Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

#784-cisco_asa_show_running-config_all_crypto_map.textfsm #883

Conversation

diepes
Copy link
Contributor

@diepes diepes commented Mar 10, 2021

add raw and test,
split var SA into SA_SEC, SA_KB
match new TFC_PACKETS
fix isakmp_dynamic match

ISSUE TYPE
  • Bugfix Pull Request
  • Additional Testing
COMPONENT

cisco_asa_show_running-config_all_crypto_map
(Fix for New template in same Issue784, requester provided new raw/test )

SUMMARY

Current test updated, the template was created for Issue #784, this PR includes additional raw sample provided in #784 for further corner cases where SA (Security Association) can have KB limit in addition to Seconds.

Breaking: Split var SA into SA_SEC and SA_KB

Make crypto map block detection more reliable by using non capture match with "-> Continue.Record"

Fix bug where single entry got lumped with following block.
From tests/.../cisco_asa_show_running-config_all_crypto_map.raw crypto map WAN1_CMAP 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
after fix the line above results in own block.


add raw and test,
split var SA into SA_SEC, SA_KB
match new TFC_PACKETS
fix isakmp_dynamic match
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants