Skip to main content
Glama

build_range_from_scratch

Create custom cyber range configurations by defining VM specifications and network rules for security testing environments.

Instructions

Build a completely custom range configuration from scratch.

This tool allows you to create a range configuration with full control over every VM and network rule, not based on any existing scenario.

Args: vms: List of VM configurations (each with vm_name, hostname, template, vlan, ip_last_octet, ram_gb, cpus) network_rules: Optional list of network rules inter_vlan_default: Default inter-VLAN policy ("REJECT" or "ACCEPT") include_siem: Whether to automatically add a SIEM server siem_type: SIEM type if include_siem is True

Returns: Complete range configuration ready for deployment

Example: # Build a custom 3-VM pentesting lab from scratch vms = [ { "vm_name": "target-web-server", "hostname": "web01", "template": "ubuntu-22.04-template", "vlan": 10, "ip_last_octet": 10, "ram_gb": 4, "cpus": 2 }, { "vm_name": "target-database", "hostname": "db01", "template": "ubuntu-22.04-template", "vlan": 10, "ip_last_octet": 11, "ram_gb": 8, "cpus": 4 }, { "vm_name": "attacker-kali", "hostname": "kali", "template": "kali-x64-desktop-template", "vlan": 99, "ip_last_octet": 1, "ram_gb": 8, "cpus": 4 } ]

network_rules = [ { "name": "Allow attacker to targets", "vlan_src": 99, "vlan_dst": 10, "protocol": "all", "ports": "all", "action": "ACCEPT" } ] result = await build_range_from_scratch( vms=vms, network_rules=network_rules, include_siem=True, siem_type="wazuh" )

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
vmsYes
network_rulesNo
inter_vlan_defaultNoREJECT
include_siemNo
siem_typeNowazuh

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tjnull/Ludus-FastMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server