Note
This plugin is part of the fortinet.fortimanager collection.
To install it use: ansible-galaxy collection install fortinet.fortimanager
.
To use it in a playbook, specify: fortinet.fortimanager.fmgr_firewall_address
.
New in version 2.10: of fortinet.fortimanager
Parameter | Choices/Defaults | Comments |
---|---|---|
loose_validation boolean |
| Do parameter validation in a loose way |
method string / required |
| The method in request |
params list / elements=string | The parameters for each method See full parameters list in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest | |
url_params dictionary | The parameters for each API request URL Also see full URL parameters in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest | |
workspace_locking_adom string | the adom name to lock in case FortiManager running in workspace mode it can be global or any other custom adom names | |
workspace_locking_timeout integer | Default: 300 | the maximum time in seconds to wait for other user to release the workspace lock |
Note
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/ADDRESS fmgr_firewall_address: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [add, set, update]> url_params: adom: <value in [none, global, custom dom]> params: - data: - allow-routing: <value in [disable, enable]> associated-interface: <value of string> cache-ttl: <value of integer> color: <value of integer> comment: <value of string> country: <value of string> dynamic_mapping: - _scope: - name: <value of string> vdom: <value of string> allow-routing: <value in [disable, enable]> associated-interface: <value of string> cache-ttl: <value of integer> color: <value of integer> comment: <value of string> country: <value of string> end-ip: <value of string> end-mac: <value of string> epg-name: <value of string> filter: <value of string> fqdn: <value of string> interface: <value of string> obj-id: <value of string> organization: <value of string> policy-group: <value of string> sdn: <value in [aci, aws, nsx, ...]> sdn-addr-type: <value in [private, public, all]> sdn-tag: <value of string> start-ip: <value of string> start-mac: <value of string> subnet: <value of string> subnet-name: <value of string> tags: <value of string> tenant: <value of string> type: <value in [ipmask, iprange, fqdn, ...]> url: <value of string> uuid: <value of string> visibility: <value in [disable, enable]> wildcard: <value of string> wildcard-fqdn: <value of string> end-ip: <value of string> epg-name: <value of string> filter: <value of string> fqdn: <value of string> list: - ip: <value of string> name: <value of string> obj-id: <value of string> organization: <value of string> policy-group: <value of string> sdn: <value in [aci, aws, nsx, ...]> sdn-tag: <value of string> start-ip: <value of string> subnet: <value of string> subnet-name: <value of string> tagging: - category: <value of string> name: <value of string> tags: - <value of string> tenant: <value of string> type: <value in [ipmask, iprange, fqdn, ...]> uuid: <value of string> visibility: <value in [disable, enable]> wildcard: <value of string> wildcard-fqdn: <value of string> - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/ADDRESS fmgr_firewall_address: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [get]> url_params: adom: <value in [none, global, custom dom]> params: - attr: <value of string> fields: - - <value in [allow-routing, associated-interface, cache-ttl, ...]> filter: - <value of string> get used: <value of integer> loadsub: <value of integer> option: <value in [count, object member, datasrc, ...]> range: - <value of integer> sortings: - varidic.attr_name: <value in [1, -1]>
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
data dictionary | always | The payload returned in the request |
status dictionary | always | The status of api request |
url string | always | The full url requested Sample: /sys/login/user |
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.10/collections/fortinet/fortimanager/fmgr_firewall_address_module.html