fortinet / fortinet.fortios / 1.1.7 / module / fortios_firewall_security_policy Configure NGFW IPv4/IPv6 application policies in Fortinet's FortiOS and FortiGate. | "added in version" 2.10 of fortinet.fortios" Authors: Link Zheng (@chillancezen), Jie Xue (@JieX19), Hongbin Lu (@fgtdev-hblu), Frank Shen (@frankshen01), Miguel Angel Munoz (@mamunozgonzalez), Nicolas Thomas (@thomnico) preview | supported by communityfortinet.fortios.fortios_firewall_security_policy (1.1.7) — module
Install with ansible-galaxy collection install fortinet.fortios:==1.1.7
collections: - name: fortinet.fortios version: 1.1.7
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify firewall feature and security_policy category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.4.0
- hosts: fortigates collections: - fortinet.fortios connection: httpapi vars: vdom: "root" ansible_httpapi_use_ssl: yes ansible_httpapi_validate_certs: no ansible_httpapi_port: 443 tasks: - name: Configure NGFW IPv4/IPv6 application policies. fortios_firewall_security_policy: vdom: "{{ vdom }}" state: "present" access_token: "<your_own_value>" firewall_security_policy: action: "accept" app_category: - id: "5" app_group: - name: "default_name_7 (source application.group.name)" application: - id: "9" application_list: "<your_own_value> (source application.list.name)" av_profile: "<your_own_value> (source antivirus.profile.name)" cifs_profile: "<your_own_value> (source cifs.profile.name)" comments: "<your_own_value>" dlp_sensor: "<your_own_value> (source dlp.sensor.name)" dnsfilter_profile: "<your_own_value> (source dnsfilter.profile.name)" dstaddr: - name: "default_name_17 (source firewall.address.name firewall.addrgrp.name firewall.vip.name firewall.vipgrp.name system.external-resource.name)" dstaddr6: - name: "default_name_19 (source firewall.address6.name firewall.addrgrp6.name firewall.vip6.name firewall.vipgrp6.name system.external-resource .name)" dstintf: - name: "default_name_21 (source system.interface.name system.zone.name)" emailfilter_profile: "<your_own_value> (source emailfilter.profile.name)" enforce_default_app_port: "enable" fsso_groups: - name: "default_name_25 (source user.adgrp.name)" groups: - name: "default_name_27 (source user.group.name)" icap_profile: "<your_own_value> (source icap.profile.name)" internet_service: "enable" internet_service_custom: - name: "default_name_31 (source firewall.internet-service-custom.name)" internet_service_custom_group: - name: "default_name_33 (source firewall.internet-service-custom-group.name)" internet_service_group: - name: "default_name_35 (source firewall.internet-service-group.name)" internet_service_name: - name: "default_name_37 (source firewall.internet-service-name.name)" internet_service_negate: "enable" internet_service_src: "enable" internet_service_src_custom: - name: "default_name_41 (source firewall.internet-service-custom.name)" internet_service_src_custom_group: - name: "default_name_43 (source firewall.internet-service-custom-group.name)" internet_service_src_group: - name: "default_name_45 (source firewall.internet-service-group.name)" internet_service_src_name: - name: "default_name_47 (source firewall.internet-service-name.name)" internet_service_src_negate: "enable" ips_sensor: "<your_own_value> (source ips.sensor.name)" logtraffic: "all" name: "default_name_51" policyid: "52" profile_group: "<your_own_value> (source firewall.profile-group.name)" profile_protocol_options: "<your_own_value> (source firewall.profile-protocol-options.name)" profile_type: "single" schedule: "<your_own_value> (source firewall.schedule.onetime.name firewall.schedule.recurring.name firewall.schedule.group.name)" send_deny_packet: "disable" service: - name: "default_name_59 (source firewall.service.custom.name firewall.service.group.name)" service_negate: "enable" srcaddr: - name: "default_name_62 (source firewall.address.name firewall.addrgrp.name system.external-resource.name)" srcaddr6: - name: "default_name_64 (source firewall.address6.name firewall.addrgrp6.name system.external-resource.name)" srcintf: - name: "default_name_66 (source system.interface.name system.zone.name)" ssh_filter_profile: "<your_own_value> (source ssh-filter.profile.name)" ssl_ssh_profile: "<your_own_value> (source firewall.ssl-ssh-profile.name)" status: "enable" url_category: - id: "71" users: - name: "default_name_73 (source user.local.name)" uuid: "<your_own_value>" voip_profile: "<your_own_value> (source voip.profile.name)" webfilter_profile: "<your_own_value> (source webfilter.profile.name)"
vdom: default: root description: - Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. type: str state: choices: - present - absent description: - Indicates whether to create or remove the object. required: true type: str access_token: description: - Token-based authentication. Generated from GUI of Fortigate. required: false type: str firewall_security_policy: default: null description: - Configure NGFW IPv4/IPv6 application policies. suboptions: action: choices: - accept - deny description: - Policy action (accept/deny). type: str app_category: description: - Application category ID list. suboptions: id: description: - Category IDs. required: true type: int type: list app_group: description: - Application group names. suboptions: name: description: - Application group names. Source application.group.name. required: true type: str type: list application: description: - Application ID list. suboptions: id: description: - Application IDs. required: true type: int type: list application_list: description: - Name of an existing Application list. Source application.list.name. type: str av_profile: description: - Name of an existing Antivirus profile. Source antivirus.profile.name. type: str cifs_profile: description: - Name of an existing CIFS profile. Source cifs.profile.name. type: str comments: description: - Comment. type: str dlp_sensor: description: - Name of an existing DLP sensor. Source dlp.sensor.name. type: str dnsfilter_profile: description: - Name of an existing DNS filter profile. Source dnsfilter.profile.name. type: str dstaddr: description: - Destination IPv4 address name and address group names. suboptions: name: description: - Address name. Source firewall.address.name firewall.addrgrp.name firewall.vip.name firewall.vipgrp.name system.external-resource .name. required: true type: str type: list dstaddr6: description: - Destination IPv6 address name and address group names. suboptions: name: description: - Address name. Source firewall.address6.name firewall.addrgrp6.name firewall.vip6.name firewall.vipgrp6.name system .external-resource.name. required: true type: str type: list dstintf: description: - Outgoing (egress) interface. suboptions: name: description: - Interface name. Source system.interface.name system.zone.name. required: true type: str type: list emailfilter_profile: description: - Name of an existing email filter profile. Source emailfilter.profile.name. type: str enforce_default_app_port: choices: - enable - disable description: - Enable/disable default application port enforcement for allowed applications. type: str fsso_groups: description: - Names of FSSO groups. suboptions: name: description: - Names of FSSO groups. Source user.adgrp.name. required: true type: str type: list groups: description: - Names of user groups that can authenticate with this policy. suboptions: name: description: - User group name. Source user.group.name. required: true type: str type: list icap_profile: description: - Name of an existing ICAP profile. Source icap.profile.name. type: str internet_service: choices: - enable - disable description: - Enable/disable use of Internet Services for this policy. If enabled, destination address and service are not used. type: str internet_service_custom: description: - Custom Internet Service name. suboptions: name: description: - Custom Internet Service name. Source firewall.internet-service-custom.name. required: true type: str type: list internet_service_custom_group: description: - Custom Internet Service group name. suboptions: name: description: - Custom Internet Service group name. Source firewall.internet-service-custom-group.name. required: true type: str type: list internet_service_group: description: - Internet Service group name. suboptions: name: description: - Internet Service group name. Source firewall.internet-service-group.name. required: true type: str type: list internet_service_name: description: - Internet Service name. suboptions: name: description: - Internet Service name. Source firewall.internet-service-name.name. required: true type: str type: list internet_service_negate: choices: - enable - disable description: - When enabled internet-service specifies what the service must NOT be. type: str internet_service_src: choices: - enable - disable description: - Enable/disable use of Internet Services in source for this policy. If enabled, source address is not used. type: str internet_service_src_custom: description: - Custom Internet Service source name. suboptions: name: description: - Custom Internet Service name. Source firewall.internet-service-custom.name. required: true type: str type: list internet_service_src_custom_group: description: - Custom Internet Service source group name. suboptions: name: description: - Custom Internet Service group name. Source firewall.internet-service-custom-group.name. required: true type: str type: list internet_service_src_group: description: - Internet Service source group name. suboptions: name: description: - Internet Service group name. Source firewall.internet-service-group.name. required: true type: str type: list internet_service_src_name: description: - Internet Service source name. suboptions: name: description: - Internet Service name. Source firewall.internet-service-name.name. required: true type: str type: list internet_service_src_negate: choices: - enable - disable description: - When enabled internet-service-src specifies what the service must NOT be. type: str ips_sensor: description: - Name of an existing IPS sensor. Source ips.sensor.name. type: str logtraffic: choices: - all - utm - disable description: - Enable or disable logging. Log all sessions or security profile sessions. type: str name: description: - Policy name. type: str policyid: description: - Policy ID. required: true type: int profile_group: description: - Name of profile group. Source firewall.profile-group.name. type: str profile_protocol_options: description: - Name of an existing Protocol options profile. Source firewall.profile-protocol-options.name. type: str profile_type: choices: - single - group description: - Determine whether the firewall policy allows security profile groups or single profiles only. type: str schedule: description: - Schedule name. Source firewall.schedule.onetime.name firewall.schedule.recurring.name firewall.schedule.group.name. type: str send_deny_packet: choices: - disable - enable description: - Enable to send a reply when a session is denied or blocked by a firewall policy. type: str service: description: - Service and service group names. suboptions: name: description: - Service name. Source firewall.service.custom.name firewall.service.group.name. required: true type: str type: list service_negate: choices: - enable - disable description: - When enabled service specifies what the service must NOT be. type: str srcaddr: description: - Source IPv4 address name and address group names. suboptions: name: description: - Address name. Source firewall.address.name firewall.addrgrp.name system.external-resource.name. required: true type: str type: list srcaddr6: description: - Source IPv6 address name and address group names. suboptions: name: description: - Address name. Source firewall.address6.name firewall.addrgrp6.name system.external-resource.name. required: true type: str type: list srcintf: description: - Incoming (ingress) interface. suboptions: name: description: - Interface name. Source system.interface.name system.zone.name. required: true type: str type: list ssh_filter_profile: description: - Name of an existing SSH filter profile. Source ssh-filter.profile.name. type: str ssl_ssh_profile: description: - Name of an existing SSL SSH profile. Source firewall.ssl-ssh-profile.name. type: str status: choices: - enable - disable description: - Enable or disable this policy. type: str url_category: description: - URL category ID list. suboptions: id: description: - URL category ID. required: true type: int type: list users: description: - Names of individual users that can authenticate with this policy. suboptions: name: description: - User name. Source user.local.name. required: true type: str type: list uuid: description: - Universally Unique Identifier (UUID; automatically assigned but can be manually reset). type: str voip_profile: description: - Name of an existing VoIP profile. Source voip.profile.name. type: str webfilter_profile: description: - Name of an existing Web filter profile. Source webfilter.profile.name. type: str type: dict
build: description: Build number of the fortigate image returned: always sample: '1547' type: str http_method: description: Last method used to provision the content into FortiGate returned: always sample: PUT type: str http_status: description: Last result given by FortiGate on last operation applied returned: always sample: '200' type: str mkey: description: Master key (id) used in the last call to FortiGate returned: success sample: id type: str name: description: Name of the table used to fulfill the request returned: always sample: urlfilter type: str path: description: Path of the table used to fulfill the request returned: always sample: webfilter type: str revision: description: Internal revision number returned: always sample: 17.0.2.10658 type: str serial: description: Serial number of the unit returned: always sample: FGVMEVYYQT3AB5352 type: str status: description: Indication of the operation's result returned: always sample: success type: str vdom: description: Virtual domain used returned: always sample: root type: str version: description: Version of the FortiGate returned: always sample: v5.6.3 type: str