code
stringlengths 2.5k
150k
| kind
stringclasses 1
value |
---|---|
ansible fortinet.fortimanager.fmgr_user_local β Configure local users. fortinet.fortimanager.fmgr\_user\_local β Configure local users.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_local`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_local** dictionary | | the top level parameters set |
| | **auth-concurrent-override** string | **Choices:*** disable
* enable
| Enable/disable overriding the policy-auth-concurrent under config system global. |
| | **auth-concurrent-value** integer | | Maximum number of concurrent logins permitted from the same user. |
| | **authtimeout** integer | | Time in minutes before the authentication timeout for a user is reached. |
| | **email-to** string | | Two-factor recipients email address. |
| | **fortitoken** string | | Two-factor recipients FortiToken serial number. |
| | **id** integer | | User ID. |
| | **ldap-server** string | | Name of LDAP server with which the user must authenticate. |
| | **name** string | | User name. |
| | **passwd** string | | no description |
| | **passwd-policy** string | | Password policy to apply to this user, as defined in config user password-policy. |
| | **ppk-identity** string | | IKEv2 Postquantum Preshared Key Identity. |
| | **ppk-secret** string | | no description |
| | **radius-server** string | | Name of RADIUS server with which the user must authenticate. |
| | **sms-custom-server** string | | Two-factor recipients SMS server. |
| | **sms-phone** string | | Two-factor recipients mobile phone number. |
| | **sms-server** string | **Choices:*** fortiguard
* custom
| Send SMS through FortiGuard or other external server. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable allowing the local user to authenticate with the FortiGate unit. |
| | **tacacs+-server** string | | Name of TACACS+ server with which the user must authenticate. |
| | **two-factor** string | **Choices:*** disable
* fortitoken
* email
* sms
* fortitoken-cloud
| Enable/disable two-factor authentication. |
| | **two-factor-authentication** string | **Choices:*** fortitoken
* email
* sms
| Authentication method by FortiToken Cloud. |
| | **two-factor-notification** string | **Choices:*** email
* sms
| Notification method for user activation by FortiToken Cloud. |
| | **type** string | **Choices:*** password
* radius
* tacacs+
* ldap
| Authentication method. |
| | **username-case-insensitivity** string | **Choices:*** disable
* enable
| Enable/disable case sensitivity when performing username matching (uppercase and lowercase letters are treated either as disti... |
| | **username-case-sensitivity** string | **Choices:*** disable
* enable
| Enable/disable case sensitivity when performing username matching (uppercase and lowercase letters are treated either as disti... |
| | **workstation** string | | Name of the remote user workstation, if you want to limit the user to authenticate only from a particular workstation. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure local users.
fmgr_user_local:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_local:
auth-concurrent-override: <value in [disable, enable]>
auth-concurrent-value: <value of integer>
authtimeout: <value of integer>
email-to: <value of string>
fortitoken: <value of string>
id: <value of integer>
ldap-server: <value of string>
name: <value of string>
passwd: <value of string>
passwd-policy: <value of string>
ppk-identity: <value of string>
ppk-secret: <value of string>
radius-server: <value of string>
sms-custom-server: <value of string>
sms-phone: <value of string>
sms-server: <value in [fortiguard, custom]>
status: <value in [disable, enable]>
tacacs+-server: <value of string>
two-factor: <value in [disable, fortitoken, email, ...]>
type: <value in [password, radius, tacacs+, ...]>
workstation: <value of string>
two-factor-authentication: <value in [fortitoken, email, sms]>
two-factor-notification: <value in [email, sms]>
username-case-sensitivity: <value in [disable, enable]>
username-case-insensitivity: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_tacacs β TACACS+ server entry configuration. fortinet.fortimanager.fmgr\_system\_admin\_tacacs β TACACS+ server entry configuration.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_tacacs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_tacacs** dictionary | | the top level parameters set |
| | **authen-type** string | **Choices:*** **auto** β
* ascii
* pap
* chap
* mschap
| Authentication type. auto - Use PAP, MSCHAP, and CHAP (in that order). ascii - ASCII. pap - PAP. chap - CHAP. mschap - MSCHAP. |
| | **authorization** string | **Choices:*** **disable** β
* enable
| Enable/disable TACACS+ authorization. disable - Disable TACACS+ authorization. enable - Enable TACACS+ authorization (service = fortigate). |
| | **key** string | | no description |
| | **name** string | | TACACS+ server entry name. |
| | **port** integer | **Default:**49 | Port number of TACACS+ server. |
| | **secondary-key** string | | no description |
| | **secondary-server** string | | {<name\_str|ip\_str>} secondary server domain name or IP. |
| | **server** string | | {<name\_str|ip\_str>} server domain name or IP. |
| | **tertiary-key** string | | no description |
| | **tertiary-server** string | | {<name\_str|ip\_str>} tertiary server domain name or IP. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: TACACS+ server entry configuration.
fmgr_system_admin_tacacs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_admin_tacacs:
authen-type: <value in [auto, ascii, pap, ...]>
authorization: <value in [disable, enable]>
key: <value of string>
name: <value of string>
port: <value of integer>
secondary-key: <value of string>
secondary-server: <value of string>
server: <value of string>
tertiary-key: <value of string>
tertiary-server: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_certificate_crl β Certificate Revocation List. fortinet.fortimanager.fmgr\_system\_certificate\_crl β Certificate Revocation List.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_certificate_crl`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_certificate\_crl** dictionary | | the top level parameters set |
| | **comment** string | | Comment of this Certificate Revocation List. |
| | **crl** string | | no description |
| | **http-url** string | | HTTP server URL for CRL auto-update |
| | **name** string | | no description |
| | **update-interval** integer | **Default:**1440 | CRL auto-update interval (in minutes) |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Certificate Revocation List.
fmgr_system_certificate_crl:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_certificate_crl:
comment: <value of string>
crl: <value of string>
name: <value of string>
http-url: <value of string>
update-interval: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan β no description fortinet.fortimanager.fmgr\_fsp\_vlan β no description
======================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan** dictionary | | the top level parameters set |
| | **\_dhcp-status** string | **Choices:*** disable
* enable
| no description |
| | **auth** string | **Choices:*** radius
* usergroup
| no description |
| | **color** integer | | no description |
| | **comments** string | | no description |
| | **dhcp-server** dictionary | | no description |
| | | **auto-configuration** string | **Choices:*** disable
* enable
| Enable/disable auto configuration. |
| | | **auto-managed-status** string | **Choices:*** disable
* enable
| Enable/disable use of this DHCP server once this interface has been assigned an IP address from FortiIPAM. |
| | | **conflicted-ip-timeout** integer | | Time in seconds to wait after a conflicted IP address is removed from the DHCP range before it can be reused. |
| | | **ddns-auth** string | **Choices:*** disable
* tsig
| DDNS authentication mode. |
| | | **ddns-key** string | | DDNS update key (base 64 encoding). |
| | | **ddns-keyname** string | | DDNS update key name. |
| | | **ddns-server-ip** string | | DDNS server IP. |
| | | **ddns-ttl** integer | | TTL. |
| | | **ddns-update** string | **Choices:*** disable
* enable
| Enable/disable DDNS update for DHCP. |
| | | **ddns-update-override** string | **Choices:*** disable
* enable
| Enable/disable DDNS update override for DHCP. |
| | | **ddns-zone** string | | Zone of your domain name (ex. DDNS.com). |
| | | **default-gateway** string | | Default gateway IP address assigned by the DHCP server. |
| | | **dhcp-settings-from-fortiipam** string | **Choices:*** disable
* enable
| Enable/disable populating of DHCP server settings from FortiIPAM. |
| | | **dns-server1** string | | DNS server 1. |
| | | **dns-server2** string | | DNS server 2. |
| | | **dns-server3** string | | DNS server 3. |
| | | **dns-server4** string | | DNS server 4. |
| | | **dns-service** string | **Choices:*** default
* specify
* local
| Options for assigning DNS servers to DHCP clients. |
| | | **domain** string | | Domain name suffix for the IP addresses that the DHCP server assigns to clients. |
| | | **enable** string | **Choices:*** disable
* enable
| no description |
| | | **exclude-range** list / elements=string | | no description |
| | | | **end-ip** string | | End of IP range. |
| | | | **id** integer | | ID. |
| | | | **start-ip** string | | Start of IP range. |
| | | **filename** string | | Name of the boot file on the TFTP server. |
| | | **forticlient-on-net-status** string | **Choices:*** disable
* enable
| Enable/disable FortiClient-On-Net service for this DHCP server. |
| | | **id** integer | | ID. |
| | | **ip-mode** string | **Choices:*** range
* usrgrp
| Method used to assign client IP. |
| | | **ip-range** list / elements=string | | no description |
| | | | **end-ip** string | | End of IP range. |
| | | | **id** integer | | ID. |
| | | | **start-ip** string | | Start of IP range. |
| | | **ipsec-lease-hold** integer | | DHCP over IPsec leases expire this many seconds after tunnel down (0 to disable forced-expiry). |
| | | **lease-time** integer | | Lease time in seconds, 0 means unlimited. |
| | | **mac-acl-default-action** string | **Choices:*** assign
* block
| MAC access control default action (allow or block assigning IP settings). |
| | | **netmask** string | | Netmask assigned by the DHCP server. |
| | | **next-server** string | | IP address of a server (for example, a TFTP sever) that DHCP clients can download a boot file from. |
| | | **ntp-server1** string | | NTP server 1. |
| | | **ntp-server2** string | | NTP server 2. |
| | | **ntp-server3** string | | NTP server 3. |
| | | **ntp-service** string | **Choices:*** default
* specify
* local
| Options for assigning Network Time Protocol (NTP) servers to DHCP clients. |
| | | **option1** string | | no description |
| | | **option2** string | | no description |
| | | **option3** string | | no description |
| | | **option4** string | | no description |
| | | **option5** string | | no description |
| | | **option6** string | | no description |
| | | **options** list / elements=string | | no description |
| | | | **code** integer | | DHCP option code. |
| | | | **id** integer | | ID. |
| | | | **ip** string | | no description |
| | | | **type** string | **Choices:*** hex
* string
* ip
* fqdn
| DHCP option type. |
| | | | **value** string | | DHCP option value. |
| | | **reserved-address** list / elements=string | | no description |
| | | | **action** string | **Choices:*** assign
* block
* reserved
| Options for the DHCP server to configure the client with the reserved MAC address. |
| | | | **circuit-id** string | | Option 82 circuit-ID of the client that will get the reserved IP address. |
| | | | **circuit-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | | | **description** string | | Description. |
| | | | **id** integer | | ID. |
| | | | **ip** string | | IP address to be reserved for the MAC address. |
| | | | **mac** string | | MAC address of the client that will get the reserved IP address. |
| | | | **remote-id** string | | Option 82 remote-ID of the client that will get the reserved IP address. |
| | | | **remote-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | | | **type** string | **Choices:*** mac
* option82
| DHCP reserved-address type. |
| | | **server-type** string | **Choices:*** regular
* ipsec
| DHCP server can be a normal DHCP server or an IPsec DHCP server. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable this DHCP configuration. |
| | | **tftp-server** string | | no description |
| | | **timezone** string | **Choices:*** 00
* 01
* 02
* 03
* 04
* 05
* 06
* 07
* 08
* 09
* 10
* 11
* 12
* 13
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 22
* 23
* 24
* 25
* 26
* 27
* 28
* 29
* 30
* 31
* 32
* 33
* 34
* 35
* 36
* 37
* 38
* 39
* 40
* 41
* 42
* 43
* 44
* 45
* 46
* 47
* 48
* 49
* 50
* 51
* 52
* 53
* 54
* 55
* 56
* 57
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 66
* 67
* 68
* 69
* 70
* 71
* 72
* 73
* 74
* 75
* 76
* 77
* 78
* 79
* 80
* 81
* 82
* 83
* 84
* 85
* 86
* 87
| Select the time zone to be assigned to DHCP clients. |
| | | **timezone-option** string | **Choices:*** disable
* default
* specify
| Options for the DHCP server to set the clients time zone. |
| | | **vci-match** string | **Choices:*** disable
* enable
| Enable/disable vendor class identifier (VCI) matching. When enabled only DHCP requests with a matching VCI are served. |
| | | **vci-string** string | | no description |
| | | **wifi-ac-service** string | **Choices:*** specify
* local
| Options for assigning WiFi Access Controllers to DHCP clients |
| | | **wifi-ac1** string | | WiFi Access Controller 1 IP address (DHCP option 138, RFC 5417). |
| | | **wifi-ac2** string | | WiFi Access Controller 2 IP address (DHCP option 138, RFC 5417). |
| | | **wifi-ac3** string | | WiFi Access Controller 3 IP address (DHCP option 138, RFC 5417). |
| | | **wins-server1** string | | WINS server 1. |
| | | **wins-server2** string | | WINS server 2. |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_dhcp-status** string | **Choices:*** disable
* enable
| no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **dhcp-server** dictionary | | no description |
| | | | **auto-configuration** string | **Choices:*** disable
* enable
| Enable/disable auto configuration. |
| | | | **auto-managed-status** string | **Choices:*** disable
* enable
| Enable/disable use of this DHCP server once this interface has been assigned an IP address from FortiIPAM. |
| | | | **conflicted-ip-timeout** integer | | Time in seconds to wait after a conflicted IP address is removed from the DHCP range before it can be reused. |
| | | | **ddns-auth** string | **Choices:*** disable
* tsig
| DDNS authentication mode. |
| | | | **ddns-key** string | | DDNS update key (base 64 encoding). |
| | | | **ddns-keyname** string | | DDNS update key name. |
| | | | **ddns-server-ip** string | | DDNS server IP. |
| | | | **ddns-ttl** integer | | TTL. |
| | | | **ddns-update** string | **Choices:*** disable
* enable
| Enable/disable DDNS update for DHCP. |
| | | | **ddns-update-override** string | **Choices:*** disable
* enable
| Enable/disable DDNS update override for DHCP. |
| | | | **ddns-zone** string | | Zone of your domain name (ex. DDNS.com). |
| | | | **default-gateway** string | | Default gateway IP address assigned by the DHCP server. |
| | | | **dhcp-settings-from-fortiipam** string | **Choices:*** disable
* enable
| Enable/disable populating of DHCP server settings from FortiIPAM. |
| | | | **dns-server1** string | | DNS server 1. |
| | | | **dns-server2** string | | DNS server 2. |
| | | | **dns-server3** string | | DNS server 3. |
| | | | **dns-server4** string | | DNS server 4. |
| | | | **dns-service** string | **Choices:*** default
* specify
* local
| Options for assigning DNS servers to DHCP clients. |
| | | | **domain** string | | Domain name suffix for the IP addresses that the DHCP server assigns to clients. |
| | | | **enable** string | **Choices:*** disable
* enable
| no description |
| | | | **exclude-range** list / elements=string | | no description |
| | | | | **end-ip** string | | End of IP range. |
| | | | | **id** integer | | ID. |
| | | | | **start-ip** string | | Start of IP range. |
| | | | **filename** string | | Name of the boot file on the TFTP server. |
| | | | **forticlient-on-net-status** string | **Choices:*** disable
* enable
| Enable/disable FortiClient-On-Net service for this DHCP server. |
| | | | **id** integer | | ID. |
| | | | **ip-mode** string | **Choices:*** range
* usrgrp
| Method used to assign client IP. |
| | | | **ip-range** list / elements=string | | no description |
| | | | | **end-ip** string | | End of IP range. |
| | | | | **id** integer | | ID. |
| | | | | **start-ip** string | | Start of IP range. |
| | | | **ipsec-lease-hold** integer | | DHCP over IPsec leases expire this many seconds after tunnel down (0 to disable forced-expiry). |
| | | | **lease-time** integer | | Lease time in seconds, 0 means unlimited. |
| | | | **mac-acl-default-action** string | **Choices:*** assign
* block
| MAC access control default action (allow or block assigning IP settings). |
| | | | **netmask** string | | Netmask assigned by the DHCP server. |
| | | | **next-server** string | | IP address of a server (for example, a TFTP sever) that DHCP clients can download a boot file from. |
| | | | **ntp-server1** string | | NTP server 1. |
| | | | **ntp-server2** string | | NTP server 2. |
| | | | **ntp-server3** string | | NTP server 3. |
| | | | **ntp-service** string | **Choices:*** default
* specify
* local
| Options for assigning Network Time Protocol (NTP) servers to DHCP clients. |
| | | | **option1** string | | no description |
| | | | **option2** string | | no description |
| | | | **option3** string | | no description |
| | | | **option4** string | | no description |
| | | | **option5** string | | no description |
| | | | **option6** string | | no description |
| | | | **options** list / elements=string | | no description |
| | | | | **code** integer | | DHCP option code. |
| | | | | **id** integer | | ID. |
| | | | | **ip** string | | no description |
| | | | | **type** string | **Choices:*** hex
* string
* ip
* fqdn
| DHCP option type. |
| | | | | **value** string | | DHCP option value. |
| | | | **reserved-address** list / elements=string | | no description |
| | | | | **action** string | **Choices:*** assign
* block
* reserved
| Options for the DHCP server to configure the client with the reserved MAC address. |
| | | | | **circuit-id** string | | Option 82 circuit-ID of the client that will get the reserved IP address. |
| | | | | **circuit-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | | | | **description** string | | Description. |
| | | | | **id** integer | | ID. |
| | | | | **ip** string | | IP address to be reserved for the MAC address. |
| | | | | **mac** string | | MAC address of the client that will get the reserved IP address. |
| | | | | **remote-id** string | | Option 82 remote-ID of the client that will get the reserved IP address. |
| | | | | **remote-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | | | | **type** string | **Choices:*** mac
* option82
| DHCP reserved-address type. |
| | | | **server-type** string | **Choices:*** regular
* ipsec
| DHCP server can be a normal DHCP server or an IPsec DHCP server. |
| | | | **status** string | **Choices:*** disable
* enable
| Enable/disable this DHCP configuration. |
| | | | **tftp-server** string | | no description |
| | | | **timezone** string | **Choices:*** 00
* 01
* 02
* 03
* 04
* 05
* 06
* 07
* 08
* 09
* 10
* 11
* 12
* 13
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 22
* 23
* 24
* 25
* 26
* 27
* 28
* 29
* 30
* 31
* 32
* 33
* 34
* 35
* 36
* 37
* 38
* 39
* 40
* 41
* 42
* 43
* 44
* 45
* 46
* 47
* 48
* 49
* 50
* 51
* 52
* 53
* 54
* 55
* 56
* 57
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 66
* 67
* 68
* 69
* 70
* 71
* 72
* 73
* 74
* 75
* 76
* 77
* 78
* 79
* 80
* 81
* 82
* 83
* 84
* 85
* 86
* 87
| Select the time zone to be assigned to DHCP clients. |
| | | | **timezone-option** string | **Choices:*** disable
* default
* specify
| Options for the DHCP server to set the clients time zone. |
| | | | **vci-match** string | **Choices:*** disable
* enable
| Enable/disable vendor class identifier (VCI) matching. When enabled only DHCP requests with a matching VCI are... |
| | | | **vci-string** string | | no description |
| | | | **wifi-ac-service** string | **Choices:*** specify
* local
| Options for assigning WiFi Access Controllers to DHCP clients |
| | | | **wifi-ac1** string | | WiFi Access Controller 1 IP address (DHCP option 138, RFC 5417). |
| | | | **wifi-ac2** string | | WiFi Access Controller 2 IP address (DHCP option 138, RFC 5417). |
| | | | **wifi-ac3** string | | WiFi Access Controller 3 IP address (DHCP option 138, RFC 5417). |
| | | | **wins-server1** string | | WINS server 1. |
| | | | **wins-server2** string | | WINS server 2. |
| | | **interface** dictionary | | no description |
| | | | **dhcp-relay-agent-option** string | **Choices:*** disable
* enable
| no description |
| | | | **dhcp-relay-ip** string | | no description |
| | | | **dhcp-relay-service** string | **Choices:*** disable
* enable
| no description |
| | | | **dhcp-relay-type** string | **Choices:*** regular
* ipsec
| no description |
| | | | **ip** string | | no description |
| | | | **ipv6** dictionary | | no description |
| | | | | **autoconf** string | **Choices:*** disable
* enable
| Enable/disable address auto config. |
| | | | | **cli-conn6-status** integer | | no description |
| | | | | **dhcp6-client-options** list / elements=string | **Choices:*** rapid
* iapd
* iana
* dns
* dnsname
| no description |
| | | | | **dhcp6-information-request** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 information request. |
| | | | | **dhcp6-prefix-delegation** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 prefix delegation. |
| | | | | **dhcp6-prefix-hint** string | | DHCPv6 prefix that will be used as a hint to the upstream DHCPv6 server. |
| | | | | **dhcp6-prefix-hint-plt** integer | | DHCPv6 prefix hint preferred life time (sec), 0 means unlimited lease time. |
| | | | | **dhcp6-prefix-hint-vlt** integer | | DHCPv6 prefix hint valid life time (sec). |
| | | | | **dhcp6-relay-ip** string | | DHCPv6 relay IP address. |
| | | | | **dhcp6-relay-service** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 relay. |
| | | | | **dhcp6-relay-type** string | **Choices:*** regular
| DHCPv6 relay type. |
| | | | | **icmp6-send-redirect** string | **Choices:*** disable
* enable
| Enable/disable sending of ICMPv6 redirects. |
| | | | | **interface-identifier** string | | IPv6 interface identifier. |
| | | | | **ip6-address** string | | Primary IPv6 address prefix, syntax: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx |
| | | | | **ip6-allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* capwap
* fabric
| no description |
| | | | | **ip6-default-life** integer | | Default life (sec). |
| | | | | **ip6-delegated-prefix-list** list / elements=string | | no description |
| | | | | | **autonomous-flag** string | **Choices:*** disable
* enable
| Enable/disable the autonomous flag. |
| | | | | | **onlink-flag** string | **Choices:*** disable
* enable
| Enable/disable the onlink flag. |
| | | | | | **prefix-id** integer | | Prefix ID. |
| | | | | | **rdnss** string | | no description |
| | | | | | **rdnss-service** string | **Choices:*** delegated
* default
* specify
| Recursive DNS service option. |
| | | | | | **subnet** string | | Add subnet ID to routing prefix. |
| | | | | | **upstream-interface** string | | Name of the interface that provides delegated information. |
| | | | | **ip6-dns-server-override** string | **Choices:*** disable
* enable
| Enable/disable using the DNS server acquired by DHCP. |
| | | | | **ip6-extra-addr** list / elements=string | | no description |
| | | | | | **prefix** string | | IPv6 address prefix. |
| | | | | **ip6-hop-limit** integer | | Hop limit (0 means unspecified). |
| | | | | **ip6-link-mtu** integer | | IPv6 link MTU. |
| | | | | **ip6-manage-flag** string | **Choices:*** disable
* enable
| Enable/disable the managed flag. |
| | | | | **ip6-max-interval** integer | | IPv6 maximum interval (4 to 1800 sec). |
| | | | | **ip6-min-interval** integer | | IPv6 minimum interval (3 to 1350 sec). |
| | | | | **ip6-mode** string | **Choices:*** static
* dhcp
* pppoe
* delegated
| Addressing mode (static, DHCP, delegated). |
| | | | | **ip6-other-flag** string | **Choices:*** disable
* enable
| Enable/disable the other IPv6 flag. |
| | | | | **ip6-prefix-list** list / elements=string | | no description |
| | | | | | **autonomous-flag** string | **Choices:*** disable
* enable
| Enable/disable the autonomous flag. |
| | | | | | **dnssl** string | | no description |
| | | | | | **onlink-flag** string | **Choices:*** disable
* enable
| Enable/disable the onlink flag. |
| | | | | | **preferred-life-time** integer | | Preferred life time (sec). |
| | | | | | **prefix** string | | IPv6 prefix. |
| | | | | | **rdnss** string | | no description |
| | | | | | **valid-life-time** integer | | Valid life time (sec). |
| | | | | **ip6-prefix-mode** string | **Choices:*** dhcp6
* ra
| Assigning a prefix from DHCP or RA. |
| | | | | **ip6-reachable-time** integer | | IPv6 reachable time (milliseconds; 0 means unspecified). |
| | | | | **ip6-retrans-time** integer | | IPv6 retransmit time (milliseconds; 0 means unspecified). |
| | | | | **ip6-send-adv** string | **Choices:*** disable
* enable
| Enable/disable sending advertisements about the interface. |
| | | | | **ip6-subnet** string | | Subnet to routing prefix, syntax: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx |
| | | | | **ip6-upstream-interface** string | | Interface name providing delegated information. |
| | | | | **nd-cert** string | | Neighbor discovery certificate. |
| | | | | **nd-cga-modifier** string | | Neighbor discovery CGA modifier. |
| | | | | **nd-mode** string | **Choices:*** basic
* SEND-compatible
| Neighbor discovery mode. |
| | | | | **nd-security-level** integer | | Neighbor discovery security level (0 - 7; 0 = least secure, default = 0). |
| | | | | **nd-timestamp-delta** integer | | Neighbor discovery timestamp delta value (1 - 3600 sec; default = 300). |
| | | | | **nd-timestamp-fuzz** integer | | Neighbor discovery timestamp fuzz factor (1 - 60 sec; default = 1). |
| | | | | **ra-send-mtu** string | **Choices:*** disable
* enable
| Enable/disable sending link MTU in RA packet. |
| | | | | **unique-autoconf-addr** string | **Choices:*** disable
* enable
| Enable/disable unique auto config address. |
| | | | | **vrip6\_link\_local** string | | Link-local IPv6 address of virtual router. |
| | | | | **vrrp-virtual-mac6** string | **Choices:*** disable
* enable
| Enable/disable virtual MAC for VRRP. |
| | | | | **vrrp6** list / elements=string | | no description |
| | | | | | **accept-mode** string | **Choices:*** disable
* enable
| Enable/disable accept mode. |
| | | | | | **adv-interval** integer | | Advertisement interval (1 - 255 seconds). |
| | | | | | **preempt** string | **Choices:*** disable
* enable
| Enable/disable preempt mode. |
| | | | | | **priority** integer | | Priority of the virtual router (1 - 255). |
| | | | | | **start-time** integer | | Startup time (1 - 255 seconds). |
| | | | | | **status** string | **Choices:*** disable
* enable
| Enable/disable VRRP. |
| | | | | | **vrdst6** string | | Monitor the route to this destination. |
| | | | | | **vrgrp** integer | | VRRP group ID (1 - 65535). |
| | | | | | **vrid** integer | | Virtual router identifier (1 - 255). |
| | | | | | **vrip6** string | | IPv6 address of the virtual router. |
| | | | **secondary-IP** string | **Choices:*** disable
* enable
| no description |
| | | | **secondaryip** list / elements=string | | no description |
| | | | | **allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
* dnp
* ftm
* fabric
| no description |
| | | | | **detectprotocol** list / elements=string | **Choices:*** ping
* tcp-echo
* udp-echo
| no description |
| | | | | **detectserver** string | | Gateways ping server for this IP. |
| | | | | **gwdetect** string | **Choices:*** disable
* enable
| Enable/disable detect gateway alive for first. |
| | | | | **ha-priority** integer | | HA election priority for the PING server. |
| | | | | **id** integer | | ID. |
| | | | | **ip** string | | Secondary IP address of the interface. |
| | | | | **ping-serv-status** integer | | no description |
| | | | | **seq** integer | | no description |
| | | | **vlanid** integer | | no description |
| | **interface** dictionary | | no description |
| | | **ac-name** string | | PPPoE server name. |
| | | **aggregate** string | | no description |
| | | **algorithm** string | **Choices:*** L2
* L3
* L4
| Frame distribution algorithm. |
| | | **alias** string | | Alias will be displayed with the interface name to make it easier to distinguish. |
| | | **allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
* dnp
* ftm
* fabric
| no description |
| | | **ap-discover** string | **Choices:*** disable
* enable
| Enable/disable automatic registration of unknown FortiAP devices. |
| | | **arpforward** string | **Choices:*** disable
* enable
| Enable/disable ARP forwarding. |
| | | **atm-protocol** string | **Choices:*** none
* ipoa
| ATM protocol. |
| | | **auth-type** string | **Choices:*** auto
* pap
* chap
* mschapv1
* mschapv2
| PPP authentication type to use. |
| | | **auto-auth-extension-device** string | **Choices:*** disable
* enable
| Enable/disable automatic authorization of dedicated Fortinet extension device on this interface. |
| | | **bandwidth-measure-time** integer | | Bandwidth measure time |
| | | **bfd** string | **Choices:*** global
* enable
* disable
| Bidirectional Forwarding Detection (BFD) settings. |
| | | **bfd-desired-min-tx** integer | | BFD desired minimal transmit interval. |
| | | **bfd-detect-mult** integer | | BFD detection multiplier. |
| | | **bfd-required-min-rx** integer | | BFD required minimal receive interval. |
| | | **broadcast-forticlient-discovery** string | **Choices:*** disable
* enable
| no description |
| | | **broadcast-forward** string | **Choices:*** disable
* enable
| Enable/disable broadcast forwarding. |
| | | **captive-portal** integer | | Enable/disable captive portal. |
| | | **cli-conn-status** integer | | no description |
| | | **color** integer | | Color of icon on the GUI. |
| | | **ddns** string | **Choices:*** disable
* enable
| no description |
| | | **ddns-auth** string | **Choices:*** disable
* tsig
| no description |
| | | **ddns-domain** string | | no description |
| | | **ddns-key** string | | no description |
| | | **ddns-keyname** string | | no description |
| | | **ddns-password** string | | no description |
| | | **ddns-server** string | **Choices:*** dhs.org
* dyndns.org
* dyns.net
* tzo.com
* ods.org
* vavic.com
* now.net.cn
* dipdns.net
* easydns.com
* genericDDNS
| no description |
| | | **ddns-server-ip** string | | no description |
| | | **ddns-sn** string | | no description |
| | | **ddns-ttl** integer | | no description |
| | | **ddns-username** string | | no description |
| | | **ddns-zone** string | | no description |
| | | **dedicated-to** string | **Choices:*** none
* management
| Configure interface for single purpose. |
| | | **defaultgw** string | **Choices:*** disable
* enable
| Enable to get the gateway IP from the DHCP or PPPoE server. |
| | | **description** string | | Description. |
| | | **detected-peer-mtu** integer | | no description |
| | | **detectprotocol** list / elements=string | **Choices:*** ping
* tcp-echo
* udp-echo
| no description |
| | | **detectserver** string | | Gateways ping server for this IP. |
| | | **device-access-list** string | | no description |
| | | **device-identification** string | **Choices:*** disable
* enable
| Enable/disable passively gathering of device identity information about the devices on the network connected to this i... |
| | | **device-identification-active-scan** string | **Choices:*** disable
* enable
| no description |
| | | **device-netscan** string | **Choices:*** disable
* enable
| no description |
| | | **device-user-identification** string | **Choices:*** disable
* enable
| Enable/disable passive gathering of user identity information about users on this interface. |
| | | **devindex** integer | | no description |
| | | **dhcp-client-identifier** string | | DHCP client identifier. |
| | | **dhcp-relay-agent-option** string | **Choices:*** disable
* enable
| Enable/disable DHCP relay agent option. |
| | | **dhcp-relay-interface** string | | Specify outgoing interface to reach server. |
| | | **dhcp-relay-interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | | **dhcp-relay-ip** string | | no description |
| | | **dhcp-relay-request-all-server** string | **Choices:*** disable
* enable
| Enable/disable sending of DHCP requests to all servers. |
| | | **dhcp-relay-service** string | **Choices:*** disable
* enable
| Enable/disable allowing this interface to act as a DHCP relay. |
| | | **dhcp-relay-type** string | **Choices:*** regular
* ipsec
| DHCP relay type (regular or IPsec). |
| | | **dhcp-renew-time** integer | | DHCP renew time in seconds (300-604800), 0 means use the renew time provided by the server. |
| | | **disc-retry-timeout** integer | | Time in seconds to wait before retrying to start a PPPoE discovery, 0 means no timeout. |
| | | **disconnect-threshold** integer | | Time in milliseconds to wait before sending a notification that this interface is down or disconnected. |
| | | **distance** integer | | Distance for routes learned through PPPoE or DHCP, lower distance indicates preferred route. |
| | | **dns-query** string | **Choices:*** disable
* recursive
* non-recursive
| no description |
| | | **dns-server-override** string | **Choices:*** disable
* enable
| Enable/disable use DNS acquired by DHCP or PPPoE. |
| | | **drop-fragment** string | **Choices:*** disable
* enable
| Enable/disable drop fragment packets. |
| | | **drop-overlapped-fragment** string | **Choices:*** disable
* enable
| Enable/disable drop overlapped fragment packets. |
| | | **egress-cos** string | **Choices:*** disable
* cos0
* cos1
* cos2
* cos3
* cos4
* cos5
* cos6
* cos7
| Override outgoing CoS in user VLAN tag. |
| | | **egress-shaping-profile** string | | Outgoing traffic shaping profile. |
| | | **eip** string | | no description |
| | | **endpoint-compliance** string | **Choices:*** disable
* enable
| no description |
| | | **estimated-downstream-bandwidth** integer | | Estimated maximum downstream bandwidth (kbps). Used to estimate link utilization. |
| | | **estimated-upstream-bandwidth** integer | | Estimated maximum upstream bandwidth (kbps). Used to estimate link utilization. |
| | | **explicit-ftp-proxy** string | **Choices:*** disable
* enable
| Enable/disable the explicit FTP proxy on this interface. |
| | | **explicit-web-proxy** string | **Choices:*** disable
* enable
| Enable/disable the explicit web proxy on this interface. |
| | | **external** string | **Choices:*** disable
* enable
| Enable/disable identifying the interface as an external interface (which usually means its connected to the Internet). |
| | | **fail-action-on-extender** string | **Choices:*** soft-restart
* hard-restart
* reboot
| Action on extender when interface fail . |
| | | **fail-alert-interfaces** string | | Names of the FortiGate interfaces to which the link failure alert is sent. |
| | | **fail-alert-method** string | **Choices:*** link-failed-signal
* link-down
| Select link-failed-signal or link-down method to alert about a failed link. |
| | | **fail-detect** string | **Choices:*** disable
* enable
| Enable/disable fail detection features for this interface. |
| | | **fail-detect-option** list / elements=string | **Choices:*** detectserver
* link-down
| no description |
| | | **fdp** string | **Choices:*** disable
* enable
| no description |
| | | **fortiheartbeat** string | **Choices:*** disable
* enable
| no description |
| | | **fortilink** string | **Choices:*** disable
* enable
| Enable FortiLink to dedicate this interface to manage other Fortinet devices. |
| | | **fortilink-backup-link** integer | | no description |
| | | **fortilink-neighbor-detect** string | **Choices:*** lldp
* fortilink
| Protocol for FortiGate neighbor discovery. |
| | | **fortilink-split-interface** string | **Choices:*** disable
* enable
| Enable/disable FortiLink split interface to connect member link to different FortiSwitch in stack for uplink redundancy. |
| | | **fortilink-stacking** string | **Choices:*** disable
* enable
| Enable/disable FortiLink switch-stacking on this interface. |
| | | **forward-domain** integer | | Transparent mode forward domain. |
| | | **forward-error-correction** string | **Choices:*** disable
* enable
* rs-fec
* base-r-fec
* fec-cl91
* fec-cl74
| Enable/disable forward error correction (FEC Clause 91). |
| | | **fp-anomaly** list / elements=string | **Choices:*** drop\_tcp\_fin\_noack
* pass\_winnuke
* pass\_tcpland
* pass\_udpland
* pass\_icmpland
* pass\_ipland
* pass\_iprr
* pass\_ipssrr
* pass\_iplsrr
* pass\_ipstream
* pass\_ipsecurity
* pass\_iptimestamp
* pass\_ipunknown\_option
* pass\_ipunknown\_prot
* pass\_icmp\_frag
* pass\_tcp\_no\_flag
* pass\_tcp\_fin\_noack
* drop\_winnuke
* drop\_tcpland
* drop\_udpland
* drop\_icmpland
* drop\_ipland
* drop\_iprr
* drop\_ipssrr
* drop\_iplsrr
* drop\_ipstream
* drop\_ipsecurity
* drop\_iptimestamp
* drop\_ipunknown\_option
* drop\_ipunknown\_prot
* drop\_icmp\_frag
* drop\_tcp\_no\_flag
| no description |
| | | **fp-disable** list / elements=string | **Choices:*** all
* ipsec
* none
| no description |
| | | **gateway-address** string | | Gateway address |
| | | **gi-gk** string | **Choices:*** disable
* enable
| Enable/disable Gi Gatekeeper. |
| | | **gwaddr** string | | Gateway address |
| | | **gwdetect** string | **Choices:*** disable
* enable
| Enable/disable detect gateway alive for first. |
| | | **ha-priority** integer | | HA election priority for the PING server. |
| | | **icmp-accept-redirect** string | **Choices:*** disable
* enable
| Enable/disable ICMP accept redirect. |
| | | **icmp-redirect** string | **Choices:*** disable
* enable
| no description |
| | | **icmp-send-redirect** string | **Choices:*** disable
* enable
| Enable/disable sending of ICMP redirects. |
| | | **ident-accept** string | **Choices:*** disable
* enable
| Enable/disable authentication for this interface. |
| | | **idle-timeout** integer | | PPPoE auto disconnect after idle timeout seconds, 0 means no timeout. |
| | | **if-mdix** string | **Choices:*** auto
* normal
* crossover
| no description |
| | | **if-media** string | **Choices:*** auto
* copper
* fiber
| no description |
| | | **in-force-vlan-cos** integer | | no description |
| | | **inbandwidth** integer | | Bandwidth limit for incoming traffic (0 - 16776000 kbps), 0 means unlimited. |
| | | **ingress-cos** string | **Choices:*** disable
* cos0
* cos1
* cos2
* cos3
* cos4
* cos5
* cos6
* cos7
| Override incoming CoS in user VLAN tag on VLAN interface or assign a priority VLAN tag on physical interface. |
| | | **ingress-shaping-profile** string | | Incoming traffic shaping profile. |
| | | **ingress-spillover-threshold** integer | | Ingress Spillover threshold (0 - 16776000 kbps), 0 means unlimited. |
| | | **internal** integer | | Implicitly created. |
| | | **ip** string | | Interface IPv4 address and subnet mask, syntax: X.X.X.X/24. |
| | | **ip-managed-by-fortiipam** string | **Choices:*** disable
* enable
| Enable/disable automatic IP address assignment of this interface by FortiIPAM. |
| | | **ipmac** string | **Choices:*** disable
* enable
| Enable/disable IP/MAC binding. |
| | | **ips-sniffer-mode** string | **Choices:*** disable
* enable
| Enable/disable the use of this interface as a one-armed sniffer. |
| | | **ipunnumbered** string | | Unnumbered IP used for PPPoE interfaces for which no unique local address is provided. |
| | | **ipv6** dictionary | | no description |
| | | | **autoconf** string | **Choices:*** disable
* enable
| Enable/disable address auto config. |
| | | | **cli-conn6-status** integer | | no description |
| | | | **dhcp6-client-options** list / elements=string | **Choices:*** rapid
* iapd
* iana
* dns
* dnsname
| no description |
| | | | **dhcp6-information-request** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 information request. |
| | | | **dhcp6-prefix-delegation** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 prefix delegation. |
| | | | **dhcp6-prefix-hint** string | | DHCPv6 prefix that will be used as a hint to the upstream DHCPv6 server. |
| | | | **dhcp6-prefix-hint-plt** integer | | DHCPv6 prefix hint preferred life time (sec), 0 means unlimited lease time. |
| | | | **dhcp6-prefix-hint-vlt** integer | | DHCPv6 prefix hint valid life time (sec). |
| | | | **dhcp6-relay-ip** string | | DHCPv6 relay IP address. |
| | | | **dhcp6-relay-service** string | **Choices:*** disable
* enable
| Enable/disable DHCPv6 relay. |
| | | | **dhcp6-relay-type** string | **Choices:*** regular
| DHCPv6 relay type. |
| | | | **icmp6-send-redirect** string | **Choices:*** disable
* enable
| Enable/disable sending of ICMPv6 redirects. |
| | | | **interface-identifier** string | | IPv6 interface identifier. |
| | | | **ip6-address** string | | Primary IPv6 address prefix, syntax: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx |
| | | | **ip6-allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* capwap
* fabric
| no description |
| | | | **ip6-default-life** integer | | Default life (sec). |
| | | | **ip6-delegated-prefix-list** list / elements=string | | no description |
| | | | | **autonomous-flag** string | **Choices:*** disable
* enable
| Enable/disable the autonomous flag. |
| | | | | **onlink-flag** string | **Choices:*** disable
* enable
| Enable/disable the onlink flag. |
| | | | | **prefix-id** integer | | Prefix ID. |
| | | | | **rdnss** string | | no description |
| | | | | **rdnss-service** string | **Choices:*** delegated
* default
* specify
| Recursive DNS service option. |
| | | | | **subnet** string | | Add subnet ID to routing prefix. |
| | | | | **upstream-interface** string | | Name of the interface that provides delegated information. |
| | | | **ip6-dns-server-override** string | **Choices:*** disable
* enable
| Enable/disable using the DNS server acquired by DHCP. |
| | | | **ip6-extra-addr** list / elements=string | | no description |
| | | | | **prefix** string | | IPv6 address prefix. |
| | | | **ip6-hop-limit** integer | | Hop limit (0 means unspecified). |
| | | | **ip6-link-mtu** integer | | IPv6 link MTU. |
| | | | **ip6-manage-flag** string | **Choices:*** disable
* enable
| Enable/disable the managed flag. |
| | | | **ip6-max-interval** integer | | IPv6 maximum interval (4 to 1800 sec). |
| | | | **ip6-min-interval** integer | | IPv6 minimum interval (3 to 1350 sec). |
| | | | **ip6-mode** string | **Choices:*** static
* dhcp
* pppoe
* delegated
| Addressing mode (static, DHCP, delegated). |
| | | | **ip6-other-flag** string | **Choices:*** disable
* enable
| Enable/disable the other IPv6 flag. |
| | | | **ip6-prefix-list** list / elements=string | | no description |
| | | | | **autonomous-flag** string | **Choices:*** disable
* enable
| Enable/disable the autonomous flag. |
| | | | | **dnssl** string | | no description |
| | | | | **onlink-flag** string | **Choices:*** disable
* enable
| Enable/disable the onlink flag. |
| | | | | **preferred-life-time** integer | | Preferred life time (sec). |
| | | | | **prefix** string | | IPv6 prefix. |
| | | | | **rdnss** string | | no description |
| | | | | **valid-life-time** integer | | Valid life time (sec). |
| | | | **ip6-prefix-mode** string | **Choices:*** dhcp6
* ra
| Assigning a prefix from DHCP or RA. |
| | | | **ip6-reachable-time** integer | | IPv6 reachable time (milliseconds; 0 means unspecified). |
| | | | **ip6-retrans-time** integer | | IPv6 retransmit time (milliseconds; 0 means unspecified). |
| | | | **ip6-send-adv** string | **Choices:*** disable
* enable
| Enable/disable sending advertisements about the interface. |
| | | | **ip6-subnet** string | | Subnet to routing prefix, syntax: xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx/xxx |
| | | | **ip6-upstream-interface** string | | Interface name providing delegated information. |
