Note
This plugin is part of the fortinet.fortimanager collection (version 2.1.3).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortimanager
.
To use it in a playbook, specify: fortinet.fortimanager.fmgr_pkg_firewall_policy6
.
New in version 2.10: of fortinet.fortimanager
Parameter | Choices/Defaults | Comments | |
---|---|---|---|
adom string / required | the parameter (adom) in requested url | ||
bypass_validation boolean |
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters | |
enable_log boolean |
| Enable/Disable logging for task | |
pkg string / required | the parameter (pkg) in requested url | ||
pkg_firewall_policy6 dictionary | the top level parameters set | ||
action string |
| Policy action (allow/deny/ipsec). | |
anti-replay string |
| Enable/disable anti-replay check. | |
app-category string | Application category ID list. | ||
app-group string | Application group names. | ||
application integer | no description | ||
application-list string | Name of an existing Application list. | ||
auto-asic-offload string |
| Enable/disable policy traffic ASIC offloading. | |
av-profile string | Name of an existing Antivirus profile. | ||
cifs-profile string | Name of an existing CIFS profile. | ||
comments string | Comment. | ||
custom-log-fields string | Log field index numbers to append custom log fields to log messages for this policy. | ||
decrypted-traffic-mirror string | Decrypted traffic mirror. | ||
devices string | Names of devices or device groups that can be matched by the policy. | ||
diffserv-forward string |
| Enable to change packets DiffServ values to the specified diffservcode-forward value. | |
diffserv-reverse string |
| Enable to change packets reverse (reply) DiffServ values to the specified diffservcode-rev value. | |
diffservcode-forward string | Change packets DiffServ to this value. | ||
diffservcode-rev string | Change packets reverse (reply) DiffServ to this value. | ||
dlp-sensor string | Name of an existing DLP sensor. | ||
dnsfilter-profile string | Name of an existing DNS filter profile. | ||
dscp-match string |
| Enable DSCP check. | |
dscp-negate string |
| Enable negated DSCP match. | |
dscp-value string | DSCP value. | ||
dsri string |
| Enable DSRI to ignore HTTP server responses. | |
dstaddr string | Destination address and address group names. | ||
dstaddr-negate string |
| When enabled dstaddr specifies what the destination address must NOT be. | |
dstintf string | Outgoing (egress) interface. | ||
emailfilter-profile string | Name of an existing email filter profile. | ||
firewall-session-dirty string |
| How to handle sessions if the configuration of this firewall policy changes. | |
fixedport string |
| Enable to prevent source NAT from changing a sessions source port. | |
fsso-groups string | Names of FSSO groups. | ||
global-label string | Label for the policy that appears when the GUI is in Global View mode. | ||
groups string | Names of user groups that can authenticate with this policy. | ||
http-policy-redirect string |
| Redirect HTTP(S) traffic to matching transparent web proxy policy. | |
icap-profile string | Name of an existing ICAP profile. | ||
inbound string |
| Policy-based IPsec VPN: only traffic from the remote network can initiate a VPN. | |
inspection-mode string |
| Policy inspection mode (Flow/proxy). Default is Flow mode. | |
ippool string |
| Enable to use IP Pools for source NAT. | |
ips-sensor string | Name of an existing IPS sensor. | ||
label string | Label for the policy that appears when the GUI is in Section View mode. | ||
logtraffic string |
| Enable or disable logging. Log all sessions or security profile sessions. | |
logtraffic-start string |
| Record logs when a session starts and ends. | |
mms-profile string | Name of an existing MMS profile. | ||
name string | Policy name. | ||
nat string |
| Enable/disable source NAT. | |
natinbound string |
| Policy-based IPsec VPN: apply destination NAT to inbound traffic. | |
natoutbound string |
| Policy-based IPsec VPN: apply source NAT to outbound traffic. | |
np-accelation string |
| Enable/disable UTM Network Processor acceleration. | |
np-acceleration string |
| Enable/disable UTM Network Processor acceleration. | |
outbound string |
