|
4 | 4 | === PREREQUISITES ===
|
5 | 5 | Run in Python 3
|
6 | 6 |
|
7 |
| -Install both requests & Meraki Dashboard API Python modules: |
| 7 | +Install Requests, PyYAML and Meraki Dashboard API Python modules: |
8 | 8 | pip[3] install --upgrade requests
|
9 | 9 | pip[3] install --upgrade meraki
|
| 10 | +pip[3] install --upgrade pyyaml |
10 | 11 |
|
11 | 12 | === DESCRIPTION ===
|
12 |
| -Imports CSV of MX site-to-site VPN firewall rules into Dashboard network. Note |
| 13 | +Imports YAML of MX site-to-site VPN firewall rules into Dashboard network. Note |
13 | 14 | that if logging is enabled for any rule, then a syslog server needs to be
|
14 | 15 | configured on the Network-wide > General page.
|
15 | 16 |
|
16 | 17 | === USAGE ===
|
17 | 18 | python import_mx_s2svpn.py -k <api_key> -o <org_id> -f <file> [-m <mode>]
|
18 |
| -The -f parameter is the path to the CSV file with MX S2S VPN firewall rules. |
| 19 | +The -f parameter is the path to the YAML file with MX S2S VPN firewall rules. |
19 | 20 | The optional -m parameter is either "simulate" (default) to only print changes,
|
20 | 21 | or "commit" to also apply those changes to Dashboard.
|
21 | 22 | '''
|
22 | 23 |
|
23 |
| - |
24 |
| -import csv |
25 | 24 | from datetime import datetime
|
26 | 25 | import getopt
|
27 |
| -import logging |
28 | 26 | import sys
|
29 |
| -from meraki import meraki |
| 27 | +import os |
| 28 | +import meraki |
| 29 | +import yaml |
30 | 30 |
|
31 | 31 | # Prints READ_ME help message for user to read
|
32 | 32 | def print_help():
|
33 | 33 | lines = READ_ME.split('\n')
|
34 | 34 | for line in lines:
|
35 | 35 | print('# {0}'.format(line))
|
36 | 36 |
|
37 |
| -logger = logging.getLogger(__name__) |
38 |
| - |
39 |
| -def configure_logging(): |
40 |
| - logging.basicConfig( |
41 |
| - filename='{}_log_{:%Y%m%d_%H%M%S}.txt'.format(sys.argv[0].split('.')[0], datetime.now()), |
42 |
| - level=logging.DEBUG, |
43 |
| - format='%(asctime)s: %(levelname)7s: [%(name)s]: %(message)s', |
44 |
| - datefmt='%Y-%m-%d %H:%M:%S' |
45 |
| - ) |
46 |
| - |
47 | 37 |
|
48 | 38 | def main(argv):
|
49 | 39 | # Set default values for command line arguments
|
@@ -76,75 +66,52 @@ def main(argv):
|
76 | 66 | # Assign default mode to "simulate" unless "commit" specified
|
77 | 67 | if arg_mode != 'commit':
|
78 | 68 | arg_mode = 'simulate'
|
| 69 | + |
| 70 | + dashboard = meraki.DashboardAPI( |
| 71 | + api_key=api_key, |
| 72 | + base_url='https://api-mp.meraki.com/api/v1/', |
| 73 | + output_log=True, |
| 74 | + log_file_prefix=os.path.basename(__file__)[:-3], |
| 75 | + log_path='', |
| 76 | + print_console=False |
| 77 | + ) |
79 | 78 |
|
80 |
| - # Read CSV input file, and skip header row |
81 |
| - input_file = open(arg_file) |
82 |
| - csv_reader = csv.reader(input_file, delimiter=',', quotechar='"', quoting=csv.QUOTE_ALL) |
83 |
| - next(csv_reader, None) |
84 |
| - logger.info('Reading file {0}'.format(arg_file)) |
85 |
| - |
86 |
| - # Loop through each firewall rule from CSV file and build PUT data |
87 |
| - fw_rules = [] |
88 |
| - for row in csv_reader: |
89 |
| - rule = dict({'policy': row[0], 'protocol': row[1], 'srcCidr': row[2], 'srcPort': row[3], 'destCidr': row[4], 'destPort': row[5], 'comment': row[6], 'syslogEnabled': (row[7] == True or row[7] == 'True' or row[7] == 'true')}) |
90 |
| - fw_rules.append(rule) |
91 |
| - old_rules = list(fw_rules) |
92 |
| - logger.info('Processed all {0} rules of file {1}'.format(len(fw_rules), arg_file)) |
93 |
| - |
94 |
| - # Check if last (default) rule exists, and if so, remove and check for default logging |
95 |
| - default_rule_exists = False |
96 |
| - default_logging = False |
97 |
| - last_rule = {'comment': 'Default rule', 'policy': 'allow', 'protocol': 'Any', 'srcPort': 'Any', 'srcCidr': 'Any', 'destPort': 'Any', 'destCidr': 'Any'} |
