Note
This plugin is part of the cisco.meraki collection.
To install it use: ansible-galaxy collection install cisco.meraki
.
To use it in a playbook, specify: cisco.meraki.meraki_intrusion_prevention
.
Parameter | Choices/Defaults | Comments | |
---|---|---|---|
allowed_rules list / elements=dictionary | List of IDs related to rules which are allowed for the organization. | ||
message string | Description of rule. This is overwritten by the API. | ||
rule_id string | ID of rule as defined by Snort. | ||
auth_key string / required | Authentication key provided by the dashboard. Required if environmental variable MERAKI_KEY is not set. | ||
host string | Default: "api.meraki.com" | Hostname for Meraki dashboard. Can be used to access regional Meraki environments, such as China. | |
ids_rulesets string |
| Ruleset complexity setting. | |
internal_error_retry_time integer | Default: 60 | Number of seconds to retry if server returns an internal server error. | |
mode string |
| Operational mode of Intrusion Prevention system. | |
net_id string | ID number of a network. | ||
net_name string | Name of a network. aliases: name, network | ||
org_id string | ID of organization. | ||
org_name string | Name of organization. aliases: organization | ||
output_format string |
| Instructs module whether response keys should be snake case (ex. net_id ) or camel case (ex. netId ). | |
output_level string |
| Set amount of debug output during module execution. | |
protected_networks dictionary | Set included/excluded networks for Intrusion Prevention. | ||
excluded_cidr list / elements=string | List of network IP ranges to exclude from scanning. | ||
included_cidr list / elements=string | List of network IP ranges to include in scanning. | ||
use_default boolean |
| Whether to use special IPv4 addresses per RFC 5735. | |
rate_limit_retry_time integer | Default: 165 | Number of seconds to retry if rate limiter is triggered. | |
state string |
| Create or modify an organization. | |
timeout integer | Default: 30 | Time to timeout for HTTP requests. | |
use_https boolean |
| If no , it will use HTTP. Otherwise it will use HTTPS.Only useful for internal Meraki developers. | |
use_proxy boolean |
| If no , it will not use a proxy, even if one is defined in an environment variable on the target hosts. | |
validate_certs boolean |
| Whether to validate HTTP certificates. |
Note
ANSIBLE_MERAKI_FORMAT
environment variable to camelcase
.- name: Set whitelist for organization meraki_intrusion_prevention: auth_key: '{{auth_key}}' state: present org_id: '{{test_org_id}}' allowed_rules: - rule_id: "meraki:intrusion/snort/GID/01/SID/5805" message: Test rule delegate_to: localhost - name: Query IPS info for organization meraki_intrusion_prevention: auth_key: '{{auth_key}}' state: query org_name: '{{test_org_name}}' delegate_to: localhost register: query_org - name: Set full ruleset with check mode meraki_intrusion_prevention: auth_key: '{{auth_key}}' state: present org_name: '{{test_org_name}}' net_name: '{{test_net_name}} - IPS' mode: prevention ids_rulesets: security protected_networks: use_default: true included_cidr: - 192.0.1.0/24 excluded_cidr: - 10.0.1.0/24 delegate_to: localhost - name: Clear rules from organization meraki_intrusion_prevention: auth_key: '{{auth_key}}' state: absent org_name: '{{test_org_name}}' allowed_rules: [] delegate_to: localhost
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description | ||
---|---|---|---|---|
data complex | success | Information about the Threat Protection settings. | ||
idsRulesets string | success, when network is queried or modified | Setting of selected ruleset. Sample: balanced | ||
mode string | success, when network is queried or modified | Enabled setting of intrusion prevention. Sample: enabled | ||
protectedNetworks complex | success, when network is queried or modified | Networks protected by IPS. | ||
excludedCidr string | success, when network is queried or modified | List of CIDR notiation networks to exclude from protection. Sample: 192.0.1.0/24 | ||
includedCidr string | success, when network is queried or modified | List of CIDR notiation networks to protect. Sample: 192.0.1.0/24 | ||
useDefault boolean | success, when network is queried or modified | Whether to use special IPv4 addresses. Sample: True | ||
whitelistedRules complex | success, when organization is queried or modified | List of whitelisted IPS rules. | ||
message string | success, when organization is queried or modified | Description of rule. Sample: MALWARE-OTHER Trackware myway speedbar runtime detection - switch engines | ||
ruleId string | success, when organization is queried or modified | A rule identifier for an IPS rule. Sample: meraki:intrusion/snort/GID/01/SID/5805 |
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/cisco/meraki/meraki_intrusion_prevention_module.html