidly migrating from physical infrastructure to a combination of physical, virtual and cloud environments. A similar transition is emerging in the networking space, with network control logic shifting from proprietary hardware-based platforms to open source software-based platforms. CloudRouter is a software-based router distribution designed to run on physical, virtual and cloud environments, supporting software-defined networking infrastructure. It includes the features of traditional hardware routers, as well as support for emerging technologies such as containers and software-defined interconnection. CloudRouter aims to facilitate migration to the cloud without giving up control over network routing and governance.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "5a03e6b9-afe3-44f5-ae35-5664c0250b94",
"name": "CoreOS", "name": "CoreOS",
"category": "guest", "category": "guest",
"description": "CoreOS is designed for security, consistency, and reliability. Instead of installing packages via yum or apt, CoreOS uses Linux containers to manage your services at a higher level of abstraction. A single service's code and all dependencies are packaged within a container that can be run on one or many CoreOS machines.", "description": "CoreOS is designed for security, consistency, and reliability. Instead of installing packages via yum or apt, CoreOS uses Linux containers to manage your services at a higher level of abstraction. A single service's code and all dependencies are packaged within a container that can be run on one or many CoreOS machines.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f1b83421-6c20-4fa7-8292-568fe08874c4",
"name": "Cumulus VX", "name": "Cumulus VX",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "Cumulus VX is a community-supported virtual appliance that enables cloud admins and network engineers to preview and test Cumulus Networks technology at zero cost. You can build sandbox environments to learn Open Networking concepts, prototype network operations and script & develop applications risk-free. With Cumulus VX, you can get started with Open Networking at your pace, on your time, and in your environment!", "description": "Cumulus VX is a community-supported virtual appliance that enables cloud admins and network engineers to preview and test Cumulus Networks technology at zero cost. You can build sandbox environments to learn Open Networking concepts, prototype network operations and script & develop applications risk-free. With Cumulus VX, you can get started with Open Networking at your pace, on your time, and in your environment!",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "ccbd2d81-c588-4bbb-80ac-ba20686b613a",
"name": "DANOS", "name": "DANOS",
"category": "router", "category": "router",
"description": "The Disaggregated Network Operating System (DANOS) project enables community collaboration across network hardware, forwarding, and operating system layers. DANOS is initially based on AT&T's \"dNOS\" software framework of a more open, cost-effective and flexible alternative to traditional networking equipment. As part of The Linux Foundation, it now incorporates contributions from complementary open source communities in building a standardized distributed Network Operating System (NOS) to speed the adoption and use of white boxes in a service provider's infrastructure.", "description": "The Disaggregated Network Operating System (DANOS) project enables community collaboration across network hardware, forwarding, and operating system layers. DANOS is initially based on AT&T's \"dNOS\" software framework of a more open, cost-effective and flexible alternative to traditional networking equipment. As part of The Linux Foundation, it now incorporates contributions from complementary open source communities in building a standardized distributed Network Operating System (NOS) to speed the adoption and use of white boxes in a service provider's infrastructure.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "8f8df56b-605d-447c-94a4-4848e3ae8392",
"name": "Debian 10 Minimal", "name": "Debian 10 Minimal",
"category": "guest", "category": "guest",
"description": "Debian 10 Custom, with automatic disk resize and ssh/nmap", "description": "Debian 10 Custom, with automatic disk resize and ssh/nmap",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "518a5802-266a-4299-b84b-e6cccb5a39ac",
"name": "DEFT Linux", "name": "DEFT Linux",
"category": "guest", "category": "guest",
