
Let me know on the Packet Pushers Slack channel or Twitter DM, and I’ll do additional posts or update this list over time. My goal is to clearly document what these images are and how to obtain them, as this data is less obvious than I’d like. When VFP will say interfaces are UP, on the VCP appears ge-0/0/X interfaces and node is ready for work.Here’s my current list of no cost, minimal headache, easily obtainable networking images that work in a virtual lab environment such as EVE-NG or GNS3. WAIT till on VFP cli appears that interfaces are UP. Once VCP will be fully booted it will automatically start communicate with VFP. Start VCP and VFP set and wait till it is fully boots. Use VFP to connect your lab element to the ports. This setup will be one vMX 17 node (set of 2). em1 interface is communication port between VCP and VFP. opt/unetlab/wrappers/unl_wrapper -a fixpermissionsĪdd VCP and VFP nodes on the topology and connect them with em1 interfaces. Remove abc folder and fix permissions: cd virtioa.qcow2 cp vFPC-20170216.img /opt/unetlab/addons/qemu/vmxvfp-17.1R1.8-domestic-VFP/virtioa.qcow2ĥ. create VFP image folder: mkdir /opt/unetlab/addons/qemu/vmxvfp-17.1R1.8-domestic-VFPĤ.1. virtioc.qcow2 cp metadata-usb-re.img /opt/unetlab/addons/qemu/vmxvcp-17.1R1.8-domestic-VCP/virtioc.qcow2ģ. virtiob.qcow2 cp vmxhdd.img /opt/unetlab/addons/qemu/vmxvcp-17.1R1.8-domestic-VCP/virtiob.qcow2Ģ.3. create VCP image folder: mkdir /opt/unetlab/addons/qemu/vmxvcp-17.1R1.8-domestic-VCPĢ.1. Our necessary images are marked in red above.ġ. Metadata-usb-fpc11.img metadata-usb-fpc5.img metadata-usb-re0.img Metadata-usb-fpc10.img metadata-usb-fpc4.img metadata-usb-fpc9.img vmxhdd.img Metadata-usb-fpc0.img metadata-usb-fpc3.img metadata-usb-fpc8.img vFPC-20170216.img Junos-vmx-x86-64-17.1R1.8.tgz metadata-usb-fpc2.img metadata-usb-fpc7.img metadata-usb-re.img Junos-vmx-x86-64-17.1R1.8.qcow2 metadata-usb-fpc1.img metadata-usb-fpc6.img metadata-usb-re1.img Unzip loaded image archive: tar xvf vmx-bundle-17.1R1.8.tgz Then login as root using SSH protocol and uncompress it: Upload the downloaded image to the EVE using for example FileZilla or WinSCP.
