Note
This plugin is part of the fortinet.fortimanager collection (version 2.0.1).
To install it use: ansible-galaxy collection install fortinet.fortimanager
.
To use it in a playbook, specify: fortinet.fortimanager.fmgr_pkg_firewall_localinpolicy
.
New in version 2.10: of fortinet.fortimanager
Parameter | Choices/Defaults | Comments | |
---|---|---|---|
adom string / required | the parameter (adom) in requested url | ||
bypass_validation boolean |
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters | |
pkg string / required | the parameter (pkg) in requested url | ||
pkg_firewall_localinpolicy dictionary | the top level parameters set | ||
action string |
| Action performed on traffic matching the policy (default = deny). | |
dstaddr string | Destination address object from available options. | ||
ha-mgmt-intf-only string |
| Enable/disable dedicating the HA management interface only for local-in policy. | |
intf string | Incoming interface name from available options. | ||
policyid integer | User defined local in policy ID. | ||
schedule string | Schedule object from available options. | ||
service string | Service object from available options. | ||
srcaddr string | Source address object from available options. | ||
status string |
| Enable/disable this local-in policy. | |
rc_failed list / elements=string | the rc codes list with which the conditions to fail will be overriden | ||
rc_succeeded list / elements=string | the rc codes list with which the conditions to succeed will be overriden | ||
state string / required |
| the directive to create, update or delete an object | |
workspace_locking_adom string | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root | ||
workspace_locking_timeout integer | Default: 300 | the maximum time in seconds to wait for other user to release the workspace lock |
Note
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: Configure user defined IPv4 local-in policies. fmgr_pkg_firewall_localinpolicy: bypass_validation: False workspace_locking_adom: <value in [global, custom adom including root]> workspace_locking_timeout: 300 rc_succeeded: [0, -2, -3, ...] rc_failed: [-2, -3, ...] adom: <your own value> pkg: <your own value> state: <value in [present, absent]> pkg_firewall_localinpolicy: action: <value in [deny, accept]> dstaddr: <value of string> ha-mgmt-intf-only: <value in [disable, enable]> intf: <value of string> policyid: <value of integer> schedule: <value of string> service: <value of string> srcaddr: <value of string> status: <value in [disable, enable]>
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
request_url string | always | The full url requested Sample: /sys/login/user |
response_code integer | always | The status of api request |
response_message string | always | The descriptive message of the api response Sample: OK. |
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.11/collections/fortinet/fortimanager/fmgr_pkg_firewall_localinpolicy_module.html