ciscoasav-vm
gehoumi/ciscoasav-vm/google
Terraform module to deploy Cisco ASAv on GCP
  Automated Cisco ASAv deployment on GCP with Terraform Terraform module to deploy Cisco Adaptive Security Virtual Appliance (ASAv) on Google Cloud Platform (GCP) for remote access IPSec/SSL VPN clients. The ASAv runs the same software as physical Cisco ASAs and can be deployed in the public GCP cloud Project. It can then be configured as a VPN concentrator to connect to the private cloud workloads, or can be used for IPSec site-to-site, etc. The ASAv in this module requires a minimum of 3 interfaces. The module will deploy the ASAv in GCP with 3 interfaces and minimal configuration. This module will: - Creat
| Name | Type | Description | Default |
|---|---|---|---|
| project_id | string | The ID of the Project to which the resources belong | required |
| labels | map(string) | Key-value map of labels to assign to the ASAv instance | {} |
| disk_labels | map(string) | Labels to be assigned to boot disk, provided as a map | {} |
| vpn_pool_reserve_start_ip | number | The number of IPs to be reserved from the start of VPN pool. Default is not to r | 1 |
| machine_type | string | Instance type for the ASAv instance | "n2-standard-4" |
| source_image | string | Image of the ASAv which is to be used in the project. GCP public URL image f | "cisco-asav-9-19-1" |
| smart_account_registration_token | string | The Smart Account registration token ID to activate the license | "" |
| admin_password | string | ASAv administrator password | null |
| enable_password | string | The ASAv enable password | null |
| name | string | The hostname to assign to the Cisco ASAv | "ciscoasav-1" |
| subnetwork_names | object({ mgmt = string | The name of the required subnetworks, The subnetworks must below to the VPC mana | null |
| public_static_ips | object({ mgmt = string | The existing public static IPs to use on the ASAv mgmt and outside interfaces. B | null |
| service_account_email | string | Email of Service Account for running instance. Default is to use google managed | null |
| scopes | list(string) | [
"https://www.googleapis.com/auth/clo | |
| disk_size_gb | string | Boot disk size in GB | "10" |
| ssh_key | string | The SSH public key to use to login to the instance. The maximum keysize is 204 | "" |
| throughput_level | map(string) | The throughput level based on the instance size, the maximum supported vCPUs is | {
"n2-standard-16": "10G",
"n2-stand |
| zone | string | The zone to construct the ASAv resources in | "us-central1-a" |
| public_ip_whitelist_mgmt_access | list(string) | List of Public IP address to that need to manage ASAv instance. Default is your | null |
| gcp_private_supernet_cidr | string | The GCP private internal supernet that should be accessible by the remote anycon | "10.0.0.0/8" |
| vpn_pool_cidr | string | The VPN Pool CIDR network to assign the remote anyconnect VPN clients | "10.100.0.0/24" |
hostname — Host name of the ASAvadmin_password — ASAv administrator passwordasa_external_mgmt_ip — address value create for external mgmt accessasa_external_outside_ip — address value create for external outsideworkstation_public_ip — Public IP of the workstation where to run the moduleAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,