"description": "DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc...) connected to the PC where the boot process takes place.\nThe DEFT system is based on GNU Linux, it can run live (via DVDROM or USB pendrive), installed or run as a Virtual Appliance on VMware or Virtualbox. DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux. It features a comfortable mount manager for device management.\nDEFT is paired with DART (acronym for Digital Advanced Response Toolkit), a Forensics System which can be run on Windows and contains the best tools for Forensics and Incident Response. DART features a GUI with logging and integrity check for the instruments here contained.\nBesides all this, the DEFT staff is devoted to implementing and developing applications which are released to Law Enforcement Officers, such as Autopsy 3 for Linux.", "description": "DEFT (acronym for Digital Evidence & Forensics Toolkit) is a distribution made for Computer Forensics, with the purpose of running live on systems without tampering or corrupting devices (hard disks, pendrives, etc...) connected to the PC where the boot process takes place.\nThe DEFT system is based on GNU Linux, it can run live (via DVDROM or USB pendrive), installed or run as a Virtual Appliance on VMware or Virtualbox. DEFT employs LXDE as desktop environment and WINE for executing Windows tools under Linux. It features a comfortable mount manager for device management.\nDEFT is paired with DART (acronym for Digital Advanced Response Toolkit), a Forensics System which can be run on Windows and contains the best tools for Forensics and Incident Response. DART features a GUI with logging and integrity check for the instruments here contained.\nBesides all this, the DEFT staff is devoted to implementing and developing applications which are released to Law Enforcement Officers, such as Autopsy 3 for Linux.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "85441847-4091-4894-9079-802084a1845b",
"name": "Dell OS9", "name": "Dell OS9",
"category": "router", "category": "router",
"description": "Dell Networking OS9 (formerly FTOS).\nOS9 powers the Dell Networking product portfolio and has been hardened in some of the largest and most demanding environments in the world to meet stringent reliability, scalability and serviceability requirements. \n\nDownload and uncompress zip files from the Dell support site - corresponding to the FTOS/OS9 image name. Please 'Select FTOS for S-Series OS-EMULATOR'. Import the resulting ISO image.", "description": "Dell Networking OS9 (formerly FTOS).\nOS9 powers the Dell Networking product portfolio and has been hardened in some of the largest and most demanding environments in the world to meet stringent reliability, scalability and serviceability requirements. \n\nDownload and uncompress zip files from the Dell support site - corresponding to the FTOS/OS9 image name. Please 'Select FTOS for S-Series OS-EMULATOR'. Import the resulting ISO image.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f049539d-db46-422f-8d10-ff9b96a2a4ae",
"name": "DNS", "name": "DNS",
"category": "guest", "category": "guest",
"description": "This appliance provides DNS using dnsmasq with the local domain set to \"lab\".", "description": "This appliance provides DNS using dnsmasq with the local domain set to \"lab\".",

View File

@ -0,0 +1,73 @@
{
"appliance_id": "1cfdf900-7c30-4cb7-8f03-3f61d2581633",
"name": "Empty VM",
"category": "guest",
"description": "An empty VM with empty hard disks 8G, 30G & 100G.",
"vendor_name": "GNS3",
"vendor_url": "https://gns3.com",
"documentation_url": "",
"product_name": "QEMU",
"product_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/",
"registry_version": 4,
"status": "experimental",
"maintainer": "GNS3 Team",
"maintainer_email": "developers@gns3.net",
"usage": "Default at first boot the VM will start from the cdrom.",
"port_name_format": "eth{0}",
"qemu": {
"adapter_type": "e1000",
"adapters": 1,
"ram": 1024,
"arch": "x86_64",
"console_type": "vnc",
"hda_disk_interface": "sata",
"boot_priority": "d",
"kvm": "allow"
},
"images": [
{
"filename": "empty8G.qcow2",
"version": "8G",
"md5sum": "f1d2c25b6990f99bd05b433ab603bdb4",
"filesize": 197120,
"download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/",
"direct_download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/empty8G.qcow2/download"
},
{
"filename": "empty30G.qcow2",
"version": "30G",
"md5sum": "3411a599e822f2ac6be560a26405821a",
"filesize": 197120,
"download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/",
"direct_download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/empty30G.qcow2/download"
},
{
"filename": "empty100G.qcow2",
"version": "100G",
"md5sum": "1e6409a4523ada212dea2ebc50e50a65",
"filesize": 198656,
"download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/",
"direct_download_url": "https://sourceforge.net/projects/gns-3/files/Empty%20Qemu%20disk/empty100G.qcow2/download"
}
],
"versions": [
{
"name": "8G",
"images": {
"hda_disk_image": "empty8G.qcow2"
}
},
{
"name": "30G",
"images": {
"hda_disk_image": "empty30G.qcow2"
}
},
{
"name": "100G",
"images": {
