fmgr_pkg_firewall_hyperscalepolicy – Configure IPv4/IPv6 policies.
Added in version 2.2.0.
Warning
Starting in version 3.0.0, all input arguments will be named using the underscore naming convention (snake_case).
Argument name before 3.0.0:
var-name
,var name
,var.name
New argument name starting in 3.0.0:
var_name
FortiManager Ansible v2.4+ supports both previous argument name and new underscore name. You will receive deprecation warnings if you keep using the previous argument name. You can ignore the warning by setting deprecation_warnings=False in ansible.cfg.
Synopsis
This module is able to configure a FortiManager device.
Examples include all parameters and values need to be adjusted to data sources before usage.
Tested with FortiManager v7.x.
Requirements
The below requirements are needed on the host that executes this module.
ansible>=2.15.0
FortiManager Version Compatibility
Supported Version Ranges: v6.4.7 -> v6.4.15
, v7.0.1 -> v7.2.0
, v7.2.6 -> v7.2.8
, v7.4.3 -> latest
Parameters
- access_token -The token to access FortiManager without using username and password. type: str required: false
- bypass_validation - Only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters. type: bool required: false default: False
- enable_log - Enable/Disable logging for task. type: bool required: false default: False
- forticloud_access_token - Access token of forticloud managed API users, this option is available with FortiManager later than 6.4.0. type: str required: false
- proposed_method - The overridden method for the underlying Json RPC request. type: str required: false choices: set, update, add
- rc_succeeded - The rc codes list with which the conditions to succeed will be overriden. type: list required: false
- rc_failed - The rc codes list with which the conditions to fail will be overriden. type: list required: false
- state - The directive to create, update or delete an object type: str required: true choices: present, absent
- workspace_locking_adom - Acquire the workspace lock if FortiManager is running in workspace mode. type: str required: false choices: global, custom adom including root
- workspace_locking_timeout - The maximum time in seconds to wait for other users to release workspace lock. type: integer required: false default: 300
- adom - The parameter in requested url type: str required: true
- pkg - The parameter in requested url type: str required: true
- pkg_firewall_hyperscalepolicy - Configure IPv4/IPv6 policies. type: dict
- action Policy action (accept/deny/ipsec). type: str choices: [deny, accept] more...
- auto_asic_offload (Alias name: auto-asic-offload) Enable/disable policy traffic asic offloading. type: str choices: [disable, enable] more...
- cgn_eif (Alias name: cgn-eif) Enable/disable cgn endpoint independent filtering. type: str choices: [disable, enable] more...
- cgn_eim (Alias name: cgn-eim) Enable/disable cgn endpoint independent mapping type: str choices: [disable, enable] more...
- cgn_log_server_grp (Alias name: cgn-log-server-grp) Np log server group name type: str more...
- cgn_resource_quota (Alias name: cgn-resource-quota) Resource quota type: int more...
- cgn_session_quota (Alias name: cgn-session-quota) Session quota type: int more...
- comments Comment. type: str more...
- delay_tcp_npu_session (Alias name: delay-tcp-npu-session) Enable tcp npu session delay to guarantee packet order of 3-way handshake. type: str choices: [disable, enable] more...
- dstaddr Destination ipv4 address and address group names. type: list or str more...
- dstaddr_negate (Alias name: dstaddr-negate) When enabled dstaddr/dstaddr6 specifies what the destination address must not be. type: str choices: [disable, enable] more...
- dstaddr6 Destination ipv6 address name and address group names. type: list or str more...
- dstintf Outgoing (egress) interface. type: list or str more...
- firewall_session_dirty (Alias name: firewall-session-dirty) How to handle sessions if the configuration of this firewall policy changes. type: str choices: [check-all, check-new] more...
- global_label (Alias name: global-label) Label for the policy that appears when the gui is in global view mode. type: str more...
- ippool Enable to use ip pools for source nat. type: str choices: [disable, enable] more...
- label Label for the policy that appears when the gui is in section view mode. type: str more...
- name Policy name. type: str more...
- nat Enable/disable source nat. type: str choices: [disable, enable] more...
- policy_offload (Alias name: policy-offload) Enable/disable hardware session setup for cgnat. type: str choices: [disable, enable] more...
