Skip to content

Commit

Permalink
v0.1.6
Browse files Browse the repository at this point in the history
Updated encyclopedia.  Migrated batch helper code for cleaner installation.
  • Loading branch information
ecoen66 committed Mar 26, 2024
1 parent f4b7027 commit 7aa5e4a
Show file tree
Hide file tree
Showing 5 changed files with 59 additions and 48 deletions.
5 changes: 5 additions & 0 deletions HISTORY.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,10 @@
# History

## 0.1.6 (03-26-2024)

- Updated encyclopedia.
- Migrated batch helper code.

## 0.1.5 (03-23-2024)

- Supports NM ports.
Expand Down
File renamed without changes.
File renamed without changes.
File renamed without changes.
102 changes: 54 additions & 48 deletions src/merakicat/mc_pedia.py
Original file line number Diff line number Diff line change
Expand Up @@ -67,8 +67,8 @@

mc_pedia = {

'version': "v0.1.1",
'dated': "03/22/2024",
'version': "v0.1.2",
'dated': "03/26/2024",

'switch': {

Expand Down Expand Up @@ -167,13 +167,15 @@

'mls':{
'name': "QoS",
'support':"",
'support':"",
'translatable':"",
'regex': '^mls',
'meraki': {
'skip': True
},
'iosxe': "mls = parse.find_objects('^mls')\n"
'iosxe': "mls = parse.find_objects('^mls')\n",
'url':"https://documentation.meraki.com/MS/Other_Topics/MS_Switch_Quality_of_Service_Defined",
'note':"Network-wide"
},

'rstp':{
Expand Down Expand Up @@ -251,7 +253,9 @@
'meraki': {
'skip': True
},
'iosxe': "access_list = parse.find_objects('^access-list')\n"
'iosxe': "access_list = parse.find_objects('^access-list')\n",
'url':"https://documentation.meraki.com/MS/Access_Control/Meraki_MS_Group_Policy_Access_Control_Lists",
'note':"Group Policies"
},

'extended_access_list':{
Expand All @@ -262,7 +266,9 @@
'meraki': {
'skip': True
},
'iosxe': "extended_access_list = parse.find_objects('^ip\saccess-list')\n"
'iosxe': "extended_access_list = parse.find_objects('^ip\saccess-list')\n",
'url':"https://documentation.meraki.com/MS/Access_Control/Meraki_MS_Group_Policy_Access_Control_Lists",
'note':"Group Policies"
},

'port_mirror':{
Expand All @@ -289,17 +295,30 @@
'note':"Built in Meraki dashboard"
},

'802.1x':{
'name': "802.1x",
'support': "✓",
'translatable':"",
'regex': '^aaa authentication dot1x',
'meraki': {
'skip': True
},
'iosxe': "802.1x = parse.find_objects('^aaa authentication dot1x')\n",
'url':"https://documentation.meraki.com/MS/Access_Control/MS_Switch_Access_Policies_(802.1X)",
'note':"Network-wide"
},

'netflow':{
'name': "NetFlow",
'support':"",
'support':"",
'translatable':"",
'regex': '^flow\sexporter',
'meraki': {
'skip': True
},
'iosxe': "netflow = parse.find_objects('^flow\sexporter')\n",
'url':"https://documentation.meraki.com/MX/Monitoring_and_Reporting/NetFlow_Overview",
'note':"Currently supported on MX only"
'url':"https://documentation.meraki.com/MS/Monitoring_and_Reporting/MS_NetFlow_and_Encrypted_Traffic_Analytics",
'note':"Network-wide"
},

'dhcp':{
Expand Down Expand Up @@ -327,25 +346,14 @@
},

'radius':{
'name':"radius",
'support':"",
'translatable':"",
'regex': '^radius-server',
'meraki': {
'skip': True
},
'iosxe':"radius = parse.find_objects('^radius-server')\n"
},

'radius2':{
'name':"radius",
'support':"",
'name':"Radius",
'support':"✓",
'translatable':"",
'regex': '^radius\sserver',
'regex': '^radius-server|^radius\sserver',
'meraki': {
'skip': True
},
'iosxe':"radius2 = parse.find_objects('^radius\sserver')\n"
'iosxe':"radius = parse.find_objects('^radius-server|^radius\sserver')\n"
},