| | | | **nd-cert** string | | Neighbor discovery certificate. |
| | | | **nd-cga-modifier** string | | Neighbor discovery CGA modifier. |
| | | | **nd-mode** string | **Choices:*** basic
* SEND-compatible
| Neighbor discovery mode. |
| | | | **nd-security-level** integer | | Neighbor discovery security level (0 - 7; 0 = least secure, default = 0). |
| | | | **nd-timestamp-delta** integer | | Neighbor discovery timestamp delta value (1 - 3600 sec; default = 300). |
| | | | **nd-timestamp-fuzz** integer | | Neighbor discovery timestamp fuzz factor (1 - 60 sec; default = 1). |
| | | | **ra-send-mtu** string | **Choices:*** disable
* enable
| Enable/disable sending link MTU in RA packet. |
| | | | **unique-autoconf-addr** string | **Choices:*** disable
* enable
| Enable/disable unique auto config address. |
| | | | **vrip6\_link\_local** string | | Link-local IPv6 address of virtual router. |
| | | | **vrrp-virtual-mac6** string | **Choices:*** disable
* enable
| Enable/disable virtual MAC for VRRP. |
| | | | **vrrp6** list / elements=string | | no description |
| | | | | **accept-mode** string | **Choices:*** disable
* enable
| Enable/disable accept mode. |
| | | | | **adv-interval** integer | | Advertisement interval (1 - 255 seconds). |
| | | | | **preempt** string | **Choices:*** disable
* enable
| Enable/disable preempt mode. |
| | | | | **priority** integer | | Priority of the virtual router (1 - 255). |
| | | | | **start-time** integer | | Startup time (1 - 255 seconds). |
| | | | | **status** string | **Choices:*** disable
* enable
| Enable/disable VRRP. |
| | | | | **vrdst6** string | | Monitor the route to this destination. |
| | | | | **vrgrp** integer | | VRRP group ID (1 - 65535). |
| | | | | **vrid** integer | | Virtual router identifier (1 - 255). |
| | | | | **vrip6** string | | IPv6 address of the virtual router. |
| | | **l2forward** string | **Choices:*** disable
* enable
| Enable/disable l2 forwarding. |
| | | **l2tp-client** string | **Choices:*** disable
* enable
| Enable/disable this interface as a Layer 2 Tunnelling Protocol (L2TP) client. |
| | | **lacp-ha-slave** string | **Choices:*** disable
* enable
| LACP HA slave. |
| | | **lacp-mode** string | **Choices:*** static
* passive
* active
| LACP mode. |
| | | **lacp-speed** string | **Choices:*** slow
* fast
| How often the interface sends LACP messages. |
| | | **lcp-echo-interval** integer | | Time in seconds between PPPoE Link Control Protocol (LCP) echo requests. |
| | | **lcp-max-echo-fails** integer | | Maximum missed LCP echo messages before disconnect. |
| | | **link-up-delay** integer | | Number of milliseconds to wait before considering a link is up. |
| | | **listen-forticlient-connection** string | **Choices:*** disable
* enable
| no description |
| | | **lldp-network-policy** string | | LLDP-MED network policy profile. |
| | | **lldp-reception** string | **Choices:*** disable
* enable
* vdom
| Enable/disable Link Layer Discovery Protocol (LLDP) reception. |
| | | **lldp-transmission** string | **Choices:*** enable
* disable
* vdom
| Enable/disable Link Layer Discovery Protocol (LLDP) transmission. |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **macaddr** string | | Change the interfaces MAC address. |
| | | **managed-subnetwork-size** string | **Choices:*** 256
* 512
* 1024
* 2048
* 4096
* 8192
* 16384
* 32768
* 65536
| Number of IP addresses to be allocated by FortiIPAM and used by this FortiGate units DHCP server settings. |
| | | **management-ip** string | | High Availability in-band management IP address of this interface. |
| | | **max-egress-burst-rate** integer | | no description |
| | | **max-egress-rate** integer | | no description |
| | | **measured-downstream-bandwidth** integer | | Measured downstream bandwidth (kbps). |
| | | **measured-upstream-bandwidth** integer | | Measured upstream bandwidth (kbps). |
| | | **mediatype** string | **Choices:*** serdes-sfp
* sgmii-sfp
* cfp2-sr10
* cfp2-lr4
* serdes-copper-sfp
* sr
* cr
* lr
* qsfp28-sr4
* qsfp28-lr4
* qsfp28-cr4
* sr4
* cr4
* lr4
| Select SFP media interface type |
| | | **member** string | | Physical interfaces that belong to the aggregate or redundant interface. |
| | | **min-links** integer | | Minimum number of aggregated ports that must be up. |
| | | **min-links-down** string | **Choices:*** operational
* administrative
| Action to take when less than the configured minimum number of links are active. |
| | | **mode** string | **Choices:*** static
* dhcp
* pppoe
* pppoa
* ipoa
* eoa
| Addressing mode (static, DHCP, PPPoE). |
| | | **monitor-bandwidth** string | **Choices:*** disable
* enable
| Enable monitoring bandwidth on this interface. |
| | | **mtu** integer | | MTU value for this interface. |
| | | **mtu-override** string | **Choices:*** disable
* enable
| Enable to set a custom MTU for this interface. |
| | | **mux-type** string | **Choices:*** llc-encaps
* vc-encaps
| Multiplexer type |
| | | **name** string | | Name. |
| | | **ndiscforward** string | **Choices:*** disable
* enable
| Enable/disable NDISC forwarding. |
| | | **netbios-forward** string | **Choices:*** disable
* enable
| Enable/disable NETBIOS forwarding. |
| | | **netflow-sampler** string | **Choices:*** disable
* tx
* rx
* both
| Enable/disable NetFlow on this interface and set the data that NetFlow collects (rx, tx, or both). |
| | | **np-qos-profile** integer | | no description |
| | | **npu-fastpath** string | **Choices:*** disable
* enable
| no description |
| | | **nst** string | **Choices:*** disable
* enable
| no description |
| | | **out-force-vlan-cos** integer | | no description |
| | | **outbandwidth** integer | | Bandwidth limit for outgoing traffic (0 - 16776000 kbps), 0 means unlimited. |
| | | **padt-retry-timeout** integer | | PPPoE Active Discovery Terminate (PADT) used to terminate sessions after an idle time. |
| | | **password** string | | no description |
| | | **peer-interface** string | | no description |
| | | **phy-mode** string | **Choices:*** auto
* adsl
* vdsl
| DSL physical mode. |
| | | **ping-serv-status** integer | | no description |
| | | **poe** string | **Choices:*** disable
* enable
| Enable/disable PoE status. |
| | | **polling-interval** integer | | sFlow polling interval (1 - 255 sec). |
| | | **pppoe-unnumbered-negotiate** string | **Choices:*** disable
* enable
| Enable/disable PPPoE unnumbered negotiation. |
| | | **pptp-auth-type** string | **Choices:*** auto
* pap
* chap
* mschapv1
* mschapv2
| PPTP authentication type. |
| | | **pptp-client** string | **Choices:*** disable
* enable
| Enable/disable PPTP client. |
| | | **pptp-password** string | | no description |
| | | **pptp-server-ip** string | | PPTP server IP address. |
| | | **pptp-timeout** integer | | Idle timer in minutes (0 for disabled). |
| | | **pptp-user** string | | PPTP user name. |
| | | **preserve-session-route** string | **Choices:*** disable
* enable
| Enable/disable preservation of session route when dirty. |
| | | **priority** integer | | Priority of learned routes. |
| | | **priority-override** string | **Choices:*** disable
* enable
| Enable/disable fail back to higher priority port once recovered. |
| | | **proxy-captive-portal** string | **Choices:*** disable
* enable
| Enable/disable proxy captive portal on this interface. |
| | | **redundant-interface** string | | no description |
| | | **remote-ip** string | | Remote IP address of tunnel. |
| | | **replacemsg-override-group** string | | Replacement message override group. |
| | | **retransmission** string | **Choices:*** disable
* enable
| Enable/disable DSL retransmission. |
| | | **ring-rx** integer | | RX ring size. |
| | | **ring-tx** integer | | TX ring size. |
| | | **role** string | **Choices:*** lan
* wan
* dmz
* undefined
| Interface role. |
| | | **sample-direction** string | **Choices:*** rx
* tx
* both
| Data that NetFlow collects (rx, tx, or both). |
| | | **sample-rate** integer | | sFlow sample rate (10 - 99999). |
| | | **scan-botnet-connections** string | **Choices:*** disable
* block
* monitor
| no description |
| | | **secondary-IP** string | **Choices:*** disable
* enable
| Enable/disable adding a secondary IP to this interface. |
| | | **secondaryip** list / elements=string | | no description |
| | | | **allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
* dnp
* ftm
* fabric
| no description |
| | | | **detectprotocol** list / elements=string | **Choices:*** ping
* tcp-echo
* udp-echo
| no description |
| | | | **detectserver** string | | Gateways ping server for this IP. |
| | | | **gwdetect** string | **Choices:*** disable
* enable
| Enable/disable detect gateway alive for first. |
| | | | **ha-priority** integer | | HA election priority for the PING server. |
| | | | **id** integer | | ID. |
| | | | **ip** string | | Secondary IP address of the interface. |
| | | | **ping-serv-status** integer | | no description |
| | | | **seq** integer | | no description |
| | | **security-8021x-dynamic-vlan-id** integer | | VLAN ID for virtual switch. |
| | | **security-8021x-master** string | | 802.1X master virtual-switch. |
| | | **security-8021x-mode** string | **Choices:*** default
* dynamic-vlan
* fallback
* slave
| 802.1X mode. |
| | | **security-exempt-list** string | | Name of security-exempt-list. |
| | | **security-external-logout** string | | URL of external authentication logout server. |
| | | **security-external-web** string | | URL of external authentication web server. |
| | | **security-groups** string | | User groups that can authenticate with the captive portal. |
| | | **security-mac-auth-bypass** string | **Choices:*** disable
* enable
* mac-auth-only
| Enable/disable MAC authentication bypass. |
| | | **security-mode** string | **Choices:*** none
* captive-portal
* 802.1X
| Turn on captive portal authentication for this interface. |
| | | **security-redirect-url** string | | URL redirection after disclaimer/authentication. |
| | | **service-name** string | | PPPoE service name. |
| | | **sflow-sampler** string | **Choices:*** disable
* enable
| Enable/disable sFlow on this interface. |
| | | **speed** string | **Choices:*** auto
* 10full
* 10half
* 100full
* 100half
* 1000full
* 1000half
* 10000full
* 1000auto
* 10000auto
* 40000full
* 100Gfull
* 25000full
* 40000auto
* 25000auto
* 100Gauto
| Interface speed. The default setting and the options available depend on the interface hardware. |
| | | **spillover-threshold** integer | | Egress Spillover threshold (0 - 16776000 kbps), 0 means unlimited. |
| | | **src-check** string | **Choices:*** disable
* enable
| Enable/disable source IP check. |
| | | **status** string | **Choices:*** down
* up
| Bring the interface up or shut the interface down. |
| | | **stp** string | **Choices:*** disable
* enable
| Enable/disable STP. |
| | | **stp-ha-secondary** string | **Choices:*** disable
* enable
* priority-adjust
| Control STP behaviour on HA secondary. |
| | | **stp-ha-slave** string | **Choices:*** disable
* enable
* priority-adjust
| Control STP behaviour on HA slave. |
| | | **stpforward** string | **Choices:*** disable
* enable
| Enable/disable STP forwarding. |
| | | **stpforward-mode** string | **Choices:*** rpl-all-ext-id
* rpl-bridge-ext-id
* rpl-nothing
| Configure STP forwarding mode. |
| | | **strip-priority-vlan-tag** string | **Choices:*** disable
* enable
| no description |
| | | **subst** string | **Choices:*** disable
* enable
| Enable to always send packets from this interface to a destination MAC address. |
| | | **substitute-dst-mac** string | | Destination MAC address that all packets are sent to from this interface. |
| | | **swc-first-create** integer | | Initial create for switch-controller VLANs. |
| | | **swc-vlan** integer | | no description |
| | | **switch** string | | no description |
| | | **switch-controller-access-vlan** string | **Choices:*** disable
* enable
| Block FortiSwitch port-to-port traffic. |
| | | **switch-controller-arp-inspection** string | **Choices:*** disable
* enable
| Enable/disable FortiSwitch ARP inspection. |
| | | **switch-controller-auth** string | **Choices:*** radius
* usergroup
| no description |
| | | **switch-controller-dhcp-snooping** string | **Choices:*** disable
* enable
| Switch controller DHCP snooping. |
| | | **switch-controller-dhcp-snooping-option82** string | **Choices:*** disable
* enable
| Switch controller DHCP snooping option82. |
| | | **switch-controller-dhcp-snooping-verify-mac** string | **Choices:*** disable
* enable
| Switch controller DHCP snooping verify MAC. |
| | | **switch-controller-dynamic** string | | Integrated FortiLink settings for managed FortiSwitch. |
| | | **switch-controller-feature** string | **Choices:*** none
* default-vlan
* quarantine
* sniffer
* voice
* camera
* rspan
* video
* nac
| Interfaces purpose when assigning traffic (read only). |
| | | **switch-controller-igmp-snooping** string | **Choices:*** disable
* enable
| Switch controller IGMP snooping. |
| | | **switch-controller-igmp-snooping-fast-leave** string | **Choices:*** disable
* enable
| Switch controller IGMP snooping fast-leave. |
| | | **switch-controller-igmp-snooping-proxy** string | **Choices:*** disable
* enable
| Switch controller IGMP snooping proxy. |
| | | **switch-controller-iot-scanning** string | **Choices:*** disable
* enable
| Enable/disable managed FortiSwitch IoT scanning. |
| | | **switch-controller-learning-limit** integer | | Limit the number of dynamic MAC addresses on this VLAN (1 - 128, 0 = no limit, default). |
| | | **switch-controller-mgmt-vlan** integer | | VLAN to use for FortiLink management purposes. |
| | | **switch-controller-nac** string | | Integrated NAC settings for managed FortiSwitch. |
| | | **switch-controller-radius-server** string | | no description |
| | | **switch-controller-rspan-mode** string | **Choices:*** disable
* enable
| Stop Layer2 MAC learning and interception of BPDUs and other packets on this interface. |
| | | **switch-controller-source-ip** string | **Choices:*** outbound
* fixed
| Source IP address used in FortiLink over L3 connections. |
| | | **switch-controller-traffic-policy** string | | Switch controller traffic policy for the VLAN. |
| | | **tc-mode** string | **Choices:*** ptm
* atm
| DSL transfer mode. |
| | | **tcp-mss** integer | | TCP maximum segment size. 0 means do not change segment size. |
| | | **trunk** string | **Choices:*** disable
* enable
| Enable/disable VLAN trunk. |
| | | **trust-ip-1** string | | Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). |
| | | **trust-ip-2** string | | Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). |
| | | **trust-ip-3** string | | Trusted host for dedicated management traffic (0.0.0.0/24 for all hosts). |
| | | **trust-ip6-1** string | | Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). |
| | | **trust-ip6-2** string | | Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). |
| | | **trust-ip6-3** string | | Trusted IPv6 host for dedicated management traffic (::/0 for all hosts). |
| | | **type** string | **Choices:*** physical
* vlan
* aggregate
* redundant
* tunnel
* wireless
* vdom-link
* loopback
* switch
* hard-switch
* hdlc
* vap-switch
* wl-mesh
* fortilink
* switch-vlan
* fctrl-trunk
* tdm
* fext-wan
* vxlan
* emac-vlan
* geneve
* ssl
| Interface type. |
| | | **username** string | | Username of the PPPoE account, provided by your ISP. |
| | | **vci** integer | | Virtual Channel ID |
| | | **vectoring** string | **Choices:*** disable
* enable
| Enable/disable DSL vectoring. |
| | | **vindex** integer | | no description |
| | | **vlan-protocol** string | **Choices:*** 8021q
* 8021ad
| Ethernet protocol of VLAN. |
| | | **vlanforward** string | **Choices:*** disable
* enable
| Enable/disable traffic forwarding between VLANs on this interface. |
| | | **vlanid** integer | | VLAN ID (1 - 4094). |
| | | **vpi** integer | | Virtual Path ID |
| | | **vrf** integer | | Virtual Routing Forwarding ID. |
| | | **vrrp** list / elements=string | | no description |
| | | | **accept-mode** string | **Choices:*** disable
* enable
| Enable/disable accept mode. |
| | | | **adv-interval** integer | | Advertisement interval (1 - 255 seconds). |
| | | | **ignore-default-route** string | **Choices:*** disable
* enable
| Enable/disable ignoring of default route when checking destination. |
| | | | **preempt** string | **Choices:*** disable
* enable
| Enable/disable preempt mode. |
| | | | **priority** integer | | Priority of the virtual router (1 - 255). |
| | | | **start-time** integer | | Startup time (1 - 255 seconds). |
| | | | **status** string | **Choices:*** disable
* enable
| Enable/disable this VRRP configuration. |
| | | | **version** string | **Choices:*** 2
* 3
| VRRP version. |
| | | | **vrdst** string | | no description |
| | | | **vrdst-priority** integer | | Priority of the virtual router when the virtual router destination becomes unreachable (0 - 254). |
| | | | **vrgrp** integer | | VRRP group ID (1 - 65535). |
| | | | **vrid** integer | | Virtual router identifier (1 - 255). |
| | | | **vrip** string | | IP address of the virtual router. |
| | | **vrrp-virtual-mac** string | **Choices:*** disable
* enable
| Enable/disable use of virtual MAC for VRRP. |
| | | **wccp** string | **Choices:*** disable
* enable
| Enable/disable WCCP on this interface. Used for encapsulated WCCP communication between WCCP clients and servers. |
| | | **weight** integer | | Default weight for static routes (if route has no weight configured). |
| | | **wifi-5g-threshold** string | | Minimal signal strength to be considered as a good 5G AP. |
| | | **wifi-acl** string | **Choices:*** deny
* allow
| Access control for MAC addresses in the MAC list. |
| | | **wifi-ap-band** string | **Choices:*** any
* 5g-preferred
* 5g-only
| How to select the AP to connect. |
| | | **wifi-auth** string | **Choices:*** PSK
* RADIUS
* radius
* usergroup
| WiFi authentication. |
| | | **wifi-auto-connect** string | **Choices:*** disable
* enable
| Enable/disable WiFi network auto connect. |
| | | **wifi-auto-save** string | **Choices:*** disable
* enable
| Enable/disable WiFi network automatic save. |
| | | **wifi-broadcast-ssid** string | **Choices:*** disable
* enable
| Enable/disable SSID broadcast in the beacon. |
| | | **wifi-encrypt** string | **Choices:*** TKIP
* AES
| Data encryption. |
| | | **wifi-fragment-threshold** integer | | WiFi fragment threshold (800 - 2346). |
| | | **wifi-key** string | | no description |
| | | **wifi-keyindex** integer | | WEP key index (1 - 4). |
| | | **wifi-mac-filter** string | **Choices:*** disable
* enable
| Enable/disable MAC filter status. |
| | | **wifi-passphrase** string | | no description |
| | | **wifi-radius-server** string | | WiFi RADIUS server for WPA. |
| | | **wifi-rts-threshold** integer | | WiFi RTS threshold (256 - 2346). |
| | | **wifi-security** string | **Choices:*** None
* WEP64
* wep64
* WEP128
* wep128
* WPA\_PSK
* WPA\_RADIUS
* WPA
* WPA2
* WPA2\_AUTO
* open
* wpa-personal
* wpa-enterprise
* wpa-only-personal
* wpa-only-enterprise
* wpa2-only-personal
* wpa2-only-enterprise
| Wireless access security of SSID. |
| | | **wifi-ssid** string | | IEEE 802.11 Service Set Identifier. |
| | | **wifi-usergroup** string | | WiFi user group for WPA. |
| | | **wins-ip** string | | WINS server IP. |
| | **name** string | | no description |
| | **portal-message-override-group** string | | no description |
| | **radius-server** string | | no description |
| | **security** string | **Choices:*** open
* captive-portal
* 8021x
| no description |
| | **selected-usergroups** string | | no description |
| | **usergroup** string | | no description |
| | **vdom** string | | no description |
| | **vlanid** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_fsp_vlan:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
fsp_vlan:
_dhcp-status: <value in [disable, enable]>
auth: <value in [radius, usergroup]>
color: <value of integer>
comments: <value of string>
dynamic_mapping:
-
_dhcp-status: <value in [disable, enable]>
_scope:
-
name: <value of string>
vdom: <value of string>
dhcp-server:
auto-configuration: <value in [disable, enable]>
auto-managed-status: <value in [disable, enable]>
conflicted-ip-timeout: <value of integer>
ddns-auth: <value in [disable, tsig]>
ddns-key: <value of string>
ddns-keyname: <value of string>
ddns-server-ip: <value of string>
ddns-ttl: <value of integer>
ddns-update: <value in [disable, enable]>
ddns-update-override: <value in [disable, enable]>
ddns-zone: <value of string>
default-gateway: <value of string>
dhcp-settings-from-fortiipam: <value in [disable, enable]>
dns-server1: <value of string>
dns-server2: <value of string>
dns-server3: <value of string>
dns-server4: <value of string>
dns-service: <value in [default, specify, local]>
domain: <value of string>
enable: <value in [disable, enable]>
exclude-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
filename: <value of string>
forticlient-on-net-status: <value in [disable, enable]>
id: <value of integer>
ip-mode: <value in [range, usrgrp]>
ip-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
ipsec-lease-hold: <value of integer>
lease-time: <value of integer>
mac-acl-default-action: <value in [assign, block]>
netmask: <value of string>
next-server: <value of string>
ntp-server1: <value of string>
ntp-server2: <value of string>
ntp-server3: <value of string>
ntp-service: <value in [default, specify, local]>
option1: <value of string>
option2: <value of string>
option3: <value of string>
option4: <value of string>
option5: <value of string>
option6: <value of string>
options:
-
code: <value of integer>
id: <value of integer>
ip: <value of string>
type: <value in [hex, string, ip, ...]>
value: <value of string>
reserved-address:
-
action: <value in [assign, block, reserved]>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
server-type: <value in [regular, ipsec]>
status: <value in [disable, enable]>
tftp-server: <value of string>
timezone: <value in [00, 01, 02, ...]>
timezone-option: <value in [disable, default, specify]>
vci-match: <value in [disable, enable]>
vci-string: <value of string>
wifi-ac-service: <value in [specify, local]>
wifi-ac1: <value of string>
wifi-ac2: <value of string>
wifi-ac3: <value of string>
wins-server1: <value of string>
wins-server2: <value of string>
interface:
dhcp-relay-agent-option: <value in [disable, enable]>
dhcp-relay-ip: <value of string>
dhcp-relay-service: <value in [disable, enable]>
dhcp-relay-type: <value in [regular, ipsec]>
ip: <value of string>
ipv6:
autoconf: <value in [disable, enable]>
dhcp6-client-options:
- rapid
- iapd
- iana
- dns
- dnsname
dhcp6-information-request: <value in [disable, enable]>
dhcp6-prefix-delegation: <value in [disable, enable]>
dhcp6-prefix-hint: <value of string>
dhcp6-prefix-hint-plt: <value of integer>
dhcp6-prefix-hint-vlt: <value of integer>
dhcp6-relay-ip: <value of string>
dhcp6-relay-service: <value in [disable, enable]>
dhcp6-relay-type: <value in [regular]>
icmp6-send-redirect: <value in [disable, enable]>
interface-identifier: <value of string>
ip6-address: <value of string>
ip6-allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- capwap
- fabric
ip6-default-life: <value of integer>
ip6-delegated-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
onlink-flag: <value in [disable, enable]>
prefix-id: <value of integer>
rdnss: <value of string>
rdnss-service: <value in [delegated, default, specify]>
subnet: <value of string>
upstream-interface: <value of string>
ip6-dns-server-override: <value in [disable, enable]>
ip6-extra-addr:
-
prefix: <value of string>
ip6-hop-limit: <value of integer>
ip6-link-mtu: <value of integer>
ip6-manage-flag: <value in [disable, enable]>
ip6-max-interval: <value of integer>
ip6-min-interval: <value of integer>
ip6-mode: <value in [static, dhcp, pppoe, ...]>
ip6-other-flag: <value in [disable, enable]>
ip6-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
dnssl: <value of string>
onlink-flag: <value in [disable, enable]>
preferred-life-time: <value of integer>
prefix: <value of string>
rdnss: <value of string>
valid-life-time: <value of integer>
ip6-reachable-time: <value of integer>
ip6-retrans-time: <value of integer>
ip6-send-adv: <value in [disable, enable]>
ip6-subnet: <value of string>
ip6-upstream-interface: <value of string>
nd-cert: <value of string>
nd-cga-modifier: <value of string>
nd-mode: <value in [basic, SEND-compatible]>
nd-security-level: <value of integer>
nd-timestamp-delta: <value of integer>
nd-timestamp-fuzz: <value of integer>
unique-autoconf-addr: <value in [disable, enable]>
vrip6_link_local: <value of string>
vrrp-virtual-mac6: <value in [disable, enable]>
vrrp6:
-
accept-mode: <value in [disable, enable]>
adv-interval: <value of integer>
preempt: <value in [disable, enable]>
priority: <value of integer>
start-time: <value of integer>
status: <value in [disable, enable]>
vrdst6: <value of string>
vrgrp: <value of integer>
vrid: <value of integer>
vrip6: <value of string>
cli-conn6-status: <value of integer>
ip6-prefix-mode: <value in [dhcp6, ra]>
ra-send-mtu: <value in [disable, enable]>
secondary-IP: <value in [disable, enable]>
secondaryip:
-
allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
- dnp
- ftm
- fabric
detectprotocol:
- ping
- tcp-echo
- udp-echo
detectserver: <value of string>
gwdetect: <value in [disable, enable]>
ha-priority: <value of integer>
id: <value of integer>
ip: <value of string>
ping-serv-status: <value of integer>
seq: <value of integer>
vlanid: <value of integer>
name: <value of string>
portal-message-override-group: <value of string>
radius-server: <value of string>
security: <value in [open, captive-portal, 8021x]>
selected-usergroups: <value of string>
usergroup: <value of string>
vdom: <value of string>
vlanid: <value of integer>
dhcp-server:
auto-configuration: <value in [disable, enable]>
auto-managed-status: <value in [disable, enable]>
conflicted-ip-timeout: <value of integer>
ddns-auth: <value in [disable, tsig]>
ddns-key: <value of string>
ddns-keyname: <value of string>
ddns-server-ip: <value of string>
ddns-ttl: <value of integer>
ddns-update: <value in [disable, enable]>
ddns-update-override: <value in [disable, enable]>
ddns-zone: <value of string>
default-gateway: <value of string>
dhcp-settings-from-fortiipam: <value in [disable, enable]>
dns-server1: <value of string>
dns-server2: <value of string>
dns-server3: <value of string>
dns-server4: <value of string>
dns-service: <value in [default, specify, local]>
domain: <value of string>
enable: <value in [disable, enable]>
exclude-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
filename: <value of string>
forticlient-on-net-status: <value in [disable, enable]>
id: <value of integer>
ip-mode: <value in [range, usrgrp]>
ip-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
ipsec-lease-hold: <value of integer>
lease-time: <value of integer>
mac-acl-default-action: <value in [assign, block]>
netmask: <value of string>
next-server: <value of string>
ntp-server1: <value of string>
ntp-server2: <value of string>
ntp-server3: <value of string>
ntp-service: <value in [default, specify, local]>
option1: <value of string>
option2: <value of string>
option3: <value of string>
option4: <value of string>
option5: <value of string>
option6: <value of string>
options:
-
code: <value of integer>
id: <value of integer>
ip: <value of string>
type: <value in [hex, string, ip, ...]>
value: <value of string>
reserved-address:
-
action: <value in [assign, block, reserved]>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
server-type: <value in [regular, ipsec]>
status: <value in [disable, enable]>
tftp-server: <value of string>
timezone: <value in [00, 01, 02, ...]>
timezone-option: <value in [disable, default, specify]>
vci-match: <value in [disable, enable]>
vci-string: <value of string>
wifi-ac-service: <value in [specify, local]>
wifi-ac1: <value of string>
wifi-ac2: <value of string>
wifi-ac3: <value of string>
wins-server1: <value of string>
wins-server2: <value of string>
interface:
ac-name: <value of string>
aggregate: <value of string>
algorithm: <value in [L2, L3, L4]>
alias: <value of string>
allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
- dnp
- ftm
- fabric
ap-discover: <value in [disable, enable]>
arpforward: <value in [disable, enable]>
atm-protocol: <value in [none, ipoa]>
auth-type: <value in [auto, pap, chap, ...]>
auto-auth-extension-device: <value in [disable, enable]>
bandwidth-measure-time: <value of integer>
bfd: <value in [global, enable, disable]>
bfd-desired-min-tx: <value of integer>
bfd-detect-mult: <value of integer>
bfd-required-min-rx: <value of integer>
broadcast-forticlient-discovery: <value in [disable, enable]>
broadcast-forward: <value in [disable, enable]>
captive-portal: <value of integer>
cli-conn-status: <value of integer>
color: <value of integer>
ddns: <value in [disable, enable]>
ddns-auth: <value in [disable, tsig]>
ddns-domain: <value of string>
ddns-key: <value of string>
ddns-keyname: <value of string>
ddns-password: <value of string>
ddns-server: <value in [dhs.org, dyndns.org, dyns.net, ...]>
ddns-server-ip: <value of string>
ddns-sn: <value of string>
ddns-ttl: <value of integer>
ddns-username: <value of string>
ddns-zone: <value of string>
dedicated-to: <value in [none, management]>
defaultgw: <value in [disable, enable]>
description: <value of string>
detected-peer-mtu: <value of integer>
detectprotocol:
- ping
- tcp-echo
- udp-echo
detectserver: <value of string>
device-access-list: <value of string>
device-identification: <value in [disable, enable]>
device-identification-active-scan: <value in [disable, enable]>
device-netscan: <value in [disable, enable]>
device-user-identification: <value in [disable, enable]>
devindex: <value of integer>
dhcp-client-identifier: <value of string>
dhcp-relay-agent-option: <value in [disable, enable]>
dhcp-relay-interface: <value of string>
dhcp-relay-interface-select-method: <value in [auto, sdwan, specify]>
dhcp-relay-ip: <value of string>
dhcp-relay-service: <value in [disable, enable]>
dhcp-relay-type: <value in [regular, ipsec]>
dhcp-renew-time: <value of integer>
disc-retry-timeout: <value of integer>
disconnect-threshold: <value of integer>
distance: <value of integer>
dns-query: <value in [disable, recursive, non-recursive]>
dns-server-override: <value in [disable, enable]>
drop-fragment: <value in [disable, enable]>
drop-overlapped-fragment: <value in [disable, enable]>
egress-cos: <value in [disable, cos0, cos1, ...]>
egress-shaping-profile: <value of string>
eip: <value of string>
endpoint-compliance: <value in [disable, enable]>
estimated-downstream-bandwidth: <value of integer>
estimated-upstream-bandwidth: <value of integer>
explicit-ftp-proxy: <value in [disable, enable]>
explicit-web-proxy: <value in [disable, enable]>
external: <value in [disable, enable]>
fail-action-on-extender: <value in [soft-restart, hard-restart, reboot]>
fail-alert-interfaces: <value of string>
fail-alert-method: <value in [link-failed-signal, link-down]>
fail-detect: <value in [disable, enable]>
fail-detect-option:
- detectserver
- link-down
fdp: <value in [disable, enable]>
fortiheartbeat: <value in [disable, enable]>
fortilink: <value in [disable, enable]>
fortilink-backup-link: <value of integer>
fortilink-neighbor-detect: <value in [lldp, fortilink]>
fortilink-split-interface: <value in [disable, enable]>
fortilink-stacking: <value in [disable, enable]>
forward-domain: <value of integer>
forward-error-correction: <value in [disable, enable, rs-fec, ...]>
fp-anomaly:
- drop_tcp_fin_noack
- pass_winnuke
- pass_tcpland
- pass_udpland
- pass_icmpland
- pass_ipland
- pass_iprr
- pass_ipssrr
- pass_iplsrr
- pass_ipstream
- pass_ipsecurity
- pass_iptimestamp
- pass_ipunknown_option
- pass_ipunknown_prot
- pass_icmp_frag
- pass_tcp_no_flag
- pass_tcp_fin_noack
- drop_winnuke
- drop_tcpland
- drop_udpland
- drop_icmpland
- drop_ipland
- drop_iprr
- drop_ipssrr
- drop_iplsrr
- drop_ipstream
- drop_ipsecurity
- drop_iptimestamp
- drop_ipunknown_option
- drop_ipunknown_prot
- drop_icmp_frag
- drop_tcp_no_flag
fp-disable:
- all
- ipsec
- none
gateway-address: <value of string>
gi-gk: <value in [disable, enable]>
gwaddr: <value of string>
gwdetect: <value in [disable, enable]>
ha-priority: <value of integer>
icmp-accept-redirect: <value in [disable, enable]>
icmp-redirect: <value in [disable, enable]>
icmp-send-redirect: <value in [disable, enable]>
ident-accept: <value in [disable, enable]>
idle-timeout: <value of integer>
if-mdix: <value in [auto, normal, crossover]>
if-media: <value in [auto, copper, fiber]>
in-force-vlan-cos: <value of integer>
inbandwidth: <value of integer>
ingress-cos: <value in [disable, cos0, cos1, ...]>
ingress-shaping-profile: <value of string>
ingress-spillover-threshold: <value of integer>
internal: <value of integer>
ip: <value of string>
ip-managed-by-fortiipam: <value in [disable, enable]>
ipmac: <value in [disable, enable]>
ips-sniffer-mode: <value in [disable, enable]>
ipunnumbered: <value of string>
ipv6:
autoconf: <value in [disable, enable]>
dhcp6-client-options:
- rapid
- iapd
- iana
- dns
- dnsname
dhcp6-information-request: <value in [disable, enable]>
dhcp6-prefix-delegation: <value in [disable, enable]>
dhcp6-prefix-hint: <value of string>
dhcp6-prefix-hint-plt: <value of integer>
dhcp6-prefix-hint-vlt: <value of integer>
dhcp6-relay-ip: <value of string>
dhcp6-relay-service: <value in [disable, enable]>
dhcp6-relay-type: <value in [regular]>
icmp6-send-redirect: <value in [disable, enable]>
interface-identifier: <value of string>
ip6-address: <value of string>
ip6-allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- capwap
- fabric
ip6-default-life: <value of integer>
ip6-delegated-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
onlink-flag: <value in [disable, enable]>
prefix-id: <value of integer>
rdnss: <value of string>
rdnss-service: <value in [delegated, default, specify]>
subnet: <value of string>
upstream-interface: <value of string>
ip6-dns-server-override: <value in [disable, enable]>
ip6-extra-addr:
-
prefix: <value of string>
ip6-hop-limit: <value of integer>
ip6-link-mtu: <value of integer>
ip6-manage-flag: <value in [disable, enable]>
ip6-max-interval: <value of integer>
ip6-min-interval: <value of integer>
ip6-mode: <value in [static, dhcp, pppoe, ...]>
ip6-other-flag: <value in [disable, enable]>
ip6-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
dnssl: <value of string>
onlink-flag: <value in [disable, enable]>
preferred-life-time: <value of integer>
prefix: <value of string>
rdnss: <value of string>
valid-life-time: <value of integer>
ip6-reachable-time: <value of integer>
ip6-retrans-time: <value of integer>
ip6-send-adv: <value in [disable, enable]>
ip6-subnet: <value of string>
ip6-upstream-interface: <value of string>
nd-cert: <value of string>
nd-cga-modifier: <value of string>
nd-mode: <value in [basic, SEND-compatible]>
nd-security-level: <value of integer>
nd-timestamp-delta: <value of integer>
nd-timestamp-fuzz: <value of integer>
unique-autoconf-addr: <value in [disable, enable]>
vrip6_link_local: <value of string>
vrrp-virtual-mac6: <value in [disable, enable]>
vrrp6:
-
accept-mode: <value in [disable, enable]>
adv-interval: <value of integer>
preempt: <value in [disable, enable]>
priority: <value of integer>
start-time: <value of integer>
status: <value in [disable, enable]>
vrdst6: <value of string>
vrgrp: <value of integer>
vrid: <value of integer>
vrip6: <value of string>
cli-conn6-status: <value of integer>
ip6-prefix-mode: <value in [dhcp6, ra]>
ra-send-mtu: <value in [disable, enable]>
l2forward: <value in [disable, enable]>
l2tp-client: <value in [disable, enable]>
lacp-ha-slave: <value in [disable, enable]>
lacp-mode: <value in [static, passive, active]>
lacp-speed: <value in [slow, fast]>
lcp-echo-interval: <value of integer>
lcp-max-echo-fails: <value of integer>
link-up-delay: <value of integer>
listen-forticlient-connection: <value in [disable, enable]>
lldp-network-policy: <value of string>
lldp-reception: <value in [disable, enable, vdom]>
lldp-transmission: <value in [enable, disable, vdom]>
log: <value in [disable, enable]>
macaddr: <value of string>
managed-subnetwork-size: <value in [256, 512, 1024, ...]>
management-ip: <value of string>
max-egress-burst-rate: <value of integer>
max-egress-rate: <value of integer>
measured-downstream-bandwidth: <value of integer>
measured-upstream-bandwidth: <value of integer>
mediatype: <value in [serdes-sfp, sgmii-sfp, cfp2-sr10, ...]>
member: <value of string>
min-links: <value of integer>
min-links-down: <value in [operational, administrative]>
mode: <value in [static, dhcp, pppoe, ...]>
monitor-bandwidth: <value in [disable, enable]>
mtu: <value of integer>
mtu-override: <value in [disable, enable]>
mux-type: <value in [llc-encaps, vc-encaps]>
name: <value of string>
ndiscforward: <value in [disable, enable]>
netbios-forward: <value in [disable, enable]>
netflow-sampler: <value in [disable, tx, rx, ...]>
np-qos-profile: <value of integer>
npu-fastpath: <value in [disable, enable]>
nst: <value in [disable, enable]>
out-force-vlan-cos: <value of integer>
outbandwidth: <value of integer>
padt-retry-timeout: <value of integer>
password: <value of string>
peer-interface: <value of string>
phy-mode: <value in [auto, adsl, vdsl]>
ping-serv-status: <value of integer>
poe: <value in [disable, enable]>
polling-interval: <value of integer>
pppoe-unnumbered-negotiate: <value in [disable, enable]>
pptp-auth-type: <value in [auto, pap, chap, ...]>
pptp-client: <value in [disable, enable]>
pptp-password: <value of string>
pptp-server-ip: <value of string>
pptp-timeout: <value of integer>
pptp-user: <value of string>
preserve-session-route: <value in [disable, enable]>
priority: <value of integer>
priority-override: <value in [disable, enable]>
proxy-captive-portal: <value in [disable, enable]>
redundant-interface: <value of string>
remote-ip: <value of string>
replacemsg-override-group: <value of string>
retransmission: <value in [disable, enable]>
ring-rx: <value of integer>
ring-tx: <value of integer>
role: <value in [lan, wan, dmz, ...]>
sample-direction: <value in [rx, tx, both]>
sample-rate: <value of integer>
scan-botnet-connections: <value in [disable, block, monitor]>
secondary-IP: <value in [disable, enable]>
secondaryip:
-
allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
- dnp
- ftm
- fabric
detectprotocol:
- ping
- tcp-echo
- udp-echo
detectserver: <value of string>
gwdetect: <value in [disable, enable]>
ha-priority: <value of integer>
id: <value of integer>
ip: <value of string>
ping-serv-status: <value of integer>
seq: <value of integer>
security-8021x-dynamic-vlan-id: <value of integer>
security-8021x-master: <value of string>
security-8021x-mode: <value in [default, dynamic-vlan, fallback, ...]>
security-exempt-list: <value of string>
security-external-logout: <value of string>
security-external-web: <value of string>
security-groups: <value of string>
security-mac-auth-bypass: <value in [disable, enable, mac-auth-only]>
security-mode: <value in [none, captive-portal, 802.1X]>
security-redirect-url: <value of string>
service-name: <value of string>
sflow-sampler: <value in [disable, enable]>
speed: <value in [auto, 10full, 10half, ...]>
spillover-threshold: <value of integer>
src-check: <value in [disable, enable]>
status: <value in [down, up]>
stp: <value in [disable, enable]>
stp-ha-slave: <value in [disable, enable, priority-adjust]>
stpforward: <value in [disable, enable]>
stpforward-mode: <value in [rpl-all-ext-id, rpl-bridge-ext-id, rpl-nothing]>
strip-priority-vlan-tag: <value in [disable, enable]>
subst: <value in [disable, enable]>
substitute-dst-mac: <value of string>
swc-first-create: <value of integer>
swc-vlan: <value of integer>
switch: <value of string>
switch-controller-access-vlan: <value in [disable, enable]>
switch-controller-arp-inspection: <value in [disable, enable]>
switch-controller-auth: <value in [radius, usergroup]>
switch-controller-dhcp-snooping: <value in [disable, enable]>
switch-controller-dhcp-snooping-option82: <value in [disable, enable]>
switch-controller-dhcp-snooping-verify-mac: <value in [disable, enable]>
switch-controller-feature: <value in [none, default-vlan, quarantine, ...]>
switch-controller-igmp-snooping: <value in [disable, enable]>
switch-controller-igmp-snooping-fast-leave: <value in [disable, enable]>
switch-controller-igmp-snooping-proxy: <value in [disable, enable]>
switch-controller-iot-scanning: <value in [disable, enable]>
switch-controller-learning-limit: <value of integer>
switch-controller-mgmt-vlan: <value of integer>
switch-controller-nac: <value of string>
switch-controller-radius-server: <value of string>
switch-controller-rspan-mode: <value in [disable, enable]>
switch-controller-source-ip: <value in [outbound, fixed]>
switch-controller-traffic-policy: <value of string>
tc-mode: <value in [ptm, atm]>
tcp-mss: <value of integer>
trunk: <value in [disable, enable]>
trust-ip-1: <value of string>
trust-ip-2: <value of string>
trust-ip-3: <value of string>
trust-ip6-1: <value of string>
trust-ip6-2: <value of string>
trust-ip6-3: <value of string>
type: <value in [physical, vlan, aggregate, ...]>
username: <value of string>
vci: <value of integer>
vectoring: <value in [disable, enable]>
vindex: <value of integer>
vlan-protocol: <value in [8021q, 8021ad]>
vlanforward: <value in [disable, enable]>
vlanid: <value of integer>
vpi: <value of integer>
vrf: <value of integer>
vrrp:
-
accept-mode: <value in [disable, enable]>
adv-interval: <value of integer>
ignore-default-route: <value in [disable, enable]>
preempt: <value in [disable, enable]>
priority: <value of integer>
start-time: <value of integer>
status: <value in [disable, enable]>
version: <value in [2, 3]>
vrdst: <value of string>
vrdst-priority: <value of integer>
vrgrp: <value of integer>
vrid: <value of integer>
vrip: <value of string>
vrrp-virtual-mac: <value in [disable, enable]>
wccp: <value in [disable, enable]>
weight: <value of integer>
wifi-5g-threshold: <value of string>
wifi-acl: <value in [deny, allow]>
wifi-ap-band: <value in [any, 5g-preferred, 5g-only]>
wifi-auth: <value in [PSK, RADIUS, radius, ...]>
wifi-auto-connect: <value in [disable, enable]>
wifi-auto-save: <value in [disable, enable]>
wifi-broadcast-ssid: <value in [disable, enable]>
wifi-encrypt: <value in [TKIP, AES]>
wifi-fragment-threshold: <value of integer>
wifi-key: <value of string>
wifi-keyindex: <value of integer>
wifi-mac-filter: <value in [disable, enable]>
wifi-passphrase: <value of string>
wifi-radius-server: <value of string>
wifi-rts-threshold: <value of integer>
wifi-security: <value in [None, WEP64, wep64, ...]>
wifi-ssid: <value of string>
wifi-usergroup: <value of string>
wins-ip: <value of string>
dhcp-relay-request-all-server: <value in [disable, enable]>
stp-ha-secondary: <value in [disable, enable, priority-adjust]>
switch-controller-dynamic: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_filefilter_profile β Configure file-filter profiles. fortinet.fortimanager.fmgr\_filefilter\_profile β Configure file-filter profiles.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_filefilter_profile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **filefilter\_profile** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **extended-log** string | **Choices:*** disable
* enable
| Enable/disable file-filter extended logging. |
| | **feature-set** string | **Choices:*** proxy
* flow
| Flow/proxy feature set. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable file-filter logging. |
| | **name** string | | Profile name. |
| | **replacemsg-group** string | | Replacement message group |
| | **rules** list / elements=string | | no description |
| | | **action** string | **Choices:*** log-only
* block
| Action taken for matched file. |
| | | **comment** string | | Comment. |
| | | **direction** string | **Choices:*** any
* incoming
* outgoing
| Traffic direction. (HTTP, FTP, SSH, CIFS only) |
| | | **file-type** string | | no description |
| | | **name** string | | File-filter rule name. |
| | | **password-protected** string | **Choices:*** any
* yes
| Match password-protected files. |
| | | **protocol** list / elements=string | **Choices:*** imap
* smtp
* pop3
* http
* ftp
* mapi
* cifs
* ssh
| no description |
| | **scan-archive-contents** string | **Choices:*** disable
* enable
| Enable/disable archive contents scan. (Not for CIFS) |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure file-filter profiles.
fmgr_filefilter_profile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
filefilter_profile:
comment: <value of string>
extended-log: <value in [disable, enable]>
feature-set: <value in [proxy, flow]>
log: <value in [disable, enable]>
name: <value of string>
replacemsg-group: <value of string>
rules:
-
action: <value in [log-only, block]>
comment: <value of string>
direction: <value in [any, incoming, outgoing]>
file-type: <value of string>
name: <value of string>
password-protected: <value in [any, yes]>
protocol:
- imap
- smtp
- pop3
- http
- ftp
- mapi
- cifs
- ssh
scan-archive-contents: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile β Configure SSL/SSH protocol options. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile β Configure SSL/SSH protocol options.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile** dictionary | | the top level parameters set |
| | **allowlist** string | **Choices:*** disable
* enable
| Enable/disable exempting servers by FortiGuard allowlist. |
| | **block-blacklisted-certificates** string | **Choices:*** disable
* enable
| Enable/disable blocking SSL-based botnet communication by FortiGuard certificate blacklist. |
| | **block-blocklisted-certificates** string | **Choices:*** disable
* enable
| Enable/disable blocking SSL-based botnet communication by FortiGuard certificate blocklist. |
| | **caname** string | | CA certificate used by SSL Inspection. |
| | **comment** string | | Optional comments. |
| | **dot** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** enable
* strict
* disable
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** block
* allow
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** block
* allow
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **ftps** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **ports** integer | | no description |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **https** dictionary | | no description |
| | | **cert-probe-failure** string | **Choices:*** block
* allow
| Action based on certificate probe failure. |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **ports** integer | | no description |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* certificate-inspection
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **imaps** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **ports** integer | | no description |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **mapi-over-https** string | **Choices:*** disable
* enable
| Enable/disable inspection of MAPI over HTTPS. |
| | **name** string | | Name. |
| | **pop3s** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **ports** integer | | no description |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **rpc-over-https** string | **Choices:*** disable
* enable
| Enable/disable inspection of RPC over HTTPS. |
| | **server-cert** string | | Certificate used by SSL Inspection to replace server certificate. |
| | **server-cert-mode** string | **Choices:*** re-sign
* replace
| Re-sign or replace the servers certificate. |
| | **smtps** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **ports** integer | | no description |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **ssh** dictionary | | no description |
| | | **inspect-all** string | **Choices:*** disable
* deep-inspection
| Level of SSL inspection. |
| | | **ports** integer | | no description |
| | | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | | **ssh-algorithm** string | **Choices:*** compatible
* high-encryption
| Relative strength of encryption algorithms accepted during negotiation. |
| | | **ssh-tun-policy-check** string | **Choices:*** disable
* enable
| Enable/disable SSH tunnel policy check. |
| | | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | | **unsupported-version** string | **Choices:*** block
* bypass
| Action based on SSH version being unsupported. |
| | **ssl** dictionary | | no description |
| | | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | | **inspect-all** string | **Choices:*** disable
* certificate-inspection
* deep-inspection
| Level of SSL inspection. |
| | | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| | **ssl-anomalies-log** string | **Choices:*** disable
* enable
| Enable/disable logging SSL anomalies. |
| | **ssl-exempt** list / elements=string | | no description |
| | | **address** string | | IPv4 address object. |
| | | **address6** string | | IPv6 address object. |
| | | **fortiguard-category** string | | FortiGuard category ID. |
| | | **id** integer | | ID number. |
| | | **regex** string | | Exempt servers by regular expression. |
| | | **type** string | **Choices:*** fortiguard-category
* address
* address6
* wildcard-fqdn
* regex
| Type of address object (IPv4 or IPv6) or FortiGuard category. |
| | | **wildcard-fqdn** string | | Exempt servers by wildcard FQDN. |
| | **ssl-exemptions-log** string | **Choices:*** disable
* enable
| Enable/disable logging SSL exemptions. |
| | **ssl-negotiation-log** string | **Choices:*** disable
* enable
| Enable/disable logging SSL negotiation. |
| | **ssl-server** list / elements=string | | no description |
| | | **ftps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the FTPS handshake. |
| | | **ftps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the FTPS handshake. |
| | | **https-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the HTTPS handshake. |
| | | **https-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the HTTPS handshake. |
| | | **id** integer | | SSL server ID. |
| | | **imaps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the IMAPS handshake. |
| | | **imaps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the IMAPS handshake. |
| | | **ip** string | | IPv4 address of the SSL server. |
| | | **pop3s-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the POP3S handshake. |
| | | **pop3s-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the POP3S handshake. |
| | | **smtps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the SMTPS handshake. |
| | | **smtps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the SMTPS handshake. |
| | | **ssl-other-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during an SSL protocol handshake. |
| | | **ssl-other-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during an SSL protocol handshake. |
| | **supported-alpn** string | **Choices:*** none
* http1-1
* http2
* all
| Configure ALPN option. |
| | **untrusted-caname** string | | Untrusted CA certificate used by SSL Inspection. |
| | **use-ssl-server** string | **Choices:*** disable
* enable
| Enable/disable the use of SSL server table for SSL offloading. |
| | **whitelist** string | **Choices:*** disable
* enable
| Enable/disable exempting servers by FortiGuard whitelist. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SSL/SSH protocol options.
fmgr_firewall_sslsshprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_sslsshprofile:
caname: <value of string>
comment: <value of string>
mapi-over-https: <value in [disable, enable]>
name: <value of string>
rpc-over-https: <value in [disable, enable]>
server-cert: <value of string>
server-cert-mode: <value in [re-sign, replace]>
ssl-anomalies-log: <value in [disable, enable]>
ssl-exempt:
-
address: <value of string>
address6: <value of string>
fortiguard-category: <value of string>
id: <value of integer>
regex: <value of string>
type: <value in [fortiguard-category, address, address6, ...]>
wildcard-fqdn: <value of string>
ssl-exemptions-log: <value in [disable, enable]>
ssl-server:
-
ftps-client-cert-request: <value in [bypass, inspect, block]>
https-client-cert-request: <value in [bypass, inspect, block]>
id: <value of integer>
imaps-client-cert-request: <value in [bypass, inspect, block]>
ip: <value of string>
pop3s-client-cert-request: <value in [bypass, inspect, block]>
smtps-client-cert-request: <value in [bypass, inspect, block]>
ssl-other-client-cert-request: <value in [bypass, inspect, block]>
ftps-client-certificate: <value in [bypass, inspect, block]>
https-client-certificate: <value in [bypass, inspect, block]>
imaps-client-certificate: <value in [bypass, inspect, block]>
pop3s-client-certificate: <value in [bypass, inspect, block]>
smtps-client-certificate: <value in [bypass, inspect, block]>
ssl-other-client-certificate: <value in [bypass, inspect, block]>
untrusted-caname: <value of string>
use-ssl-server: <value in [disable, enable]>
whitelist: <value in [disable, enable]>
block-blacklisted-certificates: <value in [disable, enable]>
ssl-negotiation-log: <value in [disable, enable]>
ftps:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
ports: <value of integer>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
https:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
ports: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
status: <value in [disable, certificate-inspection, deep-inspection]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
cert-probe-failure: <value in [block, allow]>
imaps:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
ports: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
pop3s:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
ports: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
smtps:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
ports: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
ssh:
inspect-all: <value in [disable, deep-inspection]>
ports: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
ssh-algorithm: <value in [compatible, high-encryption]>
ssh-tun-policy-check: <value in [disable, enable]>
status: <value in [disable, deep-inspection]>
unsupported-version: <value in [block, bypass]>
ssl:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
inspect-all: <value in [disable, certificate-inspection, deep-inspection]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [disable, enable, strict]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
untrusted-server-cert: <value in [allow, block, ignore]>
allowlist: <value in [disable, enable]>
block-blocklisted-certificates: <value in [disable, enable]>
dot:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [enable, strict, disable]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [block, allow]>
unsupported-ssl-negotiation: <value in [block, allow]>
untrusted-server-cert: <value in [allow, block, ignore]>
supported-alpn: <value in [none, http1-1, http2, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_hotspot20_h2qposuprovider_servicedescription β OSU service name. fortinet.fortimanager.fmgr\_hotspot20\_h2qposuprovider\_servicedescription β OSU service name.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_h2qposuprovider_servicedescription`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **h2qp-osu-provider** string / required | | the parameter (h2qp-osu-provider) in requested url |
| **hotspot20\_h2qposuprovider\_servicedescription** dictionary | | the top level parameters set |
| | **lang** string | | Language code. |
| | **service-description** string | | Service description. |
| | **service-id** integer | | OSU service ID. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: OSU service name.
fmgr_hotspot20_h2qposuprovider_servicedescription:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
h2qp-osu-provider: <your own value>
state: <value in [present, absent]>
hotspot20_h2qposuprovider_servicedescription:
lang: <value of string>
service-description: <value of string>
service-id: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_qos_dot1pmap β Configure FortiSwitch QoS 802. fortinet.fortimanager.fmgr\_switchcontroller\_qos\_dot1pmap β Configure FortiSwitch QoS 802.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_qos_dot1pmap`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_qos\_dot1pmap** dictionary | | the top level parameters set |
| | **description** string | | Description of the 802.1p name. |
| | **egress-pri-tagging** string | **Choices:*** disable
* enable
| Enable/disable egress priority-tag frame. |
| | **name** string | | Dot1p map name. |
| | **priority-0** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-1** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-2** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-3** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-4** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-5** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-6** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| | **priority-7** string | **Choices:*** queue-0
* queue-1
* queue-2
* queue-3
* queue-4
* queue-5
* queue-6
* queue-7
| COS queue mapped to dot1p priority number. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiSwitch QoS 802.
fmgr_switchcontroller_qos_dot1pmap:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
switchcontroller_qos_dot1pmap:
description: <value of string>
name: <value of string>
priority-0: <value in [queue-0, queue-1, queue-2, ...]>
priority-1: <value in [queue-0, queue-1, queue-2, ...]>
priority-2: <value in [queue-0, queue-1, queue-2, ...]>
priority-3: <value in [queue-0, queue-1, queue-2, ...]>
priority-4: <value in [queue-0, queue-1, queue-2, ...]>
priority-5: <value in [queue-0, queue-1, queue-2, ...]>
priority-6: <value in [queue-0, queue-1, queue-2, ...]>
priority-7: <value in [queue-0, queue-1, queue-2, ...]>
egress-pri-tagging: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_profile_signature β WAF signatures. fortinet.fortimanager.fmgr\_waf\_profile\_signature β WAF signatures.
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_signature`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_signature** dictionary | | the top level parameters set |
| | **credit-card-detection-threshold** integer | | The minimum number of Credit cards to detect violation. |
| | **custom-signature** list / elements=string | | no description |
| | | **action** string | **Choices:*** allow
* block
* erase
| Action. |
| | | **case-sensitivity** string | **Choices:*** disable
* enable
| Case sensitivity in pattern. |
| | | **direction** string | **Choices:*** request
* response
| Traffic direction. |
| | | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | | **name** string | | Signature name. |
| | | **pattern** string | | Match pattern. |
| | | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | | **status** string | **Choices:*** disable
* enable
| Status. |
| | | **target** list / elements=string | **Choices:*** arg
* arg-name
* req-body
* req-cookie
* req-cookie-name
* req-filename
* req-header
* req-header-name
* req-raw-uri
* req-uri
* resp-body
* resp-hdr
* resp-status
| no description |
| | **disabled-signature** string | | Disabled signatures |
| | **disabled-sub-class** string | | Disabled signature subclasses. |
| | **main-class** dictionary | | no description |
| | | **action** string | **Choices:*** allow
* block
* erase
| Action. |
| | | **id** integer | | Main signature class ID. |
| | | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | | **status** string | **Choices:*** disable
* enable
| Status. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: WAF signatures.
fmgr_waf_profile_signature:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_signature:
credit-card-detection-threshold: <value of integer>
custom-signature:
-
action: <value in [allow, block, erase]>
case-sensitivity: <value in [disable, enable]>
direction: <value in [request, response]>
log: <value in [disable, enable]>
name: <value of string>
pattern: <value of string>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
target:
- arg
- arg-name
- req-body
- req-cookie
- req-cookie-name
- req-filename
- req-header
- req-header-name
- req-raw-uri
- req-uri
- resp-body
- resp-hdr
- resp-status
disabled-signature: <value of string>
disabled-sub-class: <value of string>
main-class:
action: <value in [allow, block, erase]>
id: <value of integer>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_mmsprofile_notifmsisdn β Notification for MSISDNs. fortinet.fortimanager.fmgr\_firewall\_mmsprofile\_notifmsisdn β Notification for MSISDNs.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_mmsprofile_notifmsisdn`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_mmsprofile\_notifmsisdn** dictionary | | the top level parameters set |
| | **msisdn** string | | Recipient MSISDN. |
| | **threshold** list / elements=string | **Choices:*** flood-thresh-1
* flood-thresh-2
* flood-thresh-3
* dupe-thresh-1
* dupe-thresh-2
* dupe-thresh-3
| no description |
| **mms-profile** string / required | | the parameter (mms-profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Notification for MSISDNs.
fmgr_firewall_mmsprofile_notifmsisdn:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mms-profile: <your own value>
state: <value in [present, absent]>
firewall_mmsprofile_notifmsisdn:
msisdn: <value of string>
threshold:
- flood-thresh-1
- flood-thresh-2
- flood-thresh-3
- dupe-thresh-1
- dupe-thresh-2
- dupe-thresh-3
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_bleprofile β Configure Bluetooth Low Energy profile. fortinet.fortimanager.fmgr\_bleprofile β Configure Bluetooth Low Energy profile.
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_bleprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bleprofile** dictionary | | the top level parameters set |
| | **advertising** list / elements=string | **Choices:*** ibeacon
* eddystone-uid
* eddystone-url
| no description |
| | **beacon-interval** integer | | Beacon interval (default = 100 msec). |
| | **ble-scanning** string | **Choices:*** disable
* enable
| Enable/disable Bluetooth Low Energy (BLE) scanning. |
| | **comment** string | | Comment. |
| | **eddystone-instance** string | | Eddystone instance ID. |
| | **eddystone-namespace** string | | Eddystone namespace ID. |
| | **eddystone-url** string | | Eddystone URL. |
| | **eddystone-url-encode-hex** string | | Eddystone encoded URL hexadecimal string |
| | **ibeacon-uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **major-id** integer | | Major ID. |
| | **minor-id** integer | | Minor ID. |
| | **name** string | | Bluetooth Low Energy profile name. |
| | **txpower** string | **Choices:*** 0
* 1
* 2
* 3
* 4
* 5
* 6
* 7
* 8
* 9
* 10
* 11
* 12
| Transmit power level (default = 0). |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Bluetooth Low Energy profile.
fmgr_bleprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
bleprofile:
advertising:
- ibeacon
- eddystone-uid
- eddystone-url
beacon-interval: <value of integer>
ble-scanning: <value in [disable, enable]>
comment: <value of string>
eddystone-instance: <value of string>
eddystone-namespace: <value of string>
eddystone-url: <value of string>
eddystone-url-encode-hex: <value of string>
ibeacon-uuid: <value of string>
major-id: <value of integer>
minor-id: <value of integer>
name: <value of string>
txpower: <value in [0, 1, 2, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_clone β Clone an object in FortiManager. fortinet.fortimanager.fmgr\_clone β Clone an object in FortiManager.
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_clone`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **clone** dictionary | | the top level parameters set |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager01
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: clone an vip object using fmgr_clone module.
fmgr_clone:
clone:
selector: 'firewall_vip'
self:
adom: 'root'
vip: 'ansible-test-vip_first'
target:
name: 'ansible-test-vip_fourth'
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_central_dnat6 β no description fortinet.fortimanager.fmgr\_pkg\_central\_dnat6 β no description
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_central_dnat6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_central\_dnat6** dictionary | | the top level parameters set |
| | **name** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pkg_central_dnat6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_central_dnat6:
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_review β no description fortinet.fortimanager.fmgr\_dvmdb\_workflow\_review β no description
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_review`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_workflow_review:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dlp_sensor β Configure DLP sensors. fortinet.fortimanager.fmgr\_dlp\_sensor β Configure DLP sensors.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dlp_sensor`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dlp\_sensor** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **dlp-log** string | **Choices:*** disable
* enable
| Enable/disable DLP logging. |
| | **extended-log** string | **Choices:*** disable
* enable
| Enable/disable extended logging for data leak prevention. |
| | **feature-set** string | **Choices:*** proxy
* flow
| Flow/proxy feature set. |
| | **filter** list / elements=string | | no description |
| | | **action** string | **Choices:*** log-only
* block
* exempt
* ban
* ban-sender
* quarantine-ip
* quarantine-port
* none
* allow
| Action to take with content that this DLP sensor matches. |
| | | **archive** string | **Choices:*** disable
* enable
* summary-only
| Enable/disable DLP archiving. |
| | | **company-identifier** string | | Enter a company identifier watermark to match. Only watermarks that your company has placed on the files are matched. |
| | | **expiry** string | | Quarantine duration in days, hours, minutes format (dddhhmm). |
| | | **file-size** integer | | Match files this size or larger (0 - 4294967295 kbytes). |
| | | **file-type** string | | Select the number of a DLP file pattern table to match. |
| | | **filter-by** string | **Choices:*** credit-card
* ssn
* regexp
* file-type
* file-size
* fingerprint
* watermark
* encrypted
| Select the type of content to match. |
| | | **fp-sensitivity** string | | Select a DLP file pattern sensitivity to match. |
| | | **id** integer | | ID. |
| | | **match-percentage** integer | | Percentage of fingerprints in the fingerprint databases designated with the selected fp-sensitivity to match. |
| | | **name** string | | Filter name. |
| | | **proto** list / elements=string | **Choices:*** imap
* smtp
* pop3
* ftp
* nntp
* mm1
* mm3
* mm4
* mm7
* mapi
* aim
* icq
* msn
* yahoo
* http-get
* http-post
* ssh
* cifs
| no description |
| | | **regexp** string | | Enter a regular expression to match (max. 255 characters). |
| | | **sensitivity** string | | Select a DLP file pattern sensitivity to match. |
| | | **severity** string | **Choices:*** info
* low
* medium
* high
* critical
| Select the severity or threat level that matches this filter. |
| | | **type** string | **Choices:*** file
* message
| Select whether to check the content of messages (an email message) or files (downloaded files or email attachments). |
| | **flow-based** string | **Choices:*** disable
* enable
| Enable/disable flow-based DLP. |
| | **full-archive-proto** list / elements=string | **Choices:*** imap
* smtp
* pop3
* ftp
* nntp
* mm1
* mm3
* mm4
* mm7
* mapi
* aim
* icq
* msn
* yahoo
* http-get
* http-post
* ssh
* cifs
| no description |
| | **nac-quar-log** string | **Choices:*** disable
* enable
| Enable/disable NAC quarantine logging. |
| | **name** string | | Name of the DLP sensor. |
| | **options** string | **Choices:*** strict-file
| Configure DLP options. |
| | **replacemsg-group** string | | Replacement message group used by this DLP sensor. |
| | **summary-proto** list / elements=string | **Choices:*** imap
* smtp
* pop3
* ftp
* nntp
* mm1
* mm3
* mm4
* mm7
* mapi
* aim
* icq
* msn
* yahoo
* http-get
* http-post
* ssh
* cifs
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure DLP sensors.
fmgr_dlp_sensor:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dlp_sensor:
comment: <value of string>
dlp-log: <value in [disable, enable]>
extended-log: <value in [disable, enable]>
filter:
-
action: <value in [log-only, block, exempt, ...]>
archive: <value in [disable, enable, summary-only]>
company-identifier: <value of string>
expiry: <value of string>
file-size: <value of integer>
file-type: <value of string>
filter-by: <value in [credit-card, ssn, regexp, ...]>
fp-sensitivity: <value of string>
id: <value of integer>
match-percentage: <value of integer>
name: <value of string>
proto:
- imap
- smtp
- pop3
- ftp
- nntp
- mm1
- mm3
- mm4
- mm7
- mapi
- aim
- icq
- msn
- yahoo
- http-get
- http-post
- ssh
- cifs
regexp: <value of string>
severity: <value in [info, low, medium, ...]>
type: <value in [file, message]>
sensitivity: <value of string>
flow-based: <value in [disable, enable]>
full-archive-proto:
- imap
- smtp
- pop3
- ftp
- nntp
- mm1
- mm3
- mm4
- mm7
- mapi
- aim
- icq
- msn
- yahoo
- http-get
- http-post
- ssh
- cifs
nac-quar-log: <value in [disable, enable]>
name: <value of string>
options: <value in [strict-file]>
replacemsg-group: <value of string>
summary-proto:
- imap
- smtp
- pop3
- ftp
- nntp
- mm1
- mm3
- mm4
- mm7
- mapi
- aim
- icq
- msn
- yahoo
- http-get
- http-post
- ssh
- cifs
feature-set: <value in [proxy, flow]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_gtp_apn β Configure APN for GTP. fortinet.fortimanager.fmgr\_gtp\_apn β Configure APN for GTP.
=============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_gtp_apn`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **gtp\_apn** dictionary | | the top level parameters set |
| | **apn** string | | APN value. |
| | **name** string | | APN name. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure APN for GTP.
fmgr_gtp_apn:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
gtp_apn:
apn: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile β Configure Email Filter profiles. fortinet.fortimanager.fmgr\_emailfilter\_profile β Configure Email Filter profiles.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **external** string | **Choices:*** disable
* enable
| Enable/disable external Email inspection. |
| | **feature-set** string | **Choices:*** proxy
* flow
| Flow/proxy feature set. |
| | **gmail** dictionary | | no description |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **imap** dictionary | | no description |
| | | **action** string | **Choices:*** pass
* tag
| Action for spam email. |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | | **tag-msg** string | | Subject text or header added to spam email. |
| | | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| | **mapi** dictionary | | no description |
| | | **action** string | **Choices:*** pass
* discard
| Action for spam email. |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **msn-hotmail** dictionary | | no description |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **name** string | | Profile name. |
| | **options** list / elements=string | **Choices:*** bannedword
* spambwl
* spamfsip
* spamfssubmit
* spamfschksum
* spamfsurl
* spamhelodns
* spamraddrdns
* spamrbl
* spamhdrcheck
* spamfsphish
* spambal
| no description |
| | **other-webmails** dictionary | | no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **pop3** dictionary | | no description |
| | | **action** string | **Choices:*** pass
* tag
| Action for spam email. |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | | **tag-msg** string | | Subject text or header added to spam email. |
| | | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| | **replacemsg-group** string | | Replacement message group. |
| | **smtp** dictionary | | no description |
| | | **action** string | **Choices:*** pass
* tag
* discard
| Action for spam email. |
| | | **hdrip** string | **Choices:*** disable
* enable
| Enable/disable SMTP email header IP checks for spamfsip, spamrbl and spambwl filters. |
| | | **local-override** string | **Choices:*** disable
* enable
| Enable/disable local filter to override SMTP remote check result. |
| | | **log** string | **Choices:*** disable
* enable
| no description |
| | | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | | **tag-msg** string | | Subject text or header added to spam email. |
| | | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| | **spam-bal-table** string | | Anti-spam block/allow list table ID. |
| | **spam-bwl-table** string | | Anti-spam black/white list table ID. |
| | **spam-bword-table** string | | Anti-spam banned word table ID. |
| | **spam-bword-threshold** integer | | Spam banned word threshold. |
| | **spam-filtering** string | **Choices:*** disable
* enable
| Enable/disable spam filtering. |
| | **spam-iptrust-table** string | | Anti-spam IP trust table ID. |
| | **spam-log** string | **Choices:*** disable
* enable
| Enable/disable spam logging for email filtering. |
| | **spam-log-fortiguard-response** string | **Choices:*** disable
* enable
| Enable/disable logging FortiGuard spam response. |
| | **spam-mheader-table** string | | Anti-spam MIME header table ID. |
| | **spam-rbl-table** string | | Anti-spam DNSBL table ID. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Email Filter profiles.
fmgr_emailfilter_profile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
emailfilter_profile:
comment: <value of string>
external: <value in [disable, enable]>
name: <value of string>
options:
- bannedword
- spambwl
- spamfsip
- spamfssubmit
- spamfschksum
- spamfsurl
- spamhelodns
- spamraddrdns
- spamrbl
- spamhdrcheck
- spamfsphish
- spambal
replacemsg-group: <value of string>
spam-bwl-table: <value of string>
spam-bword-table: <value of string>
spam-bword-threshold: <value of integer>
spam-filtering: <value in [disable, enable]>
spam-iptrust-table: <value of string>
spam-log: <value in [disable, enable]>
spam-log-fortiguard-response: <value in [disable, enable]>
spam-mheader-table: <value of string>
spam-rbl-table: <value of string>
feature-set: <value in [proxy, flow]>
gmail:
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
imap:
action: <value in [pass, tag]>
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
mapi:
action: <value in [pass, discard]>
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
msn-hotmail:
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
other-webmails:
log-all: <value in [disable, enable]>
pop3:
action: <value in [pass, tag]>
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
smtp:
action: <value in [pass, tag, discard]>
hdrip: <value in [disable, enable]>
local-override: <value in [disable, enable]>
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
spam-bal-table: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_autodelete_dlpfilesautodeletion β Automatic deletion policy for DLP archives. fortinet.fortimanager.fmgr\_system\_autodelete\_dlpfilesautodeletion β Automatic deletion policy for DLP archives.
==================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_autodelete_dlpfilesautodeletion`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_autodelete\_dlpfilesautodeletion** dictionary | | the top level parameters set |
| | **retention** string | **Choices:*** **days** β
* weeks
* months
| Automatic deletion in days, weeks, or months. days - Auto-delete data older than <value> days. weeks - Auto-delete data older than <value> weeks. months - Auto-delete data older than <value> months. |
| | **runat** integer | **Default:**0 | Automatic deletion run at (0 - 23) oclock. |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable automatic deletion. disable - Disable automatic deletion. enable - Enable automatic deletion. |
| | **value** integer | **Default:**0 | Automatic deletion in x days, weeks, or months. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Automatic deletion policy for DLP archives.
fmgr_system_autodelete_dlpfilesautodeletion:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_autodelete_dlpfilesautodeletion:
retention: <value in [days, weeks, months]>
runat: <value of integer>
status: <value in [disable, enable]>
value: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_user_devicegroup_tagging β Config object tagging. fortinet.fortimanager.fmgr\_user\_devicegroup\_tagging β Config object tagging.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_devicegroup_tagging`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device-group** string / required | | the parameter (device-group) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_devicegroup\_tagging** dictionary | | the top level parameters set |
| | **category** string | | Tag category. |
| | **name** string | | Tagging entry name. |
| | **tags** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Config object tagging.
fmgr_user_devicegroup_tagging:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
device-group: <your own value>
state: <value in [present, absent]>
user_devicegroup_tagging:
category: <value of string>
name: <value of string>
tags: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_preview_result β Retrieve the result of previous install/preview command. fortinet.fortimanager.fmgr\_securityconsole\_preview\_result β Retrieve the result of previous install/preview command.
=======================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_preview_result`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_preview\_result** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| | **device** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Retrieve the result of previous install/preview command.
fmgr_securityconsole_preview_result:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_preview_result:
adom: <value of string>
device: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_reject β no description fortinet.fortimanager.fmgr\_dvmdb\_workflow\_reject β no description
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_reject`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_workflow\_reject** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_workflow_reject:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
dvmdb_workflow_reject:
desc: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_options β DHCP options. fortinet.fortimanager.fmgr\_fsp\_vlan\_dhcpserver\_options β DHCP options.
==========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_options`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dhcpserver\_options** dictionary | | the top level parameters set |
| | **code** integer | | no description |
| | **id** integer | | no description |
| | **ip** string | | no description |
| | **type** string | **Choices:*** hex
* string
* ip
* fqdn
| no description |
| | **value** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: DHCP options.
fmgr_fsp_vlan_dhcpserver_options:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
state: <value in [present, absent]>
fsp_vlan_dhcpserver_options:
code: <value of integer>
id: <value of integer>
ip: <value of string>
type: <value in [hex, string, ip, ...]>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_ec β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_ec β Replacement message table entries.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_ec`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_ec** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_ec:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_ec:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_devprof_log_syslogd_setting β Global settings for remote syslog server. fortinet.fortimanager.fmgr\_devprof\_log\_syslogd\_setting β Global settings for remote syslog server.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_log_syslogd_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_log\_syslogd\_setting** dictionary | | the top level parameters set |
| | **certificate** string | | Certificate used to communicate with Syslog server. |
| | **enc-algorithm** string | **Choices:*** high
* low
* disable
* high-medium
| Enable/disable reliable syslogging with TLS encryption. |
| | **facility** string | **Choices:*** kernel
* user
* mail
* daemon
* auth
* syslog
* lpr
* news
* uucp
* cron
* authpriv
* ftp
* ntp
* audit
* alert
* clock
* local0
* local1
* local2
* local3
* local4
* local5
* local6
* local7
| Remote syslog facility. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **max-log-rate** integer | | Syslog maximum log rate in MBps (0 = unlimited). |
| | **mode** string | **Choices:*** udp
* legacy-reliable
* reliable
| Remote syslog logging over UDP/Reliable TCP. |
| | **port** integer | | Server listen port. |
| | **priority** string | **Choices:*** low
* default
| Set log transmission priority. |
| | **server** string | | Address of remote syslog server. |
| | **ssl-min-proto-version** string | **Choices:*** default
* TLSv1-1
* TLSv1-2
* SSLv3
* TLSv1
| Minimum supported protocol version for SSL/TLS connections (default is to follow system global setting). |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable remote syslog logging. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Global settings for remote syslog server.
fmgr_devprof_log_syslogd_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_log_syslogd_setting:
certificate: <value of string>
enc-algorithm: <value in [high, low, disable, ...]>
facility: <value in [kernel, user, mail, ...]>
mode: <value in [udp, legacy-reliable, reliable]>
port: <value of integer>
server: <value of string>
ssl-min-proto-version: <value in [default, TLSv1-1, TLSv1-2, ...]>
status: <value in [disable, enable]>
max-log-rate: <value of integer>
priority: <value in [low, default]>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dynamic_virtualwanlink_members β no description fortinet.fortimanager.fmgr\_dynamic\_virtualwanlink\_members β no description
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dynamic_virtualwanlink_members`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_virtualwanlink\_members** dictionary | | the top level parameters set |
| | **comment** string | | no description |
| | **cost** integer | | no description |
| | **detect-failtime** integer | | no description |
| | **detect-http-get** string | | no description |
| | **detect-http-match** string | | no description |
| | **detect-http-port** integer | | no description |
| | **detect-interval** integer | | no description |
| | **detect-protocol** string | **Choices:*** ping
* tcp-echo
* udp-echo
* http
| no description |
| | **detect-recoverytime** integer | | no description |
| | **detect-server** string | | no description |
| | **detect-timeout** integer | | no description |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **comment** string | | no description |
| | | **cost** integer | | no description |
| | | **detect-failtime** integer | | no description |
| | | **detect-http-get** string | | no description |
| | | **detect-http-match** string | | no description |
| | | **detect-http-port** integer | | no description |
| | | **detect-interval** integer | | no description |
| | | **detect-protocol** string | **Choices:*** ping
* tcp-echo
* udp-echo
* http
| no description |
| | | **detect-recoverytime** integer | | no description |
| | | **detect-server** string | | no description |
| | | **detect-timeout** integer | | no description |
| | | **gateway** string | | no description |
| | | **gateway6** string | | no description |
| | | **ingress-spillover-threshold** integer | | no description |
| | | **interface** string | | no description |
| | | **priority** integer | | no description |
| | | **source** string | | no description |
| | | **source6** string | | no description |
| | | **spillover-threshold** integer | | no description |
| | | **status** string | **Choices:*** disable
* enable
| no description |
| | | **volume-ratio** integer | | no description |
| | | **weight** integer | | no description |
| | **gateway** string | | no description |
| | **gateway6** string | | no description |
| | **ingress-spillover-threshold** integer | | no description |
| | **interface** string | | no description |
| | **name** string | | no description |
| | **priority** integer | | no description |
| | **source** string | | no description |
| | **source6** string | | no description |
| | **spillover-threshold** integer | | no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **volume-ratio** integer | | no description |
| | **weight** integer | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dynamic_virtualwanlink_members:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dynamic_virtualwanlink_members:
comment: <value of string>
cost: <value of integer>
detect-failtime: <value of integer>
detect-http-get: <value of string>
detect-http-match: <value of string>
detect-http-port: <value of integer>
detect-interval: <value of integer>
detect-protocol: <value in [ping, tcp-echo, udp-echo, ...]>
detect-recoverytime: <value of integer>
detect-server: <value of string>
detect-timeout: <value of integer>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
comment: <value of string>
cost: <value of integer>
detect-failtime: <value of integer>
detect-http-get: <value of string>
detect-http-match: <value of string>
detect-http-port: <value of integer>
detect-interval: <value of integer>
detect-protocol: <value in [ping, tcp-echo, udp-echo, ...]>
detect-recoverytime: <value of integer>
detect-server: <value of string>
detect-timeout: <value of integer>
gateway: <value of string>
gateway6: <value of string>
ingress-spillover-threshold: <value of integer>
interface: <value of string>
priority: <value of integer>
source: <value of string>
source6: <value of string>
spillover-threshold: <value of integer>
status: <value in [disable, enable]>
volume-ratio: <value of integer>
weight: <value of integer>
gateway: <value of string>
gateway6: <value of string>
ingress-spillover-threshold: <value of integer>
interface: <value of string>
name: <value of string>
priority: <value of integer>
source: <value of string>
source6: <value of string>
spillover-threshold: <value of integer>
status: <value in [disable, enable]>
volume-ratio: <value of integer>
weight: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpuser β Configuration method to edit Simple Network Management Protocol fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_snmpuser β Configuration method to edit Simple Network Management Protocol
=======================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpuser`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_snmpuser** dictionary | | the top level parameters set |
| | **auth-proto** string | **Choices:*** md5
* sha
| Authentication protocol. |
| | **auth-pwd** string | | no description |
| | **name** string | | SNMP user name. |
| | **priv-proto** string | **Choices:*** des
* aes
| Privacy (encryption) protocol. |
| | **priv-pwd** string | | no description |
| | **queries** string | **Choices:*** disable
* enable
| Enable/disable SNMP queries for this user. |
| | **query-port** integer | | SNMPv3 query port (default = 161). |
| | **security-level** string | **Choices:*** no-auth-no-priv
* auth-no-priv
* auth-priv
| Security level for message authentication and encryption. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit Simple Network Management Protocol
fmgr_switchcontroller_managedswitch_snmpuser:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
state: <value in [present, absent]>
switchcontroller_managedswitch_snmpuser:
auth-proto: <value in [md5, sha]>
auth-pwd: <value of string>
name: <value of string>
priv-proto: <value in [des, aes]>
priv-pwd: <value of string>
queries: <value in [disable, enable]>
query-port: <value of integer>
security-level: <value in [no-auth-no-priv, auth-no-priv, auth-priv]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vipgrp46 β Configure IPv4 to IPv6 virtual IP groups. fortinet.fortimanager.fmgr\_firewall\_vipgrp46 β Configure IPv4 to IPv6 virtual IP groups.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vipgrp46`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vipgrp46** dictionary | | the top level parameters set |
| | **color** integer | | Integer value to determine the color of the icon in the GUI (range 1 to 32, default = 0, which sets the value to 1). |
| | **comments** string | | Comment. |
| | **member** string | | Member VIP objects of the group (Separate multiple objects with a space). |
| | **name** string | | VIP46 group name. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 to IPv6 virtual IP groups.
fmgr_firewall_vipgrp46:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_vipgrp46:
color: <value of integer>
comments: <value of string>
member: <value of string>
name: <value of string>
uuid: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_krbkeytab β Configure Kerberos keytab entries. fortinet.fortimanager.fmgr\_user\_krbkeytab β Configure Kerberos keytab entries.
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_krbkeytab`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_krbkeytab** dictionary | | the top level parameters set |
| | **keytab** string | | base64 coded keytab file containing a pre-shared key. |
| | **ldap-server** string | | LDAP server name. |
| | **name** string | | Kerberos keytab entry name. |
| | **pac-data** string | **Choices:*** disable
* enable
| Enable/disable parsing PAC data in the ticket. |
| | **password** string | | no description |
| | **principal** string | | Kerberos service principal, e.g. HTTP/[email protected]. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Kerberos keytab entries.
fmgr_user_krbkeytab:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_krbkeytab:
keytab: <value of string>
ldap-server: <value of string>
name: <value of string>
pac-data: <value in [disable, enable]>
principal: <value of string>
password: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_localinpolicy6 β Configure user defined IPv6 local-in policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_localinpolicy6 β Configure user defined IPv6 local-in policies.
==========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_localinpolicy6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_localinpolicy6** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
| Action performed on traffic matching the policy (default = deny). |
| | **comments** string | | Comment. |
| | **dstaddr** string | | Destination address object from available options. |
| | **dstaddr-negate** string | **Choices:*** disable
* enable
| When enabled dstaddr specifies what the destination address must NOT be. |
| | **intf** string | | Incoming interface name from available options. |
| | **policyid** integer | | User defined local in policy ID. |
| | **schedule** string | | Schedule object from available options. |
| | **service** string | | Service object from available options. Separate names with a space. |
| | **service-negate** string | **Choices:*** disable
* enable
| When enabled service specifies what the service must NOT be. |
| | **srcaddr** string | | Source address object from available options. |
| | **srcaddr-negate** string | **Choices:*** disable
* enable
| When enabled srcaddr specifies what the source address must NOT be. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this local-in policy. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure user defined IPv6 local-in policies.
fmgr_pkg_firewall_localinpolicy6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_firewall_localinpolicy6:
action: <value in [deny, accept]>
dstaddr: <value of string>
intf: <value of string>
policyid: <value of integer>
schedule: <value of string>
service: <value of string>
srcaddr: <value of string>
status: <value in [disable, enable]>
comments: <value of string>
uuid: <value of string>
dstaddr-negate: <value in [disable, enable]>
service-negate: <value in [disable, enable]>
srcaddr-negate: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_sdnconnector_route β Configure GCP route. fortinet.fortimanager.fmgr\_system\_sdnconnector\_route β Configure GCP route.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sdnconnector_route`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sdn-connector** string / required | | the parameter (sdn-connector) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sdnconnector\_route** dictionary | | the top level parameters set |
| | **name** string | | Route name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure GCP route.
fmgr_system_sdnconnector_route:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
sdn-connector: <your own value>
state: <value in [present, absent]>
system_sdnconnector_route:
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dynamic_multicast_interface_dynamicmapping β no description fortinet.fortimanager.fmgr\_dynamic\_multicast\_interface\_dynamicmapping β no description
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dynamic_multicast_interface_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_multicast\_interface\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **local-intf** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **interface** string / required | | the parameter (interface) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dynamic_multicast_interface_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
interface: <your own value>
state: <value in [present, absent]>
dynamic_multicast_interface_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
local-intf: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_headerlength β HTTP header length in request. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_headerlength β HTTP header length in request.
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_headerlength`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_headerlength** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **length** integer | | Length of HTTP header in bytes (0 to 2147483647). |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: HTTP header length in request.
fmgr_waf_profile_constraint_headerlength:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_headerlength:
action: <value in [allow, block]>
length: <value of integer>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_mapi β MAPI. fortinet.fortimanager.fmgr\_emailfilter\_profile\_mapi β MAPI.
==============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_mapi`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_mapi** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* discard
| Action for spam email. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: MAPI.
fmgr_emailfilter_profile_mapi:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_mapi:
action: <value in [pass, discard]>
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_ldap β LDAP server entry configuration. fortinet.fortimanager.fmgr\_system\_admin\_ldap β LDAP server entry configuration.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_ldap`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_ldap** dictionary | | the top level parameters set |
| | **adom** list / elements=string | | no description |
| | | **adom-name** string | | Admin domain names. |
| | **adom-attr** string | | Attribute used to retrieve adom |
| | **attributes** string | **Default:**"member,uniquemember,memberuid" | Attributes used for group searching. |
| | **ca-cert** string | | CA certificate name. |
| | **cnid** string | **Default:**"cn" | Common Name Identifier (default = CN). |
| | **connect-timeout** integer | **Default:**500 | LDAP connection timeout (msec). |
| | **dn** string | | Distinguished Name. |
| | **filter** string | **Default:**"(objectclass=\*)" | Filter used for group searching. |
| | **group** string | | Full base DN used for group searching. |
| | **memberof-attr** string | | Attribute used to retrieve memeberof. |
| | **name** string | | LDAP server entry name. |
| | **password** string | | no description |
| | **port** integer | **Default:**389 | Port number of LDAP server (default = 389). |
| | **profile-attr** string | | Attribute used to retrieve admin profile. |
| | **secondary-server** string | | {<name\_str|ip\_str>} secondary LDAP server domain name or IP. |
| | **secure** string | **Choices:*** **disable** β
* starttls
* ldaps
| SSL connection. disable - No SSL. starttls - Use StartTLS. ldaps - Use LDAPS. |
| | **server** string | | {<name\_str|ip\_str>} LDAP server domain name or IP. |
| | **tertiary-server** string | | {<name\_str|ip\_str>} tertiary LDAP server domain name or IP. |
| | **type** string | **Choices:*** **simple** β
* anonymous
* regular
| Type of LDAP binding. simple - Simple password authentication without search. anonymous - Bind using anonymous user search. regular - Bind using username/password and then search. |
| | **username** string | | Username (full DN) for initial binding. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: LDAP server entry configuration.
fmgr_system_admin_ldap:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_admin_ldap:
adom:
-
adom-name: <value of string>
adom-attr: <value of string>
attributes: <value of string>
ca-cert: <value of string>
cnid: <value of string>
connect-timeout: <value of integer>
dn: <value of string>
filter: <value of string>
group: <value of string>
memberof-attr: <value of string>
name: <value of string>
password: <value of string>
port: <value of integer>
profile-attr: <value of string>
secondary-server: <value of string>
secure: <value in [disable, starttls, ldaps]>
server: <value of string>
tertiary-server: <value of string>
type: <value in [simple, anonymous, regular]>
username: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_user_passwordpolicy β Configure user password policy. fortinet.fortimanager.fmgr\_user\_passwordpolicy β Configure user password policy.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_passwordpolicy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_passwordpolicy** dictionary | | the top level parameters set |
| | **expire-days** integer | | Time in days before the users password expires. |
| | **expired-password-renewal** string | **Choices:*** disable
* enable
| Enable/disable renewal of a password that already is expired. |
| | **name** string | | Password policy name. |
| | **warn-days** integer | | Time in days before a password expiration warning message is displayed to the user upon login. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure user password policy.
fmgr_user_passwordpolicy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_passwordpolicy:
expire-days: <value of integer>
name: <value of string>
warn-days: <value of integer>
expired-password-renewal: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_profile_ftgdwf β FortiGuard Web Filter settings. fortinet.fortimanager.fmgr\_webfilter\_profile\_ftgdwf β FortiGuard Web Filter settings.
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_ftgdwf`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_ftgdwf** dictionary | | the top level parameters set |
| | **exempt-quota** string | | Do not stop quota for these categories. |
| | **filters** list / elements=string | | no description |
| | | **action** string | **Choices:*** block
* monitor
* warning
* authenticate
| Action to take for matches. |
| | | **auth-usr-grp** string | | Groups with permission to authenticate. |
| | | **category** string | | Categories and groups the filter examines. |
| | | **id** integer | | ID number. |
| | | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | | **override-replacemsg** string | | Override replacement message. |
| | | **warn-duration** string | | Duration of warnings. |
| | | **warning-duration-type** string | **Choices:*** session
* timeout
| Re-display warning after closing browser or after a timeout. |
| | | **warning-prompt** string | **Choices:*** per-domain
* per-category
| Warning prompts in each category or each domain. |
| | **max-quota-timeout** integer | | Maximum FortiGuard quota used by single page view in seconds (excludes streams). |
| | **options** list / elements=string | **Choices:*** error-allow
* http-err-detail
* rate-image-urls
* strict-blocking
* rate-server-ip
* redir-block
* connect-request-bypass
* log-all-url
* ftgd-disable
| no description |
| | **ovrd** string | | Allow web filter profile overrides. |
| | **quota** list / elements=string | | no description |
| | | **category** string | | FortiGuard categories to apply quota to (category action must be set to monitor). |
| | | **duration** string | | Duration of quota. |
| | | **id** integer | | ID number. |
| | | **override-replacemsg** string | | Override replacement message. |
| | | **type** string | **Choices:*** time
* traffic
| Quota type. |
| | | **unit** string | **Choices:*** B
* KB
* MB
* GB
| Traffic quota unit of measurement. |
| | | **value** integer | | Traffic quota value. |
| | **rate-crl-urls** string | **Choices:*** disable
* enable
| Enable/disable rating CRL by URL. |
| | **rate-css-urls** string | **Choices:*** disable
* enable
| Enable/disable rating CSS by URL. |
| | **rate-image-urls** string | **Choices:*** disable
* enable
| Enable/disable rating images by URL. |
| | **rate-javascript-urls** string | **Choices:*** disable
* enable
| Enable/disable rating JavaScript by URL. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiGuard Web Filter settings.
fmgr_webfilter_profile_ftgdwf:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
webfilter_profile_ftgdwf:
exempt-quota: <value of string>
filters:
-
action: <value in [block, monitor, warning, ...]>
auth-usr-grp: <value of string>
category: <value of string>
id: <value of integer>
log: <value in [disable, enable]>
override-replacemsg: <value of string>
warn-duration: <value of string>
warning-duration-type: <value in [session, timeout]>
warning-prompt: <value in [per-domain, per-category]>
max-quota-timeout: <value of integer>
options:
- error-allow
- http-err-detail
- rate-image-urls
- strict-blocking
- rate-server-ip
- redir-block
- connect-request-bypass
- log-all-url
- ftgd-disable
ovrd: <value of string>
quota:
-
category: <value of string>
duration: <value of string>
id: <value of integer>
override-replacemsg: <value of string>
type: <value in [time, traffic]>
unit: <value in [B, KB, MB, ...]>
value: <value of integer>
rate-crl-urls: <value in [disable, enable]>
rate-css-urls: <value in [disable, enable]>
rate-image-urls: <value in [disable, enable]>
rate-javascript-urls: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_mms β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_mms β Replacement messages.
