dux_fortinet / dux_fortinet.fortianalyzer_dev / 1.4.0 / module / faz_cli_fmupdate_webspam_webproxy Configure the web proxy for use with FortiGuard antivirus and IPS updates. | "added in version" 1.0.0 of dux_fortinet.fortianalyzer_dev" Authors: Xinwei Du (@dux-fortinet), Link Zheng (@chillancezen), Jie Xue (@JieX19), Frank Shen (@fshen01), Hongbin Lu (@fgtdev-hblu) preview | supported by communitydux_fortinet.fortianalyzer_dev.faz_cli_fmupdate_webspam_webproxy (1.4.0) — module
Install with ansible-galaxy collection install dux_fortinet.fortianalyzer_dev:==1.4.0
collections: - name: dux_fortinet.fortianalyzer_dev version: 1.4.0
This module is able to configure a FortiAnalyzer device.
Examples include all parameters and values which need to be adjusted to data sources before usage.
- name: Example playbook connection: httpapi hosts: fortianalyzers tasks: - name: Configure the web proxy for use with FortiGuard antivirus and IPS updates. fortinet.fortianalyzer.faz_cli_fmupdate_webspam_webproxy: cli_fmupdate_webspam_webproxy: address: 55.6.7.88 mode: proxy password: passcode port: 443 status: disable username: foouser vars: ansible_httpapi_port: 443 ansible_httpapi_use_ssl: true ansible_httpapi_validate_certs: false
log_path: default: /tmp/fortianalyzer.ansible.log description: - The path to save log. Used if enable_log is true. - Please use absolute path instead of relative path. - If the log_path setting is incorrect, the log will be saved in /tmp/fortianalyzer.ansible.log required: false type: str rc_failed: description: the rc codes list with which the conditions to fail will be overriden elements: int required: false type: list enable_log: default: false description: Enable/Disable logging for task required: false type: bool access_token: description: The token to access FortiManager without using username and password. required: false type: str rc_succeeded: description: the rc codes list with which the conditions to succeed will be overriden elements: int required: false type: list proposed_method: choices: - set - update - add description: The overridden method for the underlying Json RPC request required: false type: str bypass_validation: default: false description: only set to True when module schema diffs with FortiAnalyzer API structure, module continues to execute without validating parameters required: false type: bool forticloud_access_token: description: Authenticate Ansible client with forticloud API access token. required: false type: str cli_fmupdate_webspam_webproxy: description: The top level parameters set. required: false suboptions: address: description: web proxy address. type: str mode: choices: - proxy - tunnel description: - Web proxy mode - proxy - HTTP proxy mode - tunnel - HTTP tunnel mode (default) type: str password: description: no description type: str port: description: The port number of the web proxy (1 - 65535, default = 80). type: int status: choices: - disable - enable description: - Enable/disable connections through the web proxy (default = disable). - disable - Disable setting. - enable - Enable setting. type: str username: description: The user name used for authentication. type: str type: dict
meta: contains: request_url: description: The full url requested returned: always sample: /sys/login/user type: str response_code: description: The status of api request returned: always sample: 0 type: int response_data: description: The api response returned: always type: list response_message: description: The descriptive message of the api response returned: always sample: OK. type: str system_information: description: The information of the target system. returned: always type: dict description: The result of the request. returned: always type: dict rc: description: The status the request. returned: always sample: 0 type: int version_check_warning: description: Warning if the parameters used in the playbook are not supported by the current fortianalyzer version. returned: complex type: list