ciscoasav-vm

gehoumi/ciscoasav-vm/google

Terraform Module HCL GOOGLE

Terraform module to deploy Cisco ASAv on GCP

Install
module "ciscoasav-vm" {
source = "gehoumi/ciscoasav-vm/google"
version = "3.1.0"
}
plain text: /constructs/tfmod-gehoumi-ciscoasav-vm-google/install.txt
⭐ Source on GitHub 📦 Registry page
README

![published](https://developer.cisco.com/codeexchange/github/repo/gehoumi/terraform-google-ciscoasav-vm) ![Github tag](https://github.com/gehoumi/terraform-google-ciscoasav-vm/releases) Automated Cisco ASAv deployment on GCP with Terraform Terraform module to deploy Cisco Adaptive Security Virtual Appliance (ASAv) on Google Cloud Platform (GCP) for remote access IPSec/SSL VPN clients. The ASAv runs the same software as physical Cisco ASAs and can be deployed in the public GCP cloud Project. It can then be configured as a VPN concentrator to connect to the private cloud workloads, or can be used for IPSec site-to-site, etc. The ASAv in this module requires a minimum of 3 interfaces. The module will deploy the ASAv in GCP with 3 interfaces and minimal configuration. This module will: - Creat

Inputs (26)
NameTypeDescriptionDefault
project_idstringThe ID of the Project to which the resources belong required
labelsmap(string)Key-value map of labels to assign to the ASAv instance{}
disk_labelsmap(string)Labels to be assigned to boot disk, provided as a map{}
vpn_pool_reserve_start_ipnumberThe number of IPs to be reserved from the start of VPN pool. Default is not to r1
machine_typestringInstance type for the ASAv instance"n2-standard-4"
source_imagestring Image of the ASAv which is to be used in the project. GCP public URL image f"cisco-asav-9-19-1"
smart_account_registration_tokenstringThe Smart Account registration token ID to activate the license""
admin_passwordstringASAv administrator passwordnull
enable_passwordstringThe ASAv enable passwordnull
namestringThe hostname to assign to the Cisco ASAv"ciscoasav-1"
subnetwork_namesobject({ mgmt = string The name of the required subnetworks, The subnetworks must below to the VPC mananull
public_static_ipsobject({ mgmt = string The existing public static IPs to use on the ASAv mgmt and outside interfaces. Bnull
service_account_emailstringEmail of Service Account for running instance. Default is to use google managed null
scopeslist(string)[ "https://www.googleapis.com/auth/clo
disk_size_gbstringBoot disk size in GB"10"
ssh_keystring The SSH public key to use to login to the instance. The maximum keysize is 204""
throughput_levelmap(string)The throughput level based on the instance size, the maximum supported vCPUs is { "n2-standard-16": "10G", "n2-stand
zonestringThe zone to construct the ASAv resources in"us-central1-a"
public_ip_whitelist_mgmt_accesslist(string)List of Public IP address to that need to manage ASAv instance. Default is your null
gcp_private_supernet_cidrstringThe GCP private internal supernet that should be accessible by the remote anycon"10.0.0.0/8"
vpn_pool_cidrstringThe VPN Pool CIDR network to assign the remote anyconnect VPN clients"10.100.0.0/24"
Outputs (5)
hostname — Host name of the ASAv
admin_password — ASAv administrator password
asa_external_mgmt_ip — address value create for external mgmt access
asa_external_outside_ip — address value create for external outside
workstation_public_ip — Public IP of the workstation where to run the module
Resources (3)
google_compute_addressgoogle_compute_firewallgoogle_compute_instance
Details
FrameworkTerraform Module
LanguageHCL
Version3.1.0
Cloud GOOGLE
★ Stars1
Forks1
Total downloads4.5k
Inputs26
Outputs5
Resources3
Examples2
Submodules1
LicenseApache-2.0
Namespacegehoumi
Updated