| Policy-based IPsec VPN: only traffic from the internal network can initiate a VPN. | |
per-ip-shaper string | Per-IP traffic shaper. | ||
policyid integer | Policy ID. | ||
poolname string | IP Pool names. | ||
profile-group string | Name of profile group. | ||
profile-protocol-options string | Name of an existing Protocol options profile. | ||
profile-type string |
| Determine whether the firewall policy allows security profile groups or single profiles only. | |
replacemsg-override-group string | Override the default replacement message group for this policy. | ||
rsso string |
| Enable/disable RADIUS single sign-on (RSSO). | |
schedule string | Schedule name. | ||
send-deny-packet string |
| Enable/disable return of deny-packet. | |
service string | Service and service group names. | ||
service-negate string |
| When enabled service specifies what the service must NOT be. | |
session-ttl integer | Session TTL in seconds for sessions accepted by this policy. 0 means use the system default session TTL. | ||
spamfilter-profile string | Name of an existing Spam filter profile. | ||
srcaddr string | Source address and address group names. | ||
srcaddr-negate string |
| When enabled srcaddr specifies what the source address must NOT be. | |
srcintf string | Incoming (ingress) interface. | ||
ssh-filter-profile string | Name of an existing SSH filter profile. | ||
ssh-policy-redirect string |
| Redirect SSH traffic to matching transparent proxy policy. | |
ssl-mirror string |
| Enable to copy decrypted SSL traffic to a FortiGate interface (called SSL mirroring). | |
ssl-mirror-intf string | SSL mirror interface name. | ||
ssl-ssh-profile string | Name of an existing SSL SSH profile. | ||
status string |
| Enable or disable this policy. | |
tags string | Names of object-tags applied to this policy. | ||
tcp-mss-receiver integer | Receiver TCP maximum segment size (MSS). | ||
tcp-mss-sender integer | Sender TCP maximum segment size (MSS). | ||
tcp-session-without-syn string |
| Enable/disable creation of TCP session without SYN flag. | |
timeout-send-rst string |
| Enable/disable sending RST packets when TCP sessions expire. | |
tos string | ToS (Type of Service) value used for comparison. | ||
tos-mask string | Non-zero bit positions are used for comparison while zero bit positions are ignored. | ||
tos-negate string |
| Enable negated TOS match. | |
traffic-shaper string | Reverse traffic shaper. | ||
traffic-shaper-reverse string | Reverse traffic shaper. | ||
url-category string | URL category ID list. | ||
users string | Names of individual users that can authenticate with this policy. | ||
utm-status string |
| Enable AV/web/ips protection profile. | |
uuid string | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). | ||
vlan-cos-fwd integer | VLAN forward direction user priority: 255 passthrough, 0 lowest, 7 highest | ||
vlan-cos-rev integer | VLAN reverse direction user priority: 255 passthrough, 0 lowest, 7 highest | ||
vlan-filter string | Set VLAN filters. | ||
voip-profile string | Name of an existing VoIP profile. | ||
vpntunnel string | Policy-based IPsec VPN: name of the IPsec VPN Phase 1. | ||
waf-profile string | Name of an existing Web application firewall profile. | ||
webcache string |
| Enable/disable web cache. | |
webcache-https string |
| Enable/disable web cache for HTTPS. | |
webfilter-profile string | Name of an existing Web filter profile. | ||
webproxy-forward-server string | Web proxy forward server name. | ||
webproxy-profile string | Webproxy profile name. | ||
proposed_method string |
| The overridden method for the underlying Json RPC request | |
rc_failed list / elements=string | the rc codes list with which the conditions to fail will be overriden | ||
rc_succeeded list / elements=string | the rc codes list with which the conditions to succeed will be overriden | ||
state string / required |
| the directive to create, update or delete an object | |
workspace_locking_adom string | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root | ||
workspace_locking_timeout integer | Default: 300 | the maximum time in seconds to wait for other user to release the workspace lock |
Note