"hda_disk_image": "empty100G.qcow2"
}
}
]
}

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "0293ded2-0ca3-4052-913f-8c2d872e46ba",
"name": "EXOS VM", "name": "EXOS VM",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "The ExtremeXOS VM is created and maintained by Extreme Networks for users to emulate a network using EXOS switches.", "description": "The ExtremeXOS VM is created and maintained by Extreme Networks for users to emulate a network using EXOS switches.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "3e81eb47-43c4-4676-bbc5-8dda1d7abe08",
"name": "VOSS VM", "name": "VOSS VM",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "The VOSS VM is a software emulation of a VSP8K switch.", "description": "The VOSS VM is a software emulation of a VSP8K switch.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "4aa73054-4d54-4829-9c00-b16ad50e7a7e",
"name": "F5 BIG-IP LTM VE", "name": "F5 BIG-IP LTM VE",
"category": "router", "category": "router",
"description": "The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry. BIG-IP Virtual Edition (VE) is a version of the BIG-IP system that runs as a virtual machine in specifically-supported hypervisors. BIG-IP VE emulates a hardware-based BIG-IP system running a VE-compatible version of BIG-IP software.", "description": "The BIG-IP family of products offers the application intelligence that network managers need to ensure applications are fast, secure, and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility, and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry. BIG-IP Virtual Edition (VE) is a version of the BIG-IP system that runs as a virtual machine in specifically-supported hypervisors. BIG-IP VE emulates a hardware-based BIG-IP system running a VE-compatible version of BIG-IP software.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "799f2414-7341-4f55-8b6d-2b3f6d11b1d8",
"name": "F5 BIG-IQ CM", "name": "F5 BIG-IQ CM",
"category": "guest", "category": "guest",
"description": "When you go from managing a few boxes to managing a few dozen, your processes, logistics, and needs all change. BIG-IQ Centralized Management brings all of your devices together, so you can discover, track, upgrade, and deploy more efficiently. You can also monitor key metrics from one location, saving yourself both time and effort.\n\nCentrally manage up to 200 physical, virtual, or virtual clustered multiprocessing (vCMP) based BIG-IP devices. BIG-IQ Centralized Management also handles licensing for up to 5,000 unmanaged devices, so you can spin BIG-IP virtual editions (VEs) up or down as needed.", "description": "When you go from managing a few boxes to managing a few dozen, your processes, logistics, and needs all change. BIG-IQ Centralized Management brings all of your devices together, so you can discover, track, upgrade, and deploy more efficiently. You can also monitor key metrics from one location, saving yourself both time and effort.\n\nCentrally manage up to 200 physical, virtual, or virtual clustered multiprocessing (vCMP) based BIG-IP devices. BIG-IQ Centralized Management also handles licensing for up to 5,000 unmanaged devices, so you can spin BIG-IP virtual editions (VEs) up or down as needed.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "b2027465-2959-4ef3-ba56-7b2880e4e711",
"name": "Firefox", "name": "Firefox",
"category": "guest", "category": "guest",
"description": "A light Linux based on TinyCore Linux with Firefox preinstalled", "description": "A light Linux based on TinyCore Linux with Firefox preinstalled",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "a1903402-919b-4620-9b07-37902f46a4e3",
"name": "FortiADC Manager", "name": "FortiADC Manager",
"category": "guest", "category": "guest",
"description": "FortiADC Manager allows you to use a web- based user interface to configure remote FortiADC devices. It allows you to simplify and speed up the FortiADC deployment and update process by maintaining configuration templates and policy packages that you can modify and apply as needed.", "description": "FortiADC Manager allows you to use a web- based user interface to configure remote FortiADC devices. It allows you to simplify and speed up the FortiADC deployment and update process by maintaining configuration templates and policy packages that you can modify and apply as needed.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "74e0ff73-7ceb-4871-81f0-b4dd4b35911a",
"name": "FortiADC", "name": "FortiADC",
"category": "router", "category": "router",