98 |
| - if all(item in fw_rules[-1].items() for item in last_rule.items()): |
99 |
| - default_rule_exists = True |
100 |
| - default_logging = (fw_rules.pop()['syslogEnabled'] == True) |
101 |
| - |
102 |
| - # Update MX site-to-site VPN firewall rules |
| 79 | + # Read input file |
| 80 | + with open(arg_file) as file: |
| 81 | + loaded_rules = yaml.full_load(file) |
| 82 | + |
| 83 | + #Remove default allow rule, if it exists in loaded rules |
| 84 | + default_allow_rule = {'comment': 'Default rule', 'destCidr': 'Any', 'destPort': 'Any', |
| 85 | + 'policy': 'allow', 'protocol': 'Any', 'srcCidr': 'Any', 'srcPort': 'Any'} |
| 86 | + |
| 87 | + last_line = loaded_rules['rules'][len(loaded_rules['rules'])-1] |
| 88 | + |
| 89 | + matched_default = True |
| 90 | + for key in default_allow_rule: |
| 91 | + if key in last_line: |
| 92 | + if last_line[key] != default_allow_rule[key]: |
| 93 | + matched_default = False |
| 94 | + |
| 95 | + if matched_default: |
| 96 | + processed_rules = loaded_rules['rules'][:-1] |
| 97 | + else: |
| 98 | + processed_rules = loaded_rules['rules'] |
| 99 | + |
103 | 100 | if arg_mode == 'commit':
|
104 |
| - meraki.updatemxvpnfwrules(api_key, org_id, fw_rules, default_logging) |
105 |
| - logger.info('Attempting update of site-to-site VPN firewall rules to organization {0}'.format(org_id)) |
106 |
| - |
107 |
| - # Confirm whether changes were successfully made |
108 |
| - new_rules = meraki.getmxvpnfwrules(api_key, org_id) |
109 |
| - if default_rule_exists and new_rules[:-1] == old_rules[:-1]: |
110 |
| - logger.info('Update successful!') |
111 |
| - elif not(default_rule_exists) and new_rules[:-1] == old_rules: |
112 |
| - logger.info('Update successful!') |
113 |
| - else: |
114 |
| - logger.error('Uh oh, something went wrong...') |
| 101 | + print("\nCOMMIT MODE ENABLED\n") |
| 102 | + result = dashboard.appliance.updateOrganizationApplianceVpnVpnFirewallRules(org_id, rules=processed_rules) |
| 103 | + print("Configuration updated. Result:\n\n%s" % result) |
115 | 104 | else:
|
116 |
| - logger.info('Simulating update of site-to-site VPN firewall rules to organization {0}'.format(org_id)) |
117 |
| - |
118 |
| - |
| 105 | + print("\nSIMULATION MODE ENABLED\n") |
| 106 | + print('Use "-m commit" to apply the following VPN FW rules:\n') |
| 107 | + print(processed_rules) |
| 108 | + |
119 | 109 | if __name__ == '__main__':
|
120 |
| - # Configure logging to stdout |
121 |
| - configure_logging() |
122 |
| - # Define a Handler which writes INFO messages or higher to the sys.stderr |
123 |
| - console = logging.StreamHandler() |
124 |
| - console.setLevel(logging.INFO) |
125 |
| - # Set a format which is simpler for console use |
126 |
| - formatter = logging.Formatter('%(name)-12s: %(levelname)-8s %(message)s') |
127 |
| - # Tell the handler to use this format |
128 |
| - console.setFormatter(formatter) |
129 |
| - # Add the handler to the root logger |
130 |
| - logging.getLogger('').addHandler(console) |
131 |
| - |
132 |
| - # Output to logfile/console starting inputs |
133 |
| - start_time = datetime.now() |
134 |
| - logger.info('Started script at {0}'.format(start_time)) |
135 | 110 | inputs = sys.argv[1:]
|
136 | 111 | try:
|
137 | 112 | key_index = inputs.index('-k')
|
138 | 113 | except ValueError:
|
139 | 114 | print_help()
|
140 | 115 | sys.exit(2)
|
141 |
| - inputs.pop(key_index+1) |
142 |
| - inputs.pop(key_index) |
143 |
| - logger.info('Input parameters: {0}'.format(inputs)) |
144 | 116 |
|
145 | 117 | main(sys.argv[1:])
|
146 |
| - |
147 |
| - # Finish output to logfile/console |
148 |
| - end_time = datetime.now() |
149 |
| - logger.info('Ended script at {0}'.format(end_time)) |
150 |
| - logger.info(f'Total run time = {end_time - start_time}') |
0 commit comments