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: Configure IPv6 policies. fmgr_pkg_firewall_policy6: bypass_validation: False workspace_locking_adom: <value in [global, custom adom including root]> workspace_locking_timeout: 300 rc_succeeded: [0, -2, -3, ...] rc_failed: [-2, -3, ...] adom: <your own value> pkg: <your own value> state: <value in [present, absent]> pkg_firewall_policy6: action: <value in [deny, accept, ipsec, ...]> app-category: <value of string> application: <value of integer> application-list: <value of string> auto-asic-offload: <value in [disable, enable]> av-profile: <value of string> comments: <value of string> custom-log-fields: <value of string> devices: <value of string> diffserv-forward: <value in [disable, enable]> diffserv-reverse: <value in [disable, enable]> diffservcode-forward: <value of string> diffservcode-rev: <value of string> dlp-sensor: <value of string> dscp-match: <value in [disable, enable]> dscp-negate: <value in [disable, enable]> dscp-value: <value of string> dsri: <value in [disable, enable]> dstaddr: <value of string> dstaddr-negate: <value in [disable, enable]> dstintf: <value of string> firewall-session-dirty: <value in [check-all, check-new]> fixedport: <value in [disable, enable]> global-label: <value of string> groups: <value of string> icap-profile: <value of string> inbound: <value in [disable, enable]> ippool: <value in [disable, enable]> ips-sensor: <value of string> label: <value of string> logtraffic: <value in [disable, enable, all, ...]> logtraffic-start: <value in [disable, enable]> mms-profile: <value of string> name: <value of string> nat: <value in [disable, enable]> natinbound: <value in [disable, enable]> natoutbound: <value in [disable, enable]> np-accelation: <value in [disable, enable]> outbound: <value in [disable, enable]> per-ip-shaper: <value of string> policyid: <value of integer> poolname: <value of string> profile-group: <value of string> profile-protocol-options: <value of string> profile-type: <value in [single, group]> replacemsg-override-group: <value of string> rsso: <value in [disable, enable]> schedule: <value of string> send-deny-packet: <value in [disable, enable]> service: <value of string> service-negate: <value in [disable, enable]> session-ttl: <value of integer> spamfilter-profile: <value of string> srcaddr: <value of string> srcaddr-negate: <value in [disable, enable]> srcintf: <value of string> ssl-mirror: <value in [disable, enable]> ssl-mirror-intf: <value of string> ssl-ssh-profile: <value of string> status: <value in [disable, enable]> tags: <value of string> tcp-mss-receiver: <value of integer> tcp-mss-sender: <value of integer> tcp-session-without-syn: <value in [all, data-only, disable]> timeout-send-rst: <value in [disable, enable]> traffic-shaper: <value of string> traffic-shaper-reverse: <value of string> url-category: <value of string> users: <value of string> utm-status: <value in [disable, enable]> uuid: <value of string> vlan-cos-fwd: <value of integer> vlan-cos-rev: <value of integer> voip-profile: <value of string> vpntunnel: <value of string> webfilter-profile: <value of string> anti-replay: <value in [disable, enable]> app-group: <value of string> cifs-profile: <value of string> dnsfilter-profile: <value of string> emailfilter-profile: <value of string> http-policy-redirect: <value in [disable, enable]> inspection-mode: <value in [proxy, flow]> np-acceleration: <value in [disable, enable]> ssh-filter-profile: <value of string> ssh-policy-redirect: <value in [disable, enable]> tos: <value of string> tos-mask: <value of string> tos-negate: <value in [disable, enable]> vlan-filter: <value of string> waf-profile: <value of string> webcache: <value in [disable, enable]> webcache-https: <value in [disable, enable]> webproxy-forward-server: <value of string> webproxy-profile: <value of string> fsso-groups: <value of string> decrypted-traffic-mirror: <value of string>
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
request_url string | always | The full url requested Sample: /sys/login/user |
response_code integer | always | The status of api request |
response_message string | always | The descriptive message of the api response Sample: OK. |
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/fortinet/fortimanager/fmgr_pkg_firewall_policy6_module.html