[rancid] Update configs by an external means
Piegorsch, Weylin William
weylin at bu.edu
Fri Oct 6 12:32:51 UTC 2017
I had the same problem with rancid v1.x using a custom script (written by my predecessor for NX-OS). It cleared up when we migrated to v3.4.1, which had native NX-OS so it’s not clear to me if dumping the custom config fixed the issue or if it were a rancid version issue.
Are you using a current version?
weylin
-----Original Message-----
From: Alex DEKKER <rancid at ale.cx>
Date: Thursday, October 5, 2017 at 05:08
To: <rancid-discuss at shrubbery.net>
Subject: Re: [rancid] Update configs by an external means
On 04/10/17 21:50, Dan Anderson wrote:
> Rather than using a file that's been transferred onto the system, you
> may be able to have RANCID log in via SSH and run "config\rshow
> current-config" to dump the config. I'm guessing that there's some
> other commands that may be useful, but "show current-config" from
> config mode is how I typically get config copies from Sonicwall
> firewalls when I'm doing firewall migrations for my customers.
I have started a snwlrancid based on the Mikrotik config fetcher. I
guess I should just throw it up somewhere for others to have a look at.
One thing I've noticed is that the obscured encryption keys in VPN
tunnels change *every time* the config is polled:
< shared-secret
4,c99c5ca7b2d0907883e8c6eacb251bfc189265ff041f4941cfaca1a3f3371511611bef8ee56affb2e091204a7c93f8c0d976d2cb3d251b4b940b0fafdb0d8f6812b8c067e1d1d3683db2f6d1247cf5c670171ba6f72e6bc1b62de89b79d23512ee6abf58b5f6ed6dcfb492a4a9d1800f9234e12899b2bc7f7eb4ccf865b478244f0b1a80ffd91035
---
> shared-secret
4,aa138a1f3e053d8fe0efbc3089e2be854a1a9d31fc6e3c26165674b26823f2e32c2e2ecf57fd16e74af093c9e6d35923be216133728061756144089c6ef3cfefc4f1f7bd270e41010e765b1afaed41f2d3e07950c3a3bf9a96264bbf7d9e17ad4280062cbdf2fa1f8b1071423186d5bb232e4424f50493c3ef64b34c7645305a56669a379d5abbba
So long as it works when it's pasted back in to the firewall then great,
but obviously this is going to be absurdly noisy unless it's replaced
with a placeholder with some post-processing. If it's replaced with a
placeholder then the resulting config cannot be put back in to the
firewall without some tweaking. Personally, working in a team of people
who manage Sonicwalls, partial-RANCID is better than no RANCID at all.
The main roadblock I hit was that the word "exit" just seems to move
around at random, and it's not the same "exit" that does this, there are
loads of exits in the config and any one of them can apparently do it:
Index: configs/barkminisonic.rancid
===================================================================
retrieving revision 1.21
diff -u -4 -r1.21 minisonic.rancid
@@ -5,8 +5,9 @@
rom-version 5.0.5.6
model "NSA 220"
serial-number C0EA-E42D-XXXX
last-modified-by "admin 192.168.253.16:X0 UI 2017/09/10 16:07:22"
+ exit
administration
firewall-name MiniSonic
no auto-append-suffix
admin-name admin
@@ -20,9 +21,9 @@
password constraints-apply-to limited-admins
password constraints-apply-to local-users
idle-logout-time 25
no user-lockout
- admin-preempt-action goto-non-configexit
+ admin-preempt-action goto-non-config
admin-preempt-inactivity-timeout 10
no inter-admin-messaging
no web-management allow-http
web-management https-port 443
I don't have time to work on this at the moment but I will try and make
some time to put what I've done so far on Github or similar.
alexd
More information about the Rancid-discuss
mailing list