If the switch would get too much to maintain, if there are many cases, then you could do a similar thing with a hash, with the command line arg being the key in the hash. as far as i know this is not a bad thing to do, as you're not using the arg to construct a variable name as such.
you mention using external commands to "heal" hosts. from a systems engineer point of view, this is quite dangerous, unless you can categorically rule out all other possibilities for causing a particular pattern of behavior by the hosts. and said patterns sometimes unexpectedly change etc. so plenty of defensive programming is usually necessitated. and be prepared for this kind of thing never being 100%, as it can sometimes cause more problems than it fixes.
anyway, have fun
the hardest line to type correctly is: stty erase ^H