====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_mms`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_mms** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **image** string | | Message string. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_mms:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_mms:
buffer: <value of string>
charset: <value in [us-ascii, utf-8]>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
image: <value of string>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqproamingconsortium β Configure roaming consortium. fortinet.fortimanager.fmgr\_hotspot20\_anqproamingconsortium β Configure roaming consortium.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqproamingconsortium`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqproamingconsortium** dictionary | | the top level parameters set |
| | **name** string | | Roaming consortium name. |
| | **oi-list** list / elements=string | | no description |
| | | **comment** string | | Comment. |
| | | **index** integer | | OI index. |
| | | **oi** string | | Organization identifier. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure roaming consortium.
fmgr_hotspot20_anqproamingconsortium:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
hotspot20_anqproamingconsortium:
name: <value of string>
oi-list:
-
comment: <value of string>
index: <value of integer>
oi: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_waf_profile_addresslist β Black address list and white address list. fortinet.fortimanager.fmgr\_waf\_profile\_addresslist β Black address list and white address list.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_addresslist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_addresslist** dictionary | | the top level parameters set |
| | **blocked-address** string | | Blocked address. |
| | **blocked-log** string | **Choices:*** disable
* enable
| Enable/disable logging on blocked addresses. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Status. |
| | **trusted-address** string | | Trusted address. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Black address list and white address list.
fmgr_waf_profile_addresslist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_addresslist:
blocked-address: <value of string>
blocked-log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
trusted-address: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible Fortinet.Fortimanager Fortinet.Fortimanager
=====================
Collection version 2.1.3
Plugin Index
------------
These are the plugins in the fortinet.fortimanager collection
### Httpapi Plugins
* [fortimanager](fortimanager_httpapi#ansible-collections-fortinet-fortimanager-fortimanager-httpapi) β HttpApi Plugin for Fortinet FortiManager Appliance or VM.
### Modules
* [fmgr\_adom\_options](fmgr_adom_options_module#ansible-collections-fortinet-fortimanager-fmgr-adom-options-module) β no description
* [fmgr\_antivirus\_mmschecksum](fmgr_antivirus_mmschecksum_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-mmschecksum-module) β Configure MMS content checksum list.
* [fmgr\_antivirus\_mmschecksum\_entries](fmgr_antivirus_mmschecksum_entries_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-mmschecksum-entries-module) β modify this MMS content checksum list
* [fmgr\_antivirus\_notification](fmgr_antivirus_notification_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-notification-module) β Configure AntiVirus notification lists.
* [fmgr\_antivirus\_notification\_entries](fmgr_antivirus_notification_entries_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-notification-entries-module) β modify this antivirus notification list
* [fmgr\_antivirus\_profile](fmgr_antivirus_profile_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-module) β Configure AntiVirus profiles.
* [fmgr\_antivirus\_profile\_cifs](fmgr_antivirus_profile_cifs_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-cifs-module) β Configure CIFS AntiVirus options.
* [fmgr\_antivirus\_profile\_contentdisarm](fmgr_antivirus_profile_contentdisarm_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-contentdisarm-module) β AV Content Disarm and Reconstruction settings.
* [fmgr\_antivirus\_profile\_ftp](fmgr_antivirus_profile_ftp_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-ftp-module) β Configure FTP AntiVirus options.
* [fmgr\_antivirus\_profile\_http](fmgr_antivirus_profile_http_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-http-module) β Configure HTTP AntiVirus options.
* [fmgr\_antivirus\_profile\_imap](fmgr_antivirus_profile_imap_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-imap-module) β Configure IMAP AntiVirus options.
* [fmgr\_antivirus\_profile\_mapi](fmgr_antivirus_profile_mapi_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-mapi-module) β Configure MAPI AntiVirus options.
* [fmgr\_antivirus\_profile\_nacquar](fmgr_antivirus_profile_nacquar_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-nacquar-module) β Configure AntiVirus quarantine settings.
* [fmgr\_antivirus\_profile\_nntp](fmgr_antivirus_profile_nntp_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-nntp-module) β Configure NNTP AntiVirus options.
* [fmgr\_antivirus\_profile\_outbreakprevention](fmgr_antivirus_profile_outbreakprevention_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-outbreakprevention-module) β Configure Virus Outbreak Prevention settings.
* [fmgr\_antivirus\_profile\_pop3](fmgr_antivirus_profile_pop3_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-pop3-module) β Configure POP3 AntiVirus options.
* [fmgr\_antivirus\_profile\_smb](fmgr_antivirus_profile_smb_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-smb-module) β Configure SMB AntiVirus options.
* [fmgr\_antivirus\_profile\_smtp](fmgr_antivirus_profile_smtp_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-smtp-module) β Configure SMTP AntiVirus options.
* [fmgr\_antivirus\_profile\_ssh](fmgr_antivirus_profile_ssh_module#ansible-collections-fortinet-fortimanager-fmgr-antivirus-profile-ssh-module) β Configure SFTP and SCP AntiVirus options.
* [fmgr\_apcfgprofile](fmgr_apcfgprofile_module#ansible-collections-fortinet-fortimanager-fmgr-apcfgprofile-module) β Configure AP local configuration profiles.
* [fmgr\_apcfgprofile\_commandlist](fmgr_apcfgprofile_commandlist_module#ansible-collections-fortinet-fortimanager-fmgr-apcfgprofile-commandlist-module) β AP local configuration command list.
* [fmgr\_application\_categories](fmgr_application_categories_module#ansible-collections-fortinet-fortimanager-fmgr-application-categories-module) β no description
* [fmgr\_application\_custom](fmgr_application_custom_module#ansible-collections-fortinet-fortimanager-fmgr-application-custom-module) β Configure custom application signatures.
* [fmgr\_application\_group](fmgr_application_group_module#ansible-collections-fortinet-fortimanager-fmgr-application-group-module) β Configure firewall application groups.
* [fmgr\_application\_list](fmgr_application_list_module#ansible-collections-fortinet-fortimanager-fmgr-application-list-module) β Configure application control lists.
* [fmgr\_application\_list\_defaultnetworkservices](fmgr_application_list_defaultnetworkservices_module#ansible-collections-fortinet-fortimanager-fmgr-application-list-defaultnetworkservices-module) β Default network service entries.
* [fmgr\_application\_list\_entries](fmgr_application_list_entries_module#ansible-collections-fortinet-fortimanager-fmgr-application-list-entries-module) β Application list entries.
* [fmgr\_application\_list\_entries\_parameters](fmgr_application_list_entries_parameters_module#ansible-collections-fortinet-fortimanager-fmgr-application-list-entries-parameters-module) β Application parameters.
* [fmgr\_application\_list\_entries\_parameters\_members](fmgr_application_list_entries_parameters_members_module#ansible-collections-fortinet-fortimanager-fmgr-application-list-entries-parameters-members-module) β Parameter tuple members.
* [fmgr\_authentication\_scheme](fmgr_authentication_scheme_module#ansible-collections-fortinet-fortimanager-fmgr-authentication-scheme-module) β Configure Authentication Schemes.
* [fmgr\_bleprofile](fmgr_bleprofile_module#ansible-collections-fortinet-fortimanager-fmgr-bleprofile-module) β Configure Bluetooth Low Energy profile.
* [fmgr\_bonjourprofile](fmgr_bonjourprofile_module#ansible-collections-fortinet-fortimanager-fmgr-bonjourprofile-module) β Configure Bonjour profiles.
* [fmgr\_bonjourprofile\_policylist](fmgr_bonjourprofile_policylist_module#ansible-collections-fortinet-fortimanager-fmgr-bonjourprofile-policylist-module) β Bonjour policy list.
* [fmgr\_certificate\_template](fmgr_certificate_template_module#ansible-collections-fortinet-fortimanager-fmgr-certificate-template-module) β no description
* [fmgr\_cifs\_domaincontroller](fmgr_cifs_domaincontroller_module#ansible-collections-fortinet-fortimanager-fmgr-cifs-domaincontroller-module) β Define known domain controller servers.
* [fmgr\_cifs\_profile](fmgr_cifs_profile_module#ansible-collections-fortinet-fortimanager-fmgr-cifs-profile-module) β Configure CIFS profile.
* [fmgr\_cifs\_profile\_filefilter](fmgr_cifs_profile_filefilter_module#ansible-collections-fortinet-fortimanager-fmgr-cifs-profile-filefilter-module) β File filter.
* [fmgr\_cifs\_profile\_filefilter\_entries](fmgr_cifs_profile_filefilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-cifs-profile-filefilter-entries-module) β File filter entries.
* [fmgr\_cifs\_profile\_serverkeytab](fmgr_cifs_profile_serverkeytab_module#ansible-collections-fortinet-fortimanager-fmgr-cifs-profile-serverkeytab-module) β Server keytab.
* [fmgr\_clone](fmgr_clone_module#ansible-collections-fortinet-fortimanager-fmgr-clone-module) β Clone an object in FortiManager.
* [fmgr\_credentialstore\_domaincontroller](fmgr_credentialstore_domaincontroller_module#ansible-collections-fortinet-fortimanager-fmgr-credentialstore-domaincontroller-module) β Define known domain controller servers.
* [fmgr\_devprof\_device\_profile\_fortianalyzer](fmgr_devprof_device_profile_fortianalyzer_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-device-profile-fortianalyzer-module) β no description
* [fmgr\_devprof\_device\_profile\_fortiguard](fmgr_devprof_device_profile_fortiguard_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-device-profile-fortiguard-module) β no description
* [fmgr\_devprof\_import](fmgr_devprof_import_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-import-module) β no description
* [fmgr\_devprof\_log\_fortianalyzer\_setting](fmgr_devprof_log_fortianalyzer_setting_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-log-fortianalyzer-setting-module) β Global FortiAnalyzer settings.
* [fmgr\_devprof\_log\_fortianalyzercloud\_setting](fmgr_devprof_log_fortianalyzercloud_setting_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-log-fortianalyzercloud-setting-module) β Global FortiAnalyzer Cloud settings.
* [fmgr\_devprof\_log\_syslogd\_filter](fmgr_devprof_log_syslogd_filter_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-log-syslogd-filter-module) β Filters for remote system server.
* [fmgr\_devprof\_log\_syslogd\_setting](fmgr_devprof_log_syslogd_setting_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-log-syslogd-setting-module) β Global settings for remote syslog server.
* [fmgr\_devprof\_system\_centralmanagement](fmgr_devprof_system_centralmanagement_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-centralmanagement-module) β Configure central management.
* [fmgr\_devprof\_system\_centralmanagement\_serverlist](fmgr_devprof_system_centralmanagement_serverlist_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-centralmanagement-serverlist-module) β Additional severs that the FortiGate can use for updates
* [fmgr\_devprof\_system\_dns](fmgr_devprof_system_dns_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-dns-module) β Configure DNS.
* [fmgr\_devprof\_system\_emailserver](fmgr_devprof_system_emailserver_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-emailserver-module) β Configure the email server used by the FortiGate various things.
* [fmgr\_devprof\_system\_global](fmgr_devprof_system_global_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-global-module) β Configure global attributes.
* [fmgr\_devprof\_system\_ntp](fmgr_devprof_system_ntp_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-ntp-module) β Configure system NTP information.
* [fmgr\_devprof\_system\_ntp\_ntpserver](fmgr_devprof_system_ntp_ntpserver_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-ntp-ntpserver-module) β Configure the FortiGate to connect to any available third-party NTP server.
* [fmgr\_devprof\_system\_replacemsg\_admin](fmgr_devprof_system_replacemsg_admin_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-admin-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_alertmail](fmgr_devprof_system_replacemsg_alertmail_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-alertmail-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_auth](fmgr_devprof_system_replacemsg_auth_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-auth-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_devicedetectionportal](fmgr_devprof_system_replacemsg_devicedetectionportal_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-devicedetectionportal-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_ec](fmgr_devprof_system_replacemsg_ec_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-ec-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_fortiguardwf](fmgr_devprof_system_replacemsg_fortiguardwf_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-fortiguardwf-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_ftp](fmgr_devprof_system_replacemsg_ftp_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-ftp-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_http](fmgr_devprof_system_replacemsg_http_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-http-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_mail](fmgr_devprof_system_replacemsg_mail_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-mail-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_mms](fmgr_devprof_system_replacemsg_mms_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-mms-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_nacquar](fmgr_devprof_system_replacemsg_nacquar_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-nacquar-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_nntp](fmgr_devprof_system_replacemsg_nntp_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-nntp-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_spam](fmgr_devprof_system_replacemsg_spam_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-spam-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_sslvpn](fmgr_devprof_system_replacemsg_sslvpn_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-sslvpn-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_trafficquota](fmgr_devprof_system_replacemsg_trafficquota_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-trafficquota-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_utm](fmgr_devprof_system_replacemsg_utm_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-utm-module) β Replacement messages.
* [fmgr\_devprof\_system\_replacemsg\_webproxy](fmgr_devprof_system_replacemsg_webproxy_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-replacemsg-webproxy-module) β Replacement messages.
* [fmgr\_devprof\_system\_snmp\_community](fmgr_devprof_system_snmp_community_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-snmp-community-module) β SNMP community configuration.
* [fmgr\_devprof\_system\_snmp\_community\_hosts](fmgr_devprof_system_snmp_community_hosts_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-snmp-community-hosts-module) β Configure IPv4 SNMP managers
* [fmgr\_devprof\_system\_snmp\_community\_hosts6](fmgr_devprof_system_snmp_community_hosts6_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-snmp-community-hosts6-module) β Configure IPv6 SNMP managers.
* [fmgr\_devprof\_system\_snmp\_sysinfo](fmgr_devprof_system_snmp_sysinfo_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-snmp-sysinfo-module) β SNMP system info configuration.
* [fmgr\_devprof\_system\_snmp\_user](fmgr_devprof_system_snmp_user_module#ansible-collections-fortinet-fortimanager-fmgr-devprof-system-snmp-user-module) β SNMP user configuration.
* [fmgr\_dlp\_filepattern](fmgr_dlp_filepattern_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-filepattern-module) β Configure file patterns used by DLP blocking.
* [fmgr\_dlp\_filepattern\_entries](fmgr_dlp_filepattern_entries_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-filepattern-entries-module) β Configure file patterns used by DLP blocking.
* [fmgr\_dlp\_fpsensitivity](fmgr_dlp_fpsensitivity_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-fpsensitivity-module) β Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
* [fmgr\_dlp\_sensitivity](fmgr_dlp_sensitivity_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-sensitivity-module) β Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
* [fmgr\_dlp\_sensor](fmgr_dlp_sensor_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-sensor-module) β Configure DLP sensors.
* [fmgr\_dlp\_sensor\_filter](fmgr_dlp_sensor_filter_module#ansible-collections-fortinet-fortimanager-fmgr-dlp-sensor-filter-module) β Set up DLP filters for this sensor.
* [fmgr\_dnsfilter\_domainfilter](fmgr_dnsfilter_domainfilter_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-domainfilter-module) β Configure DNS domain filters.
* [fmgr\_dnsfilter\_domainfilter\_entries](fmgr_dnsfilter_domainfilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-domainfilter-entries-module) β DNS domain filter entries.
* [fmgr\_dnsfilter\_profile](fmgr_dnsfilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-profile-module) β Configure DNS domain filter profiles.
* [fmgr\_dnsfilter\_profile\_dnstranslation](fmgr_dnsfilter_profile_dnstranslation_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-profile-dnstranslation-module) β DNS translation settings.
* [fmgr\_dnsfilter\_profile\_domainfilter](fmgr_dnsfilter_profile_domainfilter_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-profile-domainfilter-module) β Domain filter settings.
* [fmgr\_dnsfilter\_profile\_ftgddns](fmgr_dnsfilter_profile_ftgddns_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-profile-ftgddns-module) β FortiGuard DNS Filter settings.
* [fmgr\_dnsfilter\_profile\_ftgddns\_filters](fmgr_dnsfilter_profile_ftgddns_filters_module#ansible-collections-fortinet-fortimanager-fmgr-dnsfilter-profile-ftgddns-filters-module) β FortiGuard DNS domain filters.
* [fmgr\_dvm\_cmd\_add\_device](fmgr_dvm_cmd_add_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-add-device-module) β Add a device to the Device Manager database.
* [fmgr\_dvm\_cmd\_add\_devlist](fmgr_dvm_cmd_add_devlist_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-add-devlist-module) β Add multiple devices to the Device Manager database.
* [fmgr\_dvm\_cmd\_changehaseq](fmgr_dvm_cmd_changehaseq_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-changehaseq-module) β Modify HA sequence to promote a slave to become the master of the cluster.
* [fmgr\_dvm\_cmd\_del\_device](fmgr_dvm_cmd_del_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-del-device-module) β Delete a device.
* [fmgr\_dvm\_cmd\_del\_devlist](fmgr_dvm_cmd_del_devlist_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-del-devlist-module) β Delete a list of devices.
* [fmgr\_dvm\_cmd\_discover\_device](fmgr_dvm_cmd_discover_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-discover-device-module) β Probe a remote device and retrieve its device information and system status.
* [fmgr\_dvm\_cmd\_import\_devlist](fmgr_dvm_cmd_import_devlist_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-import-devlist-module) β Import a list of ADOMs and devices.
* [fmgr\_dvm\_cmd\_reload\_devlist](fmgr_dvm_cmd_reload_devlist_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-reload-devlist-module) β Retrieve a list of devices.
* [fmgr\_dvm\_cmd\_update\_device](fmgr_dvm_cmd_update_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-update-device-module) β Refresh the FGFM connection and system information of a device.
* [fmgr\_dvm\_cmd\_update\_devlist](fmgr_dvm_cmd_update_devlist_module#ansible-collections-fortinet-fortimanager-fmgr-dvm-cmd-update-devlist-module) β Refresh FGFM connection and system information for a list of devices.
* [fmgr\_dvmdb\_adom](fmgr_dvmdb_adom_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-adom-module) β ADOM table, most attributes are read-only and can only be changed internally.
* [fmgr\_dvmdb\_adom\_objectmember](fmgr_dvmdb_adom_objectmember_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-adom-objectmember-module) β ADOM table, most attributes are read-only and can only be changed internally.
* [fmgr\_dvmdb\_device](fmgr_dvmdb_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-device-module) β Device table, most attributes are read-only and can only be changed internally.
* [fmgr\_dvmdb\_device\_replace\_sn](fmgr_dvmdb_device_replace_sn_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-device-replace-sn-module) β Replace devices serial number with new value.
* [fmgr\_dvmdb\_device\_vdom](fmgr_dvmdb_device_vdom_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-device-vdom-module) β Device VDOM table.
* [fmgr\_dvmdb\_folder](fmgr_dvmdb_folder_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-folder-module) β no description
* [fmgr\_dvmdb\_group](fmgr_dvmdb_group_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-group-module) β Device group table.
* [fmgr\_dvmdb\_group\_objectmember](fmgr_dvmdb_group_objectmember_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-group-objectmember-module) β Device group table.
* [fmgr\_dvmdb\_metafields\_adom](fmgr_dvmdb_metafields_adom_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-metafields-adom-module) β no description
* [fmgr\_dvmdb\_metafields\_device](fmgr_dvmdb_metafields_device_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-metafields-device-module) β no description
* [fmgr\_dvmdb\_metafields\_group](fmgr_dvmdb_metafields_group_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-metafields-group-module) β no description
* [fmgr\_dvmdb\_revision](fmgr_dvmdb_revision_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-revision-module) β ADOM revision table.
* [fmgr\_dvmdb\_script](fmgr_dvmdb_script_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-script-module) β Script table.
* [fmgr\_dvmdb\_script\_execute](fmgr_dvmdb_script_execute_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-script-execute-module) β Run script.
* [fmgr\_dvmdb\_script\_objectmember](fmgr_dvmdb_script_objectmember_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-script-objectmember-module) β Script table.
* [fmgr\_dvmdb\_script\_scriptschedule](fmgr_dvmdb_script_scriptschedule_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-script-scriptschedule-module) β Script schedule table.
* [fmgr\_dvmdb\_workflow\_approve](fmgr_dvmdb_workflow_approve_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-approve-module) β no description
* [fmgr\_dvmdb\_workflow\_discard](fmgr_dvmdb_workflow_discard_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-discard-module) β no description
* [fmgr\_dvmdb\_workflow\_drop](fmgr_dvmdb_workflow_drop_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-drop-module) β no description
* [fmgr\_dvmdb\_workflow\_reject](fmgr_dvmdb_workflow_reject_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-reject-module) β no description
* [fmgr\_dvmdb\_workflow\_repair](fmgr_dvmdb_workflow_repair_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-repair-module) β no description
* [fmgr\_dvmdb\_workflow\_revert](fmgr_dvmdb_workflow_revert_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-revert-module) β no description
* [fmgr\_dvmdb\_workflow\_review](fmgr_dvmdb_workflow_review_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-review-module) β no description
* [fmgr\_dvmdb\_workflow\_save](fmgr_dvmdb_workflow_save_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-save-module) β no description
* [fmgr\_dvmdb\_workflow\_start](fmgr_dvmdb_workflow_start_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-start-module) β Continue a workflow session.
* [fmgr\_dvmdb\_workflow\_submit](fmgr_dvmdb_workflow_submit_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workflow-submit-module) β no description
* [fmgr\_dvmdb\_workspace\_commit](fmgr_dvmdb_workspace_commit_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-commit-module) β Commit change
* [fmgr\_dvmdb\_workspace\_commit\_dev](fmgr_dvmdb_workspace_commit_dev_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-commit-dev-module) β Commit change
* [fmgr\_dvmdb\_workspace\_commit\_obj](fmgr_dvmdb_workspace_commit_obj_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-commit-obj-module) β Commit change
* [fmgr\_dvmdb\_workspace\_commit\_pkg](fmgr_dvmdb_workspace_commit_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-commit-pkg-module) β Commit change
* [fmgr\_dvmdb\_workspace\_lock](fmgr_dvmdb_workspace_lock_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-lock-module) β Lock an entire ADOM.
* [fmgr\_dvmdb\_workspace\_lock\_dev](fmgr_dvmdb_workspace_lock_dev_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-lock-dev-module) β Lock a device.
* [fmgr\_dvmdb\_workspace\_lock\_obj](fmgr_dvmdb_workspace_lock_obj_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-lock-obj-module) β Lock a specific object, where the url contains the full path to the object
* [fmgr\_dvmdb\_workspace\_lock\_pkg](fmgr_dvmdb_workspace_lock_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-lock-pkg-module) β Lock a specific package, where the url includes both the folder
* [fmgr\_dvmdb\_workspace\_unlock](fmgr_dvmdb_workspace_unlock_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-unlock-module) β Unlock an entire ADOM.
* [fmgr\_dvmdb\_workspace\_unlock\_dev](fmgr_dvmdb_workspace_unlock_dev_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-unlock-dev-module) β Unlock a device.
* [fmgr\_dvmdb\_workspace\_unlock\_obj](fmgr_dvmdb_workspace_unlock_obj_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-unlock-obj-module) β Unlock a specific object, where the url contains the full path to the object
* [fmgr\_dvmdb\_workspace\_unlock\_pkg](fmgr_dvmdb_workspace_unlock_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-dvmdb-workspace-unlock-pkg-module) β Unlock a specific package, where the url includes both the folder
* [fmgr\_dynamic\_address](fmgr_dynamic_address_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-address-module) β no description
* [fmgr\_dynamic\_address\_dynamicaddrmapping](fmgr_dynamic_address_dynamicaddrmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-address-dynamicaddrmapping-module) β no description
* [fmgr\_dynamic\_certificate\_local](fmgr_dynamic_certificate_local_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-certificate-local-module) β no description
* [fmgr\_dynamic\_certificate\_local\_dynamicmapping](fmgr_dynamic_certificate_local_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-certificate-local-dynamicmapping-module) β no description
* [fmgr\_dynamic\_input\_interface](fmgr_dynamic_input_interface_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-input-interface-module) β no description
* [fmgr\_dynamic\_input\_interface\_dynamicmapping](fmgr_dynamic_input_interface_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-input-interface-dynamicmapping-module) β no description
* [fmgr\_dynamic\_interface](fmgr_dynamic_interface_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-interface-module) β no description
* [fmgr\_dynamic\_interface\_dynamicmapping](fmgr_dynamic_interface_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-interface-dynamicmapping-module) β no description
* [fmgr\_dynamic\_interface\_platformmapping](fmgr_dynamic_interface_platformmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-interface-platformmapping-module) β no description
* [fmgr\_dynamic\_ippool](fmgr_dynamic_ippool_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-ippool-module) β no description
* [fmgr\_dynamic\_multicast\_interface](fmgr_dynamic_multicast_interface_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-multicast-interface-module) β no description
* [fmgr\_dynamic\_multicast\_interface\_dynamicmapping](fmgr_dynamic_multicast_interface_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-multicast-interface-dynamicmapping-module) β no description
* [fmgr\_dynamic\_vip](fmgr_dynamic_vip_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-vip-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_members](fmgr_dynamic_virtualwanlink_members_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-members-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_members\_dynamicmapping](fmgr_dynamic_virtualwanlink_members_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-members-dynamicmapping-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_neighbor](fmgr_dynamic_virtualwanlink_neighbor_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-neighbor-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_neighbor\_dynamicmapping](fmgr_dynamic_virtualwanlink_neighbor_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-neighbor-dynamicmapping-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_server](fmgr_dynamic_virtualwanlink_server_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-server-module) β no description
* [fmgr\_dynamic\_virtualwanlink\_server\_dynamicmapping](fmgr_dynamic_virtualwanlink_server_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-virtualwanlink-server-dynamicmapping-module) β no description
* [fmgr\_dynamic\_vpntunnel](fmgr_dynamic_vpntunnel_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-vpntunnel-module) β no description
* [fmgr\_dynamic\_vpntunnel\_dynamicmapping](fmgr_dynamic_vpntunnel_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-dynamic-vpntunnel-dynamicmapping-module) β no description
* [fmgr\_emailfilter\_blockallowlist](fmgr_emailfilter_blockallowlist_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-blockallowlist-module) β Configure anti-spam block/allow list.
* [fmgr\_emailfilter\_blockallowlist\_entries](fmgr_emailfilter_blockallowlist_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-blockallowlist-entries-module) β Anti-spam block/allow entries.
* [fmgr\_emailfilter\_bwl](fmgr_emailfilter_bwl_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-bwl-module) β Configure anti-spam black/white list.
* [fmgr\_emailfilter\_bwl\_entries](fmgr_emailfilter_bwl_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-bwl-entries-module) β Anti-spam black/white list entries.
* [fmgr\_emailfilter\_bword](fmgr_emailfilter_bword_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-bword-module) β Configure AntiSpam banned word list.
* [fmgr\_emailfilter\_bword\_entries](fmgr_emailfilter_bword_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-bword-entries-module) β Spam filter banned word.
* [fmgr\_emailfilter\_dnsbl](fmgr_emailfilter_dnsbl_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-dnsbl-module) β Configure AntiSpam DNSBL/ORBL.
* [fmgr\_emailfilter\_dnsbl\_entries](fmgr_emailfilter_dnsbl_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-dnsbl-entries-module) β Spam filter DNSBL and ORBL server.
* [fmgr\_emailfilter\_fortishield](fmgr_emailfilter_fortishield_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-fortishield-module) β Configure FortiGuard - AntiSpam.
* [fmgr\_emailfilter\_iptrust](fmgr_emailfilter_iptrust_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-iptrust-module) β Configure AntiSpam IP trust.
* [fmgr\_emailfilter\_iptrust\_entries](fmgr_emailfilter_iptrust_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-iptrust-entries-module) β Spam filter trusted IP addresses.
* [fmgr\_emailfilter\_mheader](fmgr_emailfilter_mheader_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-mheader-module) β Configure AntiSpam MIME header.
* [fmgr\_emailfilter\_mheader\_entries](fmgr_emailfilter_mheader_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-mheader-entries-module) β Spam filter mime header content.
* [fmgr\_emailfilter\_options](fmgr_emailfilter_options_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-options-module) β Configure AntiSpam options.
* [fmgr\_emailfilter\_profile](fmgr_emailfilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-module) β Configure Email Filter profiles.
* [fmgr\_emailfilter\_profile\_filefilter](fmgr_emailfilter_profile_filefilter_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-filefilter-module) β File filter.
* [fmgr\_emailfilter\_profile\_filefilter\_entries](fmgr_emailfilter_profile_filefilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-filefilter-entries-module) β File filter entries.
* [fmgr\_emailfilter\_profile\_gmail](fmgr_emailfilter_profile_gmail_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-gmail-module) β Gmail.
* [fmgr\_emailfilter\_profile\_imap](fmgr_emailfilter_profile_imap_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-imap-module) β IMAP.
* [fmgr\_emailfilter\_profile\_mapi](fmgr_emailfilter_profile_mapi_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-mapi-module) β MAPI.
* [fmgr\_emailfilter\_profile\_msnhotmail](fmgr_emailfilter_profile_msnhotmail_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-msnhotmail-module) β MSN Hotmail.
* [fmgr\_emailfilter\_profile\_otherwebmails](fmgr_emailfilter_profile_otherwebmails_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-otherwebmails-module) β Other supported webmails.
* [fmgr\_emailfilter\_profile\_pop3](fmgr_emailfilter_profile_pop3_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-pop3-module) β POP3.
* [fmgr\_emailfilter\_profile\_smtp](fmgr_emailfilter_profile_smtp_module#ansible-collections-fortinet-fortimanager-fmgr-emailfilter-profile-smtp-module) β SMTP.
* [fmgr\_exec\_fgfm\_reclaimdevtunnel](fmgr_exec_fgfm_reclaimdevtunnel_module#ansible-collections-fortinet-fortimanager-fmgr-exec-fgfm-reclaimdevtunnel-module) β Reclaim management tunnel to device.
* [fmgr\_extendercontroller\_dataplan](fmgr_extendercontroller_dataplan_module#ansible-collections-fortinet-fortimanager-fmgr-extendercontroller-dataplan-module) β FortiExtender dataplan configuration.
* [fmgr\_extendercontroller\_simprofile](fmgr_extendercontroller_simprofile_module#ansible-collections-fortinet-fortimanager-fmgr-extendercontroller-simprofile-module) β no description
* [fmgr\_extendercontroller\_simprofile\_autoswitchprofile](fmgr_extendercontroller_simprofile_autoswitchprofile_module#ansible-collections-fortinet-fortimanager-fmgr-extendercontroller-simprofile-autoswitchprofile-module) β no description
* [fmgr\_extendercontroller\_template](fmgr_extendercontroller_template_module#ansible-collections-fortinet-fortimanager-fmgr-extendercontroller-template-module) β no description
* [fmgr\_fact](fmgr_fact_module#ansible-collections-fortinet-fortimanager-fmgr-fact-module) β Gather fortimanager facts.
* [fmgr\_filefilter\_profile](fmgr_filefilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-filefilter-profile-module) β Configure file-filter profiles.
* [fmgr\_filefilter\_profile\_rules](fmgr_filefilter_profile_rules_module#ansible-collections-fortinet-fortimanager-fmgr-filefilter-profile-rules-module) β File filter rules.
* [fmgr\_firewall\_accessproxy](fmgr_firewall_accessproxy_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-module) β Configure Access Proxy.
* [fmgr\_firewall\_accessproxy\_apigateway](fmgr_firewall_accessproxy_apigateway_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-apigateway-module) β Set API Gateway.
* [fmgr\_firewall\_accessproxy\_apigateway\_realservers](fmgr_firewall_accessproxy_apigateway_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-apigateway-realservers-module) β Select the real servers that this Access Proxy will distribute traffic to.
* [fmgr\_firewall\_accessproxy\_apigateway\_sslciphersuites](fmgr_firewall_accessproxy_apigateway_sslciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-apigateway-sslciphersuites-module) β SSL/TLS cipher suites to offer to a server, ordered by priority.
* [fmgr\_firewall\_accessproxy\_realservers](fmgr_firewall_accessproxy_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-realservers-module) β Select the SSL real servers that this Access Proxy will distribute traffic to.
* [fmgr\_firewall\_accessproxy\_serverpubkeyauthsettings](fmgr_firewall_accessproxy_serverpubkeyauthsettings_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-serverpubkeyauthsettings-module) β Server SSH public key authentication settings.
* [fmgr\_firewall\_accessproxy\_serverpubkeyauthsettings\_certextension](fmgr_firewall_accessproxy_serverpubkeyauthsettings_certextension_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-accessproxy-serverpubkeyauthsettings-certextension-module) β Configure certificate extension for user certificate.
* [fmgr\_firewall\_address](fmgr_firewall_address_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address-module) β Configure IPv4 addresses.
* [fmgr\_firewall\_address6](fmgr_firewall_address6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-module) β Configure IPv6 firewall addresses.
* [fmgr\_firewall\_address6\_dynamicmapping](fmgr_firewall_address6_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-dynamicmapping-module) β Configure IPv6 firewall addresses.
* [fmgr\_firewall\_address6\_dynamicmapping\_subnetsegment](fmgr_firewall_address6_dynamicmapping_subnetsegment_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-dynamicmapping-subnetsegment-module) β IPv6 subnet segments.
* [fmgr\_firewall\_address6\_list](fmgr_firewall_address6_list_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-list-module) β IP address list.
* [fmgr\_firewall\_address6\_subnetsegment](fmgr_firewall_address6_subnetsegment_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-subnetsegment-module) β IPv6 subnet segments.
* [fmgr\_firewall\_address6\_tagging](fmgr_firewall_address6_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6-tagging-module) β Config object tagging
* [fmgr\_firewall\_address6template](fmgr_firewall_address6template_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6template-module) β Configure IPv6 address templates.
* [fmgr\_firewall\_address6template\_subnetsegment](fmgr_firewall_address6template_subnetsegment_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6template-subnetsegment-module) β IPv6 subnet segments.
* [fmgr\_firewall\_address6template\_subnetsegment\_values](fmgr_firewall_address6template_subnetsegment_values_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address6template-subnetsegment-values-module) β Subnet segment values.
* [fmgr\_firewall\_address\_dynamicmapping](fmgr_firewall_address_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address-dynamicmapping-module) β Configure IPv4 addresses.
* [fmgr\_firewall\_address\_list](fmgr_firewall_address_list_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address-list-module) β IP address list.
* [fmgr\_firewall\_address\_tagging](fmgr_firewall_address_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-address-tagging-module) β Config object tagging.
* [fmgr\_firewall\_addrgrp](fmgr_firewall_addrgrp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp-module) β Configure IPv4 address groups.
* [fmgr\_firewall\_addrgrp6](fmgr_firewall_addrgrp6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp6-module) β Configure IPv6 address groups.
* [fmgr\_firewall\_addrgrp6\_dynamicmapping](fmgr_firewall_addrgrp6_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp6-dynamicmapping-module) β Configure IPv6 address groups.
* [fmgr\_firewall\_addrgrp6\_tagging](fmgr_firewall_addrgrp6_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp6-tagging-module) β Config object tagging.
* [fmgr\_firewall\_addrgrp\_dynamicmapping](fmgr_firewall_addrgrp_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp-dynamicmapping-module) β Configure IPv4 address groups.
* [fmgr\_firewall\_addrgrp\_tagging](fmgr_firewall_addrgrp_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-addrgrp-tagging-module) β Config object tagging.
* [fmgr\_firewall\_carrierendpointbwl](fmgr_firewall_carrierendpointbwl_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-carrierendpointbwl-module) β Carrier end point black/white list tables.
* [fmgr\_firewall\_carrierendpointbwl\_entries](fmgr_firewall_carrierendpointbwl_entries_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-carrierendpointbwl-entries-module) β Carrier end point black/white list.
* [fmgr\_firewall\_decryptedtrafficmirror](fmgr_firewall_decryptedtrafficmirror_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-decryptedtrafficmirror-module) β Configure decrypted traffic mirror.
* [fmgr\_firewall\_gtp](fmgr_firewall_gtp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-module) β Configure GTP.
* [fmgr\_firewall\_gtp\_apn](fmgr_firewall_gtp_apn_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-apn-module) β APN.
* [fmgr\_firewall\_gtp\_ieremovepolicy](fmgr_firewall_gtp_ieremovepolicy_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-ieremovepolicy-module) β IE remove policy.
* [fmgr\_firewall\_gtp\_ievalidation](fmgr_firewall_gtp_ievalidation_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-ievalidation-module) β IE validation.
* [fmgr\_firewall\_gtp\_imsi](fmgr_firewall_gtp_imsi_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-imsi-module) β IMSI.
* [fmgr\_firewall\_gtp\_ippolicy](fmgr_firewall_gtp_ippolicy_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-ippolicy-module) β IP policy.
* [fmgr\_firewall\_gtp\_messageratelimit](fmgr_firewall_gtp_messageratelimit_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-messageratelimit-module) β Message rate limiting.
* [fmgr\_firewall\_gtp\_messageratelimitv0](fmgr_firewall_gtp_messageratelimitv0_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-messageratelimitv0-module) β Message rate limiting for GTP version 0.
* [fmgr\_firewall\_gtp\_messageratelimitv1](fmgr_firewall_gtp_messageratelimitv1_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-messageratelimitv1-module) β Message rate limiting for GTP version 1.
* [fmgr\_firewall\_gtp\_messageratelimitv2](fmgr_firewall_gtp_messageratelimitv2_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-messageratelimitv2-module) β Message rate limiting for GTP version 2.
* [fmgr\_firewall\_gtp\_noippolicy](fmgr_firewall_gtp_noippolicy_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-noippolicy-module) β No IP policy.
* [fmgr\_firewall\_gtp\_perapnshaper](fmgr_firewall_gtp_perapnshaper_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-perapnshaper-module) β Per APN shaper.
* [fmgr\_firewall\_gtp\_policy](fmgr_firewall_gtp_policy_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-policy-module) β Policy.
* [fmgr\_firewall\_gtp\_policyv2](fmgr_firewall_gtp_policyv2_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-gtp-policyv2-module) β Apply allow or deny action to each GTPv2-c packet.
* [fmgr\_firewall\_identitybasedroute](fmgr_firewall_identitybasedroute_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-identitybasedroute-module) β Configure identity based routing.
* [fmgr\_firewall\_identitybasedroute\_rule](fmgr_firewall_identitybasedroute_rule_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-identitybasedroute-rule-module) β Rule.
* [fmgr\_firewall\_internetservice](fmgr_firewall_internetservice_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservice-module) β Show Internet Service application.
* [fmgr\_firewall\_internetservice\_entry](fmgr_firewall_internetservice_entry_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservice-entry-module) β Entries in the Internet Service database.
* [fmgr\_firewall\_internetserviceaddition](fmgr_firewall_internetserviceaddition_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetserviceaddition-module) β Configure Internet Services Addition.
* [fmgr\_firewall\_internetserviceaddition\_entry](fmgr_firewall_internetserviceaddition_entry_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetserviceaddition-entry-module) β Entries added to the Internet Service addition database.
* [fmgr\_firewall\_internetserviceaddition\_entry\_portrange](fmgr_firewall_internetserviceaddition_entry_portrange_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetserviceaddition-entry-portrange-module) β Port ranges in the custom entry.
* [fmgr\_firewall\_internetservicecustom](fmgr_firewall_internetservicecustom_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustom-module) β Configure custom Internet Services.
* [fmgr\_firewall\_internetservicecustom\_disableentry](fmgr_firewall_internetservicecustom_disableentry_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustom-disableentry-module) β Disable entries in the Internet Service database.
* [fmgr\_firewall\_internetservicecustom\_disableentry\_iprange](fmgr_firewall_internetservicecustom_disableentry_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustom-disableentry-iprange-module) β IP ranges in the disable entry.
* [fmgr\_firewall\_internetservicecustom\_entry](fmgr_firewall_internetservicecustom_entry_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustom-entry-module) β Entries added to the Internet Service database and custom database.
* [fmgr\_firewall\_internetservicecustom\_entry\_portrange](fmgr_firewall_internetservicecustom_entry_portrange_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustom-entry-portrange-module) β Port ranges in the custom entry.
* [fmgr\_firewall\_internetservicecustomgroup](fmgr_firewall_internetservicecustomgroup_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicecustomgroup-module) β Configure custom Internet Service group.
* [fmgr\_firewall\_internetservicegroup](fmgr_firewall_internetservicegroup_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicegroup-module) β Configure group of Internet Service.
* [fmgr\_firewall\_internetservicename](fmgr_firewall_internetservicename_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-internetservicename-module) β Define internet service names.
* [fmgr\_firewall\_ippool](fmgr_firewall_ippool_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ippool-module) β Configure IPv4 IP pools.
* [fmgr\_firewall\_ippool6](fmgr_firewall_ippool6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ippool6-module) β Configure IPv6 IP pools.
* [fmgr\_firewall\_ippool6\_dynamicmapping](fmgr_firewall_ippool6_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ippool6-dynamicmapping-module) β Configure IPv6 IP pools.
* [fmgr\_firewall\_ippool\_dynamicmapping](fmgr_firewall_ippool_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ippool-dynamicmapping-module) β Configure IPv4 IP pools.
* [fmgr\_firewall\_ldbmonitor](fmgr_firewall_ldbmonitor_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ldbmonitor-module) β Configure server load balancing health monitors.
* [fmgr\_firewall\_mmsprofile](fmgr_firewall_mmsprofile_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-module) β Configure MMS profiles.
* [fmgr\_firewall\_mmsprofile\_dupe](fmgr_firewall_mmsprofile_dupe_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-dupe-module) β Duplicate configuration.
* [fmgr\_firewall\_mmsprofile\_flood](fmgr_firewall_mmsprofile_flood_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-flood-module) β Flood configuration.
* [fmgr\_firewall\_mmsprofile\_notification](fmgr_firewall_mmsprofile_notification_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-notification-module) β Notification configuration.
* [fmgr\_firewall\_mmsprofile\_notifmsisdn](fmgr_firewall_mmsprofile_notifmsisdn_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-notifmsisdn-module) β Notification for MSISDNs.
* [fmgr\_firewall\_mmsprofile\_outbreakprevention](fmgr_firewall_mmsprofile_outbreakprevention_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-mmsprofile-outbreakprevention-module) β Configure Virus Outbreak Prevention settings.
* [fmgr\_firewall\_multicastaddress](fmgr_firewall_multicastaddress_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-multicastaddress-module) β Configure multicast addresses.
* [fmgr\_firewall\_multicastaddress6](fmgr_firewall_multicastaddress6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-multicastaddress6-module) β Configure IPv6 multicast address.
* [fmgr\_firewall\_multicastaddress6\_tagging](fmgr_firewall_multicastaddress6_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-multicastaddress6-tagging-module) β Config object tagging.
* [fmgr\_firewall\_multicastaddress\_tagging](fmgr_firewall_multicastaddress_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-multicastaddress-tagging-module) β Config object tagging.
* [fmgr\_firewall\_profilegroup](fmgr_firewall_profilegroup_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profilegroup-module) β Configure profile groups.
* [fmgr\_firewall\_profileprotocoloptions](fmgr_firewall_profileprotocoloptions_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-module) β Configure protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_cifs](fmgr_firewall_profileprotocoloptions_cifs_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-cifs-module) β Configure CIFS protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_cifs\_filefilter](fmgr_firewall_profileprotocoloptions_cifs_filefilter_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-cifs-filefilter-module) β File filter.
* [fmgr\_firewall\_profileprotocoloptions\_cifs\_filefilter\_entries](fmgr_firewall_profileprotocoloptions_cifs_filefilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-cifs-filefilter-entries-module) β File filter entries.
* [fmgr\_firewall\_profileprotocoloptions\_cifs\_serverkeytab](fmgr_firewall_profileprotocoloptions_cifs_serverkeytab_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-cifs-serverkeytab-module) β Server keytab.