'http_server':{
Expand All @@ -358,7 +366,7 @@
},
'iosxe': "http_server = parse.find_objects('^ip\shttp')\n",
'url':"https://documentation.meraki.com/MS",
'note':"Not Supported"
'note':"Not required"
},

'stack':{
Expand Down Expand Up @@ -454,14 +462,15 @@

'dhcp_snooping':{
'name': "DHCP Snooping",
'support':"",
'support':"",
'translatable':"",
'regex': '^ip\sdhcp\ssnooping',
'meraki': {
'skip': True
},
'iosxe': "dhcp_snooping = parse.find_objects('ip\sdhcp\ssnooping')\n",
'note':"Not Supported"
'url':"https://documentation.meraki.com/MS/Other_Topics/Dynamic_ARP_Inspection",
'note':"Network-wide"
},

'ip_source_guard':{
Expand All @@ -477,13 +486,15 @@

'arp_inspection':{
'name': "ARP Inspection",
'support':"",
'support':"",
'translatable':"",
'regex': '^ip\sarp\sinspection',
'meraki': {
'skip': True
},
'iosxe': "arp_inspection = parse.find_objects('^ip\sarp\sinspection')\n"
'iosxe': "arp_inspection = parse.find_objects('^ip\sarp\sinspection')\n",
'url':"https://documentation.meraki.com/MS/Other_Topics/Dynamic_ARP_Inspection",
'note':"Network-wide"
},

'arp_acl':{
Expand Down Expand Up @@ -558,12 +569,14 @@
'meraki': {
'skip': True
},
'iosxe': "multicast_igmp = parse.find_objects('^ip\sigmp')\n"
'iosxe': "multicast_igmp = parse.find_objects('^ip\sigmp')\n",
'url':"https://documentation.meraki.com/MS",
'note':"Configured by default"
},

'multicast_pim':{
'name': "Multicast PIM",
'support':"",
'support':"",
'translatable':"",
'regex': '^ip\spim',
'meraki': {
Expand Down Expand Up @@ -644,7 +657,7 @@

'ospf':{
'name': "OSPFv2",
'support':"",
'support':"",
'translatable':"",
'regex': '^router ospf',
'meraki': {
Expand Down Expand Up @@ -1021,24 +1034,15 @@

'portfast': {
'name': "STP Portfast",
'support':"",
'translatable':"",
'support':"",
'translatable':"",
'regex': r'\sspanning-tree\sportfast?(\S.*)',
'meraki': {
'skip': True
},
'iosxe': "portfast = child.re_match_typed(regex=r'\sspanning-tree\sportfast?(\S.*)')\n"
},

'flex_links': {
'name': "Flex Links",
'support':"",
'translatable':"",
'regex': r'\sswitchport\sbackup\sinterface?(\S.*)',
'meraki': {
'skip': True
},
'iosxe': "flex_links = child.re_match_typed(regex=r'\sswitchport\sbackup\sinterface?(\S.*)')\n"
'iosxe': "portfast = child.re_match_typed(regex=r'\sspanning-tree\sportfast?(\S.*)')\n",
'url':"https://documentation.meraki.com/MS/Deployment_Guides/Advanced_MS_Setup_Guide",
'note':"Automatic Edge Port"
},

'storm_control': {
Expand All @@ -1056,13 +1060,15 @@

'protected': {
'name': "Protected",
'support':"",
'support':"",
'translatable':"",
'regex': r'\sswitchport\sprotected?(\S.*)',
'meraki': {
'skip': True
},
'iosxe': "protected = child.re_match_typed(regex=r'\sswitchport\sprotected?(\S.*)')\n"
'iosxe': "protected = child.re_match_typed(regex=r'\sswitchport\sprotected?(\S.*)')\n",
'url':"https://documentation.meraki.com/MS/Port_and_VLAN_Configuration/Restricting_Traffic_with_Isolated_Switch_Ports",
'note':"Port Isolation"
},

'port_security': {
Expand Down

0 comments on commit 7aa5e4a

Please sign in to comment.