"description": "Fortinet ADC appliances optimize the availability, user experience, and scalability of enterprise application delivery. They deliver fast, secure, and intelligent acceleration and distribution of even the most demanding enterprise applications.", "description": "Fortinet ADC appliances optimize the availability, user experience, and scalability of enterprise application delivery. They deliver fast, secure, and intelligent acceleration and distribution of even the most demanding enterprise applications.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "4fc11cfb-d600-4dd4-af94-e4b16191be2a",
"name": "FortiAnalyzer", "name": "FortiAnalyzer",
"category": "guest", "category": "guest",
"description": "FortiAnalyzer Network Security Logging, Analysis, and Reporting Appliances securely aggregate log data from Fortinet Security Appliances. A comprehensive suite of easily customable reports allows you to quickly analyze and visualize network threats, inefficiencies and usage.", "description": "FortiAnalyzer Network Security Logging, Analysis, and Reporting Appliances securely aggregate log data from Fortinet Security Appliances. A comprehensive suite of easily customable reports allows you to quickly analyze and visualize network threats, inefficiencies and usage.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "57e289b6-68a4-4911-a916-0d3def89ef74",
"name": "FortiAuthenticator", "name": "FortiAuthenticator",
"category": "guest", "category": "guest",
"description": "FortiAuthenticator user identity management appliances strengthen enterprise security by simplifying and centralizing the management and storage of user identity information.", "description": "FortiAuthenticator user identity management appliances strengthen enterprise security by simplifying and centralizing the management and storage of user identity information.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "75df92b4-69d3-4d5d-91b1-c36efa68d9fd",
"name": "FortiCache", "name": "FortiCache",
"category": "guest", "category": "guest",
"description": "FortiCache VM high performance Web Caching virtual appliances address bandwidth saturation, high latency, and poor performance caused by caching popular internet content locally for carriers, service providers, enterprises and educational networks. FortiCache VM appliances reduce the cost and impact of cached content on the network, while increasing performance and end- user satisfaction by improving the speed of delivery of popular repeated content.", "description": "FortiCache VM high performance Web Caching virtual appliances address bandwidth saturation, high latency, and poor performance caused by caching popular internet content locally for carriers, service providers, enterprises and educational networks. FortiCache VM appliances reduce the cost and impact of cached content on the network, while increasing performance and end- user satisfaction by improving the speed of delivery of popular repeated content.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "2b3da0fb-abe3-4131-92b6-4e7fcb50dba5",
"name": "FortiGate", "name": "FortiGate",
"category": "firewall", "category": "firewall",
"description": "FortiGate Virtual Appliance offers the same level of advanced threat prevention features like the physical appliances in private, hybrid and public cloud deployment.", "description": "FortiGate Virtual Appliance offers the same level of advanced threat prevention features like the physical appliances in private, hybrid and public cloud deployment.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "4089ee66-e13b-4490-aa51-53cdb969e024",
"name": "FortiMail", "name": "FortiMail",
"category": "guest", "category": "guest",
"description": "FortiMail is a complete Secure Email Gateway offering suitable for any size organization. It provides a single solution to protect against inbound attacks - including advanced malware -, as well as outbound threats and data loss with a wide range of top-rated security capabilities.", "description": "FortiMail is a complete Secure Email Gateway offering suitable for any size organization. It provides a single solution to protect against inbound attacks - including advanced malware -, as well as outbound threats and data loss with a wide range of top-rated security capabilities.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "b9ce377f-6a6c-497a-a12d-444936a575c3",
"name": "FortiManager", "name": "FortiManager",
"category": "guest", "category": "guest",
"description": "FortiManager Security Management appliances allow you to centrally manage any number of Fortinet Network Security devices, from several to thousands, including FortiGate, FortiWiFi, and FortiCarrier.", "description": "FortiManager Security Management appliances allow you to centrally manage any number of Fortinet Network Security devices, from several to thousands, including FortiGate, FortiWiFi, and FortiCarrier.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "0f57eb3a-7b1c-47d4-96c4-fe8ed60c9f50",
"name": "FortiProxy", "name": "FortiProxy",
"category": "firewall", "category": "firewall",