* [fmgr\_firewall\_profileprotocoloptions\_dns](fmgr_firewall_profileprotocoloptions_dns_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-dns-module) β Configure DNS protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_ftp](fmgr_firewall_profileprotocoloptions_ftp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-ftp-module) β Configure FTP protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_http](fmgr_firewall_profileprotocoloptions_http_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-http-module) β Configure HTTP protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_imap](fmgr_firewall_profileprotocoloptions_imap_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-imap-module) β Configure IMAP protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_mailsignature](fmgr_firewall_profileprotocoloptions_mailsignature_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-mailsignature-module) β Configure Mail signature.
* [fmgr\_firewall\_profileprotocoloptions\_mapi](fmgr_firewall_profileprotocoloptions_mapi_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-mapi-module) β Configure MAPI protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_nntp](fmgr_firewall_profileprotocoloptions_nntp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-nntp-module) β Configure NNTP protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_pop3](fmgr_firewall_profileprotocoloptions_pop3_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-pop3-module) β Configure POP3 protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_smtp](fmgr_firewall_profileprotocoloptions_smtp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-smtp-module) β Configure SMTP protocol options.
* [fmgr\_firewall\_profileprotocoloptions\_ssh](fmgr_firewall_profileprotocoloptions_ssh_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-profileprotocoloptions-ssh-module) β Configure SFTP and SCP protocol options.
* [fmgr\_firewall\_proxyaddress](fmgr_firewall_proxyaddress_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-proxyaddress-module) β Web proxy address configuration.
* [fmgr\_firewall\_proxyaddress\_headergroup](fmgr_firewall_proxyaddress_headergroup_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-proxyaddress-headergroup-module) β HTTP header group.
* [fmgr\_firewall\_proxyaddress\_tagging](fmgr_firewall_proxyaddress_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-proxyaddress-tagging-module) β Config object tagging.
* [fmgr\_firewall\_proxyaddrgrp](fmgr_firewall_proxyaddrgrp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-proxyaddrgrp-module) β Web proxy address group configuration.
* [fmgr\_firewall\_proxyaddrgrp\_tagging](fmgr_firewall_proxyaddrgrp_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-proxyaddrgrp-tagging-module) β Config object tagging.
* [fmgr\_firewall\_schedule\_group](fmgr_firewall_schedule_group_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-schedule-group-module) β Schedule group configuration.
* [fmgr\_firewall\_schedule\_onetime](fmgr_firewall_schedule_onetime_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-schedule-onetime-module) β Onetime schedule configuration.
* [fmgr\_firewall\_schedule\_recurring](fmgr_firewall_schedule_recurring_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-schedule-recurring-module) β Recurring schedule configuration.
* [fmgr\_firewall\_service\_category](fmgr_firewall_service_category_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-service-category-module) β Configure service categories.
* [fmgr\_firewall\_service\_custom](fmgr_firewall_service_custom_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-service-custom-module) β Configure custom services.
* [fmgr\_firewall\_service\_group](fmgr_firewall_service_group_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-service-group-module) β Configure service groups.
* [fmgr\_firewall\_shaper\_peripshaper](fmgr_firewall_shaper_peripshaper_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-shaper-peripshaper-module) β Configure per-IP traffic shaper.
* [fmgr\_firewall\_shaper\_trafficshaper](fmgr_firewall_shaper_trafficshaper_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-shaper-trafficshaper-module) β Configure shared traffic shaper.
* [fmgr\_firewall\_shapingprofile](fmgr_firewall_shapingprofile_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-shapingprofile-module) β Configure shaping profiles.
* [fmgr\_firewall\_shapingprofile\_shapingentries](fmgr_firewall_shapingprofile_shapingentries_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-shapingprofile-shapingentries-module) β Define shaping entries of this shaping profile.
* [fmgr\_firewall\_ssh\_localca](fmgr_firewall_ssh_localca_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-ssh-localca-module) β SSH proxy local CA.
* [fmgr\_firewall\_sslsshprofile](fmgr_firewall_sslsshprofile_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-module) β Configure SSL/SSH protocol options.
* [fmgr\_firewall\_sslsshprofile\_dot](fmgr_firewall_sslsshprofile_dot_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-dot-module) β Configure DNS over TLS options.
* [fmgr\_firewall\_sslsshprofile\_ftps](fmgr_firewall_sslsshprofile_ftps_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-ftps-module) β Configure FTPS options.
* [fmgr\_firewall\_sslsshprofile\_https](fmgr_firewall_sslsshprofile_https_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-https-module) β Configure HTTPS options.
* [fmgr\_firewall\_sslsshprofile\_imaps](fmgr_firewall_sslsshprofile_imaps_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-imaps-module) β Configure IMAPS options.
* [fmgr\_firewall\_sslsshprofile\_pop3s](fmgr_firewall_sslsshprofile_pop3s_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-pop3s-module) β Configure POP3S options.
* [fmgr\_firewall\_sslsshprofile\_smtps](fmgr_firewall_sslsshprofile_smtps_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-smtps-module) β Configure SMTPS options.
* [fmgr\_firewall\_sslsshprofile\_ssh](fmgr_firewall_sslsshprofile_ssh_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-ssh-module) β Configure SSH options.
* [fmgr\_firewall\_sslsshprofile\_ssl](fmgr_firewall_sslsshprofile_ssl_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-ssl-module) β Configure SSL options.
* [fmgr\_firewall\_sslsshprofile\_sslexempt](fmgr_firewall_sslsshprofile_sslexempt_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-sslexempt-module) β Servers to exempt from SSL inspection.
* [fmgr\_firewall\_sslsshprofile\_sslserver](fmgr_firewall_sslsshprofile_sslserver_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-sslsshprofile-sslserver-module) β SSL servers.
* [fmgr\_firewall\_trafficclass](fmgr_firewall_trafficclass_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-trafficclass-module) β Configure names for shaping classes.
* [fmgr\_firewall\_vip](fmgr_firewall_vip_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-module) β Configure virtual IP for IPv4.
* [fmgr\_firewall\_vip46](fmgr_firewall_vip46_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip46-module) β Configure IPv4 to IPv6 virtual IPs.
* [fmgr\_firewall\_vip46\_dynamicmapping](fmgr_firewall_vip46_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip46-dynamicmapping-module) β Configure IPv4 to IPv6 virtual IPs.
* [fmgr\_firewall\_vip46\_realservers](fmgr_firewall_vip46_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip46-realservers-module) β Real servers.
* [fmgr\_firewall\_vip6](fmgr_firewall_vip6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip6-module) β Configure virtual IP for IPv6.
* [fmgr\_firewall\_vip64](fmgr_firewall_vip64_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip64-module) β Configure IPv6 to IPv4 virtual IPs.
* [fmgr\_firewall\_vip64\_dynamicmapping](fmgr_firewall_vip64_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip64-dynamicmapping-module) β Configure IPv6 to IPv4 virtual IPs.
* [fmgr\_firewall\_vip64\_realservers](fmgr_firewall_vip64_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip64-realservers-module) β Real servers.
* [fmgr\_firewall\_vip6\_dynamicmapping](fmgr_firewall_vip6_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip6-dynamicmapping-module) β Configure virtual IP for IPv6.
* [fmgr\_firewall\_vip6\_realservers](fmgr_firewall_vip6_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip6-realservers-module) β Select the real servers that this server load balancing VIP will distribute traffic to.
* [fmgr\_firewall\_vip6\_sslciphersuites](fmgr_firewall_vip6_sslciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip6-sslciphersuites-module) β SSL/TLS cipher suites acceptable from a client, ordered by priority.
* [fmgr\_firewall\_vip6\_sslserverciphersuites](fmgr_firewall_vip6_sslserverciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip6-sslserverciphersuites-module) β SSL/TLS cipher suites to offer to a server, ordered by priority.
* [fmgr\_firewall\_vip\_dynamicmapping](fmgr_firewall_vip_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-dynamicmapping-module) β Configure virtual IP for IPv4.
* [fmgr\_firewall\_vip\_dynamicmapping\_realservers](fmgr_firewall_vip_dynamicmapping_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-dynamicmapping-realservers-module) β Select the real servers that this server load balancing VIP will distribute traffic to.
* [fmgr\_firewall\_vip\_dynamicmapping\_sslciphersuites](fmgr_firewall_vip_dynamicmapping_sslciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-dynamicmapping-sslciphersuites-module) β SSL/TLS cipher suites acceptable from a client, ordered by priority.
* [fmgr\_firewall\_vip\_realservers](fmgr_firewall_vip_realservers_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-realservers-module) β Select the real servers that this server load balancing VIP will distribute traffic to.
* [fmgr\_firewall\_vip\_sslciphersuites](fmgr_firewall_vip_sslciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-sslciphersuites-module) β SSL/TLS cipher suites acceptable from a client, ordered by priority.
* [fmgr\_firewall\_vip\_sslserverciphersuites](fmgr_firewall_vip_sslserverciphersuites_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vip-sslserverciphersuites-module) β SSL/TLS cipher suites to offer to a server, ordered by priority.
* [fmgr\_firewall\_vipgrp](fmgr_firewall_vipgrp_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vipgrp-module) β Configure IPv4 virtual IP groups.
* [fmgr\_firewall\_vipgrp46](fmgr_firewall_vipgrp46_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vipgrp46-module) β Configure IPv4 to IPv6 virtual IP groups.
* [fmgr\_firewall\_vipgrp6](fmgr_firewall_vipgrp6_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vipgrp6-module) β Configure IPv6 virtual IP groups.
* [fmgr\_firewall\_vipgrp64](fmgr_firewall_vipgrp64_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vipgrp64-module) β Configure IPv6 to IPv4 virtual IP groups.
* [fmgr\_firewall\_vipgrp\_dynamicmapping](fmgr_firewall_vipgrp_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-vipgrp-dynamicmapping-module) β Configure IPv4 virtual IP groups.
* [fmgr\_firewall\_wildcardfqdn\_custom](fmgr_firewall_wildcardfqdn_custom_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-wildcardfqdn-custom-module) β Config global/VDOM Wildcard FQDN address.
* [fmgr\_firewall\_wildcardfqdn\_group](fmgr_firewall_wildcardfqdn_group_module#ansible-collections-fortinet-fortimanager-fmgr-firewall-wildcardfqdn-group-module) β Config global Wildcard FQDN address groups.
* [fmgr\_fmupdate\_analyzer\_virusreport](fmgr_fmupdate_analyzer_virusreport_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-analyzer-virusreport-module) β Send virus detection notification to FortiGuard.
* [fmgr\_fmupdate\_avips\_advancedlog](fmgr_fmupdate_avips_advancedlog_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-avips-advancedlog-module) β Enable/disable logging of FortiGuard antivirus and IPS update packages received by FortiManagers built-in FortiGuard.
* [fmgr\_fmupdate\_avips\_webproxy](fmgr_fmupdate_avips_webproxy_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-avips-webproxy-module) β Configure the web proxy for use with FortiGuard antivirus and IPS updates.
* [fmgr\_fmupdate\_customurllist](fmgr_fmupdate_customurllist_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-customurllist-module) β Configure the URL database for rating and filtering.
* [fmgr\_fmupdate\_diskquota](fmgr_fmupdate_diskquota_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-diskquota-module) β Configure disk space available for use by the Upgrade Manager.
* [fmgr\_fmupdate\_fctservices](fmgr_fmupdate_fctservices_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fctservices-module) β Configure FortiGuard to provide services to FortiClient installations.
* [fmgr\_fmupdate\_fdssetting](fmgr_fmupdate_fdssetting_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-module) β Configure FortiGuard settings.
* [fmgr\_fmupdate\_fdssetting\_pushoverride](fmgr_fmupdate_fdssetting_pushoverride_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-pushoverride-module) β Enable/disable push updates, and override the default IP address and port used by FortiGuard to send antivirus and IPS push messages forβ¦
* [fmgr\_fmupdate\_fdssetting\_pushoverridetoclient](fmgr_fmupdate_fdssetting_pushoverridetoclient_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-pushoverridetoclient-module) β Enable/disable push updates, and override the default IP address and port used by FortiGuard to send antivirus and IPS push messages forβ¦
* [fmgr\_fmupdate\_fdssetting\_pushoverridetoclient\_announceip](fmgr_fmupdate_fdssetting_pushoverridetoclient_announceip_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-pushoverridetoclient-announceip-module) β Announce IP addresses for the device.
* [fmgr\_fmupdate\_fdssetting\_serveroverride](fmgr_fmupdate_fdssetting_serveroverride_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-serveroverride-module) β Server override configure.
* [fmgr\_fmupdate\_fdssetting\_serveroverride\_servlist](fmgr_fmupdate_fdssetting_serveroverride_servlist_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-serveroverride-servlist-module) β Override server.
* [fmgr\_fmupdate\_fdssetting\_updateschedule](fmgr_fmupdate_fdssetting_updateschedule_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fdssetting-updateschedule-module) β Configure the schedule when built-in FortiGuard retrieves antivirus and IPS updates.
* [fmgr\_fmupdate\_fwmsetting](fmgr_fmupdate_fwmsetting_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-fwmsetting-module) β Configure firmware management settings.
* [fmgr\_fmupdate\_multilayer](fmgr_fmupdate_multilayer_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-multilayer-module) β Configure multilayer mode.
* [fmgr\_fmupdate\_publicnetwork](fmgr_fmupdate_publicnetwork_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-publicnetwork-module) β Enable/disable access to the public FortiGuard.
* [fmgr\_fmupdate\_serveraccesspriorities](fmgr_fmupdate_serveraccesspriorities_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-serveraccesspriorities-module) β Configure priorities for FortiGate units accessing antivirus updates and web filtering services.
* [fmgr\_fmupdate\_serveraccesspriorities\_privateserver](fmgr_fmupdate_serveraccesspriorities_privateserver_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-serveraccesspriorities-privateserver-module) β Configure multiple FortiManager units and private servers.
* [fmgr\_fmupdate\_serveroverridestatus](fmgr_fmupdate_serveroverridestatus_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-serveroverridestatus-module) β Configure strict/loose server override.
* [fmgr\_fmupdate\_service](fmgr_fmupdate_service_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-service-module) β Enable/disable services provided by the built-in FortiGuard.
* [fmgr\_fmupdate\_webspam\_fgdsetting](fmgr_fmupdate_webspam_fgdsetting_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-webspam-fgdsetting-module) β Configure the FortiGuard run parameters.
* [fmgr\_fmupdate\_webspam\_fgdsetting\_serveroverride](fmgr_fmupdate_webspam_fgdsetting_serveroverride_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-webspam-fgdsetting-serveroverride-module) β Server override configure.
* [fmgr\_fmupdate\_webspam\_fgdsetting\_serveroverride\_servlist](fmgr_fmupdate_webspam_fgdsetting_serveroverride_servlist_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-webspam-fgdsetting-serveroverride-servlist-module) β Override server.
* [fmgr\_fmupdate\_webspam\_webproxy](fmgr_fmupdate_webspam_webproxy_module#ansible-collections-fortinet-fortimanager-fmgr-fmupdate-webspam-webproxy-module) β Configure the web proxy for use with FortiGuard antivirus and IPS updates.
* [fmgr\_fsp\_vlan](fmgr_fsp_vlan_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-module) β no description
* [fmgr\_fsp\_vlan\_dhcpserver](fmgr_fsp_vlan_dhcpserver_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dhcpserver-module) β Configure DHCP servers.
* [fmgr\_fsp\_vlan\_dhcpserver\_excluderange](fmgr_fsp_vlan_dhcpserver_excluderange_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dhcpserver-excluderange-module) β Exclude one or more ranges of IP addresses from being assigned to clients.
* [fmgr\_fsp\_vlan\_dhcpserver\_iprange](fmgr_fsp_vlan_dhcpserver_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dhcpserver-iprange-module) β DHCP IP range configuration.
* [fmgr\_fsp\_vlan\_dhcpserver\_options](fmgr_fsp_vlan_dhcpserver_options_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dhcpserver-options-module) β DHCP options.
* [fmgr\_fsp\_vlan\_dhcpserver\_reservedaddress](fmgr_fsp_vlan_dhcpserver_reservedaddress_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dhcpserver-reservedaddress-module) β Options for the DHCP server to assign IP settings to specific MAC addresses.
* [fmgr\_fsp\_vlan\_dynamicmapping](fmgr_fsp_vlan_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-module) β no description
* [fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver](fmgr_fsp_vlan_dynamicmapping_dhcpserver_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-dhcpserver-module) β Configure DHCP servers.
* [fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver\_excluderange](fmgr_fsp_vlan_dynamicmapping_dhcpserver_excluderange_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-dhcpserver-excluderange-module) β Exclude one or more ranges of IP addresses from being assigned to clients.
* [fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver\_iprange](fmgr_fsp_vlan_dynamicmapping_dhcpserver_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-dhcpserver-iprange-module) β DHCP IP range configuration.
* [fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver\_options](fmgr_fsp_vlan_dynamicmapping_dhcpserver_options_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-dhcpserver-options-module) β DHCP options.
* [fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver\_reservedaddress](fmgr_fsp_vlan_dynamicmapping_dhcpserver_reservedaddress_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-dhcpserver-reservedaddress-module) β Options for the DHCP server to assign IP settings to specific MAC addresses.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface](fmgr_fsp_vlan_dynamicmapping_interface_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-module) β no description
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6](fmgr_fsp_vlan_dynamicmapping_interface_ipv6_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-ipv6-module) β IPv6 of interface.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6delegatedprefixlist](fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6delegatedprefixlist_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-ipv6-ip6delegatedprefixlist-module) β Advertised IPv6 delegated prefix list.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6extraaddr](fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6extraaddr_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-ipv6-ip6extraaddr-module) β Extra IPv6 address prefixes of interface.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6prefixlist](fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6prefixlist_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-ipv6-ip6prefixlist-module) β Advertised prefix list.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_vrrp6](fmgr_fsp_vlan_dynamicmapping_interface_ipv6_vrrp6_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-ipv6-vrrp6-module) β IPv6 VRRP configuration.
* [fmgr\_fsp\_vlan\_dynamicmapping\_interface\_secondaryip](fmgr_fsp_vlan_dynamicmapping_interface_secondaryip_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-dynamicmapping-interface-secondaryip-module) β Second IP address of interface.
* [fmgr\_fsp\_vlan\_interface](fmgr_fsp_vlan_interface_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-module) β Configure interfaces.
* [fmgr\_fsp\_vlan\_interface\_ipv6](fmgr_fsp_vlan_interface_ipv6_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-ipv6-module) β IPv6 of interface.
* [fmgr\_fsp\_vlan\_interface\_ipv6\_ip6delegatedprefixlist](fmgr_fsp_vlan_interface_ipv6_ip6delegatedprefixlist_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-ipv6-ip6delegatedprefixlist-module) β Advertised IPv6 delegated prefix list.
* [fmgr\_fsp\_vlan\_interface\_ipv6\_ip6extraaddr](fmgr_fsp_vlan_interface_ipv6_ip6extraaddr_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-ipv6-ip6extraaddr-module) β Extra IPv6 address prefixes of interface.
* [fmgr\_fsp\_vlan\_interface\_ipv6\_ip6prefixlist](fmgr_fsp_vlan_interface_ipv6_ip6prefixlist_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-ipv6-ip6prefixlist-module) β Advertised prefix list.
* [fmgr\_fsp\_vlan\_interface\_ipv6\_vrrp6](fmgr_fsp_vlan_interface_ipv6_vrrp6_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-ipv6-vrrp6-module) β IPv6 VRRP configuration.
* [fmgr\_fsp\_vlan\_interface\_secondaryip](fmgr_fsp_vlan_interface_secondaryip_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-secondaryip-module) β Second IP address of interface.
* [fmgr\_fsp\_vlan\_interface\_vrrp](fmgr_fsp_vlan_interface_vrrp_module#ansible-collections-fortinet-fortimanager-fmgr-fsp-vlan-interface-vrrp-module) β VRRP configuration.
* [fmgr\_generic](fmgr_generic_module#ansible-collections-fortinet-fortimanager-fmgr-generic-module) β Build and send generic FortiManager API request.
* [fmgr\_gtp\_apn](fmgr_gtp_apn_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-apn-module) β Configure APN for GTP.
* [fmgr\_gtp\_apngrp](fmgr_gtp_apngrp_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-apngrp-module) β Configure APN groups for GTP.
* [fmgr\_gtp\_iewhitelist](fmgr_gtp_iewhitelist_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-iewhitelist-module) β IE white list.
* [fmgr\_gtp\_iewhitelist\_entries](fmgr_gtp_iewhitelist_entries_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-iewhitelist-entries-module) β Entries of white list
* [fmgr\_gtp\_messagefilterv0v1](fmgr_gtp_messagefilterv0v1_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-messagefilterv0v1-module) β Message filter for GTPv0/v1 messages.
* [fmgr\_gtp\_messagefilterv2](fmgr_gtp_messagefilterv2_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-messagefilterv2-module) β Message filter for GTPv2 messages.
* [fmgr\_gtp\_tunnellimit](fmgr_gtp_tunnellimit_module#ansible-collections-fortinet-fortimanager-fmgr-gtp-tunnellimit-module) β GTP tunnel limiter.
* [fmgr\_hotspot20\_anqp3gppcellular](fmgr_hotspot20_anqp3gppcellular_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqp3gppcellular-module) β Configure 3GPP public land mobile network
* [fmgr\_hotspot20\_anqp3gppcellular\_mccmnclist](fmgr_hotspot20_anqp3gppcellular_mccmnclist_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqp3gppcellular-mccmnclist-module) β Mobile Country Code and Mobile Network Code configuration.
* [fmgr\_hotspot20\_anqpipaddresstype](fmgr_hotspot20_anqpipaddresstype_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpipaddresstype-module) β Configure IP address type availability.
* [fmgr\_hotspot20\_anqpnairealm](fmgr_hotspot20_anqpnairealm_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpnairealm-module) β Configure network access identifier
* [fmgr\_hotspot20\_anqpnairealm\_nailist](fmgr_hotspot20_anqpnairealm_nailist_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpnairealm-nailist-module) β NAI list.
* [fmgr\_hotspot20\_anqpnairealm\_nailist\_eapmethod](fmgr_hotspot20_anqpnairealm_nailist_eapmethod_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpnairealm-nailist-eapmethod-module) β EAP Methods.
* [fmgr\_hotspot20\_anqpnairealm\_nailist\_eapmethod\_authparam](fmgr_hotspot20_anqpnairealm_nailist_eapmethod_authparam_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpnairealm-nailist-eapmethod-authparam-module) β EAP auth param.
* [fmgr\_hotspot20\_anqpnetworkauthtype](fmgr_hotspot20_anqpnetworkauthtype_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpnetworkauthtype-module) β Configure network authentication type.
* [fmgr\_hotspot20\_anqproamingconsortium](fmgr_hotspot20_anqproamingconsortium_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqproamingconsortium-module) β Configure roaming consortium.
* [fmgr\_hotspot20\_anqproamingconsortium\_oilist](fmgr_hotspot20_anqproamingconsortium_oilist_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqproamingconsortium-oilist-module) β Organization identifier list.
* [fmgr\_hotspot20\_anqpvenuename](fmgr_hotspot20_anqpvenuename_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpvenuename-module) β Configure venue name duple.
* [fmgr\_hotspot20\_anqpvenuename\_valuelist](fmgr_hotspot20_anqpvenuename_valuelist_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-anqpvenuename-valuelist-module) β Name list.
* [fmgr\_hotspot20\_h2qpconncapability](fmgr_hotspot20_h2qpconncapability_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qpconncapability-module) β Configure connection capability.
* [fmgr\_hotspot20\_h2qpoperatorname](fmgr_hotspot20_h2qpoperatorname_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qpoperatorname-module) β Configure operator friendly name.
* [fmgr\_hotspot20\_h2qpoperatorname\_valuelist](fmgr_hotspot20_h2qpoperatorname_valuelist_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qpoperatorname-valuelist-module) β Name list.
* [fmgr\_hotspot20\_h2qposuprovider](fmgr_hotspot20_h2qposuprovider_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qposuprovider-module) β Configure online sign up
* [fmgr\_hotspot20\_h2qposuprovider\_friendlyname](fmgr_hotspot20_h2qposuprovider_friendlyname_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qposuprovider-friendlyname-module) β OSU provider friendly name.
* [fmgr\_hotspot20\_h2qposuprovider\_servicedescription](fmgr_hotspot20_h2qposuprovider_servicedescription_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qposuprovider-servicedescription-module) β OSU service name.
* [fmgr\_hotspot20\_h2qpwanmetric](fmgr_hotspot20_h2qpwanmetric_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-h2qpwanmetric-module) β Configure WAN metrics.
* [fmgr\_hotspot20\_hsprofile](fmgr_hotspot20_hsprofile_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-hsprofile-module) β Configure hotspot profile.
* [fmgr\_hotspot20\_qosmap](fmgr_hotspot20_qosmap_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-qosmap-module) β Configure QoS map set.
* [fmgr\_hotspot20\_qosmap\_dscpexcept](fmgr_hotspot20_qosmap_dscpexcept_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-qosmap-dscpexcept-module) β Differentiated Services Code Point
* [fmgr\_hotspot20\_qosmap\_dscprange](fmgr_hotspot20_qosmap_dscprange_module#ansible-collections-fortinet-fortimanager-fmgr-hotspot20-qosmap-dscprange-module) β Differentiated Services Code Point
* [fmgr\_icap\_profile](fmgr_icap_profile_module#ansible-collections-fortinet-fortimanager-fmgr-icap-profile-module) β Configure ICAP profiles.
* [fmgr\_icap\_profile\_icapheaders](fmgr_icap_profile_icapheaders_module#ansible-collections-fortinet-fortimanager-fmgr-icap-profile-icapheaders-module) β Configure ICAP forwarded request headers.
* [fmgr\_icap\_profile\_respmodforwardrules](fmgr_icap_profile_respmodforwardrules_module#ansible-collections-fortinet-fortimanager-fmgr-icap-profile-respmodforwardrules-module) β ICAP response mode forward rules.
* [fmgr\_icap\_profile\_respmodforwardrules\_headergroup](fmgr_icap_profile_respmodforwardrules_headergroup_module#ansible-collections-fortinet-fortimanager-fmgr-icap-profile-respmodforwardrules-headergroup-module) β HTTP header group.
* [fmgr\_icap\_server](fmgr_icap_server_module#ansible-collections-fortinet-fortimanager-fmgr-icap-server-module) β Configure ICAP servers.
* [fmgr\_ips\_custom](fmgr_ips_custom_module#ansible-collections-fortinet-fortimanager-fmgr-ips-custom-module) β Configure IPS custom signature.
* [fmgr\_ips\_sensor](fmgr_ips_sensor_module#ansible-collections-fortinet-fortimanager-fmgr-ips-sensor-module) β Configure IPS sensor.
* [fmgr\_ips\_sensor\_entries](fmgr_ips_sensor_entries_module#ansible-collections-fortinet-fortimanager-fmgr-ips-sensor-entries-module) β IPS sensor filter.
* [fmgr\_ips\_sensor\_entries\_exemptip](fmgr_ips_sensor_entries_exemptip_module#ansible-collections-fortinet-fortimanager-fmgr-ips-sensor-entries-exemptip-module) β Traffic from selected source or destination IP addresses is exempt from this signature.
* [fmgr\_log\_customfield](fmgr_log_customfield_module#ansible-collections-fortinet-fortimanager-fmgr-log-customfield-module) β Configure custom log fields.
* [fmgr\_metafields\_system\_admin\_user](fmgr_metafields_system_admin_user_module#ansible-collections-fortinet-fortimanager-fmgr-metafields-system-admin-user-module) β no description
* [fmgr\_move](fmgr_move_module#ansible-collections-fortinet-fortimanager-fmgr-move-module) β Move fortimanager defined Object.
* [fmgr\_mpskprofile](fmgr_mpskprofile_module#ansible-collections-fortinet-fortimanager-fmgr-mpskprofile-module) β Configure MPSK profile.
* [fmgr\_mpskprofile\_mpskgroup](fmgr_mpskprofile_mpskgroup_module#ansible-collections-fortinet-fortimanager-fmgr-mpskprofile-mpskgroup-module) β List of multiple PSK groups.
* [fmgr\_mpskprofile\_mpskgroup\_mpskkey](fmgr_mpskprofile_mpskgroup_mpskkey_module#ansible-collections-fortinet-fortimanager-fmgr-mpskprofile-mpskgroup-mpskkey-module) β List of multiple PSK entries.
* [fmgr\_pkg\_authentication\_rule](fmgr_pkg_authentication_rule_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-authentication-rule-module) β Configure Authentication Rules.
* [fmgr\_pkg\_authentication\_setting](fmgr_pkg_authentication_setting_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-authentication-setting-module) β Configure authentication setting.
* [fmgr\_pkg\_central\_dnat](fmgr_pkg_central_dnat_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-central-dnat-module) β no description
* [fmgr\_pkg\_central\_dnat6](fmgr_pkg_central_dnat6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-central-dnat6-module) β no description
* [fmgr\_pkg\_firewall\_centralsnatmap](fmgr_pkg_firewall_centralsnatmap_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-centralsnatmap-module) β Configure central SNAT policies.
* [fmgr\_pkg\_firewall\_consolidated\_policy](fmgr_pkg_firewall_consolidated_policy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-consolidated-policy-module) β Configure consolidated IPv4/IPv6 policies.
* [fmgr\_pkg\_firewall\_consolidated\_policy\_sectionvalue](fmgr_pkg_firewall_consolidated_policy_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-consolidated-policy-sectionvalue-module) β Configure consolidated IPv4/IPv6 policies.
* [fmgr\_pkg\_firewall\_dospolicy](fmgr_pkg_firewall_dospolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-dospolicy-module) β Configure IPv4 DoS policies.
* [fmgr\_pkg\_firewall\_dospolicy6](fmgr_pkg_firewall_dospolicy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-dospolicy6-module) β Configure IPv6 DoS policies.
* [fmgr\_pkg\_firewall\_dospolicy6\_anomaly](fmgr_pkg_firewall_dospolicy6_anomaly_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-dospolicy6-anomaly-module) β Anomaly name.
* [fmgr\_pkg\_firewall\_dospolicy\_anomaly](fmgr_pkg_firewall_dospolicy_anomaly_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-dospolicy-anomaly-module) β Anomaly name.
* [fmgr\_pkg\_firewall\_interfacepolicy](fmgr_pkg_firewall_interfacepolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-interfacepolicy-module) β Configure IPv4 interface policies.
* [fmgr\_pkg\_firewall\_interfacepolicy6](fmgr_pkg_firewall_interfacepolicy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-interfacepolicy6-module) β Configure IPv6 interface policies.
* [fmgr\_pkg\_firewall\_interfacepolicy6\_sectionvalue](fmgr_pkg_firewall_interfacepolicy6_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-interfacepolicy6-sectionvalue-module) β Configure IPv6 interface policies.
* [fmgr\_pkg\_firewall\_interfacepolicy\_sectionvalue](fmgr_pkg_firewall_interfacepolicy_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-interfacepolicy-sectionvalue-module) β Configure IPv4 interface policies.
* [fmgr\_pkg\_firewall\_localinpolicy](fmgr_pkg_firewall_localinpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-localinpolicy-module) β Configure user defined IPv4 local-in policies.
* [fmgr\_pkg\_firewall\_localinpolicy6](fmgr_pkg_firewall_localinpolicy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-localinpolicy6-module) β Configure user defined IPv6 local-in policies.
* [fmgr\_pkg\_firewall\_multicastpolicy](fmgr_pkg_firewall_multicastpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-multicastpolicy-module) β Configure multicast NAT policies.
* [fmgr\_pkg\_firewall\_multicastpolicy6](fmgr_pkg_firewall_multicastpolicy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-multicastpolicy6-module) β Configure IPv6 multicast NAT policies.
* [fmgr\_pkg\_firewall\_policy](fmgr_pkg_firewall_policy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy-module) β Configure IPv4 policies.
* [fmgr\_pkg\_firewall\_policy46](fmgr_pkg_firewall_policy46_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy46-module) β Configure IPv4 to IPv6 policies.
* [fmgr\_pkg\_firewall\_policy6](fmgr_pkg_firewall_policy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy6-module) β Configure IPv6 policies.
* [fmgr\_pkg\_firewall\_policy64](fmgr_pkg_firewall_policy64_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy64-module) β Configure IPv6 to IPv4 policies.
* [fmgr\_pkg\_firewall\_policy6\_sectionvalue](fmgr_pkg_firewall_policy6_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy6-sectionvalue-module) β Configure IPv6 policies.
* [fmgr\_pkg\_firewall\_policy\_sectionvalue](fmgr_pkg_firewall_policy_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy-sectionvalue-module) β Configure IPv4 policies.
* [fmgr\_pkg\_firewall\_policy\_vpndstnode](fmgr_pkg_firewall_policy_vpndstnode_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy-vpndstnode-module) β no description
* [fmgr\_pkg\_firewall\_policy\_vpnsrcnode](fmgr_pkg_firewall_policy_vpnsrcnode_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-policy-vpnsrcnode-module) β no description
* [fmgr\_pkg\_firewall\_proxypolicy](fmgr_pkg_firewall_proxypolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-proxypolicy-module) β Configure proxy policies.
* [fmgr\_pkg\_firewall\_proxypolicy\_sectionvalue](fmgr_pkg_firewall_proxypolicy_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-proxypolicy-sectionvalue-module) β Configure proxy policies.
* [fmgr\_pkg\_firewall\_securitypolicy](fmgr_pkg_firewall_securitypolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-securitypolicy-module) β Configure NGFW IPv4/IPv6 application policies.
* [fmgr\_pkg\_firewall\_securitypolicy\_sectionvalue](fmgr_pkg_firewall_securitypolicy_sectionvalue_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-securitypolicy-sectionvalue-module) β Configure NGFW IPv4/IPv6 application policies.
* [fmgr\_pkg\_firewall\_shapingpolicy](fmgr_pkg_firewall_shapingpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-firewall-shapingpolicy-module) β Configure shaping policies.
* [fmgr\_pkg\_footer\_policy](fmgr_pkg_footer_policy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-footer-policy-module) β Configure IPv4/IPv6 policies.
* [fmgr\_pkg\_footer\_policy6](fmgr_pkg_footer_policy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-footer-policy6-module) β Configure IPv6 policies.
* [fmgr\_pkg\_footer\_shapingpolicy](fmgr_pkg_footer_shapingpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-footer-shapingpolicy-module) β Configure shaping policies.
* [fmgr\_pkg\_header\_policy](fmgr_pkg_header_policy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-header-policy-module) β Configure IPv4/IPv6 policies.
* [fmgr\_pkg\_header\_policy6](fmgr_pkg_header_policy6_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-header-policy6-module) β Configure IPv6 policies.
* [fmgr\_pkg\_header\_shapingpolicy](fmgr_pkg_header_shapingpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-pkg-header-shapingpolicy-module) β Configure shaping policies.
* [fmgr\_pm\_config\_metafields\_firewall\_address](fmgr_pm_config_metafields_firewall_address_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-address-module) β no description
* [fmgr\_pm\_config\_metafields\_firewall\_addrgrp](fmgr_pm_config_metafields_firewall_addrgrp_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-addrgrp-module) β no description
* [fmgr\_pm\_config\_metafields\_firewall\_centralsnatmap](fmgr_pm_config_metafields_firewall_centralsnatmap_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-centralsnatmap-module) β no description
* [fmgr\_pm\_config\_metafields\_firewall\_policy](fmgr_pm_config_metafields_firewall_policy_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-policy-module) β no description
* [fmgr\_pm\_config\_metafields\_firewall\_service\_custom](fmgr_pm_config_metafields_firewall_service_custom_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-service-custom-module) β no description
* [fmgr\_pm\_config\_metafields\_firewall\_service\_group](fmgr_pm_config_metafields_firewall_service_group_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-metafields-firewall-service-group-module) β no description
* [fmgr\_pm\_config\_reset\_database](fmgr_pm_config_reset_database_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-reset-database-module) β Reset Global ADOM to a specific version.
* [fmgr\_pm\_config\_upgrade](fmgr_pm_config_upgrade_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-upgrade-module) β Upgrade an ADOM to the next version.
* [fmgr\_pm\_config\_workspace\_commit](fmgr_pm_config_workspace_commit_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-workspace-commit-module) β Commit changes to an ADOM.
* [fmgr\_pm\_config\_workspace\_lock](fmgr_pm_config_workspace_lock_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-workspace-lock-module) β Lock an ADOM in workspace mode.
* [fmgr\_pm\_config\_workspace\_unlock](fmgr_pm_config_workspace_unlock_module#ansible-collections-fortinet-fortimanager-fmgr-pm-config-workspace-unlock-module) β Unlock an ADOM.
* [fmgr\_pm\_devprof\_adom](fmgr_pm_devprof_adom_module#ansible-collections-fortinet-fortimanager-fmgr-pm-devprof-adom-module) β no description
* [fmgr\_pm\_devprof\_pkg](fmgr_pm_devprof_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-pm-devprof-pkg-module) β no description
* [fmgr\_pm\_pkg](fmgr_pm_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-pm-pkg-module) β no description
* [fmgr\_pm\_pkg\_adom](fmgr_pm_pkg_adom_module#ansible-collections-fortinet-fortimanager-fmgr-pm-pkg-adom-module) β no description
* [fmgr\_pm\_pkg\_global](fmgr_pm_pkg_global_module#ansible-collections-fortinet-fortimanager-fmgr-pm-pkg-global-module) β no description
* [fmgr\_pm\_wanprof\_adom](fmgr_pm_wanprof_adom_module#ansible-collections-fortinet-fortimanager-fmgr-pm-wanprof-adom-module) β no description
* [fmgr\_pm\_wanprof\_pkg](fmgr_pm_wanprof_pkg_module#ansible-collections-fortinet-fortimanager-fmgr-pm-wanprof-pkg-module) β no description
* [fmgr\_qosprofile](fmgr_qosprofile_module#ansible-collections-fortinet-fortimanager-fmgr-qosprofile-module) β Configure WiFi quality of service
* [fmgr\_region](fmgr_region_module#ansible-collections-fortinet-fortimanager-fmgr-region-module) β Configure FortiAP regions
* [fmgr\_securityconsole\_abort](fmgr_securityconsole_abort_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-abort-module) β Abort and cancel a security console task.
* [fmgr\_securityconsole\_assign\_package](fmgr_securityconsole_assign_package_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-assign-package-module) β Assign or unassign global policy package to ADOM packages.
* [fmgr\_securityconsole\_import\_dev\_objs](fmgr_securityconsole_import_dev_objs_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-import-dev-objs-module) β Import objects from device to ADOM, or from ADOM to Global.
* [fmgr\_securityconsole\_install\_device](fmgr_securityconsole_install_device_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-install-device-module) β no description
* [fmgr\_securityconsole\_install\_package](fmgr_securityconsole_install_package_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-install-package-module) β Copy and install a policy package to devices.
* [fmgr\_securityconsole\_install\_preview](fmgr_securityconsole_install_preview_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-install-preview-module) β Generate install preview for a device.
* [fmgr\_securityconsole\_package\_cancel\_install](fmgr_securityconsole_package_cancel_install_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-package-cancel-install-module) β Cancel policy install and clear preview cache.
* [fmgr\_securityconsole\_package\_clone](fmgr_securityconsole_package_clone_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-package-clone-module) β Clone a policy package within the same ADOM.
* [fmgr\_securityconsole\_package\_commit](fmgr_securityconsole_package_commit_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-package-commit-module) β Install policies to device from preview cache.
* [fmgr\_securityconsole\_package\_move](fmgr_securityconsole_package_move_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-package-move-module) β Move and/or rename a policy package within the same ADOM.
* [fmgr\_securityconsole\_pblock\_clone](fmgr_securityconsole_pblock_clone_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-pblock-clone-module) β no description
* [fmgr\_securityconsole\_preview\_result](fmgr_securityconsole_preview_result_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-preview-result-module) β Retrieve the result of previous install/preview command.
* [fmgr\_securityconsole\_reinstall\_package](fmgr_securityconsole_reinstall_package_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-reinstall-package-module) β Re-install a policy package that had been previously installed.
* [fmgr\_securityconsole\_sign\_certificate\_template](fmgr_securityconsole_sign_certificate_template_module#ansible-collections-fortinet-fortimanager-fmgr-securityconsole-sign-certificate-template-module) β Generate and sign certificate on the target device.
* [fmgr\_spamfilter\_bwl](fmgr_spamfilter_bwl_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-bwl-module) β Configure anti-spam black/white list.
* [fmgr\_spamfilter\_bwl\_entries](fmgr_spamfilter_bwl_entries_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-bwl-entries-module) β Anti-spam black/white list entries.
* [fmgr\_spamfilter\_bword](fmgr_spamfilter_bword_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-bword-module) β Configure AntiSpam banned word list.
* [fmgr\_spamfilter\_bword\_entries](fmgr_spamfilter_bword_entries_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-bword-entries-module) β Spam filter banned word.
* [fmgr\_spamfilter\_dnsbl](fmgr_spamfilter_dnsbl_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-dnsbl-module) β Configure AntiSpam DNSBL/ORBL.
* [fmgr\_spamfilter\_dnsbl\_entries](fmgr_spamfilter_dnsbl_entries_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-dnsbl-entries-module) β Spam filter DNSBL and ORBL server.
* [fmgr\_spamfilter\_iptrust](fmgr_spamfilter_iptrust_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-iptrust-module) β Configure AntiSpam IP trust.
* [fmgr\_spamfilter\_iptrust\_entries](fmgr_spamfilter_iptrust_entries_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-iptrust-entries-module) β Spam filter trusted IP addresses.
* [fmgr\_spamfilter\_mheader](fmgr_spamfilter_mheader_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-mheader-module) β Configure AntiSpam MIME header.
* [fmgr\_spamfilter\_mheader\_entries](fmgr_spamfilter_mheader_entries_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-mheader-entries-module) β Spam filter mime header content.
* [fmgr\_spamfilter\_profile](fmgr_spamfilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-module) β Configure AntiSpam profiles.
* [fmgr\_spamfilter\_profile\_gmail](fmgr_spamfilter_profile_gmail_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-gmail-module) β Gmail.
* [fmgr\_spamfilter\_profile\_imap](fmgr_spamfilter_profile_imap_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-imap-module) β IMAP.
* [fmgr\_spamfilter\_profile\_mapi](fmgr_spamfilter_profile_mapi_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-mapi-module) β MAPI.
* [fmgr\_spamfilter\_profile\_msnhotmail](fmgr_spamfilter_profile_msnhotmail_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-msnhotmail-module) β MSN Hotmail.
* [fmgr\_spamfilter\_profile\_pop3](fmgr_spamfilter_profile_pop3_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-pop3-module) β POP3.
* [fmgr\_spamfilter\_profile\_smtp](fmgr_spamfilter_profile_smtp_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-smtp-module) β SMTP.
* [fmgr\_spamfilter\_profile\_yahoomail](fmgr_spamfilter_profile_yahoomail_module#ansible-collections-fortinet-fortimanager-fmgr-spamfilter-profile-yahoomail-module) β Yahoo! Mail.
* [fmgr\_sshfilter\_profile](fmgr_sshfilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-sshfilter-profile-module) β SSH filter profile.
* [fmgr\_sshfilter\_profile\_filefilter](fmgr_sshfilter_profile_filefilter_module#ansible-collections-fortinet-fortimanager-fmgr-sshfilter-profile-filefilter-module) β File filter.
* [fmgr\_sshfilter\_profile\_filefilter\_entries](fmgr_sshfilter_profile_filefilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-sshfilter-profile-filefilter-entries-module) β File filter entries.
* [fmgr\_sshfilter\_profile\_shellcommands](fmgr_sshfilter_profile_shellcommands_module#ansible-collections-fortinet-fortimanager-fmgr-sshfilter-profile-shellcommands-module) β SSH command filter.
* [fmgr\_switchcontroller\_customcommand](fmgr_switchcontroller_customcommand_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-customcommand-module) β Configure the FortiGate switch controller to send custom commands to managed FortiSwitch devices.
* [fmgr\_switchcontroller\_lldpprofile](fmgr_switchcontroller_lldpprofile_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-lldpprofile-module) β Configure FortiSwitch LLDP profiles.
* [fmgr\_switchcontroller\_lldpprofile\_customtlvs](fmgr_switchcontroller_lldpprofile_customtlvs_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-lldpprofile-customtlvs-module) β Configuration method to edit custom TLV entries.
