drmofu / drmofu.fortimanager / 2.2.2 / module / fmgr_pkg_user_nacpolicy Configure NAC policy matching pattern to identify matching NAC devices. | "added in version" 2.2.0 of drmofu.fortimanager" Authors: Xinwei Du (@dux-fortinet), Xing Li (@lix-fortinet), Jie Xue (@JieX19), Link Zheng (@chillancezen), Frank Shen (@fshen01), Hongbin Lu (@fgtdev-hblu) preview | supported by communitydrmofu.fortimanager.fmgr_pkg_user_nacpolicy (2.2.2) — module
Install with ansible-galaxy collection install drmofu.fortimanager:==2.2.2
collections: - name: drmofu.fortimanager version: 2.2.2
This module is able to configure a FortiManager device.
Examples include all parameters and values which need to be adjusted to data sources before usage.
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: Configure NAC policy matching pattern to identify matching NAC devices. fmgr_pkg_user_nacpolicy: bypass_validation: False workspace_locking_adom: <value in [global, custom adom including root]> workspace_locking_timeout: 300 rc_succeeded: [0, -2, -3, ...] rc_failed: [-2, -3, ...] adom: <your own value> pkg: <your own value> state: <value in [present, absent]> pkg_user_nacpolicy: category: <value in [device, firewall-user, ems-tag, ...]> description: <value of string> ems-tag: <value of string> family: <value of string> host: <value of string> hw-vendor: <value of string> hw-version: <value of string> mac: <value of string> name: <value of string> os: <value of string> src: <value of string> ssid-policy: <value of string> status: <value in [disable, enable]> sw-version: <value of string> type: <value of string> user: <value of string> user-group: <value of string> severity: <value of integer>
pkg: description: the parameter (pkg) in requested url required: true type: str adom: description: the parameter (adom) in requested url required: true type: str state: choices: - present - absent description: The directive to create, update or delete an object. required: true type: str rc_failed: description: The rc codes list with which the conditions to fail will be overriden. elements: int required: false type: list enable_log: default: false description: Enable/Disable logging for task. required: false type: bool access_token: description: The token to access FortiManager without using username and password. required: false type: str rc_succeeded: description: The rc codes list with which the conditions to succeed will be overriden. elements: int required: false type: list proposed_method: choices: - update - set - add description: The overridden method for the underlying Json RPC request. required: false type: str bypass_validation: default: false description: Only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters. required: false type: bool pkg_user_nacpolicy: description: the top level parameters set required: false suboptions: category: choices: - device - firewall-user - ems-tag - vulnerability description: Category of NAC policy. type: str description: description: Description for the NAC policy matching pattern. type: str ems-tag: description: NAC policy matching EMS tag. type: str family: description: NAC policy matching family. type: str host: description: NAC policy matching host. type: str hw-vendor: description: NAC policy matching hardware vendor. type: str hw-version: description: NAC policy matching hardware version. type: str mac: description: NAC policy matching MAC address. type: str name: description: NAC policy name. type: str os: description: NAC policy matching operating system. type: str severity: description: description type: int src: description: NAC policy matching source. type: str ssid-policy: description: SSID policy to be applied on the matched NAC policy. type: str status: choices: - disable - enable description: Enable/disable NAC policy. type: str sw-version: description: NAC policy matching software version. type: str type: description: NAC policy matching type. type: str user: description: NAC policy matching user. type: str user-group: description: NAC policy matching user group. type: str type: dict workspace_locking_adom: description: The adom to lock for FortiManager running in workspace mode, the value can be global and others including root. required: false type: str forticloud_access_token: description: Authenticate Ansible client with forticloud API access token. required: false type: str workspace_locking_timeout: default: 300 description: The maximum time in seconds to wait for other user to release the workspace lock. required: false type: int
meta: contains: request_url: description: The full url requested. returned: always sample: /sys/login/user type: str response_code: description: The status of api request. returned: always sample: 0 type: int response_data: description: The api response. returned: always type: list response_message: description: The descriptive message of the api response. returned: always sample: OK. type: str system_information: description: The information of the target system. returned: always type: dict description: The result of the request. returned: always type: dict rc: description: The status the request. returned: always sample: 0 type: int version_check_warning: description: Warning if the parameters used in the playbook are not supported by the current FortiManager version. returned: complex type: list