"description": "FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention and advanced threat protection. It helps enterprises enforce internet compliance using granular application control.", "description": "FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention and advanced threat protection. It helps enterprises enforce internet compliance using granular application control.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "754f4df8-934f-4a55-8d32-5bfd922785d9",
"name": "FortiRecorder", "name": "FortiRecorder",
"category": "guest", "category": "guest",
"description": "Surveillance systems can be complicated, expensive, and unreliable. But FortiCamera and FortiRecorder simplify IP video surveillance and there are no license fees. With FortiCams, you can see everything: doors, POS terminals, public areas--whatever you need to keep an eye on. FortiRecorder captures the images for easy monitoring, storage, and retrieval. Just plug in your cameras, connect the FortiRecorder, open a web browser or client application, and you're ready to go. It's easy to navigate and configure with event timelines and profile-driven configuration.", "description": "Surveillance systems can be complicated, expensive, and unreliable. But FortiCamera and FortiRecorder simplify IP video surveillance and there are no license fees. With FortiCams, you can see everything: doors, POS terminals, public areas--whatever you need to keep an eye on. FortiRecorder captures the images for easy monitoring, storage, and retrieval. Just plug in your cameras, connect the FortiRecorder, open a web browser or client application, and you're ready to go. It's easy to navigate and configure with event timelines and profile-driven configuration.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "88252124-93a4-4851-9b0f-b0f264705c1a",
"name": "FortiSandbox", "name": "FortiSandbox",
"category": "firewall", "category": "firewall",
"description": "Today's threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.", "description": "Today's threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "b963c9d0-f73b-4a6c-b876-644ae5dd2779",
"name": "FortiSIEM", "name": "FortiSIEM",
"category": "guest", "category": "guest",
"description": "Breaches to network security continue to occur across all industry verticals, even to the most respected brands. The time it takes to discover, isolate, and remediate the incident continues to be measured in hundreds of days-having material impacts on security and compliance standards. It is no wonder that many organizations are struggling. As recent surveys have shown, enterprises have an average of 32 different vendors' devices in their network, with no automated ability to cross-correlate the data that each is collecting. It is also easy to see why organizations are strapped for the cyber security personnel they need to manage all the data in these complex environments.\n\nFrom its inception, FortiSIEM was built to reduce complexity in managing network and security operations. FortiSIEM provides organizations of all sizes with a comprehensive, holistic, and scalable solution for managing security, performance, and compliance from IoT to the cloud.", "description": "Breaches to network security continue to occur across all industry verticals, even to the most respected brands. The time it takes to discover, isolate, and remediate the incident continues to be measured in hundreds of days-having material impacts on security and compliance standards. It is no wonder that many organizations are struggling. As recent surveys have shown, enterprises have an average of 32 different vendors' devices in their network, with no automated ability to cross-correlate the data that each is collecting. It is also easy to see why organizations are strapped for the cyber security personnel they need to manage all the data in these complex environments.\n\nFrom its inception, FortiSIEM was built to reduce complexity in managing network and security operations. FortiSIEM provides organizations of all sizes with a comprehensive, holistic, and scalable solution for managing security, performance, and compliance from IoT to the cloud.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "62cc83dc-be46-49b3-80e0-9f0d4d644fc9",
"name": "FortiWeb", "name": "FortiWeb",
"category": "firewall", "category": "firewall",
"description": "FortiWeb Web Application Firewalls provide specialized, layered web application threat protection for medium/large enterprises, application service providers, and SaaS providers.", "description": "FortiWeb Web Application Firewalls provide specialized, layered web application threat protection for medium/large enterprises, application service providers, and SaaS providers.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "691f6552-725f-4dff-a2ba-220f5e3ab6a6",