* [fmgr\_switchcontroller\_lldpprofile\_medlocationservice](fmgr_switchcontroller_lldpprofile_medlocationservice_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-lldpprofile-medlocationservice-module) β Configuration method to edit Media Endpoint Discovery
* [fmgr\_switchcontroller\_lldpprofile\_mednetworkpolicy](fmgr_switchcontroller_lldpprofile_mednetworkpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-lldpprofile-mednetworkpolicy-module) β Configuration method to edit Media Endpoint Discovery
* [fmgr\_switchcontroller\_managedswitch](fmgr_switchcontroller_managedswitch_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-module) β Configure FortiSwitch devices that are managed by this FortiGate.
* [fmgr\_switchcontroller\_managedswitch\_8021xsettings](fmgr_switchcontroller_managedswitch_8021xsettings_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-8021xsettings-module) β Configuration method to edit FortiSwitch 802.
* [fmgr\_switchcontroller\_managedswitch\_customcommand](fmgr_switchcontroller_managedswitch_customcommand_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-customcommand-module) β Configuration method to edit FortiSwitch commands to be pushed to this FortiSwitch device upon rebooting the FortiGate switch controllerβ¦
* [fmgr\_switchcontroller\_managedswitch\_igmpsnooping](fmgr_switchcontroller_managedswitch_igmpsnooping_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-igmpsnooping-module) β Configure FortiSwitch IGMP snooping global settings.
* [fmgr\_switchcontroller\_managedswitch\_ipsourceguard](fmgr_switchcontroller_managedswitch_ipsourceguard_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-ipsourceguard-module) β IP source guard.
* [fmgr\_switchcontroller\_managedswitch\_ipsourceguard\_bindingentry](fmgr_switchcontroller_managedswitch_ipsourceguard_bindingentry_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-ipsourceguard-bindingentry-module) β IP and MAC address configuration.
* [fmgr\_switchcontroller\_managedswitch\_mirror](fmgr_switchcontroller_managedswitch_mirror_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-mirror-module) β Configuration method to edit FortiSwitch packet mirror.
* [fmgr\_switchcontroller\_managedswitch\_ports](fmgr_switchcontroller_managedswitch_ports_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-ports-module) β Managed-switch port list.
* [fmgr\_switchcontroller\_managedswitch\_remotelog](fmgr_switchcontroller_managedswitch_remotelog_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-remotelog-module) β Configure logging by FortiSwitch device to a remote syslog server.
* [fmgr\_switchcontroller\_managedswitch\_snmpcommunity](fmgr_switchcontroller_managedswitch_snmpcommunity_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-snmpcommunity-module) β Configuration method to edit Simple Network Management Protocol
* [fmgr\_switchcontroller\_managedswitch\_snmpcommunity\_hosts](fmgr_switchcontroller_managedswitch_snmpcommunity_hosts_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-snmpcommunity-hosts-module) β Configure IPv4 SNMP managers
* [fmgr\_switchcontroller\_managedswitch\_snmpsysinfo](fmgr_switchcontroller_managedswitch_snmpsysinfo_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-snmpsysinfo-module) β Configuration method to edit Simple Network Management Protocol
* [fmgr\_switchcontroller\_managedswitch\_snmptrapthreshold](fmgr_switchcontroller_managedswitch_snmptrapthreshold_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-snmptrapthreshold-module) β Configuration method to edit Simple Network Management Protocol
* [fmgr\_switchcontroller\_managedswitch\_snmpuser](fmgr_switchcontroller_managedswitch_snmpuser_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-snmpuser-module) β Configuration method to edit Simple Network Management Protocol
* [fmgr\_switchcontroller\_managedswitch\_stormcontrol](fmgr_switchcontroller_managedswitch_stormcontrol_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-stormcontrol-module) β Configuration method to edit FortiSwitch storm control for measuring traffic activity using data rates to prevent traffic disruption.
* [fmgr\_switchcontroller\_managedswitch\_stpsettings](fmgr_switchcontroller_managedswitch_stpsettings_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-stpsettings-module) β Configuration method to edit Spanning Tree Protocol
* [fmgr\_switchcontroller\_managedswitch\_switchlog](fmgr_switchcontroller_managedswitch_switchlog_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-switchlog-module) β Configuration method to edit FortiSwitch logging settings
* [fmgr\_switchcontroller\_managedswitch\_switchstpsettings](fmgr_switchcontroller_managedswitch_switchstpsettings_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-managedswitch-switchstpsettings-module) β Configure spanning tree protocol
* [fmgr\_switchcontroller\_qos\_dot1pmap](fmgr_switchcontroller_qos_dot1pmap_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-dot1pmap-module) β Configure FortiSwitch QoS 802.
* [fmgr\_switchcontroller\_qos\_ipdscpmap](fmgr_switchcontroller_qos_ipdscpmap_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-ipdscpmap-module) β Configure FortiSwitch QoS IP precedence/DSCP.
* [fmgr\_switchcontroller\_qos\_ipdscpmap\_map](fmgr_switchcontroller_qos_ipdscpmap_map_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-ipdscpmap-map-module) β Maps between IP-DSCP value to COS queue.
* [fmgr\_switchcontroller\_qos\_qospolicy](fmgr_switchcontroller_qos_qospolicy_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-qospolicy-module) β Configure FortiSwitch QoS policy.
* [fmgr\_switchcontroller\_qos\_queuepolicy](fmgr_switchcontroller_qos_queuepolicy_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-queuepolicy-module) β Configure FortiSwitch QoS egress queue policy.
* [fmgr\_switchcontroller\_qos\_queuepolicy\_cosqueue](fmgr_switchcontroller_qos_queuepolicy_cosqueue_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-qos-queuepolicy-cosqueue-module) β COS queue configuration.
* [fmgr\_switchcontroller\_securitypolicy\_8021x](fmgr_switchcontroller_securitypolicy_8021x_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-securitypolicy-8021x-module) β Configure 802.
* [fmgr\_switchcontroller\_securitypolicy\_captiveportal](fmgr_switchcontroller_securitypolicy_captiveportal_module#ansible-collections-fortinet-fortimanager-fmgr-switchcontroller-securitypolicy-captiveportal-module) β Names of VLANs that use captive portal authentication.
* [fmgr\_sys\_api\_sdnconnector](fmgr_sys_api_sdnconnector_module#ansible-collections-fortinet-fortimanager-fmgr-sys-api-sdnconnector-module) β Query SDN connector data.
* [fmgr\_sys\_generate\_wsdl](fmgr_sys_generate_wsdl_module#ansible-collections-fortinet-fortimanager-fmgr-sys-generate-wsdl-module) β Generate WSDL for specific module and objects.
* [fmgr\_sys\_login\_challenge](fmgr_sys_login_challenge_module#ansible-collections-fortinet-fortimanager-fmgr-sys-login-challenge-module) β Answer a log in challenge question, used following a login/user or login/challenge command.
* [fmgr\_sys\_login\_user](fmgr_sys_login_user_module#ansible-collections-fortinet-fortimanager-fmgr-sys-login-user-module) β Log into the device with user name and password.
* [fmgr\_sys\_logout](fmgr_sys_logout_module#ansible-collections-fortinet-fortimanager-fmgr-sys-logout-module) β Log out a session.
* [fmgr\_sys\_proxy\_json](fmgr_sys_proxy_json_module#ansible-collections-fortinet-fortimanager-fmgr-sys-proxy-json-module) β Send and receive JSON request to/from managed devices.
* [fmgr\_sys\_reboot](fmgr_sys_reboot_module#ansible-collections-fortinet-fortimanager-fmgr-sys-reboot-module) β Restart FortiManager.
* [fmgr\_system\_admin\_group](fmgr_system_admin_group_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-group-module) β User group.
* [fmgr\_system\_admin\_group\_member](fmgr_system_admin_group_member_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-group-member-module) β Group members.
* [fmgr\_system\_admin\_ldap](fmgr_system_admin_ldap_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-ldap-module) β LDAP server entry configuration.
* [fmgr\_system\_admin\_ldap\_adom](fmgr_system_admin_ldap_adom_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-ldap-adom-module) β Admin domain.
* [fmgr\_system\_admin\_profile](fmgr_system_admin_profile_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-profile-module) β Admin profile.
* [fmgr\_system\_admin\_profile\_datamaskcustomfields](fmgr_system_admin_profile_datamaskcustomfields_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-profile-datamaskcustomfields-module) β Customized datamask fields.
* [fmgr\_system\_admin\_radius](fmgr_system_admin_radius_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-radius-module) β Configure radius.
* [fmgr\_system\_admin\_setting](fmgr_system_admin_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-setting-module) β Admin setting.
* [fmgr\_system\_admin\_tacacs](fmgr_system_admin_tacacs_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-tacacs-module) β TACACS+ server entry configuration.
* [fmgr\_system\_admin\_user](fmgr_system_admin_user_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-module) β Admin user.
* [fmgr\_system\_admin\_user\_adom](fmgr_system_admin_user_adom_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-adom-module) β Admin domain.
* [fmgr\_system\_admin\_user\_adomexclude](fmgr_system_admin_user_adomexclude_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-adomexclude-module) β Excluding admin domain.
* [fmgr\_system\_admin\_user\_appfilter](fmgr_system_admin_user_appfilter_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-appfilter-module) β App filter.
* [fmgr\_system\_admin\_user\_dashboard](fmgr_system_admin_user_dashboard_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-dashboard-module) β Custom dashboard widgets.
* [fmgr\_system\_admin\_user\_dashboardtabs](fmgr_system_admin_user_dashboardtabs_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-dashboardtabs-module) β Custom dashboard.
* [fmgr\_system\_admin\_user\_ipsfilter](fmgr_system_admin_user_ipsfilter_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-ipsfilter-module) β IPS filter.
* [fmgr\_system\_admin\_user\_metadata](fmgr_system_admin_user_metadata_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-metadata-module) β Configure meta data.
* [fmgr\_system\_admin\_user\_policypackage](fmgr_system_admin_user_policypackage_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-policypackage-module) β Policy package access.
* [fmgr\_system\_admin\_user\_restrictdevvdom](fmgr_system_admin_user_restrictdevvdom_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-restrictdevvdom-module) β Restricted to these devices/VDOMs.
* [fmgr\_system\_admin\_user\_webfilter](fmgr_system_admin_user_webfilter_module#ansible-collections-fortinet-fortimanager-fmgr-system-admin-user-webfilter-module) β Web filter.
* [fmgr\_system\_alertconsole](fmgr_system_alertconsole_module#ansible-collections-fortinet-fortimanager-fmgr-system-alertconsole-module) β Alert console.
* [fmgr\_system\_alertemail](fmgr_system_alertemail_module#ansible-collections-fortinet-fortimanager-fmgr-system-alertemail-module) β Configure alertemail.
* [fmgr\_system\_alertevent](fmgr_system_alertevent_module#ansible-collections-fortinet-fortimanager-fmgr-system-alertevent-module) β Alert events.
* [fmgr\_system\_alertevent\_alertdestination](fmgr_system_alertevent_alertdestination_module#ansible-collections-fortinet-fortimanager-fmgr-system-alertevent-alertdestination-module) β Alert destination.
* [fmgr\_system\_autodelete](fmgr_system_autodelete_module#ansible-collections-fortinet-fortimanager-fmgr-system-autodelete-module) β Automatic deletion policy for logs, reports, archived, and quarantined files.
* [fmgr\_system\_autodelete\_dlpfilesautodeletion](fmgr_system_autodelete_dlpfilesautodeletion_module#ansible-collections-fortinet-fortimanager-fmgr-system-autodelete-dlpfilesautodeletion-module) β Automatic deletion policy for DLP archives.
* [fmgr\_system\_autodelete\_logautodeletion](fmgr_system_autodelete_logautodeletion_module#ansible-collections-fortinet-fortimanager-fmgr-system-autodelete-logautodeletion-module) β Automatic deletion policy for device logs.
* [fmgr\_system\_autodelete\_quarantinefilesautodeletion](fmgr_system_autodelete_quarantinefilesautodeletion_module#ansible-collections-fortinet-fortimanager-fmgr-system-autodelete-quarantinefilesautodeletion-module) β Automatic deletion policy for quarantined files.
* [fmgr\_system\_autodelete\_reportautodeletion](fmgr_system_autodelete_reportautodeletion_module#ansible-collections-fortinet-fortimanager-fmgr-system-autodelete-reportautodeletion-module) β Automatic deletion policy for reports.
* [fmgr\_system\_backup\_allsettings](fmgr_system_backup_allsettings_module#ansible-collections-fortinet-fortimanager-fmgr-system-backup-allsettings-module) β Scheduled backup settings.
* [fmgr\_system\_certificate\_ca](fmgr_system_certificate_ca_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-ca-module) β CA certificate.
* [fmgr\_system\_certificate\_crl](fmgr_system_certificate_crl_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-crl-module) β Certificate Revocation List.
* [fmgr\_system\_certificate\_local](fmgr_system_certificate_local_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-local-module) β Local keys and certificates.
* [fmgr\_system\_certificate\_oftp](fmgr_system_certificate_oftp_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-oftp-module) β OFTP certificates and keys.
* [fmgr\_system\_certificate\_remote](fmgr_system_certificate_remote_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-remote-module) β Remote certificate.
* [fmgr\_system\_certificate\_ssh](fmgr_system_certificate_ssh_module#ansible-collections-fortinet-fortimanager-fmgr-system-certificate-ssh-module) β SSH certificates and keys.
* [fmgr\_system\_connector](fmgr_system_connector_module#ansible-collections-fortinet-fortimanager-fmgr-system-connector-module) β Configure connector.
* [fmgr\_system\_customlanguage](fmgr_system_customlanguage_module#ansible-collections-fortinet-fortimanager-fmgr-system-customlanguage-module) β Configure custom languages.
* [fmgr\_system\_dhcp\_server](fmgr_system_dhcp_server_module#ansible-collections-fortinet-fortimanager-fmgr-system-dhcp-server-module) β Configure DHCP servers.
* [fmgr\_system\_dhcp\_server\_excluderange](fmgr_system_dhcp_server_excluderange_module#ansible-collections-fortinet-fortimanager-fmgr-system-dhcp-server-excluderange-module) β Exclude one or more ranges of IP addresses from being assigned to clients.
* [fmgr\_system\_dhcp\_server\_iprange](fmgr_system_dhcp_server_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-system-dhcp-server-iprange-module) β DHCP IP range configuration.
* [fmgr\_system\_dhcp\_server\_options](fmgr_system_dhcp_server_options_module#ansible-collections-fortinet-fortimanager-fmgr-system-dhcp-server-options-module) β DHCP options.
* [fmgr\_system\_dhcp\_server\_reservedaddress](fmgr_system_dhcp_server_reservedaddress_module#ansible-collections-fortinet-fortimanager-fmgr-system-dhcp-server-reservedaddress-module) β Options for the DHCP server to assign IP settings to specific MAC addresses.
* [fmgr\_system\_dm](fmgr_system_dm_module#ansible-collections-fortinet-fortimanager-fmgr-system-dm-module) β Configure dm.
* [fmgr\_system\_dns](fmgr_system_dns_module#ansible-collections-fortinet-fortimanager-fmgr-system-dns-module) β DNS configuration.
* [fmgr\_system\_docker](fmgr_system_docker_module#ansible-collections-fortinet-fortimanager-fmgr-system-docker-module) β Docker host.
* [fmgr\_system\_externalresource](fmgr_system_externalresource_module#ansible-collections-fortinet-fortimanager-fmgr-system-externalresource-module) β Configure external resource.
* [fmgr\_system\_fips](fmgr_system_fips_module#ansible-collections-fortinet-fortimanager-fmgr-system-fips-module) β Settings for FIPS-CC mode.
* [fmgr\_system\_fortiguard](fmgr_system_fortiguard_module#ansible-collections-fortinet-fortimanager-fmgr-system-fortiguard-module) β Configure FortiGuard services.
* [fmgr\_system\_fortiview\_autocache](fmgr_system_fortiview_autocache_module#ansible-collections-fortinet-fortimanager-fmgr-system-fortiview-autocache-module) β FortiView auto-cache settings.
* [fmgr\_system\_fortiview\_setting](fmgr_system_fortiview_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-fortiview-setting-module) β FortiView settings.
* [fmgr\_system\_geoipcountry](fmgr_system_geoipcountry_module#ansible-collections-fortinet-fortimanager-fmgr-system-geoipcountry-module) β no description
* [fmgr\_system\_geoipoverride](fmgr_system_geoipoverride_module#ansible-collections-fortinet-fortimanager-fmgr-system-geoipoverride-module) β Configure geographical location mapping for IP address
* [fmgr\_system\_geoipoverride\_ip6range](fmgr_system_geoipoverride_ip6range_module#ansible-collections-fortinet-fortimanager-fmgr-system-geoipoverride-ip6range-module) β Table of IPv6 ranges assigned to country.
* [fmgr\_system\_geoipoverride\_iprange](fmgr_system_geoipoverride_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-system-geoipoverride-iprange-module) β Table of IP ranges assigned to country.
* [fmgr\_system\_global](fmgr_system_global_module#ansible-collections-fortinet-fortimanager-fmgr-system-global-module) β Global range attributes.
* [fmgr\_system\_guiact](fmgr_system_guiact_module#ansible-collections-fortinet-fortimanager-fmgr-system-guiact-module) β System settings through GUI.
* [fmgr\_system\_ha](fmgr_system_ha_module#ansible-collections-fortinet-fortimanager-fmgr-system-ha-module) β HA configuration.
* [fmgr\_system\_ha\_peer](fmgr_system_ha_peer_module#ansible-collections-fortinet-fortimanager-fmgr-system-ha-peer-module) β Peer.
* [fmgr\_system\_interface](fmgr_system_interface_module#ansible-collections-fortinet-fortimanager-fmgr-system-interface-module) β Interface configuration.
* [fmgr\_system\_interface\_ipv6](fmgr_system_interface_ipv6_module#ansible-collections-fortinet-fortimanager-fmgr-system-interface-ipv6-module) β IPv6 of interface.
* [fmgr\_system\_locallog\_disk\_filter](fmgr_system_locallog_disk_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-disk-filter-module) β Filter for disk logging.
* [fmgr\_system\_locallog\_disk\_setting](fmgr_system_locallog_disk_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-disk-setting-module) β Settings for local disk logging.
* [fmgr\_system\_locallog\_fortianalyzer2\_filter](fmgr_system_locallog_fortianalyzer2_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer2-filter-module) β Filter for FortiAnalyzer2 logging.
* [fmgr\_system\_locallog\_fortianalyzer2\_setting](fmgr_system_locallog_fortianalyzer2_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer2-setting-module) β Settings for locallog to fortianalyzer.
* [fmgr\_system\_locallog\_fortianalyzer3\_filter](fmgr_system_locallog_fortianalyzer3_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer3-filter-module) β Filter for FortiAnalyzer3 logging.
* [fmgr\_system\_locallog\_fortianalyzer3\_setting](fmgr_system_locallog_fortianalyzer3_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer3-setting-module) β Settings for locallog to fortianalyzer.
* [fmgr\_system\_locallog\_fortianalyzer\_filter](fmgr_system_locallog_fortianalyzer_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer-filter-module) β Filter for FortiAnalyzer logging.
* [fmgr\_system\_locallog\_fortianalyzer\_setting](fmgr_system_locallog_fortianalyzer_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-fortianalyzer-setting-module) β Settings for locallog to fortianalyzer.
* [fmgr\_system\_locallog\_memory\_filter](fmgr_system_locallog_memory_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-memory-filter-module) β Filter for memory logging.
* [fmgr\_system\_locallog\_memory\_setting](fmgr_system_locallog_memory_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-memory-setting-module) β Settings for memory buffer.
* [fmgr\_system\_locallog\_setting](fmgr_system_locallog_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-setting-module) β Settings for locallog logging.
* [fmgr\_system\_locallog\_syslogd2\_filter](fmgr_system_locallog_syslogd2_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd2-filter-module) β Filter for syslog logging.
* [fmgr\_system\_locallog\_syslogd2\_setting](fmgr_system_locallog_syslogd2_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd2-setting-module) β Settings for remote syslog server.
* [fmgr\_system\_locallog\_syslogd3\_filter](fmgr_system_locallog_syslogd3_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd3-filter-module) β Filter for syslog logging.
* [fmgr\_system\_locallog\_syslogd3\_setting](fmgr_system_locallog_syslogd3_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd3-setting-module) β Settings for remote syslog server.
* [fmgr\_system\_locallog\_syslogd\_filter](fmgr_system_locallog_syslogd_filter_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd-filter-module) β Filter for syslog logging.
* [fmgr\_system\_locallog\_syslogd\_setting](fmgr_system_locallog_syslogd_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-locallog-syslogd-setting-module) β Settings for remote syslog server.
* [fmgr\_system\_log\_alert](fmgr_system_log_alert_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-alert-module) β Log based alert settings.
* [fmgr\_system\_log\_devicedisable](fmgr_system_log_devicedisable_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-devicedisable-module) β Disable client device logging.
* [fmgr\_system\_log\_interfacestats](fmgr_system_log_interfacestats_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-interfacestats-module) β Interface statistics settings.
* [fmgr\_system\_log\_ioc](fmgr_system_log_ioc_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-ioc-module) β IoC settings.
* [fmgr\_system\_log\_maildomain](fmgr_system_log_maildomain_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-maildomain-module) β FortiMail domain setting.
* [fmgr\_system\_log\_ratelimit](fmgr_system_log_ratelimit_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-ratelimit-module) β Logging rate limit.
* [fmgr\_system\_log\_ratelimit\_device](fmgr_system_log_ratelimit_device_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-ratelimit-device-module) β Device log rate limit.
* [fmgr\_system\_log\_settings](fmgr_system_log_settings_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-settings-module) β Log settings.
* [fmgr\_system\_log\_settings\_rollinganalyzer](fmgr_system_log_settings_rollinganalyzer_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-settings-rollinganalyzer-module) β Log rolling policy for Network Analyzer logs.
* [fmgr\_system\_log\_settings\_rollinglocal](fmgr_system_log_settings_rollinglocal_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-settings-rollinglocal-module) β Log rolling policy for local logs.
* [fmgr\_system\_log\_settings\_rollingregular](fmgr_system_log_settings_rollingregular_module#ansible-collections-fortinet-fortimanager-fmgr-system-log-settings-rollingregular-module) β Log rolling policy for device logs.
* [fmgr\_system\_logfetch\_clientprofile](fmgr_system_logfetch_clientprofile_module#ansible-collections-fortinet-fortimanager-fmgr-system-logfetch-clientprofile-module) β Log-fetch client profile settings.
* [fmgr\_system\_logfetch\_clientprofile\_devicefilter](fmgr_system_logfetch_clientprofile_devicefilter_module#ansible-collections-fortinet-fortimanager-fmgr-system-logfetch-clientprofile-devicefilter-module) β List of device filter.
* [fmgr\_system\_logfetch\_clientprofile\_logfilter](fmgr_system_logfetch_clientprofile_logfilter_module#ansible-collections-fortinet-fortimanager-fmgr-system-logfetch-clientprofile-logfilter-module) β Log content filters.
* [fmgr\_system\_logfetch\_serversettings](fmgr_system_logfetch_serversettings_module#ansible-collections-fortinet-fortimanager-fmgr-system-logfetch-serversettings-module) β Log-fetch server settings.
* [fmgr\_system\_mail](fmgr_system_mail_module#ansible-collections-fortinet-fortimanager-fmgr-system-mail-module) β Alert emails.
* [fmgr\_system\_mcpolicydisabledadoms](fmgr_system_mcpolicydisabledadoms_module#ansible-collections-fortinet-fortimanager-fmgr-system-mcpolicydisabledadoms-module) β Multicast policy disabled adoms.
* [fmgr\_system\_meta](fmgr_system_meta_module#ansible-collections-fortinet-fortimanager-fmgr-system-meta-module) β no description
* [fmgr\_system\_meta\_sysmetafields](fmgr_system_meta_sysmetafields_module#ansible-collections-fortinet-fortimanager-fmgr-system-meta-sysmetafields-module) β no description
* [fmgr\_system\_metadata\_admins](fmgr_system_metadata_admins_module#ansible-collections-fortinet-fortimanager-fmgr-system-metadata-admins-module) β Configure admins.
* [fmgr\_system\_ntp](fmgr_system_ntp_module#ansible-collections-fortinet-fortimanager-fmgr-system-ntp-module) β NTP settings.
* [fmgr\_system\_ntp\_ntpserver](fmgr_system_ntp_ntpserver_module#ansible-collections-fortinet-fortimanager-fmgr-system-ntp-ntpserver-module) β NTP server.
* [fmgr\_system\_objecttagging](fmgr_system_objecttagging_module#ansible-collections-fortinet-fortimanager-fmgr-system-objecttagging-module) β Configure object tagging.
* [fmgr\_system\_passwordpolicy](fmgr_system_passwordpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-system-passwordpolicy-module) β Password policy.
* [fmgr\_system\_replacemsggroup](fmgr_system_replacemsggroup_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-module) β Configure replacement message groups.
* [fmgr\_system\_replacemsggroup\_admin](fmgr_system_replacemsggroup_admin_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-admin-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_alertmail](fmgr_system_replacemsggroup_alertmail_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-alertmail-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_auth](fmgr_system_replacemsggroup_auth_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-auth-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_automation](fmgr_system_replacemsggroup_automation_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-automation-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_custommessage](fmgr_system_replacemsggroup_custommessage_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-custommessage-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_devicedetectionportal](fmgr_system_replacemsggroup_devicedetectionportal_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-devicedetectionportal-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_ec](fmgr_system_replacemsggroup_ec_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-ec-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_fortiguardwf](fmgr_system_replacemsggroup_fortiguardwf_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-fortiguardwf-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_ftp](fmgr_system_replacemsggroup_ftp_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-ftp-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_http](fmgr_system_replacemsggroup_http_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-http-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_icap](fmgr_system_replacemsggroup_icap_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-icap-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mail](fmgr_system_replacemsggroup_mail_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mail-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mm1](fmgr_system_replacemsggroup_mm1_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mm1-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mm3](fmgr_system_replacemsggroup_mm3_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mm3-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mm4](fmgr_system_replacemsggroup_mm4_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mm4-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mm7](fmgr_system_replacemsggroup_mm7_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mm7-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_mms](fmgr_system_replacemsggroup_mms_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-mms-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_nacquar](fmgr_system_replacemsggroup_nacquar_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-nacquar-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_nntp](fmgr_system_replacemsggroup_nntp_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-nntp-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_spam](fmgr_system_replacemsggroup_spam_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-spam-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_sslvpn](fmgr_system_replacemsggroup_sslvpn_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-sslvpn-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_trafficquota](fmgr_system_replacemsggroup_trafficquota_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-trafficquota-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_utm](fmgr_system_replacemsggroup_utm_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-utm-module) β Replacement message table entries.
* [fmgr\_system\_replacemsggroup\_webproxy](fmgr_system_replacemsggroup_webproxy_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsggroup-webproxy-module) β Replacement message table entries.
* [fmgr\_system\_replacemsgimage](fmgr_system_replacemsgimage_module#ansible-collections-fortinet-fortimanager-fmgr-system-replacemsgimage-module) β Configure replacement message images.
* [fmgr\_system\_report\_autocache](fmgr_system_report_autocache_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-autocache-module) β Report auto-cache settings.
* [fmgr\_system\_report\_estbrowsetime](fmgr_system_report_estbrowsetime_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-estbrowsetime-module) β Report estimated browse time settings
* [fmgr\_system\_report\_group](fmgr_system_report_group_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-group-module) β Report group.
* [fmgr\_system\_report\_group\_chartalternative](fmgr_system_report_group_chartalternative_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-group-chartalternative-module) β Chart alternatives.
* [fmgr\_system\_report\_group\_groupby](fmgr_system_report_group_groupby_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-group-groupby-module) β Group-by variables.
* [fmgr\_system\_report\_setting](fmgr_system_report_setting_module#ansible-collections-fortinet-fortimanager-fmgr-system-report-setting-module) β Report settings.
* [fmgr\_system\_route](fmgr_system_route_module#ansible-collections-fortinet-fortimanager-fmgr-system-route-module) β Routing table configuration.
* [fmgr\_system\_route6](fmgr_system_route6_module#ansible-collections-fortinet-fortimanager-fmgr-system-route6-module) β Routing table configuration.
* [fmgr\_system\_saml](fmgr_system_saml_module#ansible-collections-fortinet-fortimanager-fmgr-system-saml-module) β Global settings for SAML authentication.
* [fmgr\_system\_saml\_fabricidp](fmgr_system_saml_fabricidp_module#ansible-collections-fortinet-fortimanager-fmgr-system-saml-fabricidp-module) β Authorized identity providers.
* [fmgr\_system\_sdnconnector](fmgr_system_sdnconnector_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-module) β Configure connection to SDN Connector.
* [fmgr\_system\_sdnconnector\_externalip](fmgr_system_sdnconnector_externalip_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-externalip-module) β Configure GCP external IP.
* [fmgr\_system\_sdnconnector\_nic](fmgr_system_sdnconnector_nic_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-nic-module) β Configure Azure network interface.
* [fmgr\_system\_sdnconnector\_nic\_ip](fmgr_system_sdnconnector_nic_ip_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-nic-ip-module) β Configure IP configuration.
* [fmgr\_system\_sdnconnector\_route](fmgr_system_sdnconnector_route_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-route-module) β Configure GCP route.
* [fmgr\_system\_sdnconnector\_routetable](fmgr_system_sdnconnector_routetable_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-routetable-module) β Configure Azure route table.
* [fmgr\_system\_sdnconnector\_routetable\_route](fmgr_system_sdnconnector_routetable_route_module#ansible-collections-fortinet-fortimanager-fmgr-system-sdnconnector-routetable-route-module) β Configure Azure route.
* [fmgr\_system\_smsserver](fmgr_system_smsserver_module#ansible-collections-fortinet-fortimanager-fmgr-system-smsserver-module) β Configure SMS server for sending SMS messages to support user authentication.
* [fmgr\_system\_sniffer](fmgr_system_sniffer_module#ansible-collections-fortinet-fortimanager-fmgr-system-sniffer-module) β Interface sniffer.
* [fmgr\_system\_snmp\_community](fmgr_system_snmp_community_module#ansible-collections-fortinet-fortimanager-fmgr-system-snmp-community-module) β SNMP community configuration.
* [fmgr\_system\_snmp\_community\_hosts](fmgr_system_snmp_community_hosts_module#ansible-collections-fortinet-fortimanager-fmgr-system-snmp-community-hosts-module) β Allow hosts configuration.
* [fmgr\_system\_snmp\_community\_hosts6](fmgr_system_snmp_community_hosts6_module#ansible-collections-fortinet-fortimanager-fmgr-system-snmp-community-hosts6-module) β Allow hosts configuration for IPv6.
* [fmgr\_system\_snmp\_sysinfo](fmgr_system_snmp_sysinfo_module#ansible-collections-fortinet-fortimanager-fmgr-system-snmp-sysinfo-module) β SNMP configuration.
* [fmgr\_system\_snmp\_user](fmgr_system_snmp_user_module#ansible-collections-fortinet-fortimanager-fmgr-system-snmp-user-module) β SNMP user configuration.
* [fmgr\_system\_socfabric](fmgr_system_socfabric_module#ansible-collections-fortinet-fortimanager-fmgr-system-socfabric-module) β SOC Fabric.
* [fmgr\_system\_sql](fmgr_system_sql_module#ansible-collections-fortinet-fortimanager-fmgr-system-sql-module) β SQL settings.
* [fmgr\_system\_sql\_customindex](fmgr_system_sql_customindex_module#ansible-collections-fortinet-fortimanager-fmgr-system-sql-customindex-module) β List of SQL index fields.
* [fmgr\_system\_sql\_customskipidx](fmgr_system_sql_customskipidx_module#ansible-collections-fortinet-fortimanager-fmgr-system-sql-customskipidx-module) β List of aditional SQL skip index fields.
* [fmgr\_system\_sql\_tsindexfield](fmgr_system_sql_tsindexfield_module#ansible-collections-fortinet-fortimanager-fmgr-system-sql-tsindexfield-module) β List of SQL text search index fields.
* [fmgr\_system\_syslog](fmgr_system_syslog_module#ansible-collections-fortinet-fortimanager-fmgr-system-syslog-module) β Syslog servers.
* [fmgr\_system\_virtualwirepair](fmgr_system_virtualwirepair_module#ansible-collections-fortinet-fortimanager-fmgr-system-virtualwirepair-module) β Configure virtual wire pairs.
* [fmgr\_system\_workflow\_approvalmatrix](fmgr_system_workflow_approvalmatrix_module#ansible-collections-fortinet-fortimanager-fmgr-system-workflow-approvalmatrix-module) β workflow approval matrix.
* [fmgr\_system\_workflow\_approvalmatrix\_approver](fmgr_system_workflow_approvalmatrix_approver_module#ansible-collections-fortinet-fortimanager-fmgr-system-workflow-approvalmatrix-approver-module) β Approver.
* [fmgr\_template](fmgr_template_module#ansible-collections-fortinet-fortimanager-fmgr-template-module) β no description
* [fmgr\_templategroup](fmgr_templategroup_module#ansible-collections-fortinet-fortimanager-fmgr-templategroup-module) β no description
* [fmgr\_user\_adgrp](fmgr_user_adgrp_module#ansible-collections-fortinet-fortimanager-fmgr-user-adgrp-module) β Configure FSSO groups.
* [fmgr\_user\_clearpass](fmgr_user_clearpass_module#ansible-collections-fortinet-fortimanager-fmgr-user-clearpass-module) β no description
* [fmgr\_user\_device](fmgr_user_device_module#ansible-collections-fortinet-fortimanager-fmgr-user-device-module) β Configure devices.
* [fmgr\_user\_device\_dynamicmapping](fmgr_user_device_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-device-dynamicmapping-module) β no description
* [fmgr\_user\_device\_tagging](fmgr_user_device_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-user-device-tagging-module) β Config object tagging.
* [fmgr\_user\_devicecategory](fmgr_user_devicecategory_module#ansible-collections-fortinet-fortimanager-fmgr-user-devicecategory-module) β Configure device categories.
* [fmgr\_user\_devicegroup](fmgr_user_devicegroup_module#ansible-collections-fortinet-fortimanager-fmgr-user-devicegroup-module) β Configure device groups.
* [fmgr\_user\_devicegroup\_dynamicmapping](fmgr_user_devicegroup_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-devicegroup-dynamicmapping-module) β no description
* [fmgr\_user\_devicegroup\_tagging](fmgr_user_devicegroup_tagging_module#ansible-collections-fortinet-fortimanager-fmgr-user-devicegroup-tagging-module) β Config object tagging.
* [fmgr\_user\_domaincontroller](fmgr_user_domaincontroller_module#ansible-collections-fortinet-fortimanager-fmgr-user-domaincontroller-module) β Configure domain controller entries.
* [fmgr\_user\_domaincontroller\_extraserver](fmgr_user_domaincontroller_extraserver_module#ansible-collections-fortinet-fortimanager-fmgr-user-domaincontroller-extraserver-module) β extra servers.
* [fmgr\_user\_exchange](fmgr_user_exchange_module#ansible-collections-fortinet-fortimanager-fmgr-user-exchange-module) β Configure MS Exchange server entries.
* [fmgr\_user\_fortitoken](fmgr_user_fortitoken_module#ansible-collections-fortinet-fortimanager-fmgr-user-fortitoken-module) β Configure FortiToken.
* [fmgr\_user\_fsso](fmgr_user_fsso_module#ansible-collections-fortinet-fortimanager-fmgr-user-fsso-module) β Configure Fortinet Single Sign On
* [fmgr\_user\_fsso\_dynamicmapping](fmgr_user_fsso_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-fsso-dynamicmapping-module) β Configure Fortinet Single Sign On
* [fmgr\_user\_fssopolling](fmgr_user_fssopolling_module#ansible-collections-fortinet-fortimanager-fmgr-user-fssopolling-module) β Configure FSSO active directory servers for polling mode.
* [fmgr\_user\_fssopolling\_adgrp](fmgr_user_fssopolling_adgrp_module#ansible-collections-fortinet-fortimanager-fmgr-user-fssopolling-adgrp-module) β LDAP Group Info.
* [fmgr\_user\_group](fmgr_user_group_module#ansible-collections-fortinet-fortimanager-fmgr-user-group-module) β Configure user groups.
* [fmgr\_user\_group\_guest](fmgr_user_group_guest_module#ansible-collections-fortinet-fortimanager-fmgr-user-group-guest-module) β Guest User.
* [fmgr\_user\_group\_match](fmgr_user_group_match_module#ansible-collections-fortinet-fortimanager-fmgr-user-group-match-module) β Group matches.
* [fmgr\_user\_krbkeytab](fmgr_user_krbkeytab_module#ansible-collections-fortinet-fortimanager-fmgr-user-krbkeytab-module) β Configure Kerberos keytab entries.
* [fmgr\_user\_ldap](fmgr_user_ldap_module#ansible-collections-fortinet-fortimanager-fmgr-user-ldap-module) β Configure LDAP server entries.
* [fmgr\_user\_ldap\_dynamicmapping](fmgr_user_ldap_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-ldap-dynamicmapping-module) β Configure LDAP server entries.
* [fmgr\_user\_local](fmgr_user_local_module#ansible-collections-fortinet-fortimanager-fmgr-user-local-module) β Configure local users.
* [fmgr\_user\_nsx](fmgr_user_nsx_module#ansible-collections-fortinet-fortimanager-fmgr-user-nsx-module) β no description
* [fmgr\_user\_passwordpolicy](fmgr_user_passwordpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-user-passwordpolicy-module) β Configure user password policy.
* [fmgr\_user\_peer](fmgr_user_peer_module#ansible-collections-fortinet-fortimanager-fmgr-user-peer-module) β Configure peer users.
* [fmgr\_user\_peergrp](fmgr_user_peergrp_module#ansible-collections-fortinet-fortimanager-fmgr-user-peergrp-module) β Configure peer groups.
* [fmgr\_user\_pop3](fmgr_user_pop3_module#ansible-collections-fortinet-fortimanager-fmgr-user-pop3-module) β POP3 server entry configuration.
* [fmgr\_user\_pxgrid](fmgr_user_pxgrid_module#ansible-collections-fortinet-fortimanager-fmgr-user-pxgrid-module) β no description
* [fmgr\_user\_radius](fmgr_user_radius_module#ansible-collections-fortinet-fortimanager-fmgr-user-radius-module) β Configure RADIUS server entries.
* [fmgr\_user\_radius\_accountingserver](fmgr_user_radius_accountingserver_module#ansible-collections-fortinet-fortimanager-fmgr-user-radius-accountingserver-module) β Additional accounting servers.
* [fmgr\_user\_radius\_dynamicmapping](fmgr_user_radius_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-radius-dynamicmapping-module) β Configure RADIUS server entries.
* [fmgr\_user\_radius\_dynamicmapping\_accountingserver](fmgr_user_radius_dynamicmapping_accountingserver_module#ansible-collections-fortinet-fortimanager-fmgr-user-radius-dynamicmapping-accountingserver-module) β Additional accounting servers.
* [fmgr\_user\_saml](fmgr_user_saml_module#ansible-collections-fortinet-fortimanager-fmgr-user-saml-module) β SAML server entry configuration.
* [fmgr\_user\_securityexemptlist](fmgr_user_securityexemptlist_module#ansible-collections-fortinet-fortimanager-fmgr-user-securityexemptlist-module) β Configure security exemption list.
* [fmgr\_user\_securityexemptlist\_rule](fmgr_user_securityexemptlist_rule_module#ansible-collections-fortinet-fortimanager-fmgr-user-securityexemptlist-rule-module) β Configure rules for exempting users from captive portal authentication.
* [fmgr\_user\_tacacs](fmgr_user_tacacs_module#ansible-collections-fortinet-fortimanager-fmgr-user-tacacs-module) β Configure TACACS+ server entries.
* [fmgr\_user\_tacacs\_dynamicmapping](fmgr_user_tacacs_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-user-tacacs-dynamicmapping-module) β Configure TACACS+ server entries.
* [fmgr\_user\_vcenter](fmgr_user_vcenter_module#ansible-collections-fortinet-fortimanager-fmgr-user-vcenter-module) β no description
* [fmgr\_user\_vcenter\_rule](fmgr_user_vcenter_rule_module#ansible-collections-fortinet-fortimanager-fmgr-user-vcenter-rule-module) β no description
* [fmgr\_utmprofile](fmgr_utmprofile_module#ansible-collections-fortinet-fortimanager-fmgr-utmprofile-module) β Configure UTM
* [fmgr\_vap](fmgr_vap_module#ansible-collections-fortinet-fortimanager-fmgr-vap-module) β Configure Virtual Access Points
* [fmgr\_vap\_dynamicmapping](fmgr_vap_dynamicmapping_module#ansible-collections-fortinet-fortimanager-fmgr-vap-dynamicmapping-module) β Configure Virtual Access Points
* [fmgr\_vap\_macfilterlist](fmgr_vap_macfilterlist_module#ansible-collections-fortinet-fortimanager-fmgr-vap-macfilterlist-module) β Create a list of MAC addresses for MAC address filtering.
* [fmgr\_vap\_mpskkey](fmgr_vap_mpskkey_module#ansible-collections-fortinet-fortimanager-fmgr-vap-mpskkey-module) β Pre-shared keys that can be used to connect to this virtual access point.
* [fmgr\_vap\_portalmessageoverrides](fmgr_vap_portalmessageoverrides_module#ansible-collections-fortinet-fortimanager-fmgr-vap-portalmessageoverrides-module) β Individual message overrides.
* [fmgr\_vap\_vlanpool](fmgr_vap_vlanpool_module#ansible-collections-fortinet-fortimanager-fmgr-vap-vlanpool-module) β VLAN pool.
* [fmgr\_vapgroup](fmgr_vapgroup_module#ansible-collections-fortinet-fortimanager-fmgr-vapgroup-module) β Configure virtual Access Point
* [fmgr\_videofilter\_profile](fmgr_videofilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-videofilter-profile-module) β Configure VideoFilter profile.
* [fmgr\_videofilter\_profile\_fortiguardcategory](fmgr_videofilter_profile_fortiguardcategory_module#ansible-collections-fortinet-fortimanager-fmgr-videofilter-profile-fortiguardcategory-module) β Configure FortiGuard categories.
* [fmgr\_videofilter\_profile\_fortiguardcategory\_filters](fmgr_videofilter_profile_fortiguardcategory_filters_module#ansible-collections-fortinet-fortimanager-fmgr-videofilter-profile-fortiguardcategory-filters-module) β Configure VideoFilter FortiGuard category.
* [fmgr\_videofilter\_youtubechannelfilter](fmgr_videofilter_youtubechannelfilter_module#ansible-collections-fortinet-fortimanager-fmgr-videofilter-youtubechannelfilter-module) β Configure YouTube channel filter.
* [fmgr\_videofilter\_youtubechannelfilter\_entries](fmgr_videofilter_youtubechannelfilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-videofilter-youtubechannelfilter-entries-module) β YouTube filter entries.
* [fmgr\_voip\_profile](fmgr_voip_profile_module#ansible-collections-fortinet-fortimanager-fmgr-voip-profile-module) β Configure VoIP profiles.
* [fmgr\_voip\_profile\_sccp](fmgr_voip_profile_sccp_module#ansible-collections-fortinet-fortimanager-fmgr-voip-profile-sccp-module) β SCCP.
* [fmgr\_voip\_profile\_sip](fmgr_voip_profile_sip_module#ansible-collections-fortinet-fortimanager-fmgr-voip-profile-sip-module) β SIP.
* [fmgr\_vpn\_certificate\_ca](fmgr_vpn_certificate_ca_module#ansible-collections-fortinet-fortimanager-fmgr-vpn-certificate-ca-module) β CA certificate.
* [fmgr\_vpn\_certificate\_ocspserver](fmgr_vpn_certificate_ocspserver_module#ansible-collections-fortinet-fortimanager-fmgr-vpn-certificate-ocspserver-module) β OCSP server configuration.
* [fmgr\_vpn\_certificate\_remote](fmgr_vpn_certificate_remote_module#ansible-collections-fortinet-fortimanager-fmgr-vpn-certificate-remote-module) β Remote certificate as a PEM file.
* [fmgr\_vpn\_ssl\_settings](fmgr_vpn_ssl_settings_module#ansible-collections-fortinet-fortimanager-fmgr-vpn-ssl-settings-module) β Configure SSL VPN.
* [fmgr\_vpn\_ssl\_settings\_authenticationrule](fmgr_vpn_ssl_settings_authenticationrule_module#ansible-collections-fortinet-fortimanager-fmgr-vpn-ssl-settings-authenticationrule-module) β Authentication rule for SSL VPN.
* [fmgr\_vpnmgr\_node](fmgr_vpnmgr_node_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-node-module) β VPN node for VPN Manager.
