The arista.eos-acl role creates an abstraction for common EOS ACL configuration. This means that you do not need to write any ansible tasks. Simply create an object that matches the requirements below and this role will ingest that object and perform the necessary configuration.
This role is used to configure a limited set of ACL types and configurations. See notes under [Role Variables](#Role Variables) for clarification.
ansible-galaxy install arista.eos-acl
Requires an SSH connection for connectivity to your Arista device. You can use
any of the built-in eos connection variables, or the convenience provider
dictionary.
The tasks in this role are driven by the acls
object described below:
acls (list) each entry contains the following keys:
Key | Type | Notes |
---|---|---|
name | string (required) | The name of the ACL to manage. |
type | choices: standard* | The type of ACL to manage. Currently the only supported value for acltype is 'standard'. |
seqno | int (required if state is 'present') | The sequence number of the ACL rule entry to be used. Will be ignored when state is set to 'absent'. |
action | string (required) | The action associated with the ACL rule. Currently supports 'permit' and 'deny'. |
srcaddr | string (required) | The source address filter string for the ACL rule, in the form A.B.C.D. |
srcprefixlen | choices: 1-32* | The prefix length applied to srcaddr. If not 32, the CIDR address specified by srcaddr/srcprefixlen must be a valid network CIDR. Default is 32, using srcaddr as a specific host IP address. |
log | boolean: true, false* | Enables or disables log messages for this ACL rule. |
state | choices: present*, absent | Set the state for the ACL rule configuration. |
Note: Asterisk (*) denotes the default value if none specified
Note: The address specified by srcaddr/srcprefixlen must be either a network
address in CIDR notation, or a single IP address (with srcprefixlen set or
defaulted to 32). An ACL rule specification that does not meet this requirement
will be skipped in the playbook execution.
Note: Existing ACL entries on the switch that match the action/network/log
configuration of a given ACL specification will be removed from the switch
by the eos-acl role without regard for the specified sequence number. When
state is 'present', all other matching rules will be removed. When state is
'absent', all matching rules will be removed. See example playbook below.
Key | Choices | Description |
---|---|---|
eos_save_running_config | true*, false | Specifies whether to write any changes to the running-config resulting from the role execution to memory, copying the configuration to the startup-config. |
Note: Asterisk (*) denotes the default value if none specified
Ansible EOS roles require the following connection information to establish communication with the nodes in your inventory. This information can exist in the Ansible group_vars or host_vars directories, or in the playbook itself.
Key | Required | Choices | Description |
---|---|---|---|
host | yes | Specifies the DNS host name or address for connecting to the remote device over the specified transport. The value of host is used as the destination address for the transport. | |
port | no | Specifies the port to use when building the connection to the remote device. This value applies to either acceptable value of transport. The port value will default to the appropriate transport common port if none is provided in the task (cli=22, http=80, https=443). | |
username | no | Configures the usename to use to authenticate the connection to the remote device. The value of username is used to authenticate either the CLI login or the eAPI authentication depending on which transport is used. If the value is not specified in the task, the value of environment variable ANSIBLE_NET_USERNAME will be used instead. | |
password | no | Specifies the password to use to authenticate the connection to the remote device. This is a common argument used for either acceptable value of transport. If the value is not specified in the task, the value of environment variable ANSIBLE_NET_PASSWORD will be used instead. | |
ssh_keyfile | no | Specifies the SSH keyfile to use to authenticate the connection to the remote device. This argument is only used when transport=cli. If the value is not specified in the task, the value of environment variable ANSIBLE_NET_SSH_KEYFILE will be used instead. | |
authorize | no | yes, no* | Instructs the module to enter priviledged mode on the remote device before sending any commands. If not specified, the device will attempt to excecute all commands in non-priviledged mode. If the value is not specified in the task, the value of environment variable ANSIBLE_NET_AUTHORIZE will be used instead. |
auth_pass | no | Specifies the password to use if required to enter privileged mode on the remote device. If authorize=no, then this argument does nothing. If the value is not specified in the task, the value of environment variable ANSIBLE_NET_AUTH_PASS will be used instead. | |
transport | yes | cli*, eapi | Configures the transport connection to use when connecting to the remote device. The transport argument supports connectivity to the device over cli (ssh) or eapi. |
use_ssl | no | yes*, no | Configures the transport to use SSL if set to true only when transport=eapi. If transport=cli, this value is ignored. |
provider | no | Convience method that allows all the above connection arguments to be passed as a dict object. All constraints (required, choices, etc) must be met either by individual arguments or values in this dict. |
Note: Asterisk (*) denotes the default value if none specified
Key | Choices | Description |
---|---|---|
no_log | true, false* | Prevents module arguments and output from being logged during the playbook execution. By default, no_log is set to true for tasks that gather and save EOS configuration information to reduce output size. Set to true to prevent all output other than task results. |
Note: Asterisk (*) denotes the default value if none specified
The eos-acl role is built on modules included in the core Ansible code. These modules were added in ansible version 2.1.
- Ansible 2.1.0
The following example will use the arista.eos-acl role to configure ACLs on
a switch. We'll create a hosts
file with our switch, then a corresponding
host_vars
file and then a simple playbook which only references the
eos-acl role. By including the role, we automatically get access to all of
the tasks to configure these EOS features. What's nice about this is that
if you have a host without any corresponding configuration, the tasks will
be skipped without any issue.
Sample hosts file:
[leafs]
leaf1.example.com
Sample host_vars/leaf1.example.com
provider:
host: "{{ inventory_hostname }}"
username: admin
password: admin
use_ssl: no
authorize: yes
transport: cli
acls:
- name: ACL-1
type: standard
# Add '50 permit host 10.10.10.10' to ACL-1, replacing the
# existing rule number 50 if it exists, and removing any other
# rules that match '<##> permit host 10.10.10.10' regardless
# of sequence number.
seqno: 50
action: permit
srcaddr: 10.10.10.10
srcprefixlen: 32
- name: ACL-1
type: standard
# Add '55 deny 20.20.0.0/16 log' to ACL-1, replacing the
# existing rule number 55 if it exists, and removing any other
# rules that match '<##> deny 20.20.0.0 log' regardless of
# sequence number.
seqno: 55
action: deny
srcaddr: 20.20.0.0
srcprefixlen: 16
log: true
- name: ACL-1
type: standard
# Remove all ACL-1 rules that match '<##> permit 30.30.30.0/24 log'
# regardless of their sequence number.
action: permit
srcaddr: 30.30.30.0
srcprefixlen: 24
log: true
state: absent
A simple playbook, leaf.yml
- hosts: leafs
roles:
- arista.eos-acl
Then run with:
ansible-playbook -i hosts leaf.yml
Development contributions are welcome. Please see Arista Roles for Ansible - Development Guidelines (test/arista-ansible-role-test/README) for additional information, including how to develop and run test cases for role development.
Copyright (c) 2015, Arista Networks EOS+ All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
-
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
-
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
-
Neither the name of Arista nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Please raise any issues using our GitHub repo or email us at [email protected]