"name": "freeRouter", "name": "freeRouter",
"category": "router", "category": "router",
"description": "networking swiss army knife - it speaks routing protocols, and (re)encapsulates packets on interfaces", "description": "networking swiss army knife - it speaks routing protocols, and (re)encapsulates packets on interfaces",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "0706912e-be44-45b7-9723-d9c3749dd5ef",
"name": "FreeBSD", "name": "FreeBSD",
"category": "guest", "category": "guest",
"description": "FreeBSD is an advanced computer operating system used to power modern servers, desktops, and embedded platforms. A large community has continually developed it for more than thirty years. Its advanced networking, security, and storage features have made FreeBSD the platform of choice for many of the busiest web sites and most pervasive embedded networking and storage devices.", "description": "FreeBSD is an advanced computer operating system used to power modern servers, desktops, and embedded platforms. A large community has continually developed it for more than thirty years. Its advanced networking, security, and storage features have made FreeBSD the platform of choice for many of the busiest web sites and most pervasive embedded networking and storage devices.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "dabaa0d5-8b44-40a6-9a25-6c81129dd315",
"name": "FreeNAS", "name": "FreeNAS",
"category": "guest", "category": "guest",
"description": "FreeNAS is a Free and Open Source Network Attached Storage (NAS) software appliance. This means that you can use FreeNAS to share data over file-based sharing protocols, including CIFS for Windows users, NFS for Unix-like operating systems, and AFP for Mac OS X users. FreeNAS uses the ZFS file system to store, manage, and protect data. ZFS provides advanced features like snapshots to keep old versions of files, incremental remote backups to keep your data safe on another device without huge file transfers, and intelligent compression, which reduces the size of files so quickly and efficiently that it actually helps transfers happen faster.", "description": "FreeNAS is a Free and Open Source Network Attached Storage (NAS) software appliance. This means that you can use FreeNAS to share data over file-based sharing protocols, including CIFS for Windows users, NFS for Unix-like operating systems, and AFP for Mac OS X users. FreeNAS uses the ZFS file system to store, manage, and protect data. ZFS provides advanced features like snapshots to keep old versions of files, incremental remote backups to keep your data safe on another device without huge file transfers, and intelligent compression, which reduces the size of files so quickly and efficiently that it actually helps transfers happen faster.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "64f3dd9e-77bf-492c-a245-26d2a0e9bde8",
"name": "FRR", "name": "FRR",
"category": "router", "category": "router",
"description": "FRRouting (FRR) is an IP routing protocol suite for Linux and Unix platforms which includes protocol daemons for BGP, IS-IS, LDP, OSPF, PIM, and RIP.\n\nFRR's seamless integration with the native Linux/Unix IP networking stacks makes it applicable to a wide variety of use cases including connecting hosts/VMs/containers to the network, advertising network services, LAN switching and routing, Internet access routers, and Internet peering.\n\nThis is an unofficial VM of FRR.", "description": "FRRouting (FRR) is an IP routing protocol suite for Linux and Unix platforms which includes protocol daemons for BGP, IS-IS, LDP, OSPF, PIM, and RIP.\n\nFRR's seamless integration with the native Linux/Unix IP networking stacks makes it applicable to a wide variety of use cases including connecting hosts/VMs/containers to the network, advertising network services, LAN switching and routing, Internet access routers, and Internet peering.\n\nThis is an unofficial VM of FRR.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "16e06d10-bf02-4cd8-9807-69b8ef42efed",
"name": "HPE VSR1001", "name": "HPE VSR1001",
"category": "router", "category": "router",