* [fmgr\_vpnmgr\_node\_iprange](fmgr_vpnmgr_node_iprange_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-node-iprange-module) β no description
* [fmgr\_vpnmgr\_node\_ipv4excluderange](fmgr_vpnmgr_node_ipv4excluderange_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-node-ipv4excluderange-module) β no description
* [fmgr\_vpnmgr\_node\_protectedsubnet](fmgr_vpnmgr_node_protectedsubnet_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-node-protectedsubnet-module) β no description
* [fmgr\_vpnmgr\_node\_summaryaddr](fmgr_vpnmgr_node_summaryaddr_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-node-summaryaddr-module) β no description
* [fmgr\_vpnmgr\_vpntable](fmgr_vpnmgr_vpntable_module#ansible-collections-fortinet-fortimanager-fmgr-vpnmgr-vpntable-module) β no description
* [fmgr\_vpnsslweb\_hostchecksoftware](fmgr_vpnsslweb_hostchecksoftware_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-hostchecksoftware-module) β SSL-VPN host check software.
* [fmgr\_vpnsslweb\_hostchecksoftware\_checkitemlist](fmgr_vpnsslweb_hostchecksoftware_checkitemlist_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-hostchecksoftware-checkitemlist-module) β Check item list.
* [fmgr\_vpnsslweb\_portal](fmgr_vpnsslweb_portal_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-module) β Portal.
* [fmgr\_vpnsslweb\_portal\_bookmarkgroup](fmgr_vpnsslweb_portal_bookmarkgroup_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-bookmarkgroup-module) β Portal bookmark group.
* [fmgr\_vpnsslweb\_portal\_bookmarkgroup\_bookmarks](fmgr_vpnsslweb_portal_bookmarkgroup_bookmarks_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-bookmarkgroup-bookmarks-module) β Bookmark table.
* [fmgr\_vpnsslweb\_portal\_bookmarkgroup\_bookmarks\_formdata](fmgr_vpnsslweb_portal_bookmarkgroup_bookmarks_formdata_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-bookmarkgroup-bookmarks-formdata-module) β Form data.
* [fmgr\_vpnsslweb\_portal\_macaddrcheckrule](fmgr_vpnsslweb_portal_macaddrcheckrule_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-macaddrcheckrule-module) β Client MAC address check rule.
* [fmgr\_vpnsslweb\_portal\_oschecklist](fmgr_vpnsslweb_portal_oschecklist_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-oschecklist-module) β SSL VPN OS checks.
* [fmgr\_vpnsslweb\_portal\_splitdns](fmgr_vpnsslweb_portal_splitdns_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-portal-splitdns-module) β Split DNS for SSL VPN.
* [fmgr\_vpnsslweb\_realm](fmgr_vpnsslweb_realm_module#ansible-collections-fortinet-fortimanager-fmgr-vpnsslweb-realm-module) β Realm.
* [fmgr\_waf\_mainclass](fmgr_waf_mainclass_module#ansible-collections-fortinet-fortimanager-fmgr-waf-mainclass-module) β Hidden table for datasource.
* [fmgr\_waf\_profile](fmgr_waf_profile_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-module) β Web application firewall configuration.
* [fmgr\_waf\_profile\_addresslist](fmgr_waf_profile_addresslist_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-addresslist-module) β Black address list and white address list.
* [fmgr\_waf\_profile\_constraint](fmgr_waf_profile_constraint_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-module) β WAF HTTP protocol restrictions.
* [fmgr\_waf\_profile\_constraint\_contentlength](fmgr_waf_profile_constraint_contentlength_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-contentlength-module) β HTTP content length in request.
* [fmgr\_waf\_profile\_constraint\_exception](fmgr_waf_profile_constraint_exception_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-exception-module) β HTTP constraint exception.
* [fmgr\_waf\_profile\_constraint\_headerlength](fmgr_waf_profile_constraint_headerlength_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-headerlength-module) β HTTP header length in request.
* [fmgr\_waf\_profile\_constraint\_hostname](fmgr_waf_profile_constraint_hostname_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-hostname-module) β Enable/disable hostname check.
* [fmgr\_waf\_profile\_constraint\_linelength](fmgr_waf_profile_constraint_linelength_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-linelength-module) β HTTP line length in request.
* [fmgr\_waf\_profile\_constraint\_malformed](fmgr_waf_profile_constraint_malformed_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-malformed-module) β Enable/disable malformed HTTP request check.
* [fmgr\_waf\_profile\_constraint\_maxcookie](fmgr_waf_profile_constraint_maxcookie_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-maxcookie-module) β Maximum number of cookies in HTTP request.
* [fmgr\_waf\_profile\_constraint\_maxheaderline](fmgr_waf_profile_constraint_maxheaderline_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-maxheaderline-module) β Maximum number of HTTP header line.
* [fmgr\_waf\_profile\_constraint\_maxrangesegment](fmgr_waf_profile_constraint_maxrangesegment_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-maxrangesegment-module) β Maximum number of range segments in HTTP range line.
* [fmgr\_waf\_profile\_constraint\_maxurlparam](fmgr_waf_profile_constraint_maxurlparam_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-maxurlparam-module) β Maximum number of parameters in URL.
* [fmgr\_waf\_profile\_constraint\_method](fmgr_waf_profile_constraint_method_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-method-module) β Enable/disable HTTP method check.
* [fmgr\_waf\_profile\_constraint\_paramlength](fmgr_waf_profile_constraint_paramlength_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-paramlength-module) β Maximum length of parameter in URL, HTTP POST request or HTTP body.
* [fmgr\_waf\_profile\_constraint\_urlparamlength](fmgr_waf_profile_constraint_urlparamlength_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-urlparamlength-module) β Maximum length of parameter in URL.
* [fmgr\_waf\_profile\_constraint\_version](fmgr_waf_profile_constraint_version_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-constraint-version-module) β Enable/disable HTTP version check.
* [fmgr\_waf\_profile\_method](fmgr_waf_profile_method_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-method-module) β Method restriction.
* [fmgr\_waf\_profile\_method\_methodpolicy](fmgr_waf_profile_method_methodpolicy_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-method-methodpolicy-module) β HTTP method policy.
* [fmgr\_waf\_profile\_signature](fmgr_waf_profile_signature_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-signature-module) β WAF signatures.
* [fmgr\_waf\_profile\_signature\_customsignature](fmgr_waf_profile_signature_customsignature_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-signature-customsignature-module) β Custom signature.
* [fmgr\_waf\_profile\_signature\_mainclass](fmgr_waf_profile_signature_mainclass_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-signature-mainclass-module) β Main signature class.
* [fmgr\_waf\_profile\_urlaccess](fmgr_waf_profile_urlaccess_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-urlaccess-module) β URL access list
* [fmgr\_waf\_profile\_urlaccess\_accesspattern](fmgr_waf_profile_urlaccess_accesspattern_module#ansible-collections-fortinet-fortimanager-fmgr-waf-profile-urlaccess-accesspattern-module) β URL access pattern.
* [fmgr\_waf\_signature](fmgr_waf_signature_module#ansible-collections-fortinet-fortimanager-fmgr-waf-signature-module) β Hidden table for datasource.
* [fmgr\_waf\_subclass](fmgr_waf_subclass_module#ansible-collections-fortinet-fortimanager-fmgr-waf-subclass-module) β Hidden table for datasource.
* [fmgr\_wagprofile](fmgr_wagprofile_module#ansible-collections-fortinet-fortimanager-fmgr-wagprofile-module) β Configure wireless access gateway
* [fmgr\_wanopt\_authgroup](fmgr_wanopt_authgroup_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-authgroup-module) β Configure WAN optimization authentication groups.
* [fmgr\_wanopt\_peer](fmgr_wanopt_peer_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-peer-module) β Configure WAN optimization peers.
* [fmgr\_wanopt\_profile](fmgr_wanopt_profile_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-module) β Configure WAN optimization profiles.
* [fmgr\_wanopt\_profile\_cifs](fmgr_wanopt_profile_cifs_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-cifs-module) β Enable/disable CIFS
* [fmgr\_wanopt\_profile\_ftp](fmgr_wanopt_profile_ftp_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-ftp-module) β Enable/disable FTP WAN Optimization and configure FTP WAN Optimization features.
* [fmgr\_wanopt\_profile\_http](fmgr_wanopt_profile_http_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-http-module) β Enable/disable HTTP WAN Optimization and configure HTTP WAN Optimization features.
* [fmgr\_wanopt\_profile\_mapi](fmgr_wanopt_profile_mapi_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-mapi-module) β Enable/disable MAPI email WAN Optimization and configure MAPI WAN Optimization features.
* [fmgr\_wanopt\_profile\_tcp](fmgr_wanopt_profile_tcp_module#ansible-collections-fortinet-fortimanager-fmgr-wanopt-profile-tcp-module) β Enable/disable TCP WAN Optimization and configure TCP WAN Optimization features.
* [fmgr\_wanprof\_system\_sdwan](fmgr_wanprof_system_sdwan_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-module) β Configure redundant internet connections using SD-WAN
* [fmgr\_wanprof\_system\_sdwan\_duplication](fmgr_wanprof_system_sdwan_duplication_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-duplication-module) β Create SD-WAN duplication rule.
* [fmgr\_wanprof\_system\_sdwan\_healthcheck](fmgr_wanprof_system_sdwan_healthcheck_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-healthcheck-module) β SD-WAN status checking or health checking.
* [fmgr\_wanprof\_system\_sdwan\_healthcheck\_sla](fmgr_wanprof_system_sdwan_healthcheck_sla_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-healthcheck-sla-module) β Service level agreement
* [fmgr\_wanprof\_system\_sdwan\_members](fmgr_wanprof_system_sdwan_members_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-members-module) β FortiGate interfaces added to the SD-WAN.
* [fmgr\_wanprof\_system\_sdwan\_neighbor](fmgr_wanprof_system_sdwan_neighbor_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-neighbor-module) β Create SD-WAN neighbor from BGP neighbor table to control route advertisements according to SLA status.
* [fmgr\_wanprof\_system\_sdwan\_service](fmgr_wanprof_system_sdwan_service_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-service-module) β Create SD-WAN rules
* [fmgr\_wanprof\_system\_sdwan\_service\_sla](fmgr_wanprof_system_sdwan_service_sla_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-service-sla-module) β Service level agreement
* [fmgr\_wanprof\_system\_sdwan\_zone](fmgr_wanprof_system_sdwan_zone_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-sdwan-zone-module) β Configure SD-WAN zones.
* [fmgr\_wanprof\_system\_virtualwanlink](fmgr_wanprof_system_virtualwanlink_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-module) β Configure redundant internet connections using SD-WAN
* [fmgr\_wanprof\_system\_virtualwanlink\_healthcheck](fmgr_wanprof_system_virtualwanlink_healthcheck_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-healthcheck-module) β SD-WAN status checking or health checking.
* [fmgr\_wanprof\_system\_virtualwanlink\_healthcheck\_sla](fmgr_wanprof_system_virtualwanlink_healthcheck_sla_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-healthcheck-sla-module) β Service level agreement
* [fmgr\_wanprof\_system\_virtualwanlink\_members](fmgr_wanprof_system_virtualwanlink_members_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-members-module) β Physical FortiGate interfaces added to the virtual-wan-link.
* [fmgr\_wanprof\_system\_virtualwanlink\_neighbor](fmgr_wanprof_system_virtualwanlink_neighbor_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-neighbor-module) β SD-WAN neighbor table.
* [fmgr\_wanprof\_system\_virtualwanlink\_service](fmgr_wanprof_system_virtualwanlink_service_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-service-module) β Create SD-WAN rules or priority rules
* [fmgr\_wanprof\_system\_virtualwanlink\_service\_sla](fmgr_wanprof_system_virtualwanlink_service_sla_module#ansible-collections-fortinet-fortimanager-fmgr-wanprof-system-virtualwanlink-service-sla-module) β Service level agreement
* [fmgr\_webfilter\_categories](fmgr_webfilter_categories_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-categories-module) β no description
* [fmgr\_webfilter\_content](fmgr_webfilter_content_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-content-module) β Configure Web filter banned word table.
* [fmgr\_webfilter\_content\_entries](fmgr_webfilter_content_entries_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-content-entries-module) β Configure banned word entries.
* [fmgr\_webfilter\_contentheader](fmgr_webfilter_contentheader_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-contentheader-module) β Configure content types used by Web filter.
* [fmgr\_webfilter\_contentheader\_entries](fmgr_webfilter_contentheader_entries_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-contentheader-entries-module) β Configure content types used by web filter.
* [fmgr\_webfilter\_ftgdlocalcat](fmgr_webfilter_ftgdlocalcat_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-ftgdlocalcat-module) β Configure FortiGuard Web Filter local categories.
* [fmgr\_webfilter\_ftgdlocalrating](fmgr_webfilter_ftgdlocalrating_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-ftgdlocalrating-module) β Configure local FortiGuard Web Filter local ratings.
* [fmgr\_webfilter\_profile](fmgr_webfilter_profile_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-module) β Configure Web filter profiles.
* [fmgr\_webfilter\_profile\_antiphish](fmgr_webfilter_profile_antiphish_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-antiphish-module) β AntiPhishing profile.
* [fmgr\_webfilter\_profile\_antiphish\_custompatterns](fmgr_webfilter_profile_antiphish_custompatterns_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-antiphish-custompatterns-module) β Custom username and password regex patterns.
* [fmgr\_webfilter\_profile\_antiphish\_inspectionentries](fmgr_webfilter_profile_antiphish_inspectionentries_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-antiphish-inspectionentries-module) β AntiPhishing entries.
* [fmgr\_webfilter\_profile\_filefilter](fmgr_webfilter_profile_filefilter_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-filefilter-module) β File filter.
* [fmgr\_webfilter\_profile\_filefilter\_entries](fmgr_webfilter_profile_filefilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-filefilter-entries-module) β File filter entries.
* [fmgr\_webfilter\_profile\_ftgdwf](fmgr_webfilter_profile_ftgdwf_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-ftgdwf-module) β FortiGuard Web Filter settings.
* [fmgr\_webfilter\_profile\_ftgdwf\_filters](fmgr_webfilter_profile_ftgdwf_filters_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-ftgdwf-filters-module) β FortiGuard filters.
* [fmgr\_webfilter\_profile\_ftgdwf\_quota](fmgr_webfilter_profile_ftgdwf_quota_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-ftgdwf-quota-module) β FortiGuard traffic quota settings.
* [fmgr\_webfilter\_profile\_override](fmgr_webfilter_profile_override_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-override-module) β Web Filter override settings.
* [fmgr\_webfilter\_profile\_urlextraction](fmgr_webfilter_profile_urlextraction_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-urlextraction-module) β Configure URL Extraction
* [fmgr\_webfilter\_profile\_web](fmgr_webfilter_profile_web_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-web-module) β Web content filtering settings.
* [fmgr\_webfilter\_profile\_youtubechannelfilter](fmgr_webfilter_profile_youtubechannelfilter_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-profile-youtubechannelfilter-module) β YouTube channel filter.
* [fmgr\_webfilter\_urlfilter](fmgr_webfilter_urlfilter_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-urlfilter-module) β Configure URL filter lists.
* [fmgr\_webfilter\_urlfilter\_entries](fmgr_webfilter_urlfilter_entries_module#ansible-collections-fortinet-fortimanager-fmgr-webfilter-urlfilter-entries-module) β URL filter entries.
* [fmgr\_webproxy\_forwardserver](fmgr_webproxy_forwardserver_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-forwardserver-module) β Configure forward-server addresses.
* [fmgr\_webproxy\_forwardservergroup](fmgr_webproxy_forwardservergroup_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-forwardservergroup-module) β Configure a forward server group consisting or multiple forward servers.
* [fmgr\_webproxy\_forwardservergroup\_serverlist](fmgr_webproxy_forwardservergroup_serverlist_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-forwardservergroup-serverlist-module) β Add web forward servers to a list to form a server group.
* [fmgr\_webproxy\_profile](fmgr_webproxy_profile_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-profile-module) β Configure web proxy profiles.
* [fmgr\_webproxy\_profile\_headers](fmgr_webproxy_profile_headers_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-profile-headers-module) β Configure HTTP forwarded requests headers.
* [fmgr\_webproxy\_wisp](fmgr_webproxy_wisp_module#ansible-collections-fortinet-fortimanager-fmgr-webproxy-wisp-module) β Configure Wireless Internet service provider
* [fmgr\_widsprofile](fmgr_widsprofile_module#ansible-collections-fortinet-fortimanager-fmgr-widsprofile-module) β Configure wireless intrusion detection system
* [fmgr\_wtpprofile](fmgr_wtpprofile_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-module) β Configure WTP profiles or FortiAP profiles that define radio settings for manageable FortiAP platforms.
* [fmgr\_wtpprofile\_denymaclist](fmgr_wtpprofile_denymaclist_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-denymaclist-module) β List of MAC addresses that are denied access to this WTP, FortiAP, or AP.
* [fmgr\_wtpprofile\_lan](fmgr_wtpprofile_lan_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-lan-module) β WTP LAN port mapping.
* [fmgr\_wtpprofile\_lbs](fmgr_wtpprofile_lbs_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-lbs-module) β Set various location based service
* [fmgr\_wtpprofile\_platform](fmgr_wtpprofile_platform_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-platform-module) β WTP, FortiAP, or AP platform.
* [fmgr\_wtpprofile\_radio1](fmgr_wtpprofile_radio1_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-radio1-module) β Configuration options for radio 1.
* [fmgr\_wtpprofile\_radio2](fmgr_wtpprofile_radio2_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-radio2-module) β Configuration options for radio 2.
* [fmgr\_wtpprofile\_radio3](fmgr_wtpprofile_radio3_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-radio3-module) β Configuration options for radio 3.
* [fmgr\_wtpprofile\_radio4](fmgr_wtpprofile_radio4_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-radio4-module) β Configuration options for radio 4.
* [fmgr\_wtpprofile\_splittunnelingacl](fmgr_wtpprofile_splittunnelingacl_module#ansible-collections-fortinet-fortimanager-fmgr-wtpprofile-splittunnelingacl-module) β Split tunneling ACL filter list.
See also
List of [collections](../../index#list-of-collections) with docs hosted here.
| programming_docs |
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_linelength β HTTP line length in request. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_linelength β HTTP line length in request.
===============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_linelength`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_linelength** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **length** integer | | Length of HTTP line in bytes (0 to 2147483647). |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: HTTP line length in request.
fmgr_waf_profile_constraint_linelength:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_linelength:
action: <value in [allow, block]>
length: <value of integer>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_urlfilter β Configure URL filter lists. fortinet.fortimanager.fmgr\_webfilter\_urlfilter β Configure URL filter lists.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_urlfilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_urlfilter** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** exempt
* block
* allow
* monitor
* pass
| Action to take for URL filter matches. |
| | | **antiphish-action** string | **Choices:*** block
* log
| Action to take for AntiPhishing matches. |
| | | **dns-address-family** string | **Choices:*** ipv4
* ipv6
* both
| Resolve IPv4 address, IPv6 address, or both from DNS server. |
| | | **exempt** list / elements=string | **Choices:*** av
* web-content
* activex-java-cookie
* dlp
* fortiguard
* all
* filepattern
* pass
* range-block
* antiphish
| no description |
| | | **id** integer | | Id. |
| | | **referrer-host** string | | Referrer host name. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable this URL filter. |
| | | **type** string | **Choices:*** simple
* regex
* wildcard
| Filter type (simple, regex, or wildcard). |
| | | **url** string | | URL to be filtered. |
| | | **web-proxy-profile** string | | Web proxy profile. |
| | **id** integer | | ID. |
| | **ip-addr-block** string | **Choices:*** disable
* enable
| Enable/disable blocking URLs when the hostname appears as an IP address. |
| | **name** string | | Name of URL filter list. |
| | **one-arm-ips-urlfilter** string | **Choices:*** disable
* enable
| Enable/disable DNS resolver for one-arm IPS URL filter operation. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure URL filter lists.
fmgr_webfilter_urlfilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
webfilter_urlfilter:
comment: <value of string>
entries:
-
action: <value in [exempt, block, allow, ...]>
dns-address-family: <value in [ipv4, ipv6, both]>
exempt:
- av
- web-content
- activex-java-cookie
- dlp
- fortiguard
- all
- filepattern
- pass
- range-block
- antiphish
id: <value of integer>
referrer-host: <value of string>
status: <value in [disable, enable]>
type: <value in [simple, regex, wildcard]>
url: <value of string>
web-proxy-profile: <value of string>
antiphish-action: <value in [block, log]>
id: <value of integer>
ip-addr-block: <value in [disable, enable]>
name: <value of string>
one-arm-ips-urlfilter: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_fortiguardwf β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_fortiguardwf β Replacement messages.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_fortiguardwf`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_fortiguardwf** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_fortiguardwf:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_fortiguardwf:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_msnhotmail β MSN Hotmail. fortinet.fortimanager.fmgr\_emailfilter\_profile\_msnhotmail β MSN Hotmail.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_msnhotmail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_msnhotmail** dictionary | | the top level parameters set |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: MSN Hotmail.
fmgr_emailfilter_profile_msnhotmail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_msnhotmail:
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_identitybasedroute_rule β Rule. fortinet.fortimanager.fmgr\_firewall\_identitybasedroute\_rule β Rule.
======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_identitybasedroute_rule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_identitybasedroute\_rule** dictionary | | the top level parameters set |
| | **device** string | | Outgoing interface for the rule. |
| | **gateway** string | | IPv4 address of the gateway (Format: xxx.xxx.xxx.xxx , Default: 0.0.0.0). |
| | **groups** string | | Select one or more group(s) from available groups that are allowed to use this route. Separate group names with a space. |
| | **id** integer | | Rule ID. |
| **identity-based-route** string / required | | the parameter (identity-based-route) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Rule.
fmgr_firewall_identitybasedroute_rule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
identity-based-route: <your own value>
state: <value in [present, absent]>
firewall_identitybasedroute_rule:
device: <value of string>
gateway: <value of string>
groups: <value of string>
id: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_antivirus_profile_smtp β Configure SMTP AntiVirus options. fortinet.fortimanager.fmgr\_antivirus\_profile\_smtp β Configure SMTP AntiVirus options.
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_profile_smtp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_profile\_smtp** dictionary | | the top level parameters set |
| | **archive-block** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **archive-log** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **av-scan** string | **Choices:*** disable
* monitor
* block
| Enable AntiVirus scan service. |
| | **content-disarm** string | **Choices:*** disable
* enable
| Enable Content Disarm and Reconstruction for this protocol. |
| | **emulator** string | **Choices:*** disable
* enable
| Enable/disable the virus emulator. |
| | **executables** string | **Choices:*** default
* virus
| Treat Windows executable files as viruses for the purpose of blocking or monitoring. |
| | **external-blocklist** string | **Choices:*** disable
* monitor
* block
| Enable external-blocklist. |
| | **options** list / elements=string | **Choices:*** scan
* file-filter
* quarantine
* avquery
* avmonitor
| no description |
| | **outbreak-prevention** string | **Choices:*** disabled
* files
* full-archive
* disable
* block
* monitor
| Enable FortiGuard Virus Outbreak Prevention service. |
| | **quarantine** string | **Choices:*** disable
* enable
| Enable/disable quarantine for infected files. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SMTP AntiVirus options.
fmgr_antivirus_profile_smtp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
antivirus_profile_smtp:
archive-block:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
archive-log:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
content-disarm: <value in [disable, enable]>
emulator: <value in [disable, enable]>
executables: <value in [default, virus]>
options:
- scan
- file-filter
- quarantine
- avquery
- avmonitor
outbreak-prevention: <value in [disabled, files, full-archive, ...]>
av-scan: <value in [disable, monitor, block]>
external-blocklist: <value in [disable, monitor, block]>
quarantine: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_vip6 β Configure virtual IP for IPv6. fortinet.fortimanager.fmgr\_firewall\_vip6 β Configure virtual IP for IPv6.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip6** dictionary | | the top level parameters set |
| | **arp-reply** string | **Choices:*** disable
* enable
| Enable to respond to ARP requests for this virtual IP address. Enabled by default. |
| | **color** integer | | Color of icon on the GUI. |
| | **comment** string | | Comment. |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **arp-reply** string | **Choices:*** disable
* enable
| no description |
| | | **color** integer | | no description |
| | | **comment** string | | no description |
| | | **extip** string | | no description |
| | | **extport** string | | no description |
| | | **http-cookie-age** integer | | no description |
| | | **http-cookie-domain** string | | no description |
| | | **http-cookie-domain-from-host** string | **Choices:*** disable
* enable
| no description |
| | | **http-cookie-generation** integer | | no description |
| | | **http-cookie-path** string | | no description |
| | | **http-cookie-share** string | **Choices:*** disable
* same-ip
| no description |
| | | **http-ip-header** string | **Choices:*** disable
* enable
| no description |
| | | **http-ip-header-name** string | | no description |
| | | **http-multiplex** string | **Choices:*** disable
* enable
| no description |
| | | **http-redirect** string | **Choices:*** disable
* enable
| no description |
| | | **https-cookie-secure** string | **Choices:*** disable
* enable
| no description |
| | | **id** integer | | no description |
| | | **ldb-method** string | **Choices:*** static
* round-robin
* weighted
* least-session
* least-rtt
* first-alive
* http-host
| no description |
| | | **mappedip** string | | no description |
| | | **mappedport** string | | no description |
| | | **max-embryonic-connections** integer | | no description |
| | | **monitor** string | | no description |
| | | **nat-source-vip** string | **Choices:*** disable
* enable
| no description |
| | | **outlook-web-access** string | **Choices:*** disable
* enable
| no description |
| | | **persistence** string | **Choices:*** none
* http-cookie
* ssl-session-id
| no description |
| | | **portforward** string | **Choices:*** disable
* enable
| no description |
| | | **protocol** string | **Choices:*** tcp
* udp
* sctp
| no description |
| | | **server-type** string | **Choices:*** http
* https
* ssl
* tcp
* udp
* ip
* imaps
* pop3s
* smtps
| no description |
| | | **src-filter** string | | no description |
| | | **ssl-algorithm** string | **Choices:*** high
* low
* medium
* custom
| no description |
| | | **ssl-certificate** string | | no description |
| | | **ssl-client-fallback** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-client-rekey-count** integer | | no description |
| | | **ssl-client-renegotiation** string | **Choices:*** deny
* allow
* secure
| no description |
| | | **ssl-client-session-state-max** integer | | no description |
| | | **ssl-client-session-state-timeout** integer | | no description |
| | | **ssl-client-session-state-type** string | **Choices:*** disable
* time
* count
* both
| no description |
| | | **ssl-dh-bits** string | **Choices:*** 768
* 1024
* 1536
* 2048
* 3072
* 4096
| no description |
| | | **ssl-hpkp** string | **Choices:*** disable
* enable
* report-only
| no description |
| | | **ssl-hpkp-age** integer | | no description |
| | | **ssl-hpkp-backup** string | | no description |
| | | **ssl-hpkp-include-subdomains** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-hpkp-primary** string | | no description |
| | | **ssl-hpkp-report-uri** string | | no description |
| | | **ssl-hsts** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-hsts-age** integer | | no description |
| | | **ssl-hsts-include-subdomains** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-http-location-conversion** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-http-match-host** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | | **ssl-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | | **ssl-mode** string | **Choices:*** half
* full
| no description |
| | | **ssl-pfs** string | **Choices:*** require
* deny
* allow
| no description |
| | | **ssl-send-empty-frags** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-server-algorithm** string | **Choices:*** high
* low
* medium
* custom
* client
| no description |
| | | **ssl-server-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| no description |
| | | **ssl-server-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| no description |
| | | **ssl-server-session-state-max** integer | | no description |
| | | **ssl-server-session-state-timeout** integer | | no description |
| | | **ssl-server-session-state-type** string | **Choices:*** disable
* time
* count
* both
| no description |
| | | **type** string | **Choices:*** static-nat
* server-load-balance
| no description |
| | | **uuid** string | | no description |
| | | **weblogic-server** string | **Choices:*** disable
* enable
| no description |
| | | **websphere-server** string | **Choices:*** disable
* enable
| no description |
| | **extip** string | | IP address or address range on the external interface that you want to map to an address or address range on the destination n... |
| | **extport** string | | Incoming port number range that you want to map to a port number range on the destination network. |
| | **http-cookie-age** integer | | Time in minutes that client web browsers should keep a cookie. Default is 60 seconds. 0 = no time limit. |
| | **http-cookie-domain** string | | Domain that HTTP cookie persistence should apply to. |
| | **http-cookie-domain-from-host** string | **Choices:*** disable
* enable
| Enable/disable use of HTTP cookie domain from host field in HTTP. |
| | **http-cookie-generation** integer | | Generation of HTTP cookie to be accepted. Changing invalidates all existing cookies. |
| | **http-cookie-path** string | | Limit HTTP cookie persistence to the specified path. |
| | **http-cookie-share** string | **Choices:*** disable
* same-ip
| Control sharing of cookies across virtual servers. same-ip means a cookie from one virtual server can be used by another. Disa... |
| | **http-ip-header** string | **Choices:*** disable
* enable
| For HTTP multiplexing, enable to add the original client IP address in the XForwarded-For HTTP header. |
| | **http-ip-header-name** string | | For HTTP multiplexing, enter a custom HTTPS header name. The original client IP address is added to this header. If empty, X-F... |
| | **http-multiplex** string | **Choices:*** disable
* enable
| Enable/disable HTTP multiplexing. |
| | **http-redirect** string | **Choices:*** disable
* enable
| Enable/disable redirection of HTTP to HTTPS |
| | **https-cookie-secure** string | **Choices:*** disable
* enable
| Enable/disable verification that inserted HTTPS cookies are secure. |
| | **id** integer | | Custom defined ID. |
| | **ldb-method** string | **Choices:*** static
* round-robin
* weighted
* least-session
* least-rtt
* first-alive
* http-host
| Method used to distribute sessions to real servers. |
| | **mappedip** string | | Mapped IP address range in the format startIP-endIP. |
| | **mappedport** string | | Port number range on the destination network to which the external port number range is mapped. |
| | **max-embryonic-connections** integer | | Maximum number of incomplete connections. |
| | **monitor** string | | Name of the health check monitor to use when polling to determine a virtual servers connectivity status. |
| | **name** string | | Virtual ip6 name. |
| | **nat-source-vip** string | **Choices:*** disable
* enable
| Enable to perform SNAT on traffic from mappedip to the extip for all egress interfaces. |
| | **outlook-web-access** string | **Choices:*** disable
* enable
| Enable to add the Front-End-Https header for Microsoft Outlook Web Access. |
| | **persistence** string | **Choices:*** none
* http-cookie
* ssl-session-id
| Configure how to make sure that clients connect to the same server every time they make a request that is part of the same ses... |
| | **portforward** string | **Choices:*** disable
* enable
| Enable port forwarding. |
| | **protocol** string | **Choices:*** tcp
* udp
* sctp
| Protocol to use when forwarding packets. |
| | **realservers** list / elements=string | | no description |
| | | **client-ip** string | | Only clients in this IP range can connect to this real server. |
| | | **healthcheck** string | **Choices:*** disable
* enable
* vip
| Enable to check the responsiveness of the real server before forwarding traffic. |
| | | **holddown-interval** integer | | Time in seconds that the health check monitor continues to monitor an unresponsive server that should be active. |
| | | **http-host** string | | HTTP server domain name in HTTP header. |
| | | **id** integer | | Real server ID. |
| | | **ip** string | | IPv6 address of the real server. |
| | | **max-connections** integer | | Max number of active connections that can directed to the real server. When reached, sessions are sent to other real s... |
| | | **monitor** string | | Name of the health check monitor to use when polling to determine a virtual servers connectivity status. |
| | | **port** integer | | Port for communicating with the real server. Required if port forwarding is enabled. |
| | | **status** string | **Choices:*** active
* standby
* disable
| Set the status of the real server to active so that it can accept traffic, or on standby or disabled so no traffic is ... |
| | | **weight** integer | | Weight of the real server. If weighted load balancing is enabled, the server with the highest weight gets more connect... |
| | **server-type** string | **Choices:*** http
* https
* ssl
* tcp
* udp
* ip
* imaps
* pop3s
* smtps
| Protocol to be load balanced by the virtual server (also called the server load balance virtual IP). |
| | **src-filter** string | | no description |
| | **ssl-algorithm** string | **Choices:*** high
* low
* medium
* custom
| Permitted encryption algorithms for SSL sessions according to encryption strength. |
| | **ssl-certificate** string | | The name of the SSL certificate to use for SSL acceleration. |
| | **ssl-cipher-suites** list / elements=string | | no description |
| | | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | | **priority** integer | | SSL/TLS cipher suites priority. |
| | | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | **ssl-client-fallback** string | **Choices:*** disable
* enable
| Enable/disable support for preventing Downgrade Attacks on client connections (RFC 7507). |
| | **ssl-client-rekey-count** integer | | Maximum length of data in MB before triggering a client rekey (0 = disable). |
| | **ssl-client-renegotiation** string | **Choices:*** deny
* allow
* secure
| Allow, deny, or require secure renegotiation of client sessions to comply with RFC 5746. |
| | **ssl-client-session-state-max** integer | | Maximum number of client to FortiGate SSL session states to keep. |
| | **ssl-client-session-state-timeout** integer | | Number of minutes to keep client to FortiGate SSL session state. |
| | **ssl-client-session-state-type** string | **Choices:*** disable
* time
* count
* both
| How to expire SSL sessions for the segment of the SSL connection between the client and the FortiGate. |
| | **ssl-dh-bits** string | **Choices:*** 768
* 1024
* 1536
* 2048
* 3072
* 4096
| Number of bits to use in the Diffie-Hellman exchange for RSA encryption of SSL sessions. |
| | **ssl-hpkp** string | **Choices:*** disable
* enable
* report-only
| Enable/disable including HPKP header in response. |
| | **ssl-hpkp-age** integer | | Number of minutes the web browser should keep HPKP. |
| | **ssl-hpkp-backup** string | | Certificate to generate backup HPKP pin from. |
| | **ssl-hpkp-include-subdomains** string | **Choices:*** disable
* enable
| Indicate that HPKP header applies to all subdomains. |
| | **ssl-hpkp-primary** string | | Certificate to generate primary HPKP pin from. |
| | **ssl-hpkp-report-uri** string | | URL to report HPKP violations to. |
| | **ssl-hsts** string | **Choices:*** disable
* enable
| Enable/disable including HSTS header in response. |
| | **ssl-hsts-age** integer | | Number of seconds the client should honour the HSTS setting. |
| | **ssl-hsts-include-subdomains** string | **Choices:*** disable
* enable
| Indicate that HSTS header applies to all subdomains. |
| | **ssl-http-location-conversion** string | **Choices:*** disable
* enable
| Enable to replace HTTP with HTTPS in the replys Location HTTP header field. |
| | **ssl-http-match-host** string | **Choices:*** disable
* enable
| Enable/disable HTTP host matching for location conversion. |
| | **ssl-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| Highest SSL/TLS version acceptable from a client. |
| | **ssl-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| Lowest SSL/TLS version acceptable from a client. |
| | **ssl-mode** string | **Choices:*** half
* full
| Apply SSL offloading between the client and the FortiGate (half) or from the client to the FortiGate and from the FortiGate to... |
| | **ssl-pfs** string | **Choices:*** require
* deny
* allow
| Select the cipher suites that can be used for SSL perfect forward secrecy (PFS). Applies to both client and server sessions. |
| | **ssl-send-empty-frags** string | **Choices:*** disable
* enable
| Enable/disable sending empty fragments to avoid CBC IV attacks (SSL 3.0 & TLS 1.0 only). May need to be disabled for compatibi... |
| | **ssl-server-algorithm** string | **Choices:*** high
* low
* medium
* custom
* client
| Permitted encryption algorithms for the server side of SSL full mode sessions according to encryption strength. |
| | **ssl-server-cipher-suites** list / elements=string | | no description |
| | | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | | **priority** integer | | SSL/TLS cipher suites priority. |
| | | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | **ssl-server-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| Highest SSL/TLS version acceptable from a server. Use the client setting by default. |
| | **ssl-server-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| Lowest SSL/TLS version acceptable from a server. Use the client setting by default. |
| | **ssl-server-session-state-max** integer | | Maximum number of FortiGate to Server SSL session states to keep. |
| | **ssl-server-session-state-timeout** integer | | Number of minutes to keep FortiGate to Server SSL session state. |
| | **ssl-server-session-state-type** string | **Choices:*** disable
* time
* count
* both
| How to expire SSL sessions for the segment of the SSL connection between the server and the FortiGate. |
| | **type** string | **Choices:*** static-nat
* server-load-balance
| Configure a static NAT VIP. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **weblogic-server** string | **Choices:*** disable
* enable
| Enable to add an HTTP header to indicate SSL offloading for a WebLogic server. |
| | **websphere-server** string | **Choices:*** disable
* enable
| Enable to add an HTTP header to indicate SSL offloading for a WebSphere server. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure virtual IP for IPv6.
fmgr_firewall_vip6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_vip6:
arp-reply: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
arp-reply: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
extip: <value of string>
extport: <value of string>
http-cookie-age: <value of integer>
http-cookie-domain: <value of string>
http-cookie-domain-from-host: <value in [disable, enable]>
http-cookie-generation: <value of integer>
http-cookie-path: <value of string>
http-cookie-share: <value in [disable, same-ip]>
http-ip-header: <value in [disable, enable]>
http-ip-header-name: <value of string>
http-multiplex: <value in [disable, enable]>
https-cookie-secure: <value in [disable, enable]>
id: <value of integer>
ldb-method: <value in [static, round-robin, weighted, ...]>
mappedip: <value of string>
mappedport: <value of string>
max-embryonic-connections: <value of integer>
monitor: <value of string>
outlook-web-access: <value in [disable, enable]>
persistence: <value in [none, http-cookie, ssl-session-id]>
portforward: <value in [disable, enable]>
protocol: <value in [tcp, udp, sctp]>
server-type: <value in [http, https, ssl, ...]>
src-filter: <value of string>
ssl-algorithm: <value in [high, low, medium, ...]>
ssl-certificate: <value of string>
ssl-client-fallback: <value in [disable, enable]>
ssl-client-renegotiation: <value in [deny, allow, secure]>
ssl-client-session-state-max: <value of integer>
ssl-client-session-state-timeout: <value of integer>
ssl-client-session-state-type: <value in [disable, time, count, ...]>
ssl-dh-bits: <value in [768, 1024, 1536, ...]>
ssl-hpkp: <value in [disable, enable, report-only]>
ssl-hpkp-age: <value of integer>
ssl-hpkp-backup: <value of string>
ssl-hpkp-include-subdomains: <value in [disable, enable]>
ssl-hpkp-primary: <value of string>
ssl-hpkp-report-uri: <value of string>
ssl-hsts: <value in [disable, enable]>
ssl-hsts-age: <value of integer>
ssl-hsts-include-subdomains: <value in [disable, enable]>
ssl-http-location-conversion: <value in [disable, enable]>
ssl-http-match-host: <value in [disable, enable]>
ssl-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-mode: <value in [half, full]>
ssl-pfs: <value in [require, deny, allow]>
ssl-send-empty-frags: <value in [disable, enable]>
ssl-server-algorithm: <value in [high, low, medium, ...]>
ssl-server-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-session-state-max: <value of integer>
ssl-server-session-state-timeout: <value of integer>
ssl-server-session-state-type: <value in [disable, time, count, ...]>
type: <value in [static-nat, server-load-balance]>
uuid: <value of string>
weblogic-server: <value in [disable, enable]>
websphere-server: <value in [disable, enable]>
http-redirect: <value in [disable, enable]>
ssl-client-rekey-count: <value of integer>
nat-source-vip: <value in [disable, enable]>
extip: <value of string>
extport: <value of string>
http-cookie-age: <value of integer>
http-cookie-domain: <value of string>
http-cookie-domain-from-host: <value in [disable, enable]>
http-cookie-generation: <value of integer>
http-cookie-path: <value of string>
http-cookie-share: <value in [disable, same-ip]>
http-ip-header: <value in [disable, enable]>
http-ip-header-name: <value of string>
http-multiplex: <value in [disable, enable]>
https-cookie-secure: <value in [disable, enable]>
id: <value of integer>
ldb-method: <value in [static, round-robin, weighted, ...]>
mappedip: <value of string>
mappedport: <value of string>
max-embryonic-connections: <value of integer>
monitor: <value of string>
name: <value of string>
outlook-web-access: <value in [disable, enable]>
persistence: <value in [none, http-cookie, ssl-session-id]>
portforward: <value in [disable, enable]>
protocol: <value in [tcp, udp, sctp]>
realservers:
-
client-ip: <value of string>
healthcheck: <value in [disable, enable, vip]>
holddown-interval: <value of integer>
http-host: <value of string>
id: <value of integer>
ip: <value of string>
max-connections: <value of integer>
monitor: <value of string>
port: <value of integer>
status: <value in [active, standby, disable]>
weight: <value of integer>
server-type: <value in [http, https, ssl, ...]>
src-filter: <value of string>
ssl-algorithm: <value in [high, low, medium, ...]>
ssl-certificate: <value of string>
ssl-cipher-suites:
-
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
priority: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
ssl-client-fallback: <value in [disable, enable]>
ssl-client-renegotiation: <value in [deny, allow, secure]>
ssl-client-session-state-max: <value of integer>
ssl-client-session-state-timeout: <value of integer>
ssl-client-session-state-type: <value in [disable, time, count, ...]>
ssl-dh-bits: <value in [768, 1024, 1536, ...]>
ssl-hpkp: <value in [disable, enable, report-only]>
ssl-hpkp-age: <value of integer>
ssl-hpkp-backup: <value of string>
ssl-hpkp-include-subdomains: <value in [disable, enable]>
ssl-hpkp-primary: <value of string>
ssl-hpkp-report-uri: <value of string>
ssl-hsts: <value in [disable, enable]>
ssl-hsts-age: <value of integer>
ssl-hsts-include-subdomains: <value in [disable, enable]>
ssl-http-location-conversion: <value in [disable, enable]>
ssl-http-match-host: <value in [disable, enable]>
ssl-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-mode: <value in [half, full]>
ssl-pfs: <value in [require, deny, allow]>
ssl-send-empty-frags: <value in [disable, enable]>
ssl-server-algorithm: <value in [high, low, medium, ...]>
ssl-server-cipher-suites:
-
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
priority: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
ssl-server-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-session-state-max: <value of integer>
ssl-server-session-state-timeout: <value of integer>
ssl-server-session-state-type: <value in [disable, time, count, ...]>
type: <value in [static-nat, server-load-balance]>
uuid: <value of string>
weblogic-server: <value in [disable, enable]>
websphere-server: <value in [disable, enable]>
http-redirect: <value in [disable, enable]>
ssl-client-rekey-count: <value of integer>
nat-source-vip: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_workspace_commit_pkg β Commit change fortinet.fortimanager.fmgr\_dvmdb\_workspace\_commit\_pkg β Commit change
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workspace_commit_pkg`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **package\_path\_name** string / required | | the parameter (package\_path\_name) in requested url |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Commit change
fmgr_dvmdb_workspace_commit_pkg:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
package_path_name: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_ntp_ntpserver β Configure the FortiGate to connect to any available third-party NTP server. fortinet.fortimanager.fmgr\_devprof\_system\_ntp\_ntpserver β Configure the FortiGate to connect to any available third-party NTP server.
