Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/colin-mccarthy/cisco_base_config
Ansible role to apply a base config on a 3560 switch
https://github.com/colin-mccarthy/cisco_base_config
Last synced: 6 days ago
JSON representation
Ansible role to apply a base config on a 3560 switch
- Host: GitHub
- URL: https://github.com/colin-mccarthy/cisco_base_config
- Owner: colin-mccarthy
- Created: 2017-10-18T20:12:33.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2019-01-20T23:38:22.000Z (almost 6 years ago)
- Last Synced: 2024-08-01T19:51:01.466Z (3 months ago)
- Homepage:
- Size: 94.7 KB
- Stars: 10
- Watchers: 4
- Forks: 11
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Cisco_base
=========Ansible role for configuring new 3560 switches.
Example Running config
-----------------------```
service nagle
no service pad
service timestamps debug datetime localtime
service timestamps log datetime localtime
service password-encryption
logging buffered 15000
logging console critical
logging monitor warnings
enable secret 0 cisco
username colin privilege 15 secret 0 cisco
aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization config-commands
aaa authorization exec default group tacacs+ local
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
aaa accounting exec default start-stop group tacacs+
aaa accounting network default start-stop group tacacs+
aaa accounting connection default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
aaa session-id common
clock timezone MST -7
clock summer-time MDT recurring
system mtu routing 1500
vtp mode transparent
ip routing
ip domain-name thenetwork.engineer
ip name-server 10.1.0.102
ip name-server 10.1.0.101
ip name-server 10.1.0.100
login on-failure log every 5
login on-success log
archive
log config
logging enable
logging size 300
notify syslog contenttype plaintext
hidekeys
spanning-tree mode rapid-pvst
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh time-out 60
ip ssh version 2
!
router ospf 1
router-id 192.168.161.9
log-adjacency-changes
auto-cost reference-bandwidth 10000
area 0 authentication message-digest
passive-interface default
no passive-interface GigabitEthernet0/1
no passive-interface GigabitEthernet0/2
no passive-interface Port-channel1
!
ip classless
no ip http server
no ip http secure-server
ip tacacs source-interface Loopback0
ip sla enable reaction-alerts
logging source-interface Loopback0
logging 10.1.0.1
logging 10.1.0.2
snmp-server community ansibull RO 99
snmp-server trap-source Loopback0
snmp-server contact [email protected]
snmp-server enable traps ospf state-change
snmp-server enable traps ospf errors
snmp-server enable traps ospf retransmit
snmp-server enable traps ospf lsa
snmp-server enable traps ospf cisco-specific state-change nssa-trans-change
snmp-server enable traps ospf cisco-specific state-change shamlink interface
snmp-server enable traps ospf cisco-specific state-change shamlink neighbor
snmp-server enable traps ospf cisco-specific errors
snmp-server enable traps ospf cisco-specific retransmit
snmp-server enable traps ospf cisco-specific lsa
snmp-server host 10.1.0.3 ansibull
tacacs-server host 10.1.0.4 key 7
tacacs-server host 10.1.0.5 key 7
tacacs-server timeout 3
tacacs-server directed-request
banner login ^-----------------------------------------------------------------------
RTR-DEN-1
HODL CORP
THIS IS A HODL CORP COMPUTER SYSTEM. THIS COMPUTER
SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES
(SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR
AUTHORIZED USE. HODL CORP SYSTEMS MAY BE MONITORED
FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS
AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION
AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES,
SURVIVABILITY AND OPERATIONAL SECURITY. MONITORING INCLUDES ACTIVE
ATTACKS BY AUTHORIZED COMPANY ENTITIES TO TEST OR VERIFY THE SECURITY OF
THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED,
RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION,
INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY
BE MONITORED.
USE OF THIS HODL CORP SYSTEM, AUTHORIZED OR UNAUTHORIZED,
CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM. UNAUTHORIZED USE
MAY SUBJECT YOU TO CRIMINAL PROSECUTION. EVIDENCE OF UNAUTHORIZED USE
COLLECTED DURING MONITORING MAY BE USED FOR ADMINISTRATIVE, CRIMINAL
OR OTHER ADVERSE ACTION. USE OF THIS SYSTEM CONSTITUTES CONSENT TO
MONITORING FOR THESE PURPOSES.
