#904 add FortiOS SSH collector implementation from @jpvelders

This commit is contained in:
Oliver Gorwits
2022-08-02 22:14:08 +01:00
parent 005acc40a5
commit 5cc876e229
2 changed files with 124 additions and 0 deletions

View File

@@ -1,3 +1,9 @@
2.053001 - 2022-08-02
[NEW FEATURES]
* #904 add FortiOS SSH collector implementation from @jpvelders
2.053000 - 2022-08-02
[NEW FEATURES]

View File

@@ -0,0 +1,118 @@
package App::Netdisco::SSHCollector::Platform::FortiOS;
=head1 NAME
App::Netdisco::SSHCollector::Platform::FortiOS
=head1 DESCRIPTION
Collect ARP entries from Fortinet FortiOS Fortigate devices.
=cut
use strict;
use warnings;
use Dancer ':script';
use Moo;
use Expect;
=head1 PUBLIC METHODS
=over 4
=item B<arpnip($host, $ssh)>
Retrieve ARP entries from device. C<$host> is the hostname or IP address
of the device. C<$ssh> is a Net::OpenSSH connection to the device.
If a post-login banner needs to be accepted, please set C<$banner> to true.
Returns a list of hashrefs in the format C<< { mac => MACADDR, ip => IPADDR } >>.
=back
=cut
sub arpnip {
my ($self, $hostlabel, $ssh, $args) = @_;
debug "$hostlabel $$ arpnip()";
my ($pty, $pid) = $ssh->open2pty;
unless ($pty) {
warn "unable to run remote command [$hostlabel] " . $ssh->error;
return ();
}
#$Expect::Debug = 1;
#$Expect::Exp_Internal = 1;
my $expect = Expect->init($pty);
$expect->raw_pty(1);
my ($pos, $error, $match, $before, $after);
my $prompt = qr/ [\$#] +$/;
my $timeout = 10;
if ($args->{banner}) {
my $banner = qr/^\(Press 'a' to accept\):/;
($pos, $error, $match, $before, $after) = $expect->expect($timeout, -re, $banner);
$expect->send("a");
}
($pos, $error, $match, $before, $after) = $expect->expect($timeout, -re, $prompt);
# IPv4 ARP
##########
$expect->send("get system arp\n");
($pos, $error, $match, $before, $after) = $expect->expect($timeout, -re, $prompt);
my @arpentries;
my @data = split(/\R/, $before);
# fortigate # get system arp
# Address Age(min) Hardware Addr Interface
# 2.6.0.5 0 00:40:46:f9:63:0f PLAY-0400
# 1.2.9.7 2 00:30:59:bc:f6:94 DEAD-3550
foreach (@data) {
my ($ip, $age, $mac, $iface) = split(/\s+/);
if ($ip && $ip =~ m/(\d{1,3}\.){3}\d{1,3}/
&& $mac =~ m/([0-9a-f]{2}\:){5}[0-9a-f]{2}/i) {
push(@arpentries, { ip => $ip, mac => $mac });
}
}
# IPv6 ND
##########
$expect->send("diagnose ipv6 neighbor-cache list\n");
($pos, $error, $match, $before, $after) = $expect->expect($timeout, -re, $prompt);
@data = split(/\R/, $before);
# fortigate # diagnose ipv6 neighbor-cache list
# ifindex=403 ifname=WORK-4016 fe80::abcd:1234:dead:f00d ab:cd:ef:01:23:45 state=00000004 use=42733 confirm=42733 update=41100 ref=3
# ifindex=67 ifname=PLAY-4036 ff02::16 33:33:00:00:00:16 state=00000040 use=4765 confirm=10765 update=4765 ref=0
# ifindex=28 ifname=root :: 00:00:00:00:00:00 state=00000040 use=589688110 confirm=589694110 update=589688110 ref=1
# ifindex=48 ifname=FUN-4024 2001:42:1234:fe80:1234:1234:1234:1234 b0:c1:e2:f3:a4:b5 state=00000008 use=12 confirm=2 update=12 ref=2
foreach (@data) {
my ($ifindex, $ifname, $ip, $mac, $state, $use, $confirm, $update, $ref) = split(/\s+/);
if ($ip && $ip =~ m/[0-9a-f]{0,4}:([0-9a-f]{0,4}:){0,6}:[0-9a-f]{0,4}/
&& $mac =~ m/([0-9a-f]{2}\:){5}[0-9a-f]{2}/i) {
push(@arpentries, { ip => $ip, mac => $mac });
}
}
$expect->send("exit\n");
$expect->soft_close();
return @arpentries;
}
1;