W3cubDocs

/Ansible 2.10

fortinet.fortimanager.fmgr_firewall_address – Configure IPv4 addresses.

Note

This plugin is part of the fortinet.fortimanager collection.

To install it use: ansible-galaxy collection install fortinet.fortimanager.

To use it in a playbook, specify: fortinet.fortimanager.fmgr_firewall_address.

New in version 2.10: of fortinet.fortimanager

Synopsis

  • This module is able to configure a FortiManager device by allowing the user to [ add get set update ] the following apis.
  • /pm/config/adom/{adom}/obj/firewall/address
  • /pm/config/global/obj/firewall/address
  • Examples include all parameters and values need to be adjusted to data sources before usage.

Parameters

Parameter Choices/Defaults Comments
loose_validation
boolean
    Choices:
  • no
  • yes
Do parameter validation in a loose way
method
string / required
    Choices:
  • add
  • get
  • set
  • update
The method in request
params
list / elements=string
The parameters for each method
See full parameters list in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest
url_params
dictionary
The parameters for each API request URL
Also see full URL parameters in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest
workspace_locking_adom
string
the adom name to lock in case FortiManager running in workspace mode
it can be global or any other custom adom names
workspace_locking_timeout
integer
Default:
300
the maximum time in seconds to wait for other user to release the workspace lock

Notes

Note

  • There are only three top-level parameters where ‘method’ is always required while other two ‘params’ and ‘url_params’ can be optional
  • Due to the complexity of fortimanager api schema, the validation is done out of Ansible native parameter validation procedure.
  • The syntax of OPTIONS doen not comply with the standard Ansible argument specification, but with the structure of fortimanager API schema, we need a trivial transformation when we are filling the ansible playbook

Examples

- hosts: fortimanager-inventory
  collections:
    - fortinet.fortimanager
  connection: httpapi
  vars:
     ansible_httpapi_use_ssl: True
     ansible_httpapi_validate_certs: False
     ansible_httpapi_port: 443
  tasks:

   - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/ADDRESS
     fmgr_firewall_address:
        loose_validation: False
        workspace_locking_adom: <value in [global, custom adom]>
        workspace_locking_timeout: 300
        method: <value in [add, set, update]>
        url_params:
           adom: <value in [none, global, custom dom]>
        params:
           -
              data:
                -
                    allow-routing: <value in [disable, enable]>
                    associated-interface: <value of string>
                    cache-ttl: <value of integer>
                    color: <value of integer>
                    comment: <value of string>
                    country: <value of string>
                    dynamic_mapping:
                      -
                          _scope:
                            -
                                name: <value of string>
                                vdom: <value of string>
                          allow-routing: <value in [disable, enable]>
                          associated-interface: <value of string>
                          cache-ttl: <value of integer>
                          color: <value of integer>
                          comment: <value of string>
                          country: <value of string>
                          end-ip: <value of string>
                          end-mac: <value of string>
                          epg-name: <value of string>
                          filter: <value of string>
                          fqdn: <value of string>
                          interface: <value of string>
                          obj-id: <value of string>
                          organization: <value of string>
                          policy-group: <value of string>
                          sdn: <value in [aci, aws, nsx, ...]>
                          sdn-addr-type: <value in [private, public, all]>
                          sdn-tag: <value of string>
                          start-ip: <value of string>
                          start-mac: <value of string>
                          subnet: <value of string>
                          subnet-name: <value of string>
                          tags: <value of string>
                          tenant: <value of string>
                          type: <value in [ipmask, iprange, fqdn, ...]>
                          url: <value of string>
                          uuid: <value of string>
                          visibility: <value in [disable, enable]>
                          wildcard: <value of string>
                          wildcard-fqdn: <value of string>
                    end-ip: <value of string>
                    epg-name: <value of string>
                    filter: <value of string>
                    fqdn: <value of string>
                    list:
                      -
                          ip: <value of string>
                    name: <value of string>
                    obj-id: <value of string>
                    organization: <value of string>
                    policy-group: <value of string>
                    sdn: <value in [aci, aws, nsx, ...]>
                    sdn-tag: <value of string>
                    start-ip: <value of string>
                    subnet: <value of string>
                    subnet-name: <value of string>
                    tagging:
                      -
                          category: <value of string>
                          name: <value of string>
                          tags:
                            - <value of string>
                    tenant: <value of string>
                    type: <value in [ipmask, iprange, fqdn, ...]>
                    uuid: <value of string>
                    visibility: <value in [disable, enable]>
                    wildcard: <value of string>
                    wildcard-fqdn: <value of string>

   - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/ADDRESS
     fmgr_firewall_address:
        loose_validation: False
        workspace_locking_adom: <value in [global, custom adom]>
        workspace_locking_timeout: 300
        method: <value in [get]>
        url_params:
           adom: <value in [none, global, custom dom]>
        params:
           -
              attr: <value of string>
              fields:
                -
                   - <value in [allow-routing, associated-interface, cache-ttl, ...]>
              filter:
                - <value of string>
              get used: <value of integer>
              loadsub: <value of integer>
              option: <value in [count, object member, datasrc, ...]>
              range:
                - <value of integer>
              sortings:
                -
                    varidic.attr_name: <value in [1, -1]>

Return Values

Common return values are documented here, the following are the fields unique to this module:

Key Returned Description
data
dictionary
always
The payload returned in the request

status
dictionary
always
The status of api request

url
string
always
The full url requested

Sample:
/sys/login/user


Authors

  • Frank Shen (@fshen01)
  • Link Zheng (@zhengl)

© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/fortinet/fortimanager/fmgr_firewall_address_module.html