fortinet / fortinet.fortimanager / 1.0.5 / module / fmgr_firewall_ippool Configure IPv4 IP pools. | "added in version" 2.10 of fortinet.fortimanager" Authors: Frank Shen (@fshen01), Link Zheng (@zhengl) preview | supported by communityfortinet.fortimanager.fmgr_firewall_ippool (1.0.5) — module
Install with ansible-galaxy collection install fortinet.fortimanager:==1.0.5
collections: - name: fortinet.fortimanager version: 1.0.5
This module is able to configure a FortiManager device by allowing the user to [ add get set update ] the following apis.
/pm/config/adom/{adom}/obj/firewall/ippool
/pm/config/global/obj/firewall/ippool
Examples include all parameters and values need to be adjusted to data sources before usage.
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/IPPOOL fmgr_firewall_ippool: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [add, set, update]> url_params: adom: <value in [none, global, custom dom]> params: - data: - arp-intf: <value of string> arp-reply: <value in [disable, enable]> associated-interface: <value of string> block-size: <value of integer> comments: <value of string> dynamic_mapping: - _scope: - name: <value of string> vdom: <value of string> arp-intf: <value of string> arp-reply: <value in [disable, enable]> associated-interface: <value of string> block-size: <value of integer> comments: <value of string> endip: <value of string> num-blocks-per-user: <value of integer> pba-timeout: <value of integer> permit-any-host: <value in [disable, enable]> source-endip: <value of string> source-startip: <value of string> startip: <value of string> type: <value in [overload, one-to-one, fixed-port-range, ...]> endip: <value of string> name: <value of string> num-blocks-per-user: <value of integer> pba-timeout: <value of integer> permit-any-host: <value in [disable, enable]> source-endip: <value of string> source-startip: <value of string> startip: <value of string> type: <value in [overload, one-to-one, fixed-port-range, ...]> - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/IPPOOL fmgr_firewall_ippool: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [get]> url_params: adom: <value in [none, global, custom dom]> params: - attr: <value of string> fields: - - <value in [arp-intf, arp-reply, associated-interface, ...]> filter: - <value of string> get used: <value of integer> loadsub: <value of integer> option: <value in [count, object member, datasrc, ...]> range: - <value of integer> sortings: - varidic.attr_name: <value in [1, -1]>
method: choices: - add - get - set - update description: - The method in request required: true type: str params: description: - The parameters for each method - See full parameters list in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest required: false type: list url_params: description: - The parameters for each API request URL - Also see full URL parameters in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest required: false type: dict loose_validation: description: - Do parameter validation in a loose way required: false type: bool workspace_locking_adom: description: - the adom name to lock in case FortiManager running in workspace mode - it can be global or any other custom adom names required: false type: str workspace_locking_timeout: default: 300 description: - the maximum time in seconds to wait for other user to release the workspace lock required: false type: int
data: description: The payload returned in the request returned: always type: dict status: description: The status of api request returned: always type: dict url: description: The full url requested returned: always sample: /sys/login/user type: str