- policyid Policy id (0 - 4294967294). type: int more...
- poolname Ip pool names. type: list or str more...
- poolname6 Ipv6 pool names. type: list or str more...
- send_deny_packet (Alias name: send-deny-packet) Enable to send a reply when a session is denied or blocked by a firewall policy. type: str choices: [disable, enable] more...
- service Service and service group names. type: list or str more...
- service_negate (Alias name: service-negate) When enabled service specifies what the service must not be. type: str choices: [disable, enable] more...
- srcaddr Source ipv4 address and address group names. type: list or str more...
- srcaddr_negate (Alias name: srcaddr-negate) When enabled srcaddr/srcaddr6 specifies what the source address must not be. type: str choices: [disable, enable] more...
- srcaddr6 Source ipv6 address name and address group names. type: list or str more...
- srcintf Incoming (ingress) interface. type: list or str more...
- status Enable or disable this policy. type: str choices: [disable, enable] more...
- tcp_timeout_pid (Alias name: tcp-timeout-pid) Tcp timeout profile id type: str more...
- traffic_shaper (Alias name: traffic-shaper) Traffic shaper. type: str more...
- traffic_shaper_reverse (Alias name: traffic-shaper-reverse) Reverse traffic shaper. type: str more...
- udp_timeout_pid (Alias name: udp-timeout-pid) Udp timeout profile id type: str more...
- uuid Universally unique identifier (uuid; automatically assigned but can be manually reset). type: str more...
Notes
Note
Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace_locking_adom and workspace_locking_timeout help do the work.
To create or update an object, use state: present directive.
To delete an object, use state: absent directive
Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc_failed and rc_succeeded
Examples
- name: Example playbook (generated based on argument schema)
hosts: fortimanagers
connection: httpapi
vars:
ansible_httpapi_use_ssl: true
ansible_httpapi_validate_certs: false
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4/IPv6 policies.
fortinet.fortimanager.fmgr_pkg_firewall_hyperscalepolicy:
# bypass_validation: false
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
# rc_succeeded: [0, -2, -3, ...]
# rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: present # <value in [present, absent]>
pkg_firewall_hyperscalepolicy:
action: <value in [deny, accept]>
auto_asic_offload: <value in [disable, enable]>
cgn_eif: <value in [disable, enable]>
cgn_eim: <value in [disable, enable]>
cgn_log_server_grp: <string>
cgn_resource_quota: <integer>
cgn_session_quota: <integer>
comments: <string>
delay_tcp_npu_session: <value in [disable, enable]>
dstaddr: <list or string>
dstaddr_negate: <value in [disable, enable]>
dstaddr6: <list or string>
dstintf: <list or string>
firewall_session_dirty: <value in [check-all, check-new]>
global_label: <string>
ippool: <value in [disable, enable]>
label: <string>
name: <string>
nat: <value in [disable, enable]>
policy_offload: <value in [disable, enable]>
policyid: <integer>
poolname: <list or string>
poolname6: <list or string>
send_deny_packet: <value in [disable, enable]>
service: <list or string>
service_negate: <value in [disable, enable]>
srcaddr: <list or string>
srcaddr_negate: <value in [disable, enable]>
srcaddr6: <list or string>
srcintf: <list or string>
status: <value in [disable, enable]>
tcp_timeout_pid: <string>
traffic_shaper: <string>
traffic_shaper_reverse: <string>
udp_timeout_pid: <string>
uuid: <string>
Return Values
Common return values are documented: https://docs.ansible.com/ansible/latest/reference_appendices/common_return_values.html#common-return-values, the following are the fields unique to this module:
- meta - The result of the request.returned: always type: dict
- request_url - The full url requested. returned: always type: str sample: /sys/login/user
- response_code - The status of api request. returned: always type: int sample: 0
- response_data - The data body of the api response. returned: optional type: list or dict
- response_message - The descriptive message of the api response. returned: always type: str sample: OK
- system_information - The information of the target system. returned: always type: dict
- rc - The status the request. returned: always type: int sample: 0
- version_check_warning - Warning if the parameters used in the playbook are not supported by the current FortiManager version. returned: if at least one parameter not supported by the current FortiManager version type: list
Status
This module is not guaranteed to have a backwards compatible interface.