barrets2002 / barrets2002.smb / 0.0.1 / module / smb_acl_interfaces ACL interfaces resource module | "added in version" 1.0.0 of barrets2002.smb" Authors: Sumit Jaiswal (@justjais)barrets2002.smb.smb_acl_interfaces (0.0.1) — module
Install with ansible-galaxy collection install barrets2002.smb:==0.0.1
collections: - name: barrets2002.smb version: 0.0.1
This module configures and manages the access-control (ACL) attributes of interfaces on SMB platforms.
# Using Merged # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # interface GigabitEthernet0/2 # ip access-group 123 out - name: Merge module attributes of given access-groups cisco.smb.smb_acl_interfaces: config: - name: GigabitEthernet0/1 access_groups: - afi: ipv4 acls: - name: 110 direction: in - name: 123 direction: out - afi: ipv6 acls: - name: test_v6 direction: out - name: temp_v6 direction: in - name: GigabitEthernet0/2 access_groups: - afi: ipv4 acls: - name: 100 direction: in state: merged
# Commands Fired: # --------------- # # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 100 in # ip access-group 123 out # After state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out # Using Replaced # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out - name: Replace module attributes of given access-groups cisco.smb.smb_acl_interfaces: config: - name: GigabitEthernet0/1 access_groups: - afi: ipv4 acls: - name: 100 direction: out - name: 110 direction: in state: replaced
# Commands Fired: # --------------- # # interface GigabitEthernet0/1 # no ip access-group 123 out # no ipv6 traffic-filter temp_v6 in # no ipv6 traffic-filter test_v6 out # ip access-group 100 out # After state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 100 out # ip access-group 110 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out # Using Overridden # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out - name: Overridden module attributes of given access-groups cisco.smb.smb_acl_interfaces: config: - name: GigabitEthernet0/1 access_groups: - afi: ipv4 acls: - name: 100 direction: out - name: 110 direction: in state: overridden
# Commands Fired: # --------------- # # interface GigabitEthernet0/1 # no ip access-group 123 out # no ipv6 traffic-filter test_v6 out # no ipv6 traffic-filter temp_v6 in # ip access-group 100 out # interface GigabitEthernet0/2 # no ip access-group 110 in # no ip access-group 123 out # After state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 100 out # ip access-group 110 in # interface GigabitEthernet0/2 # Using Deleted # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out - name: Delete module attributes of given Interface cisco.smb.smb_acl_interfaces: config: - name: GigabitEthernet0/1 state: deleted
# Commands Fired: # --------------- # # interface GigabitEthernet0/1 # no ip access-group 110 in # no ip access-group 123 out # no ipv6 traffic-filter test_v6 out # no ipv6 traffic-filter temp_v6 in # After state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out # Using DELETED without any config passed #"(NOTE: This will delete all of configured resource module attributes from each configured interface)" # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out - name: Delete module attributes of given access-groups from ALL Interfaces cisco.smb.smb_acl_interfaces: config: state: deleted
# Commands Fired: # --------------- # # interface GigabitEthernet0/1 # no ip access-group 110 in # no ip access-group 123 out # no ipv6 traffic-filter test_v6 out # no ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # no ip access-group 110 out # no ip access-group 123 out # After state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # interface GigabitEthernet0/2 # Using Gathered # Before state: # ------------- # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out - name: Gather listed acl interfaces with provided configurations cisco.smb.smb_acl_interfaces: config: state: gathered
# Module Execution Result: # ------------------------ # # "gathered": [ # { # "name": "Loopback888" # }, # { # "name": "GigabitEthernet0/0" # }, # { # "access_groups": [ # { # "acls": [ # { # "direction": "in", # "name": "110" # }, # { # "direction": "out", # "name": "123" # } # ], # "afi": "ipv4" # }, # { # "acls": [ # { # "direction": "in", # "name": "temp_v6" # }, # { # "direction": "out", # "name": "test_v6" # } # ], # "afi": "ipv6" # } # ], # "name": "GigabitEthernet0/1" # }, # { # "access_groups": [ # { # "acls": [ # { # "direction": "in", # "name": "100" # }, # { # "direction": "out", # "name": "123" # } # ], # "afi": "ipv4" # } # ], # "name": "GigabitEthernet0/2" # } # ] # After