[go: up one dir, main page]

Skip to content

Python code for extracting a csv file from firewall rules configuation

Notifications You must be signed in to change notification settings

mvl64/EdgeMax-firewall-rules-CSV-export

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 
 
 

Repository files navigation

This python script parses the "human readable" format of the Edgerouter configuration, file "/config/congif.boot" and outputs a CSV file listing all the firewall rules in the format:

"[rulesetname]-[interface]-[action], [rulesetname]-[interface]-[description]"

For example: GUEST_IN-10-D,GUEST_IN-Drop invalid state

This allows easy reporting in Splunk, using firewall rule names and descriptions, rather than cryptic codes (the first part of the line, before the comma)

NOTE: the script will first read the "previous version" of the firewall rules, and apply modifications to it, based on current config. This ensures old rules - deleted from the current configuration - can still be used in historical reports in Splunk

About

Python code for extracting a csv file from firewall rules configuation

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages