build_range_from_scratch
Create custom cyber range configurations by defining VM specifications and network rules for security testing environments.
Instructions
Build a completely custom range configuration from scratch.
This tool allows you to create a range configuration with full control over every VM and network rule, not based on any existing scenario.
Args: vms: List of VM configurations (each with vm_name, hostname, template, vlan, ip_last_octet, ram_gb, cpus) network_rules: Optional list of network rules inter_vlan_default: Default inter-VLAN policy ("REJECT" or "ACCEPT") include_siem: Whether to automatically add a SIEM server siem_type: SIEM type if include_siem is True
Returns: Complete range configuration ready for deployment
Example: # Build a custom 3-VM pentesting lab from scratch vms = [ { "vm_name": "target-web-server", "hostname": "web01", "template": "ubuntu-22.04-template", "vlan": 10, "ip_last_octet": 10, "ram_gb": 4, "cpus": 2 }, { "vm_name": "target-database", "hostname": "db01", "template": "ubuntu-22.04-template", "vlan": 10, "ip_last_octet": 11, "ram_gb": 8, "cpus": 4 }, { "vm_name": "attacker-kali", "hostname": "kali", "template": "kali-x64-desktop-template", "vlan": 99, "ip_last_octet": 1, "ram_gb": 8, "cpus": 4 } ]
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| vms | Yes | ||
| network_rules | No | ||
| inter_vlan_default | No | REJECT | |
| include_siem | No | ||
| siem_type | No | wazuh |