-----------------------------------------------------------------------
^
line con 0
line vty 0 4
exec-timeout 30 0
privilege level 15
transport preferred ssh
transport input ssh
transport output ssh
line vty 5 15
exec-timeout 30 0
privilege level 15
transport preferred ssh
transport input ssh
transport output ssh
ntp source Loopback0
ntp server 10.1.0.6
ntp server 10.1.0.7
ntp server 10.1.0.8 prefer
port-channel load-balance src-dst-ip
```Requirements
------------Switch/Switches will need to have SSH connectivity set up first, before running this playbook.
Host Variables
--------------tests/inventory
```
[ios]RTR-DEN-1 ansible_ssh_host=192.168.161.9 ansible_network_os=ios
RTR-DEN-2 ansible_ssh_host=192.168.161.14 ansible_network_os=ios
```Role Variables
--------------A description of the settable variables for this role should go here, including any variables that are in defaults/main.yml, vars/main.yml, and any variables that can/should be set via parameters to the role. Any variables that are read from other roles and/or the global scope (ie. hostvars, group vars, etc.) should be mentioned here as well.
vars/main.yml
```
log_buffer: 15000enable_password: cisco
base_user: colin
base_user_password: ciscotimezone: MST -7
mtu: 1500vtp_mode: transparent
domain_name: thenetwork.engineer
nameserver1: 10.1.0.102
nameserver2: 10.1.0.101
nameserver3: 10.1.0.100log_failure_count: 5
logging_size: 300stp_mode: rapid-pvst
ssh_timeout: 60
ssh_version: 2tacacs_source_interface: Loopback0
logging_source_interface: Loopback0
logserver1: 10.1.0.1
logserver2: 10.1.0.2snmp_community: ansibull
snmp_source_interface: Loopback0
snmp_email: [email protected]
snmp_host: 10.1.0.3tacacsserver1: 10.1.0.4
tacacsserver2: 10.1.0.5
tacacs_key:
tacacs_timeout: 3vty_exec_timeout: 60
vty_priv_level: 15
vty_transport_input: ssh
vty_transport_output: sshntp_source_interface: Loopback0
ntpserver1: 10.1.0.6
ntpserver2: 10.1.0.7
ntpserver3: 10.1.0.8
port_channel_load_balance: src-dst-ip
```
vars/ospf.yml
```ospf_instance_number: 1
ospf_reference_bandwidth: 10000
upstream_int1: GigabitEthernet0/1
upstream_int2: GigabitEthernet0/2upstream_po1: Port-channel1
```vars/login_banner.cfg
```
^-----------------------------------------------------------------------
HODL CORP
THIS IS A HODL CORP COMPUTER SYSTEM. THIS COMPUTER
SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES
(SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR
AUTHORIZED USE. HODL CORP SYSTEMS MAY BE MONITORED
FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS
AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION
AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES,
SURVIVABILITY AND OPERATIONAL SECURITY. MONITORING INCLUDES ACTIVE
ATTACKS BY AUTHORIZED COMPANY ENTITIES TO TEST OR VERIFY THE SECURITY OF
THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED,
RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION,
INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY
BE MONITORED.
USE OF THIS HODL CORP SYSTEM, AUTHORIZED OR UNAUTHORIZED,
CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM. UNAUTHORIZED USE
MAY SUBJECT YOU TO CRIMINAL PROSECUTION. EVIDENCE OF UNAUTHORIZED USE
COLLECTED DURING MONITORING MAY BE USED FOR ADMINISTRATIVE, CRIMINAL
OR OTHER ADVERSE ACTION. USE OF THIS SYSTEM CONSTITUTES CONSENT TO
MONITORING FOR THESE PURPOSES.
-----------------------------------------------------------------------
^
```Dependencies
------------A list of other roles hosted on Galaxy should go here, plus any details in regards to parameters that may need to be set for other roles, or variables that are used from other roles.