fortinet / fortinet.fortimanager / 1.0.5 / module / fmgr_firewall_service_custom Configure custom services. | "added in version" 2.10 of fortinet.fortimanager" Authors: Frank Shen (@fshen01), Link Zheng (@zhengl) preview | supported by communityfortinet.fortimanager.fmgr_firewall_service_custom (1.0.5) — module
Install with ansible-galaxy collection install fortinet.fortimanager:==1.0.5
collections: - name: fortinet.fortimanager version: 1.0.5
This module is able to configure a FortiManager device by allowing the user to [ add get set update ] the following apis.
/pm/config/adom/{adom}/obj/firewall/service/custom
/pm/config/global/obj/firewall/service/custom
Examples include all parameters and values need to be adjusted to data sources before usage.
- hosts: fortimanager-inventory collections: - fortinet.fortimanager connection: httpapi vars: ansible_httpapi_use_ssl: True ansible_httpapi_validate_certs: False ansible_httpapi_port: 443 tasks: - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/SERVICE/CUSTOM fmgr_firewall_service_custom: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [add, set, update]> url_params: adom: <value in [none, global, custom dom]> params: - data: - app-category: - <value of integer> app-service-type: <value in [disable, app-id, app-category]> application: - <value of integer> category: <value of string> check-reset-range: <value in [disable, default, strict]> color: <value of integer> comment: <value of string> fqdn: <value of string> helper: <value in [disable, auto, ftp, ...]> icmpcode: <value of integer> icmptype: <value of integer> iprange: <value of string> name: <value of string> protocol: <value in [ICMP, IP, TCP/UDP/SCTP, ...]> protocol-number: <value of integer> proxy: <value in [disable, enable]> sctp-portrange: <value of string> session-ttl: <value of integer> tcp-halfclose-timer: <value of integer> tcp-halfopen-timer: <value of integer> tcp-portrange: <value of string> tcp-timewait-timer: <value of integer> udp-idle-timer: <value of integer> udp-portrange: <value of string> visibility: <value in [disable, enable]> - name: REQUESTING /PM/CONFIG/OBJ/FIREWALL/SERVICE/CUSTOM fmgr_firewall_service_custom: loose_validation: False workspace_locking_adom: <value in [global, custom adom]> workspace_locking_timeout: 300 method: <value in [get]> url_params: adom: <value in [none, global, custom dom]> params: - attr: <value of string> fields: - - <value in [app-category, app-service-type, application, ...]> filter: - <value of string> get used: <value of integer> loadsub: <value of integer> option: <value in [count, object member, datasrc, ...]> range: - <value of integer> sortings: - varidic.attr_name: <value in [1, -1]>
method: choices: - add - get - set - update description: - The method in request required: true type: str params: description: - The parameters for each method - See full parameters list in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest required: false type: list url_params: description: - The parameters for each API request URL - Also see full URL parameters in https://ansible-galaxy-fortimanager-docs.readthedocs.io/en/latest required: false type: dict loose_validation: description: - Do parameter validation in a loose way required: false type: bool workspace_locking_adom: description: - the adom name to lock in case FortiManager running in workspace mode - it can be global or any other custom adom names required: false type: str workspace_locking_timeout: default: 300 description: - the maximum time in seconds to wait for other user to release the workspace lock required: false type: int
data: description: The payload returned in the request returned: always type: dict status: description: The status of api request returned: always type: dict url: description: The full url requested returned: always sample: /sys/login/user type: str