"description": "The HPE VSR1000 Virtual Services Router Series is a software application, running on a server, which provides functionality similar to that of a physical router: robust routing between networked devices using a number of popular routing protocols. It also delivers the critical network services associated with today's enterprise routers such as VPN gateway, firewall and other security and traffic management functions.\n\nThe virtual services router (VSR) application runs on a hypervqcor on the server, and supports VMware vSphere and Linux KVM hypervqcors. From one to eight virtual CPUs are supported, depending on license.\n\nBecause the VSR1000 Series application runs the same HPE Comware version 7 operating system as HPE switches and routers, it enables significant operational savings. And being virtual, additional agility and ease of deployment is realized, as resources on the VSR can be dynamically allocated and upgraded upon demand as performance requirements grow.\n\nA variety of deployment models are supported including enterprise branch CPE routing, and cloud offload for small to medium workloads.", "description": "The HPE VSR1000 Virtual Services Router Series is a software application, running on a server, which provides functionality similar to that of a physical router: robust routing between networked devices using a number of popular routing protocols. It also delivers the critical network services associated with today's enterprise routers such as VPN gateway, firewall and other security and traffic management functions.\n\nThe virtual services router (VSR) application runs on a hypervqcor on the server, and supports VMware vSphere and Linux KVM hypervqcors. From one to eight virtual CPUs are supported, depending on license.\n\nBecause the VSR1000 Series application runs the same HPE Comware version 7 operating system as HPE switches and routers, it enables significant operational savings. And being virtual, additional agility and ease of deployment is realized, as resources on the VSR can be dynamically allocated and upgraded upon demand as performance requirements grow.\n\nA variety of deployment models are supported including enterprise branch CPE routing, and cloud offload for small to medium workloads.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "84b4ff53-5d0a-492c-bf80-5e8d7e0745ae",
"name": "HuaWei AR1000v", "name": "HuaWei AR1000v",
"category": "router", "category": "router",
"description": "Huawei AR1000V Virtual Router (Virtual CPE, vCPE) is an NFV product based on the industry-leading Huawei VRP platform. The product has rich business capabilities, integrating routing, switching, security, VPN, QoS and other functions, with software and hardware decoupling, Features such as easy business deployment and intelligent operation and maintenance can be applied to scenarios such as enterprise interconnection (SD-WAN) corporate headquarters (Hub point), POP point access, and cloud access.", "description": "Huawei AR1000V Virtual Router (Virtual CPE, vCPE) is an NFV product based on the industry-leading Huawei VRP platform. The product has rich business capabilities, integrating routing, switching, security, VPN, QoS and other functions, with software and hardware decoupling, Features such as easy business deployment and intelligent operation and maintenance can be applied to scenarios such as enterprise interconnection (SD-WAN) corporate headquarters (Hub point), POP point access, and cloud access.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "bd86792e-9870-4b42-8f16-cb2776f1d5d5",
"name": "HuaWei CE12800", "name": "HuaWei CE12800",
"category": "multilayer_switch", "category": "multilayer_switch",
"description": "CE12800 series switches are high-performance core switches designed for data center networks and high-end campus networks. The switches provide stable, reliable, secure, and high-performance Layer 2/Layer 3 switching services, to help build an elastic, virtualized, agile, and high-quality network.", "description": "CE12800 series switches are high-performance core switches designed for data center networks and high-end campus networks. The switches provide stable, reliable, secure, and high-performance Layer 2/Layer 3 switching services, to help build an elastic, virtualized, agile, and high-quality network.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "03aa586b-5666-49e9-a70c-e5935fdbc23d",
"name": "HuaWei NE40E", "name": "HuaWei NE40E",
"category": "router", "category": "router",
"description": "Based on a 2T platform, the NetEngine 40E-X series provides the industry\u2019s highest capacity 2T routing line cards. Combining performance with low power consumption, innovative Internet Protocol (IP) hard pipe technology, and quick evolution capabilities, NetEngine 40E-X routers meet the low latency and high reliability requirements of business-critical services as well as mature Wide Area Network (WAN) Software-Defined Networking (SDN) solutions. They can serve as core nodes on enterprise WANs, access nodes on large-scale enterprise networks, interconnection and aggregation nodes on campus networks, and edge nodes on large-scale Internet Data Center (IDC) networks.", "description": "Based on a 2T platform, the NetEngine 40E-X series provides the industry\u2019s highest capacity 2T routing line cards. Combining performance with low power consumption, innovative Internet Protocol (IP) hard pipe technology, and quick evolution capabilities, NetEngine 40E-X routers meet the low latency and high reliability requirements of business-critical services as well as mature Wide Area Network (WAN) Software-Defined Networking (SDN) solutions. They can serve as core nodes on enterprise WANs, access nodes on large-scale enterprise networks, interconnection and aggregation nodes on campus networks, and edge nodes on large-scale Internet Data Center (IDC) networks.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "62a59b15-84c7-4ab3-a785-50e139d94c6c",
