Note
This module is part of the cisco.meraki collection (version 2.21.4).
You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.meraki.
To use it in a playbook, specify: cisco.meraki.meraki_mx_intrusion_prevention.
version 3.0.0
Updated modules released with increased functionality
cisco.meraki.organizations_appliance_security_intrusion and cisco.meraki.networks_appliance_security_intrusion
Parameter | Comments |
|---|---|
allowed_rules list / elements=dictionary | List of IDs related to rules which are allowed for the organization. |
|
rule_id string |
ID of rule as defined by Snort. |
|
rule_message aliases: message_rule string added in cisco.meraki 2.3.0 |
Description of rule. This is overwritten by the API. Formerly |
auth_key string / required | Authentication key provided by the dashboard. Required if environmental variable |
host string | Hostname for Meraki dashboard. Can be used to access regional Meraki environments, such as China. Default: |
ids_rulesets string | Ruleset complexity setting. Choices:
|
internal_error_retry_time integer | Number of seconds to retry if server returns an internal server error. Default: |
mode string | Operational mode of Intrusion Prevention system. Choices:
|
net_id string | ID number of a network. |
net_name aliases: name, network string | Name of a network. |
org_id string | ID of organization. |
org_name aliases: organization string | Name of organization. |
output_format string | Instructs module whether response keys should be snake case (ex. Choices:
|
output_level string | Set amount of debug output during module execution. Choices:
|
protected_networks dictionary | Set included/excluded networks for Intrusion Prevention. |
|
excluded_cidr list / elements=string |
List of network IP ranges to exclude from scanning. |
|
included_cidr list / elements=string |
List of network IP ranges to include in scanning. |
|
use_default boolean |
Whether to use special IPv4 addresses per RFC 5735. Choices:
|
rate_limit_retry_time integer | Number of seconds to retry if rate limiter is triggered. Default: |
state string | Create or modify an organization. Choices:
|
timeout integer | Time to timeout for HTTP requests. Default: |
use_https boolean | If Only useful for internal Meraki developers. Choices:
|
use_proxy boolean | If Choices:
|
validate_certs boolean | Whether to validate HTTP certificates. Choices:
|
Note
ANSIBLE_MERAKI_FORMAT environment variable to camelcase.- name: Set whitelist for organization
meraki_intrusion_prevention:
auth_key: '{{ auth_key }}'
state: present
org_id: '{{ test_org_id }}'
allowed_rules:
- rule_id: "meraki:intrusion/snort/GID/01/SID/5805"
rule_message: Test rule
delegate_to: localhost
- name: Query IPS info for organization
meraki_intrusion_prevention:
auth_key: '{{ auth_key }}'
state: query
org_name: '{{ test_org_name }}'
delegate_to: localhost
register: query_org
- name: Set full ruleset with check mode
meraki_intrusion_prevention:
auth_key: '{{ auth_key }}'
state: present
org_name: '{{ test_org_name }}'
net_name: '{{ test_net_name }} - IPS'
mode: prevention
ids_rulesets: security
protected_networks:
use_default: true
included_cidr:
- 192.0.1.0/24
excluded_cidr:
- 10.0.1.0/24
delegate_to: localhost
- name: Clear rules from organization
meraki_intrusion_prevention:
auth_key: '{{ auth_key }}'
state: absent
org_name: '{{ test_org_name }}'
allowed_rules: []
delegate_to: localhost
Common return values are documented here, the following are the fields unique to this module:
Key | Description |
|---|---|
data complex | Information about the Threat Protection settings. Returned: success |
|
idsRulesets string |
Setting of selected ruleset. Returned: success, when network is queried or modified Sample: |
|
mode string |
Enabled setting of intrusion prevention. Returned: success, when network is queried or modified Sample: |
|
protectedNetworks complex |
Networks protected by IPS. Returned: success, when network is queried or modified |
|
excludedCidr string |
List of CIDR notiation networks to exclude from protection. Returned: success, when network is queried or modified Sample: |
|
includedCidr string |
List of CIDR notiation networks to protect. Returned: success, when network is queried or modified Sample: |
|
useDefault boolean |
Whether to use special IPv4 addresses. Returned: success, when network is queried or modified Sample: |
|
whitelistedRules complex |
List of whitelisted IPS rules. Returned: success, when organization is queried or modified |
|
rule_message string |
Description of rule. Returned: success, when organization is queried or modified Sample: |
|
ruleId string |
A rule identifier for an IPS rule. Returned: success, when organization is queried or modified Sample: |
© 2012–2018 Michael DeHaan
© 2018–2025 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/cisco/meraki/meraki_mx_intrusion_prevention_module.html