state: # ------------ # # vsmb#sh running-config | include interface|ip access-group|ipv6 traffic-filter # interface Loopback888 # interface GigabitEthernet0/0 # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter test_v6 out # ipv6 traffic-filter temp_v6 in # interface GigabitEthernet0/2 # ip access-group 110 in # ip access-group 123 out # Using Rendered - name: Render the commands for provided configuration cisco.smb.smb_acl_interfaces: config: - name: GigabitEthernet0/1 access_groups: - afi: ipv4 acls: - name: 110 direction: in - name: 123 direction: out - afi: ipv6 acls: - name: test_v6 direction: out - name: temp_v6 direction: in state: rendered
# Module Execution Result: # ------------------------ # # "rendered": [ # "interface GigabitEthernet0/1", # "ip access-group 110 in", # "ip access-group 123 out", # "ipv6 traffic-filter temp_v6 in", # "ipv6 traffic-filter test_v6 out" # ] # Using Parsed # File: parsed.cfg # ---------------- # # interface GigabitEthernet0/1 # ip access-group 110 in # ip access-group 123 out # ipv6 traffic-filter temp_v6 in # ipv6 traffic-filter test_v6 out - name: Parse the commands for provided configuration cisco.smb.smb_acl_interfaces: running_config: "{{ lookup('file', 'parsed.cfg') }}" state: parsed
state: choices: - merged - replaced - overridden - deleted - gathered - parsed - rendered default: merged description: - The state the configuration should be left in - The states I(rendered), I(gathered) and I(parsed) does not perform any change on the device. - The state I(rendered) will transform the configuration in C(config) option to platform specific CLI commands which will be returned in the I(rendered) key within the result. For state I(rendered) active connection to remote host is not required. - The state I(gathered) will fetch the running configuration from device and transform it into structured data in the format as per the resource module argspec and the value is returned in the I(gathered) key within the result. - The state I(parsed) reads the configuration from C(running_config) option and transforms it into JSON format as per the resource module parameters and the value is returned in the I(parsed) key within the result. The value of C(running_config) option should be the same format as the output of command I(show running-config | include ip route|ipv6 route) executed on device. For state I(parsed) active connection to remote host is not required. type: str config: description: A dictionary of ACL interfaces options elements: dict suboptions: access_groups: description: Specify access-group for IP access list (standard or extended). elements: dict suboptions: acls: description: Specifies the ACLs for the provided AFI. elements: dict suboptions: direction: choices: - in - out description: - Specifies the direction of packets that the ACL will be applied on. - With one direction already assigned, other acl direction cannot be same. required: true type: str name: description: Specifies the name of the IPv4/IPv4 ACL for the interface. required: true type: str type: list afi: choices: - ipv4 - ipv6 description: Specifies the AFI for the ACLs to be configured on this interface. required: true type: str type: list name: description: Full name of the interface excluding any logical unit number, i.e. GigabitEthernet0/1. required: true type: str type: list running_config: description: - The module, by default, will connect to the remote device and retrieve the current running-config to use as a base for comparing against the contents of source. There are times when it is not desirable to have the task get the current running-config for every task in a playbook. The I(running_config) argument allows the implementer to pass in the configuration to use as the base config for comparison. This value of this option should be the output received from device by executing command. type: str
after: description: The configuration as structured data after module completion. returned: when changed sample: The configuration returned will always be in the same format of the parameters above. type: list before: description: The configuration as structured data prior to module invocation. returned: always sample: The configuration returned will always be in the same format of the parameters above. type: list commands: description: The set of commands pushed to the remote device returned: always sample: - interface GigabitEthernet0/1 - ip access-group 110 in - ipv6 traffic-filter test_v6 out type: list