Note
This module is part of the fortinet.fortios collection (version 2.4.0).
You might already have this collection installed if you are using the ansible package. It is not included in ansible-core. To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install fortinet.fortios. You need further requirements to be able to use this module, see Requirements for details.
To use it in a playbook, specify: fortinet.fortios.fortios_firewall_internet_service_addition.
New in fortinet.fortios 2.0.0
The below requirements are needed on the host that executes this module.
Parameter | Comments |
|---|---|
access_token string | Token-based authentication. Generated from GUI of Fortigate. |
enable_log boolean | Enable/Disable logging for task. Choices:
|
firewall_internet_service_addition dictionary | Configure Internet Services Addition. |
|
comment string |
Comment. |
|
entry list / elements=dictionary |
Entries added to the Internet Service addition database. |
|
addr_mode string |
Address mode (IPv4 or IPv6). Choices:
|
|
id integer / required |
Entry ID(1-255). see <a href=’#notes’>Notes</a>. |
|
port_range list / elements=dictionary |
Port ranges in the custom entry. |
|
end_port integer |
Integer value for ending TCP/UDP/SCTP destination port in range (0 to 65535). |
|
id integer / required |
Custom entry port range ID. see <a href=’#notes’>Notes</a>. |
|
start_port integer |
Integer value for starting TCP/UDP/SCTP destination port in range (0 to 65535). |
|
protocol integer |
Integer value for the protocol type as defined by IANA (0 - 255). |
|
id integer / required |
Internet Service ID in the Internet Service database. see <a href=’#notes’>Notes</a>. Source firewall.internet-service.id. |
member_path string | Member attribute path to operate on. Delimited by a slash character if there are more than one attribute. Parameter marked with member_path is legitimate for doing member operation. |
member_state string | Add or delete a member under specified attribute path. When member_state is specified, the state option is ignored. Choices:
|
state string / required | Indicates whether to create or remove the object. Choices:
|
vdom string | Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. Default: |
Note
- name: Configure Internet Services Addition.
fortinet.fortios.fortios_firewall_internet_service_addition:
vdom: "{{ vdom }}"
state: "present"
access_token: "<your_own_value>"
firewall_internet_service_addition:
comment: "Comment."
entry:
-
addr_mode: "ipv4"
id: "6"
port_range:
-
end_port: "65535"
id: "9"
start_port: "1"
protocol: "0"
id: "12 (source firewall.internet-service.id)"
Common return values are documented here, the following are the fields unique to this module:
Key | Description |
|---|---|
build string | Build number of the fortigate image Returned: always Sample: |
http_method string | Last method used to provision the content into FortiGate Returned: always Sample: |
http_status string | Last result given by FortiGate on last operation applied Returned: always Sample: |
mkey string | Master key (id) used in the last call to FortiGate Returned: success Sample: |
name string | Name of the table used to fulfill the request Returned: always Sample: |
path string | Path of the table used to fulfill the request Returned: always Sample: |
revision string | Internal revision number Returned: always Sample: |
serial string | Serial number of the unit Returned: always Sample: |
status string | Indication of the operation’s result Returned: always Sample: |
vdom string | Virtual domain used Returned: always Sample: |
version string | Version of the FortiGate Returned: always Sample: |
© 2012–2018 Michael DeHaan
© 2018–2025 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/fortinet/fortios/fortios_firewall_internet_service_addition_module.html