Note
This plugin is part of the community.network collection.
To install it use: ansible-galaxy collection install community.network.
To use it in a playbook, specify: community.network.panos_match_rule.
version 2.0.0
Consolidating code base.
Use https://galaxy.ansible.com/PaloAltoNetworks/paloaltonetworks instead.
The below requirements are needed on the host that executes this module.
| Parameter | Choices/Defaults | Comments |
|---|---|---|
| api_key string | API key that can be used instead of username/password credentials. | |
| application string | The application. | |
| category string | URL category | |
| destination_ip string | The destination IP address. | |
| destination_port string | The destination port. | |
| destination_zone string | The destination zone. | |
| ip_address string / required | IP address (or hostname) of PAN-OS device being configured. | |
| password string / required | Password credentials to use for auth unless api_key is set. | |
| protocol string | The IP protocol number from 1 to 255. | |
| rule_type string / required |
| Type of rule. Valid types are security or nat. |
| source_ip string / required | The source IP address. | |
| source_port string | The source port. | |
| source_user string | The source user or group. | |
| source_zone string | The source zone. | |
| to_interface string | The inbound interface in a NAT rule. | |
| username string | Default: "admin" | Username credentials to use for auth unless api_key is set. |
| vsys_id string / required | Default: "vsys1" | ID of the VSYS object. |
Note
- name: Check security rules for Google DNS
community.network.panos_match_rule:
ip_address: '{{ ip_address }}'
username: '{{ username }}'
password: '{{ password }}'
rule_type: 'security'
source_ip: '10.0.0.0'
destination_ip: '8.8.8.8'
application: 'dns'
destination_port: '53'
protocol: '17'
register: result
- ansible.builtin.debug: msg='{{result.stdout_lines}}'
- name: Check security rules inbound SSH with user match
community.network.panos_match_rule:
ip_address: '{{ ip_address }}'
username: '{{ username }}'
password: '{{ password }}'
rule_type: 'security'
source_ip: '0.0.0.0'
source_user: 'mydomain\jsmith'
destination_ip: '192.168.100.115'
destination_port: '22'
protocol: '6'
register: result
- ansible.builtin.debug: msg='{{result.stdout_lines}}'
- name: Check NAT rules for source NAT
community.network.panos_match_rule:
ip_address: '{{ ip_address }}'
username: '{{ username }}'
password: '{{ password }}'
rule_type: 'nat'
source_zone: 'Prod-DMZ'
source_ip: '10.10.118.50'
to_interface: 'ethernet1/2'
destination_zone: 'Internet'
destination_ip: '0.0.0.0'
protocol: '6'
register: result
- ansible.builtin.debug: msg='{{result.stdout_lines}}'
- name: Check NAT rules for inbound web
community.network.panos_match_rule:
ip_address: '{{ ip_address }}'
username: '{{ username }}'
password: '{{ password }}'
rule_type: 'nat'
source_zone: 'Internet'
source_ip: '0.0.0.0'
to_interface: 'ethernet1/1'
destination_zone: 'Prod DMZ'
destination_ip: '192.168.118.50'
destination_port: '80'
protocol: '6'
register: result
- ansible.builtin.debug: msg='{{result.stdout_lines}}'
- name: Check security rules for outbound POP3 in vsys4
community.network.panos_match_rule:
ip_address: '{{ ip_address }}'
username: '{{ username }}'
password: '{{ password }}'
vsys_id: 'vsys4'
rule_type: 'security'
source_ip: '10.0.0.0'
destination_ip: '4.3.2.1'
application: 'pop3'
destination_port: '110'
protocol: '6'
register: result
- ansible.builtin.debug: msg='{{result.stdout_lines}}'
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/community/network/panos_match_rule_module.html