Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat(eos_cli_config_gen): Add IPsec and NAT options to tunnel_interfaces #3824

Closed
1 task done
Tracked by #3833
gmuloc opened this issue Apr 9, 2024 · 0 comments · Fixed by #3830
Closed
1 task done
Tracked by #3833

Feat(eos_cli_config_gen): Add IPsec and NAT options to tunnel_interfaces #3824

gmuloc opened this issue Apr 9, 2024 · 0 comments · Fixed by #3830
Assignees
Labels

Comments

@gmuloc
Copy link
Contributor

gmuloc commented Apr 9, 2024

Enhancement summary

Some new functionality is needed for tunnel interfaces

Which component of AVD is impacted

eos_cli_config_gen

Use case example

Want to configure this:

interface Tunnel99
   mtu 1394
   ip address 20.99.1.1/24
   ip nat service-profile vrf-aware-nat  <<<<<<<<<<<<<<<<<<< missing
   tunnel mode ipsec                               <<<<<<<<<<<<<<<<<<< missing
   tunnel source interface Ethernet2
   tunnel destination 199.168.148.132
   tunnel ipsec profile ipsec00                  <<<<<<<<<<<<<<<<<<< missing
!

Describe the solution you would like

Add new keys to the model and relevant template / documentation

tunnel_interfaces:

    # Tunnel Interface Name
  - name: <str; required; unique>
    description: <str>
    # NEW KEYS BELOW
    tunnel_mode: < [ipsec, gre] ; no default>
    ipsec_profile:  <str> # Add a description stating it is used only when tunnel_mode is set to ipsec and that it must target a defined IPsec profile
    nat_profile: <str> # Same it must target an existing NAT profile
    # END OF NEW KEYS
    # Keep eos_cli at the end

Describe alternatives you have considered

eos_cli but need better

Additional context

No response

Contributing Guide

  • I agree to follow this project's Code of Conduct
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants