fortinet / fortinet.fortios / 2.3.6 / module / fortios_firewall_dos_policy Configure IPv4 DoS policies in Fortinet's FortiOS and FortiGate. | "added in version" 2.0.0 of fortinet.fortios" Authors: Link Zheng (@chillancezen), Jie Xue (@JieX19), Hongbin Lu (@fgtdev-hblu), Frank Shen (@frankshen01), Miguel Angel Munoz (@mamunozgonzalez), Nicolas Thomas (@thomnico) preview | supported by communityfortinet.fortios.fortios_firewall_dos_policy (2.3.6) — module
Install with ansible-galaxy collection install fortinet.fortios:==2.3.6
collections: - name: fortinet.fortios version: 2.3.6
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify firewall feature and dos_policy category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
- name: Configure IPv4 DoS policies. fortinet.fortios.fortios_firewall_dos_policy: vdom: "{{ vdom }}" state: "present" access_token: "<your_own_value>" firewall_dos_policy: anomaly: - action: "pass" log: "enable" name: "default_name_6" quarantine: "none" quarantine_expiry: "<your_own_value>" quarantine_log: "disable" status: "disable" synproxy_tcp_mss: "0" synproxy_tcp_sack: "enable" synproxy_tcp_timestamp: "enable" synproxy_tcp_window: "4096" synproxy_tcp_windowscale: "0" synproxy_tos: "0" synproxy_ttl: "32" threshold: "0" threshold_default: "0" comments: "<your_own_value>" dstaddr: - name: "default_name_22 (source firewall.address.name firewall.addrgrp.name)" interface: "<your_own_value> (source system.zone.name system.interface.name)" name: "default_name_24" policyid: "<you_own_value>" service: - name: "default_name_27 (source firewall.service.custom.name firewall.service.group.name)" srcaddr: - name: "default_name_29 (source firewall.address.name firewall.addrgrp.name)" status: "enable"
vdom: default: root description: - Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. type: str state: choices: - present - absent description: - Indicates whether to create or remove the object. required: true type: str enable_log: default: false description: - Enable/Disable logging for task. required: false type: bool member_path: description: - Member attribute path to operate on. - Delimited by a slash character if there are more than one attribute. - Parameter marked with member_path is legitimate for doing member operation. type: str access_token: description: - Token-based authentication. Generated from GUI of Fortigate. required: false type: str member_state: choices: - present - absent description: - Add or delete a member under specified attribute path. - When member_state is specified, the state option is ignored. type: str firewall_dos_policy: default: null description: - Configure IPv4 DoS policies. suboptions: anomaly: description: - Anomaly name. elements: dict suboptions: action: choices: - pass - block - proxy description: - Action taken when the threshold is reached. type: str log: choices: - enable - disable description: - Enable/disable anomaly logging. type: str name: description: - Anomaly name. required: true type: str quarantine: choices: - none - attacker description: - Quarantine method. type: str quarantine_expiry: description: - Duration of quarantine. (Format type: str quarantine_log: choices: - disable - enable description: - Enable/disable quarantine logging. type: str status: choices: - disable - enable description: - Enable/disable this anomaly. type: str synproxy_tcp_mss: choices: - '0' - '256' - '512' - '1024' - '1300' - '1360' - '1460' - '1500' description: - Determine TCP maximum segment size (MSS) value for packets replied by syn proxy module. type: str synproxy_tcp_sack: choices: - enable - disable description: - enable/disable TCP selective acknowledage (SACK) for packets replied by syn proxy module. type: str synproxy_tcp_timestamp: choices: - enable - disable description: - enable/disable TCP timestamp option for packets replied by syn proxy module. type: str synproxy_tcp_window: choices: - '4096' - '8192' - '16384' - '32768' description: - Determine TCP Window size for packets replied by syn proxy module. type: str synproxy_tcp_windowscale: choices: - '0' - '1' - '2' - '3' - '4' - '5' - '6' - '7' - '8' - '9' - '10' - '11' - '12' - '13' - '14' description: - Determine TCP window scale option value for packets replied by syn proxy module. type: str synproxy_tos: choices: - '0' - '10' - '12' - '14' - '18' - '20' - '22' - '26' - '28' - '30' - '34' - '36' - '38' - '40' - '46' - '255' description: - Determine TCP differentiated services code point value (type of service). type: str synproxy_ttl: choices: - '32' - '64' - '128' - '255' description: - Determine Time to live (TTL) value for packets replied by syn proxy module. type: str threshold: description: - Anomaly threshold. Number of detected instances (packets per second or concurrent session number) that triggers the anomaly action. type: int threshold_default: description: - Number of detected instances per minute which triggers action (1 - 2147483647). Note that each anomaly has a different threshold value assigned to it. type: int type: list comments: description: - Comment. type: str dstaddr: description: - Destination address name from available addresses. elements: dict suboptions: name: description: - Address name. Source firewall.address.name firewall.addrgrp.name. required: true type: str type: list interface: description: - Incoming interface name from available interfaces. Source system.zone.name system.interface.name. type: str name: description: - Policy name. type: str policyid: description: - Policy ID. see <a href='#notes'>Notes</a>. required: true type: int service: description: - Service object from available options. elements: dict suboptions: name: description: - Service name. Source firewall.service.custom.name firewall.service.group.name. required: true type: str type: list srcaddr: description: - Source address name from available addresses. elements: dict suboptions: name: description: - Address name. Source firewall.address.name firewall.addrgrp.name. required: true type: str type: list status: choices: - enable - disable description: - Enable/disable this policy. type: str type: dict
build: description: Build number of the fortigate image returned: always sample: '1547' type: str http_method: description: Last method used to provision the content into FortiGate returned: always sample: PUT type: str http_status: description: Last result given by FortiGate on last operation applied returned: always sample: '200' type: str mkey: description: Master key (id) used in the last call to FortiGate returned: success sample: id type: str name: description: Name of the table used to fulfill the request returned: always sample: urlfilter type: str path: description: Path of the table used to fulfill the request returned: always sample: webfilter type: str revision: description: Internal revision number returned: always sample: 17.0.2.10658 type: str serial: description: Serial number of the unit returned: always sample: FGVMEVYYQT3AB5352 type: str status: description: Indication of the operation's result returned: always sample: success type: str vdom: description: Virtual domain used returned: always sample: root type: str version: description: Version of the FortiGate returned: always sample: v5.6.3 type: str