"name": "HuaWei USG6000v", "name": "HuaWei USG6000v",
"category": "firewall", "category": "firewall",
"description": "Huawei USG6000V is a virtual service gateway based on Network Functions Virtualization (NFV). It features high virtual resource usage and provides virtualized gateway services, such as vFW, vIPsec, vLB, vIPS, vAV, and vURL Remote Query.\nHuawei USG6000V is compatible with most mainstream virtual platforms. It provides standard APIs, together with the OpenStack cloud platform, SDN Controller, and MANO to achieve intelligent solutions for cloud security. This gateway meets flexible service customization requirements for frequent security service changes, elastic and on-demand resource allocation, visualized network management, and rapid rollout.", "description": "Huawei USG6000V is a virtual service gateway based on Network Functions Virtualization (NFV). It features high virtual resource usage and provides virtualized gateway services, such as vFW, vIPsec, vLB, vIPS, vAV, and vURL Remote Query.\nHuawei USG6000V is compatible with most mainstream virtual platforms. It provides standard APIs, together with the OpenStack cloud platform, SDN Controller, and MANO to achieve intelligent solutions for cloud security. This gateway meets flexible service customization requirements for frequent security service changes, elastic and on-demand resource allocation, visualized network management, and rapid rollout.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "f8302832-ad07-47e2-a750-004f700bd47c",
"name": "Internet", "name": "Internet",
"category": "router", "category": "router",
"description": "This appliance simulate a domestic modem. It provide an IP via DHCP and will nat all connection to the internet without the need of using a cloud interface in your topologies. IP will be in the subnet 172.16.0.0/16. Multiple internet will have different IP range from 172.16.1.0/24 to 172.16.253.0/24 .\n\nWARNING USE IT ONLY WITH THE GNS3 VM.", "description": "This appliance simulate a domestic modem. It provide an IP via DHCP and will nat all connection to the internet without the need of using a cloud interface in your topologies. IP will be in the subnet 172.16.0.0/16. Multiple internet will have different IP range from 172.16.1.0/24 to 172.16.253.0/24 .\n\nWARNING USE IT ONLY WITH THE GNS3 VM.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "286b3ba3-6646-41d2-b67c-dd6de9da8a5a",
"name": "IPFire", "name": "IPFire",
"category": "firewall", "category": "firewall",
"description": "IPFire was designed with both modularity and a high-level of flexibility in mind. You can easily deploy many variations of it, such as a firewall, a proxy server or a VPN gateway. The modular design ensures that it runs exactly what you've configured it for and nothing more. Everything is simple to manage and update through the package manager, making maintenance a breeze.", "description": "IPFire was designed with both modularity and a high-level of flexibility in mind. You can easily deploy many variations of it, such as a firewall, a proxy server or a VPN gateway. The modular design ensures that it runs exactly what you've configured it for and nothing more. Everything is simple to manage and update through the package manager, making maintenance a breeze.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "7f58b246-c4f4-4db2-b4e6-f6180bf235ff",
"name": "ipterm", "name": "ipterm",
"category": "guest", "category": "guest",
"description": "ipterm is a debian based networking toolbox.\nIt contains the following utilities: net-tools, iproute2, ping, traceroute, curl, host, iperf3, mtr, socat, ssh client, tcpdump and the multicast testing tools msend/mreceive.", "description": "ipterm is a debian based networking toolbox.\nIt contains the following utilities: net-tools, iproute2, ping, traceroute, curl, host, iperf3, mtr, socat, ssh client, tcpdump and the multicast testing tools msend/mreceive.",

View File

@ -1,4 +1,5 @@
{ {
"appliance_id": "d6d659ae-b450-4dd8-abf6-face55c3de41",
"name": "ipxe", "name": "ipxe",
"category": "guest", "category": "guest",
"description": "boot guest from network via iPXE", "description": "boot guest from network via iPXE",

Some files were not shown because too many files have changed in this diff Show More