chillancezen / chillancezen.fortimanager / 2.1.6 / module / fmgr_vpnmgr_node no description | "added in version" 1.0.0 of chillancezen.fortimanager" Authors: Link Zheng (@chillancezen), Jie Xue (@JieX19), Frank Shen (@fshen01), Hongbin Lu (@fgtdev-hblu) preview | supported by communitychillancezen.fortimanager.fmgr_vpnmgr_node (2.1.6) — module
Install with ansible-galaxy collection install chillancezen.fortimanager:==2.1.6
collections: - name: chillancezen.fortimanager version: 2.1.6
This module is able to configure a FortiManager device.
Examples include all parameters and values which need to be adjusted to data sources before usage.
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: no description fmgr_vpnmgr_node: bypass_validation: False workspace_locking_adom: <value in [global, custom adom including root]> workspace_locking_timeout: 300 rc_succeeded: [0, -2, -3, ...] rc_failed: [-2, -3, ...] adom: <your own value> state: <value in [present, absent]> vpnmgr_node: add-route: <value in [disable, enable]> assign-ip: <value in [disable, enable]> assign-ip-from: <value in [range, usrgrp, dhcp, ...]> authpasswd: <value of string> authusr: <value of string> authusrgrp: <value of string> auto-configuration: <value in [disable, enable]> automatic_routing: <value in [disable, enable]> banner: <value of string> default-gateway: <value of string> dhcp-server: <value in [disable, enable]> dns-mode: <value in [auto, manual]> dns-service: <value in [default, specify, local]> domain: <value of string> extgw: <value of string> extgw_hubip: <value of string> extgw_p2_per_net: <value in [disable, enable]> extgwip: <value of string> hub_iface: <value of string> id: <value of integer> iface: <value of string> ip-range: - end-ip: <value of string> id: <value of integer> start-ip: <value of string> ipsec-lease-hold: <value of integer> ipv4-dns-server1: <value of string> ipv4-dns-server2: <value of string> ipv4-dns-server3: <value of string> ipv4-end-ip: <value of string> ipv4-exclude-range: - end-ip: <value of string> id: <value of integer> start-ip: <value of string> ipv4-netmask: <value of string> ipv4-split-include: <value of string> ipv4-start-ip: <value of string> ipv4-wins-server1: <value of string> ipv4-wins-server2: <value of string> local-gw: <value of string> localid: <value of string> mode-cfg: <value in [disable, enable]> mode-cfg-ip-version: <value in [4, 6]> net-device: <value in [disable, enable]> peer: <value of string> peergrp: <value of string> peerid: <value of string> peertype: <value in [any, one, dialup, ...]> protected_subnet: - addr: <value of string> seq: <value of integer> public-ip: <value of string> role: <value in [hub, spoke]> route-overlap: <value in [use-old, use-new, allow]> spoke-zone: <value of string> summary_addr: - addr: <value of string> priority: <value of integer> seq: <value of integer> tunnel-search: <value in [selectors, nexthop]> unity-support: <value in [disable, enable]> usrgrp: <value of string> vpn-interface-priority: <value of integer> vpn-zone: <value of string> vpntable: <value of string> xauthtype: <value in [disable, client, pap, ...]> exchange-interface-ip: <value in [disable, enable]> hub-public-ip: <value of string> ipv4-split-exclude: <value of string> scope member: - name: <value of string> vdom: <value of string> dhcp-ra-giaddr: <value of string> encapsulation: <value in [tunnel-mode, transport-mode]> ipv4-name: <value of string> l2tp: <value in [disable, enable]>
request_url: description: The full url requested returned: always sample: /sys/login/user type: str response_code: description: The status of api request returned: always sample: 0 type: int response_message: description: The descriptive message of the api response returned: always sample: OK. type: str