This playbook automatically manages 1:1 static NAT statements
within a specified VRF on Cisco IOS routers. This is a particularly
labor-intensive and error-prone task, and this playbook
ensures that the desired state of the NAT table is applied.
Non-VRF (global table) operations are also supported.
Contact information:
Email: njrusmc@gmail.com
Twitter: @nickrusso42518
Cisco IOS routers are supported today. Any router that is running NAT and
could benefit by having automated management of the NAT statements is a good
candidate.
Testing was conducted on the following platforms and versions:
Control machine information:
$ cat /etc/redhat-release
Red Hat Enterprise Linux Server release 7.4 (Maipo)
$ uname -a
Linux ip-10-125-0-100.ec2.internal 3.10.0-693.el7.x86_64 #1 SMP
Thu Jul 6 19:56:57 EDT 2017 x86_64 x86_64 x86_64 GNU/Linux
$ ansible --version
ansible 2.10.11
config file = /home/centos/code/natm/ansible.cfg
configured module search path = ['/home/centos/.ansible/plugins/modules',
'/usr/share/ansible/plugins/modules']
ansible python module location =
/home/centos/environments/ans3/lib/python3.7/site-packages/ansible
executable location = /home/centos/environments/ans3/bin/ansible
python version = 3.7.3 (default, Apr 28 2019, 11:01:35)
[GCC 4.8.5 20150623 (Red Hat 4.8.5-36)]
First and most simply, the group variables covering all NAT routers
contains the login information for network_cli
as well as whether
text file logging should be enabled via a Boolean log
flag.
These playbooks rely only on host_vars
which are defined for each router
within a given NAT line. Each NAT line must identify a unique name,
the inside private (inside local in Cisco speak), and outside public
(inside global in Cisco speak). All three fields are required. The
playbook checks the names and IPv4 addresses for uniqueness as a single
typo could cause significant issues on the production network. If invalid
input (e.g., malformed IPv4 addresses) or duplicate input (e.g., same
inside local in two places), the task fails for a given host.
Additionally, each NAT line must identify the target state. There are
two choices for this field, "present"
and "absent"
, which are should
be self-evident. A sample host_vars
file is shown below. The vrf
option can be set to false
(without the quotes) or a string. When
false is used, the global table is assumed. When any non-empty string is
used, that string is the VRF name. An empty string yields an error.
Note that the playbook does not create or modify VRFs. These should
be pre-existing VRFs, otherwise the playbook with not work correctly.
For simplicity, the VRF is defined globally and applies to all NAT entries.
If there are multiple VRFs with multiple NATs per VRF, simply create
additional variables files and run the playbook again. Below is an example of
a host_vars
file.
Two other minor variables are also defined. save_when
is just a wrapper for
the ios_command
option that determines when to save configuration changes.
ci_test
is a true/false variable that specifies when a host should actually
log into routers and manage NAT statements (false
) or should use mocked
data for local testing only (true
). Mock data files can be found in
tasks/mock_<hostname>.yml
.
---
vrf: "TEST" # or false to signify global NAT
static_nats:
- name: "TEST_1"
state: "present"
inside_private: "192.168.0.1"
outside_public: "100.64.0.1"
- name: "TEST_2"
state: "absent"
inside_private: "192.168.0.2"
outside_public: "100.64.0.2"
- name: "TEST_3"
state: "present"
inside_private: "192.168.0.3"
outside_public: "100.64.0.3"
...
The Jinja2 templates are heavily commented for readability and are used to
develop host specific configurations based on the previously defined variables.
The templates should not be changed at the operator level.
One locally-scoped variable is used in the manage_nat.j2
template.
nat_cmd_prefix
contains the ip nat name (name)
string which simplifies
addition and removal. Ultimately, this keeps the template clean and readable.
The template contains a loop which iterates over the static_nats
list. One
of two actions will occur:
Removal is slightly simpler since NAT rules are referenced by name only
for deletion. Relying on the build-in idempotent functionality of the
ios_config
module could have reduced the playbook complexity a little,
however it is preferable to actually check the NAT state table rather than
only rely on the presence or absence of a configuration line. As such, this
playbook adds complexity but provides a more comprehensive and accurate
assessment of the current NAT state.
A second template is for logging. Since this playbook is idempotent, logging
changes is useful to identify what changed, when, and on which device. When
changes occur, the task that manages the NAT configurations shows "changed"
and thus can notify handlers. These log messages are printed to stdout
and to a log file in the format <hostname>.txt
. The LOG_PATH
variable computed by the control machine earlier in the playbook
will contain a datetime group (DTG) in the directory name. For example:
natm_20180115T183845/csr1.txt
.
The network device hostname and DTG are also written in the text of the
log to make it easy to bookmark certain events during concatenation.
The output below illustrates the use of cat
and the value of
these text labels.
$ tree --charset=ascii logs/
logs/
|-- natm_20210630T125235
| |-- csr1.txt
| `-- csr2.txt
`-- natm_20210630T125423
`-- csr2.txt
$ find logs/ -name "*.txt" | sort | xargs cat
! BEGIN csr1 @ 20210630T125235
no ip nat name TEST_1
ip nat name TEST_2 inside source static 192.168.1.2 100.64.1.2
! END csr1 @ 20210630T125235
! BEGIN csr2 @ 20210630T125235
no ip nat name TEST_1
ip nat name TEST_2 inside source static 192.168.2.2 100.64.2.2 vrf CUST_A
! END csr2 @ 20210630T125235
! BEGIN csr2 @ 20210630T125423
ip nat name TEST_1 inside source static 192.168.2.1 100.64.2.1 vrf CUST_A
no ip nat name TEST_2
! END csr2 @ 20210630T125423
This example shows how organizations can leverage network automation to better manage static NAT translations for higher reliability and fewer errors. The playbook ensures that the correct state of the NAT table is applied. Non-VRF (global table) operations are also supported.
To use this use case you need:
Owner
Contributors
Categories
Products
Catalyst RoutersProgramming Languages
ShellJinjaLicense
Code Exchange Community
Get help, share code, and collaborate with other developers in the Code Exchange community.View Community