=========================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_ntp_ntpserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_ntp\_ntpserver** dictionary | | the top level parameters set |
| | **authentication** string | **Choices:*** disable
* enable
| Enable/disable MD5 authentication. |
| | **id** integer | | NTP server ID. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **key** string | | no description |
| | **key-id** integer | | Key ID for authentication. |
| | **ntpv3** string | **Choices:*** disable
* enable
| Enable to use NTPv3 instead of NTPv4. |
| | **server** string | | IP address or hostname of the NTP Server. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure the FortiGate to connect to any available third-party NTP server.
fmgr_devprof_system_ntp_ntpserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
state: <value in [present, absent]>
devprof_system_ntp_ntpserver:
authentication: <value in [disable, enable]>
id: <value of integer>
key: <value of string>
key-id: <value of integer>
ntpv3: <value in [disable, enable]>
server: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_mheader β Configure AntiSpam MIME header. fortinet.fortimanager.fmgr\_spamfilter\_mheader β Configure AntiSpam MIME header.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_mheader`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_mheader** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** spam
* clear
| Mark spam or good. |
| | | **fieldbody** string | | Pattern for the header field body. |
| | | **fieldname** string | | Pattern for header field name. |
| | | **id** integer | | Mime header entry ID. |
| | | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure AntiSpam MIME header.
fmgr_spamfilter_mheader:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
spamfilter_mheader:
comment: <value of string>
entries:
-
action: <value in [spam, clear]>
fieldbody: <value of string>
fieldname: <value of string>
id: <value of integer>
pattern-type: <value in [wildcard, regexp]>
status: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_lldpprofile_medlocationservice β Configuration method to edit Media Endpoint Discovery fortinet.fortimanager.fmgr\_switchcontroller\_lldpprofile\_medlocationservice β Configuration method to edit Media Endpoint Discovery
=====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_lldpprofile_medlocationservice`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **lldp-profile** string / required | | the parameter (lldp-profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_lldpprofile\_medlocationservice** dictionary | | the top level parameters set |
| | **name** string | | Location service type name. |
| | **status** string | **Choices:*** disable
* enable
| Enable or disable this TLV. |
| | **sys-location-id** string | | Location service ID. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit Media Endpoint Discovery
fmgr_switchcontroller_lldpprofile_medlocationservice:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
lldp-profile: <your own value>
state: <value in [present, absent]>
switchcontroller_lldpprofile_medlocationservice:
name: <value of string>
status: <value in [disable, enable]>
sys-location-id: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_webfilter_urlfilter_entries β URL filter entries. fortinet.fortimanager.fmgr\_webfilter\_urlfilter\_entries β URL filter entries.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_urlfilter_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **urlfilter** string / required | | the parameter (urlfilter) in requested url |
| **webfilter\_urlfilter\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** exempt
* block
* allow
* monitor
* pass
| Action to take for URL filter matches. |
| | **antiphish-action** string | **Choices:*** block
* log
| Action to take for AntiPhishing matches. |
| | **dns-address-family** string | **Choices:*** ipv4
* ipv6
* both
| Resolve IPv4 address, IPv6 address, or both from DNS server. |
| | **exempt** list / elements=string | **Choices:*** av
* web-content
* activex-java-cookie
* dlp
* fortiguard
* all
* filepattern
* pass
* range-block
* antiphish
| no description |
| | **id** integer | | Id. |
| | **referrer-host** string | | Referrer host name. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this URL filter. |
| | **type** string | **Choices:*** simple
* regex
* wildcard
| Filter type (simple, regex, or wildcard). |
| | **url** string | | URL to be filtered. |
| | **web-proxy-profile** string | | Web proxy profile. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: URL filter entries.
fmgr_webfilter_urlfilter_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
urlfilter: <your own value>
state: <value in [present, absent]>
webfilter_urlfilter_entries:
action: <value in [exempt, block, allow, ...]>
dns-address-family: <value in [ipv4, ipv6, both]>
exempt:
- av
- web-content
- activex-java-cookie
- dlp
- fortiguard
- all
- filepattern
- pass
- range-block
- antiphish
id: <value of integer>
referrer-host: <value of string>
status: <value in [disable, enable]>
type: <value in [simple, regex, wildcard]>
url: <value of string>
web-proxy-profile: <value of string>
antiphish-action: <value in [block, log]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_metafields_adom β no description fortinet.fortimanager.fmgr\_dvmdb\_metafields\_adom β no description
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_metafields_adom`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_metafields\_adom** dictionary | | the top level parameters set |
| | **importance** string | **Choices:*** optional
* required
| no description |
| | **length** integer | | no description |
| | **name** string | | no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_metafields_adom:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
dvmdb_metafields_adom:
importance: <value in [optional, required]>
length: <value of integer>
name: <value of string>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_securityexemptlist_rule β Configure rules for exempting users from captive portal authentication. fortinet.fortimanager.fmgr\_user\_securityexemptlist\_rule β Configure rules for exempting users from captive portal authentication.
====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_securityexemptlist_rule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **security-exempt-list** string / required | | the parameter (security-exempt-list) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_securityexemptlist\_rule** dictionary | | the top level parameters set |
| | **devices** string | | Devices or device groups. |
| | **dstaddr** string | | Destination addresses or address groups. |
| | **id** integer | | ID. |
| | **service** string | | Destination services. |
| | **srcaddr** string | | Source addresses or address groups. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure rules for exempting users from captive portal authentication.
fmgr_user_securityexemptlist_rule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
security-exempt-list: <your own value>
state: <value in [present, absent]>
user_securityexemptlist_rule:
devices: <value of string>
dstaddr: <value of string>
id: <value of integer>
service: <value of string>
srcaddr: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wanprof_system_virtualwanlink_neighbor β SD-WAN neighbor table. fortinet.fortimanager.fmgr\_wanprof\_system\_virtualwanlink\_neighbor β SD-WAN neighbor table.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanprof_system_virtualwanlink_neighbor`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanprof** string / required | | the parameter (wanprof) in requested url |
| **wanprof\_system\_virtualwanlink\_neighbor** dictionary | | the top level parameters set |
| | **health-check** string | | SD-WAN health-check name. |
| | **ip** string | | IP address of neighbor. |
| | **member** string | | Member sequence number. |
| | **role** string | **Choices:*** primary
* secondary
* standalone
| Role of neighbor. |
| | **sla-id** integer | | SLA ID. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SD-WAN neighbor table.
fmgr_wanprof_system_virtualwanlink_neighbor:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wanprof: <your own value>
state: <value in [present, absent]>
wanprof_system_virtualwanlink_neighbor:
health-check: <value of string>
ip: <value of string>
member: <value of string>
role: <value in [primary, secondary, standalone]>
sla-id: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_admin_profile β Admin profile. fortinet.fortimanager.fmgr\_system\_admin\_profile β Admin profile.
===================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_profile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_profile** dictionary | | the top level parameters set |
| | **adom-lock** string | **Choices:*** **none** β
* read
* read-write
| ADOM locking none - No permission. read - Read permission. read-write - Read-write permission. |
| | **adom-policy-packages** string | **Choices:*** **none** β
* read
* read-write
| ADOM policy packages. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **adom-switch** string | **Choices:*** **none** β
* read
* read-write
| Administrator domain. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **allow-to-install** string | **Choices:*** disable
* **enable** β
| Enable/disable the restricted user to install objects to the devices. disable - Disable setting. enable - Enable setting. |
| | **app-filter** string | **Choices:*** **disable** β
* enable
| App filter. disable - Disable setting. enable - Enable setting. |
| | **assignment** string | **Choices:*** **none** β
* read
* read-write
| Assignment permission. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **change-password** string | **Choices:*** **disable** β
* enable
| Enable/disable restricted user to change self password. disable - Disable setting. enable - Enable setting. |
| | **config-retrieve** string | **Choices:*** **none** β
* read
* read-write
| Configuration retrieve. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **config-revert** string | **Choices:*** **none** β
* read
* read-write
| Revert Configuration from Revision History none - No permission. read - Read permission. read-write - Read-write permission. |
| | **consistency-check** string | **Choices:*** **none** β
* read
* read-write
| Consistency check. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **datamask** string | **Choices:*** **disable** β
* enable
| Enable/disable data masking. disable - Disable data masking. enable - Enable data masking. |
| | **datamask-custom-fields** list / elements=string | | no description |
| | | **field-category** list / elements=string | **Choices:*** log
* fortiview
* alert
* ueba
* all
| no description |
| | | **field-name** string | | Field name. |
| | | **field-status** string | **Choices:*** disable
* **enable** β
| Field status. disable - Disable field. enable - Enable field. |
| | | **field-type** string | **Choices:*** **string** β
* ip
* mac
* email
* unknown
| Field type. string - String. ip - IP. mac - MAC address. email - Email address. unknown - Unknown. |
| | **datamask-custom-priority** string | **Choices:*** **disable** β
* enable
| Prioritize custom fields. disable - Disable custom field search priority. enable - Enable custom field search priority. |
| | **datamask-fields** list / elements=string | **Choices:*** user
* srcip
* srcname
* srcmac
* dstip
* dstname
* email
* message
* domain
| no description |
| | **datamask-key** string | | no description |
| | **datamask-unmasked-time** integer | **Default:**0 | Time in days without data masking. |
| | **deploy-management** string | **Choices:*** **none** β
* read
* read-write
| Install to devices. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **description** string | | Description. |
| | **device-ap** string | **Choices:*** **none** β
* read
* read-write
| Manage AP. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-config** string | **Choices:*** **none** β
* read
* read-write
| Manage device configurations. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-forticlient** string | **Choices:*** **none** β
* read
* read-write
| Manage FortiClient. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-fortiswitch** string | **Choices:*** **none** β
* read
* read-write
| Manage FortiSwitch. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-manager** string | **Choices:*** **none** β
* read
* read-write
| Device manager. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-op** string | **Choices:*** **none** β
* read
* read-write
| Device add/delete/edit. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-policy-package-lock** string | **Choices:*** **none** β
* read
* read-write
| Device/Policy Package locking none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-profile** string | **Choices:*** **none** β
* read
* read-write
| Device profile permission. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-revision-deletion** string | **Choices:*** **none** β
* read
* read-write
| Delete device revision. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **device-wan-link-load-balance** string | **Choices:*** **none** β
* read
* read-write
| Manage WAN link load balance. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **event-management** string | **Choices:*** **none** β
* read
* read-write
| Event management. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **extension-access** string | **Choices:*** **none** β
* read
* read-write
| Manage extension access. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **fabric-viewer** string | **Choices:*** **none** β
* read
* read-write
| Fabric viewer. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **fgd-center-advanced** string | **Choices:*** **none** β
* read
* read-write
| FortiGuard Center Advanced. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **fgd-center-fmw-mgmt** string | **Choices:*** **none** β
* read
* read-write
| FortiGuard Center Firmware Management. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **fgd-center-licensing** string | **Choices:*** **none** β
* read
* read-write
| FortiGuard Center Licensing. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **fgd\_center** string | **Choices:*** **none** β
* read
* read-write
| FortiGuard Center. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **global-policy-packages** string | **Choices:*** **none** β
* read
* read-write
| Global policy packages. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **import-policy-packages** string | **Choices:*** **none** β
* read
* read-write
| Import Policy Package. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **intf-mapping** string | **Choices:*** **none** β
* read
* read-write
| Interface Mapping none - No permission. read - Read permission. read-write - Read-write permission. |
| | **ips-filter** string | **Choices:*** **disable** β
* enable
| IPS filter. disable - Disable setting. enable - Enable setting. |
| | **log-viewer** string | **Choices:*** **none** β
* read
* read-write
| Log viewer. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **policy-objects** string | **Choices:*** **none** β
* read
* read-write
| Policy objects permission. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **profileid** string | | Profile ID. |
| | **read-passwd** string | **Choices:*** **none** β
* read
* read-write
| View password in clear text. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **realtime-monitor** string | **Choices:*** **none** β
* read
* read-write
| Realtime monitor. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **report-viewer** string | **Choices:*** **none** β
* read
* read-write
| Report viewer. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **run-report** string | **Choices:*** **none** β
* read
* read-write
| Run reports. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **scope** string | **Choices:*** **global** β
* adom
| Scope. global - Global scope. adom - ADOM scope. |
| | **script-access** string | **Choices:*** **none** β
* read
* read-write
| Script access. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **set-install-targets** string | **Choices:*** **none** β
* read
* read-write
| Edit installation targets. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **super-user-profile** string | **Choices:*** **disable** β
* enable
| Enable/disable super user profile disable - Disable super user profile enable - Enable super user profile |
| | **system-setting** string | **Choices:*** **none** β
* read
* read-write
| System setting. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **term-access** string | **Choices:*** **none** β
* read
* read-write
| Terminal access. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **triage-events** string | **Choices:*** **none** β
* read
* read-write
| Triage events. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **type** string | **Choices:*** **system** β
* restricted
| profile type. system - System admin. restricted - Restricted admin. |
| | **update-incidents** string | **Choices:*** **none** β
* read
* read-write
| Create/update incidents. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **vpn-manager** string | **Choices:*** **none** β
* read
* read-write
| VPN manager. none - No permission. read - Read permission. read-write - Read-write permission. |
| | **web-filter** string | **Choices:*** **disable** β
* enable
| Web filter. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Admin profile.
fmgr_system_admin_profile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_admin_profile:
adom-lock: <value in [none, read, read-write]>
adom-policy-packages: <value in [none, read, read-write]>
adom-switch: <value in [none, read, read-write]>
app-filter: <value in [disable, enable]>
assignment: <value in [none, read, read-write]>
change-password: <value in [disable, enable]>
config-retrieve: <value in [none, read, read-write]>
config-revert: <value in [none, read, read-write]>
consistency-check: <value in [none, read, read-write]>
datamask: <value in [disable, enable]>
datamask-custom-fields:
-
field-category:
- log
- fortiview
- alert
- ueba
- all
field-name: <value of string>
field-status: <value in [disable, enable]>
field-type: <value in [string, ip, mac, ...]>
datamask-custom-priority: <value in [disable, enable]>
datamask-fields:
- user
- srcip
- srcname
- srcmac
- dstip
- dstname
- email
- message
- domain
datamask-key: <value of string>
deploy-management: <value in [none, read, read-write]>
description: <value of string>
device-ap: <value in [none, read, read-write]>
device-config: <value in [none, read, read-write]>
device-forticlient: <value in [none, read, read-write]>
device-fortiswitch: <value in [none, read, read-write]>
device-manager: <value in [none, read, read-write]>
device-op: <value in [none, read, read-write]>
device-policy-package-lock: <value in [none, read, read-write]>
device-profile: <value in [none, read, read-write]>
device-revision-deletion: <value in [none, read, read-write]>
device-wan-link-load-balance: <value in [none, read, read-write]>
event-management: <value in [none, read, read-write]>
fgd-center-advanced: <value in [none, read, read-write]>
fgd-center-fmw-mgmt: <value in [none, read, read-write]>
fgd-center-licensing: <value in [none, read, read-write]>
fgd_center: <value in [none, read, read-write]>
global-policy-packages: <value in [none, read, read-write]>
import-policy-packages: <value in [none, read, read-write]>
intf-mapping: <value in [none, read, read-write]>
ips-filter: <value in [disable, enable]>
log-viewer: <value in [none, read, read-write]>
policy-objects: <value in [none, read, read-write]>
profileid: <value of string>
read-passwd: <value in [none, read, read-write]>
realtime-monitor: <value in [none, read, read-write]>
report-viewer: <value in [none, read, read-write]>
scope: <value in [global, adom]>
set-install-targets: <value in [none, read, read-write]>
system-setting: <value in [none, read, read-write]>
term-access: <value in [none, read, read-write]>
type: <value in [system, restricted]>
vpn-manager: <value in [none, read, read-write]>
web-filter: <value in [disable, enable]>
datamask-unmasked-time: <value of integer>
super-user-profile: <value in [disable, enable]>
allow-to-install: <value in [disable, enable]>
extension-access: <value in [none, read, read-write]>
fabric-viewer: <value in [none, read, read-write]>
run-report: <value in [none, read, read-write]>
script-access: <value in [none, read, read-write]>
triage-events: <value in [none, read, read-write]>
update-incidents: <value in [none, read, read-write]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnmgr_node_summaryaddr β no description fortinet.fortimanager.fmgr\_vpnmgr\_node\_summaryaddr β no description
======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnmgr_node_summaryaddr`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **node** string / required | | the parameter (node) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnmgr\_node\_summaryaddr** dictionary | | the top level parameters set |
| | **addr** string | | no description |
| | **priority** integer | | no description |
| | **seq** integer | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_vpnmgr_node_summaryaddr:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
node: <your own value>
state: <value in [present, absent]>
vpnmgr_node_summaryaddr:
addr: <value of string>
priority: <value of integer>
seq: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_webfilter_ftgdlocalcat β Configure FortiGuard Web Filter local categories. fortinet.fortimanager.fmgr\_webfilter\_ftgdlocalcat β Configure FortiGuard Web Filter local categories.
=======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_ftgdlocalcat`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_ftgdlocalcat** dictionary | | the top level parameters set |
| | **desc** string | | Local category description. |
| | **id** integer | | Local category ID. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the local category. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiGuard Web Filter local categories.
fmgr_webfilter_ftgdlocalcat:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
webfilter_ftgdlocalcat:
desc: <value of string>
id: <value of integer>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6prefixlist β Advertised prefix list. fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6prefixlist β Advertised prefix list.
===============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6prefixlist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6prefixlist** dictionary | | the top level parameters set |
| | **autonomous-flag** string | **Choices:*** disable
* enable
| no description |
| | **dnssl** string | | no description |
| | **onlink-flag** string | **Choices:*** disable
* enable
| no description |
| | **preferred-life-time** integer | | no description |
| | **prefix** string | | no description |
| | **rdnss** string | | no description |
| | **valid-life-time** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Advertised prefix list.
fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6prefixlist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
fsp_vlan_dynamicmapping_interface_ipv6_ip6prefixlist:
autonomous-flag: <value in [disable, enable]>
dnssl: <value of string>
onlink-flag: <value in [disable, enable]>
preferred-life-time: <value of integer>
prefix: <value of string>
rdnss: <value of string>
valid-life-time: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_diskquota β Configure disk space available for use by the Upgrade Manager. fortinet.fortimanager.fmgr\_fmupdate\_diskquota β Configure disk space available for use by the Upgrade Manager.
================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_diskquota`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_diskquota** dictionary | | the top level parameters set |
| | **value** integer | **Default:**51200 | Configure the size of the Upgrade Manager disk quota, in megabytes. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure disk space available for use by the Upgrade Manager.
fmgr_fmupdate_diskquota:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_diskquota:
value: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_nntp β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_nntp β Replacement messages.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_nntp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_nntp** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_nntp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_nntp:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_sdnconnector_externalip β Configure GCP external IP. fortinet.fortimanager.fmgr\_system\_sdnconnector\_externalip β Configure GCP external IP.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sdnconnector_externalip`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sdn-connector** string / required | | the parameter (sdn-connector) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sdnconnector\_externalip** dictionary | | the top level parameters set |
| | **name** string | | External IP name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure GCP external IP.
fmgr_system_sdnconnector_externalip:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
sdn-connector: <your own value>
state: <value in [present, absent]>
system_sdnconnector_externalip:
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_http β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_http β Replacement message table entries.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_http`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_http** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_http:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_http:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_cifs_profile_serverkeytab β Server keytab. fortinet.fortimanager.fmgr\_cifs\_profile\_serverkeytab β Server keytab.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_cifs_profile_serverkeytab`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **cifs\_profile\_serverkeytab** dictionary | | the top level parameters set |
| | **keytab** string | | Base64 encoded keytab file containing credential of the server. |
| | **password** string | | no description |
| | **principal** string | | Service principal. For example, "host/[email protected]". |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Server keytab.
fmgr_cifs_profile_serverkeytab:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
cifs_profile_serverkeytab:
keytab: <value of string>
principal: <value of string>
password: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_interfacepolicy6 β Configure IPv6 interface policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_interfacepolicy6 β Configure IPv6 interface policies.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_interfacepolicy6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_interfacepolicy6** dictionary | | the top level parameters set |
| | **address-type** string | **Choices:*** ipv4
* ipv6
| no description |
| | **application-list** string | | Application list name. |
| | **application-list-status** string | **Choices:*** disable
* enable
| Enable/disable application control. |
| | **av-profile** string | | Antivirus profile. |
| | **av-profile-status** string | **Choices:*** disable
* enable
| Enable/disable antivirus. |
| | **comments** string | | Comments. |
| | **dlp-sensor** string | | DLP sensor name. |
| | **dlp-sensor-status** string | **Choices:*** disable
* enable
| Enable/disable DLP. |
| | **dsri** string | **Choices:*** disable
* enable
| Enable/disable DSRI. |
| | **dstaddr6** string | | IPv6 address object to limit traffic monitoring to network traffic sent to the specified address or range. |
| | **emailfilter-profile** string | | Email filter profile. |
| | **emailfilter-profile-status** string | **Choices:*** disable
* enable
| Enable/disable email filter. |
| | **interface** string | | Monitored interface name from available interfaces. |
| | **ips-sensor** string | | IPS sensor name. |
| | **ips-sensor-status** string | **Choices:*** disable
* enable
| Enable/disable IPS. |
| | **label** string | | Label. |
| | **logtraffic** string | **Choices:*** disable
* all
* utm
| Logging type to be used in this policy (Options: all | utm | disable, Default: utm). |
| | **policyid** integer | | Policy ID. |
| | **scan-botnet-connections** string | **Choices:*** disable
* block
* monitor
| Enable/disable scanning for connections to Botnet servers. |
| | **service6** string | | Service name. |
| | **spamfilter-profile** string | | Antispam profile. |
| | **spamfilter-profile-status** string | **Choices:*** disable
* enable
| Enable/disable antispam. |
| | **srcaddr6** string | | IPv6 address object to limit traffic monitoring to network traffic sent from the specified address or range. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this policy. |
| | **webfilter-profile** string | | Web filter profile. |
| | **webfilter-profile-status** string | **Choices:*** disable
* enable
| Enable/disable web filtering. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 interface policies.
fmgr_pkg_firewall_interfacepolicy6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_firewall_interfacepolicy6:
address-type: <value in [ipv4, ipv6]>
application-list: <value of string>
application-list-status: <value in [disable, enable]>
av-profile: <value of string>
av-profile-status: <value in [disable, enable]>
comments: <value of string>
dlp-sensor: <value of string>
dlp-sensor-status: <value in [disable, enable]>
dsri: <value in [disable, enable]>
dstaddr6: <value of string>
interface: <value of string>
ips-sensor: <value of string>
ips-sensor-status: <value in [disable, enable]>
label: <value of string>
logtraffic: <value in [disable, all, utm]>
policyid: <value of integer>
scan-botnet-connections: <value in [disable, block, monitor]>
service6: <value of string>
spamfilter-profile: <value of string>
spamfilter-profile-status: <value in [disable, enable]>
srcaddr6: <value of string>
status: <value in [disable, enable]>
webfilter-profile: <value of string>
webfilter-profile-status: <value in [disable, enable]>
emailfilter-profile: <value of string>
emailfilter-profile-status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_nntp β Configure NNTP protocol options. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_nntp β Configure NNTP protocol options.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_nntp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_nntp** dictionary | | the top level parameters set |
| | **inspect-all** string | **Choices:*** disable
* enable
| Enable/disable the inspection of all ports for the protocol. |
| | **options** list / elements=string | **Choices:*** oversize
* no-content-summary
* splice
| no description |
| | **oversize-limit** integer | | Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10). |
| | **ports** integer | | no description |
| | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | **scan-bzip2** string | **Choices:*** disable
* enable
| Enable/disable scanning of BZip2 compressed files. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of scanning for this protocol. |
| | **uncompressed-nest-limit** integer | | Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12). |
| | **uncompressed-oversize-limit** integer | | Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10). |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure NNTP protocol options.
fmgr_firewall_profileprotocoloptions_nntp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_nntp:
inspect-all: <value in [disable, enable]>
options:
- oversize
- no-content-summary
- splice
oversize-limit: <value of integer>
ports: <value of integer>
scan-bzip2: <value in [disable, enable]>
status: <value in [disable, enable]>
uncompressed-nest-limit: <value of integer>
uncompressed-oversize-limit: <value of integer>
proxy-after-tcp-handshake: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_gtp_ippolicy β IP policy. fortinet.fortimanager.fmgr\_firewall\_gtp\_ippolicy β IP policy.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_gtp_ippolicy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_gtp\_ippolicy** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* deny
| Action. |
| | **dstaddr** string | | Destination address name. |
| | **dstaddr6** string | | Destination IPv6 address name. |
| | **id** integer | | ID. |
| | **srcaddr** string | | Source address name. |
| | **srcaddr6** string | | Source IPv6 address name. |
| **gtp** string / required | | the parameter (gtp) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IP policy.
fmgr_firewall_gtp_ippolicy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
gtp: <your own value>
state: <value in [present, absent]>
firewall_gtp_ippolicy:
action: <value in [allow, deny]>
dstaddr: <value of string>
id: <value of integer>
srcaddr: <value of string>
dstaddr6: <value of string>
srcaddr6: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvm_cmd_add_device β Add a device to the Device Manager database. fortinet.fortimanager.fmgr\_dvm\_cmd\_add\_device β Add a device to the Device Manager database.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvm_cmd_add_device`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvm\_cmd\_add\_device** dictionary | | the top level parameters set |
| | **adom** string | | Name or ID of the ADOM where the command is to be executed on. |
| | **device** dictionary | | no description |
| | | **adm\_pass** string | | no description |
| | | **adm\_usr** string | | <i>add real and promote device</i>. |
| | | **desc** string | | <i>available for all operations</i>. |
| | | **device action** string | | Specify add device operations, or leave blank to add real device: "add\_model" - add a model device. "promote\_unreg" - promote an unregistered device to be managed by FortiManager using information from database. |
| | | **faz.quota** integer | | <i>available for all operations</i>. |
| | | **ip** string | | <i>add real device only</i>. Add device will probe with this IP using the log in credential specified. |
| | | **meta fields** dictionary | | no description |
| | | **mgmt\_mode** string | **Choices:*** unreg
* fmg
* faz
* fmgfaz
| <i>add real and model device</i>. |
| | | **mr** integer | | <i>add model device only</i>. |
| | | **name** string | | <i>required for all operations</i>. Unique name for the device. |
| | | **os\_type** string | **Choices:*** unknown
* fos
* fsw
* foc
* fml
* faz
* fwb
* fch
* fct
* log
* fmg
* fsa
* fdd
* fac
* fpx
* fna
| <i>add model device only</i>. |
| | | **os\_ver** string | **Choices:*** unknown
* 0.0
* 1.0
* 2.0
* 3.0
* 4.0
* 5.0
* 6.0
| os version |
| | | **patch** integer | | <i>add model device only</i>. |
| | | **platform\_str** string | | <i>add model device only</i>. Required for determine the platform for VM platforms. |
| | | **sn** string | | <i>add model device only</i>. This attribute will be used to determine the device platform, except for VM platforms, w... |
| | **flags** list / elements=string | **Choices:*** none
* create\_task
* nonblocking
* log\_dev
| no description |
| | **groups** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Add a device to the Device Manager database.
fmgr_dvm_cmd_add_device:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
dvm_cmd_add_device:
adom: <value of string>
device:
adm_pass: <value of string>
adm_usr: <value of string>
desc: <value of string>
device action: <value of string>
faz.quota: <value of integer>
ip: <value of string>
meta fields: <value of dict>
mgmt_mode: <value in [unreg, fmg, faz, ...]>
mr: <value of integer>
name: <value of string>
os_type: <value in [unknown, fos, fsw, ...]>
os_ver: <value in [unknown, 0.0, 1.0, ...]>
patch: <value of integer>
platform_str: <value of string>
sn: <value of string>
flags:
- none
- create_task
- nonblocking
- log_dev
groups:
-
name: <value of string>
vdom: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_fdssetting_pushoverridetoclient β Enable/disable push updates, and override the default IP address and port used by FortiGuard to send antivirus and IPS push messages forβ¦ fortinet.fortimanager.fmgr\_fmupdate\_fdssetting\_pushoverridetoclient β Enable/disable push updates, and override the default IP address and port used by FortiGuard to send antivirus and IPS push messages forβ¦
==================================================================================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_fdssetting_pushoverridetoclient`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_fdssetting\_pushoverridetoclient** dictionary | | the top level parameters set |
| | **announce-ip** list / elements=string | | no description |
| | | **id** integer | **Default:**0 | ID of the announce IP address (1 - 10). |
| | | **ip** string | **Default:**"0.0.0.0" | Announce IPv4 address. |
| | | **port** integer | **Default:**8890 | Announce IP port (1 - 65535, default = 8890). |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable push updates (default = disable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable push updates, and override the default IP address and port used by FortiGuard to send antivirus and IPS push messages for...
fmgr_fmupdate_fdssetting_pushoverridetoclient:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_fdssetting_pushoverridetoclient:
announce-ip:
-
id: <value of integer>
ip: <value of string>
port: <value of integer>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_externalresource β Configure external resource. fortinet.fortimanager.fmgr\_system\_externalresource β Configure external resource.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_externalresource`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_externalresource** dictionary | | the top level parameters set |
| | **category** integer | | User resource category. |
| | **comments** string | | Comment. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **name** string | | External resource name. |
| | **password** string | | no description |
| | **refresh-rate** integer | | Time interval to refresh external resource (1 - 43200 min, default = 5 min). |
| | **resource** string | | URI of external resource. |
| | **source-ip** string | | Source IPv4 address used to communicate with server. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable user resource. |
| | **type** string | **Choices:*** category
* address
* domain
* malware
| User resource type. |
| | **user-agent** string | | Override HTTP User-Agent header used when retrieving this external resource. |
| | **username** string | | HTTP basic authentication user name. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure external resource.
fmgr_system_externalresource:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
system_externalresource:
category: <value of integer>
comments: <value of string>
name: <value of string>
refresh-rate: <value of integer>
resource: <value of string>
status: <value in [disable, enable]>
type: <value in [category, address, domain, ...]>
password: <value of string>
source-ip: <value of string>
username: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
user-agent: <value of string>
uuid: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_approve β no description fortinet.fortimanager.fmgr\_dvmdb\_workflow\_approve β no description
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_approve`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_workflow\_approve** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_workflow_approve:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
dvmdb_workflow_approve:
desc: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_interfacepolicy6_sectionvalue β Configure IPv6 interface policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_interfacepolicy6\_sectionvalue β Configure IPv6 interface policies.
==============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_interfacepolicy6_sectionvalue`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **interface-policy6** string / required | | the parameter (interface-policy6) in requested url |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_interfacepolicy6\_sectionvalue** dictionary | | the top level parameters set |
| | **attr** string | **Choices:*** label
* global-label
| no description |
| | **name** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 interface policies.
fmgr_pkg_firewall_interfacepolicy6_sectionvalue:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
interface-policy6: <your own value>
state: <value in [present, absent]>
pkg_firewall_interfacepolicy6_sectionvalue:
attr: <value in [label, global-label]>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_syslogd_filter β Filter for syslog logging. fortinet.fortimanager.fmgr\_system\_locallog\_syslogd\_filter β Filter for syslog logging.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_syslogd_filter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_syslogd\_filter** dictionary | | the top level parameters set |
| | **aid** string | **Choices:*** disable
* **enable** β
| Log aid messages. disable - Disable setting. enable - Enable setting. |
| | **devcfg** string | **Choices:*** disable
* **enable** β
| Log device configuration message. disable - Disable setting. enable - Enable setting. |
| | **devops** string | **Choices:*** disable
* **enable** β
| Managered devices operations messages. disable - Disable setting. enable - Enable setting. |
| | **diskquota** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer disk quota messages. disable - Disable setting. enable - Enable setting. |
| | **dm** string | **Choices:*** disable
* **enable** β
| Log deployment manager message. disable - Disable setting. enable - Enable setting. |
| | **docker** string | **Choices:*** disable
* **enable** β
| Docker application generic messages. disable - Disable setting. enable - Enable setting. |
| | **dvm** string | **Choices:*** disable
* **enable** β
| Log device manager messages. disable - Disable setting. enable - Enable setting. |
| | **ediscovery** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer ediscovery messages. disable - Disable setting. enable - Enable setting. |
| | **epmgr** string | **Choices:*** disable
* **enable** β
| Log endpoint manager message. disable - Disable setting. enable - Enable setting. |
| | **event** string | **Choices:*** disable
* **enable** β
| Log event messages. disable - Disable setting. enable - Enable setting. |
| | **eventmgmt** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer event handler messages. disable - Disable setting. enable - Enable setting. |
| | **faz** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer messages. disable - Disable setting. enable - Enable setting. |
| | **fazha** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer HA messages. disable - Disable setting. enable - Enable setting. |
| | **fazsys** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer system messages. disable - Disable setting. enable - Enable setting. |
| | **fgd** string | **Choices:*** disable
* **enable** β
| Log FortiGuard service message. disable - Disable setting. enable - Enable setting. |
| | **fgfm** string | **Choices:*** disable
* **enable** β
| Log FGFM protocol message. disable - Disable setting. enable - Enable setting. |
| | **fips** string | **Choices:*** disable
* **enable** β
| Whether to log fips messages. disable - Disable setting. enable - Enable setting. |
| | **fmgws** string | **Choices:*** disable
* **enable** β
| Log web service messages. disable - Disable setting. enable - Enable setting. |
| | **fmlmgr** string | **Choices:*** disable
* **enable** β
| Log FortiMail manager message. disable - Disable setting. enable - Enable setting. |
| | **fmwmgr** string | **Choices:*** disable
* **enable** β
| Log firmware manager message. disable - Disable setting. enable - Enable setting. |
| | **fortiview** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer FortiView messages. disable - Disable setting. enable - Enable setting. |
| | **glbcfg** string | **Choices:*** disable
* **enable** β
| Log global database message. disable - Disable setting. enable - Enable setting. |
| | **ha** string | **Choices:*** disable
* **enable** β
| Log HA message. disable - Disable setting. enable - Enable setting. |
| | **hcache** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer hcache messages. disable - Disable setting. enable - Enable setting. |
| | **incident** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer incident messages. disable - Disable setting. enable - Enable setting. |
| | **iolog** string | **Choices:*** disable
* **enable** β
| Log debug IO log message. disable - Disable setting. enable - Enable setting. |
| | **logd** string | **Choices:*** disable
* **enable** β
| Log the status of log daemon. disable - Disable setting. enable - Enable setting. |
| | **logdb** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log DB messages. disable - Disable setting. enable - Enable setting. |
| | **logdev** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log device messages. disable - Disable setting. enable - Enable setting. |
| | **logfile** string | **Choices:*** enable
* disable
| Log Fortianalyzer log file messages. enable - Enable setting. disable - Disable setting. |
| | **logging** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer logging messages. disable - Disable setting. enable - Enable setting. |
| | **lrmgr** string | **Choices:*** disable
* **enable** β
| Log log and report manager message. disable - Disable setting. enable - Enable setting. |
| | **objcfg** string | **Choices:*** disable
* **enable** β
| Log object configuration change message. disable - Disable setting. enable - Enable setting. |
| | **report** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer report messages. disable - Disable setting. enable - Enable setting. |
| | **rev** string | **Choices:*** disable
* **enable** β
| Log revision history message. disable - Disable setting. enable - Enable setting. |
| | **rtmon** string | **Choices:*** disable
* **enable** β
| Log real-time monitor message. disable - Disable setting. enable - Enable setting. |
| | **scfw** string | **Choices:*** disable
* **enable** β
| Log firewall objects message. disable - Disable setting. enable - Enable setting. |
| | **scply** string | **Choices:*** disable
* **enable** β
| Log policy console message. disable - Disable setting. enable - Enable setting. |
| | **scrmgr** string | **Choices:*** disable
* **enable** β
| Log script manager message. disable - Disable setting. enable - Enable setting. |
| | **scvpn** string | **Choices:*** disable
* **enable** β
| Log VPN console message. disable - Disable setting. enable - Enable setting. |
| | **system** string | **Choices:*** disable
* **enable** β
| Log system manager message. disable - Disable setting. enable - Enable setting. |
| | **webport** string | **Choices:*** disable
* **enable** β
| Log web portal message. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Filter for syslog logging.
fmgr_system_locallog_syslogd_filter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_syslogd_filter:
devcfg: <value in [disable, enable]>
devops: <value in [disable, enable]>
diskquota: <value in [disable, enable]>
dm: <value in [disable, enable]>
dvm: <value in [disable, enable]>
ediscovery: <value in [disable, enable]>
epmgr: <value in [disable, enable]>
event: <value in [disable, enable]>
eventmgmt: <value in [disable, enable]>
faz: <value in [disable, enable]>
fazha: <value in [disable, enable]>
fazsys: <value in [disable, enable]>
fgd: <value in [disable, enable]>
fgfm: <value in [disable, enable]>
fips: <value in [disable, enable]>
fmgws: <value in [disable, enable]>
fmlmgr: <value in [disable, enable]>
fmwmgr: <value in [disable, enable]>
fortiview: <value in [disable, enable]>
glbcfg: <value in [disable, enable]>
ha: <value in [disable, enable]>
hcache: <value in [disable, enable]>
iolog: <value in [disable, enable]>
logd: <value in [disable, enable]>
logdb: <value in [disable, enable]>
logdev: <value in [disable, enable]>
logfile: <value in [enable, disable]>
logging: <value in [disable, enable]>
lrmgr: <value in [disable, enable]>
objcfg: <value in [disable, enable]>
report: <value in [disable, enable]>
rev: <value in [disable, enable]>
rtmon: <value in [disable, enable]>
scfw: <value in [disable, enable]>
scply: <value in [disable, enable]>
scrmgr: <value in [disable, enable]>
scvpn: <value in [disable, enable]>
system: <value in [disable, enable]>
webport: <value in [disable, enable]>
incident: <value in [disable, enable]>
aid: <value in [disable, enable]>
docker: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_log_settings_rollinganalyzer β Log rolling policy for Network Analyzer logs. fortinet.fortimanager.fmgr\_system\_log\_settings\_rollinganalyzer β Log rolling policy for Network Analyzer logs.
==================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_settings_rollinganalyzer`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_settings\_rollinganalyzer** dictionary | | the top level parameters set |
| | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | **directory** string | | Upload server directory, for Unix server, use absolute |
| | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | **password** string | | no description |
| | **password2** string | | no description |
| | **password3** string | | no description |
| | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | **username** string | | Upload server login username. |
| | **username2** string | | Upload server login username2. |
| | **username3** string | | Upload server login username3. |
| | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log rolling policy for Network Analyzer logs.
fmgr_system_log_settings_rollinganalyzer:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_settings_rollinganalyzer:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_user_dashboard β Custom dashboard widgets. fortinet.fortimanager.fmgr\_system\_admin\_user\_dashboard β Custom dashboard widgets.
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_user_dashboard`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_user\_dashboard** dictionary | | the top level parameters set |
| | **column** integer | **Default:**0 | Widgets column ID. |
| | **diskio-content-type** string | **Choices:*** **util** β
* iops
* blks
| Disk I/O Monitor widgets chart type. util - bandwidth utilization. iops - the number of I/O requests. blks - the amount of data of I/O requests. |
| | **diskio-period** string | **Choices:*** **1hour** β
* 8hour
* 24hour
| Disk I/O Monitor widgets data period. 1hour - 1 hour. 8hour - 8 hour. 24hour - 24 hour. |
| | **log-rate-period** string | **Choices:*** 2min
* 1hour
* 6hours
| Log receive monitor widgets data period. 2min - 2 minutes. 1hour - 1 hour. 6hours - 6 hours. |
| | **log-rate-topn** string | **Choices:*** 1
* 2
* 3
* 4
* **5** β
| Log receive monitor widgets number of top items to display. 1 - Top 1. 2 - Top 2. 3 - Top 3. 4 - Top 4. 5 - Top 5. |
| | **log-rate-type** string | **Choices:*** log
* **device** β
| Log receive monitor widgets statistics breakdown options. log - Show log rates for each log type. device - Show log rates for each device. |
| | **moduleid** integer | **Default:**0 | Widget ID. |
| | **name** string | | Widget name. |
| | **num-entries** integer | **Default:**10 | Number of entries. |
| | **refresh-interval** integer | **Default:**300 | Widgets refresh interval. |
| | **res-cpu-display** string | **Choices:*** **average** β
* each
| Widgets CPU display type. average - Average usage of CPU. each - Each usage of CPU. |
| | **res-period** string | **Choices:*** 10min
* hour
* day
| Widgets data period. 10min - Last 10 minutes. hour - Last hour. day - Last day. |
| | **res-view-type** string | **Choices:*** real-time
* history
| Widgets data view type. real-time - Real-time view. history - History view. |
| | **status** string | **Choices:*** close
* **open** β
| Widgets opened/closed state. close - Widget closed. open - Widget opened. |
| | **tabid** integer | **Default:**0 | ID of tab where widget is displayed. |
| | **time-period** string | **Choices:*** **1hour** β
* 8hour
* 24hour
| Log Database Monitor widgets data period. 1hour - 1 hour. 8hour - 8 hour. 24hour - 24 hour. |
| | **widget-type** string | **Choices:*** top-lograte
* sysres
* sysinfo
* licinfo
* jsconsole
* sysop
* alert
* statistics
* rpteng
* raid
* logrecv
* devsummary
* logdb-perf
* logdb-lag
* disk-io
* log-rcvd-fwd
| Widget type. top-lograte - Log Receive Monitor. sysres - System resources. sysinfo - System Information. licinfo - License Information. jsconsole - CLI Console. sysop - Unit Operation. alert - Alert Message Console. statistics - Statistics. rpteng - Report Engine. raid - Disk Monitor. logrecv - Logs/Data Received. devsummary - Device Summary. logdb-perf - Log Database Performance Monitor. logdb-lag - Log Database Lag Time. disk-io - Disk I/O. log-rcvd-fwd - Log receive and forwarding Monitor. |
| **user** string / required | | the parameter (user) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Custom dashboard widgets.
fmgr_system_admin_user_dashboard:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
user: <your own value>
state: <value in [present, absent]>
system_admin_user_dashboard:
column: <value of integer>
diskio-content-type: <value in [util, iops, blks]>
diskio-period: <value in [1hour, 8hour, 24hour]>
log-rate-period: <value in [2min, 1hour, 6hours]>
log-rate-topn: <value in [1, 2, 3, ...]>
log-rate-type: <value in [log, device]>
moduleid: <value of integer>
name: <value of string>
num-entries: <value of integer>
refresh-interval: <value of integer>
res-cpu-display: <value in [average, each]>
res-period: <value in [10min, hour, day]>
res-view-type: <value in [real-time, history]>
status: <value in [close, open]>
tabid: <value of integer>
time-period: <value in [1hour, 8hour, 24hour]>
widget-type: <value in [top-lograte, sysres, sysinfo, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_alertemail β Configure alertemail. fortinet.fortimanager.fmgr\_system\_alertemail β Configure alertemail.
======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_alertemail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_alertemail** dictionary | | the top level parameters set |
| | **authentication** string | **Choices:*** disable
* **enable** β
| Enable/disable authentication. disable - Disable setting. enable - Enable setting. |
| | **fromaddress** string | | SMTP from address. |
| | **fromname** string | | SMTP from user. |
| | **smtppassword** string | | no description |
| | **smtpport** integer | **Default:**25 | SMTP server port. |
| | **smtpserver** string | | SMTP server address. |
| | **smtpuser** string | | SMTP server user. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure alertemail.
fmgr_system_alertemail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_alertemail:
authentication: <value in [disable, enable]>
fromaddress: <value of string>
fromname: <value of string>
smtppassword: <value of string>
smtpport: <value of integer>
smtpserver: <value of string>
smtpuser: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_replacemsggroup β Configure replacement message groups. fortinet.fortimanager.fmgr\_system\_replacemsggroup β Configure replacement message groups.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup** dictionary | | the top level parameters set |
| | **admin** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **alertmail** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **auth** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **automation** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **comment** string | | Comment. |
| | **custom-message** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **device-detection-portal** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **ec** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **fortiguard-wf** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **ftp** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **group-type** string | **Choices:*** default
* utm
* auth
* ec
* captive-portal
| Group type. |
| | **http** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **icap** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **mail** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **mm1** list / elements=string | | no description |
| | | **add-smil** string | **Choices:*** disable
* enable
| add message encapsulation |
| | | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | | **class** string | **Choices:*** personal
* advertisement
* information
* automatic
* not-included
| message class |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **from** string | | from address |
| | | **from-sender** string | **Choices:*** disable
* enable
| notification message sent from recipient |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **image** string | | Message string. |
| | | **message** string | | message text |
| | | **msg-type** string | | Message type. |
| | | **priority** string | **Choices:*** low
* normal
* high
* not-included
| message priority |
| | | **rsp-status** string | **Choices:*** ok
* err-unspecified
* err-srv-denied
* err-msg-fmt-corrupt
* err-snd-addr-unresolv
* err-msg-not-found
* err-net-prob
* err-content-not-accept
* err-unsupp-msg
| response status code |
| | | **rsp-text** string | | response text |
| | | **sender-visibility** string | **Choices:*** hide
* show
* not-specified
| sender visibility |
| | | **smil-part** string | | message encapsulation text |
| | | **subject** string | | subject text string |
| | **mm3** list / elements=string | | no description |
| | | **add-html** string | **Choices:*** disable
* enable
| add message encapsulation |
| | | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **from** string | | from address |
| | | **from-sender** string | **Choices:*** disable
* enable
| notification message sent from recipient |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **html-part** string | | message encapsulation text |
| | | **image** string | | Message string. |
| | | **message** string | | message text |
| | | **msg-type** string | | Message type. |
| | | **priority** string | **Choices:*** low
* normal
* high
* not-included
| message priority |
| | | **subject** string | | subject text string |
| | **mm4** list / elements=string | | no description |
| | | **add-smil** string | **Choices:*** disable
* enable
| add message encapsulation |
| | | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | | **class** string | **Choices:*** personal
* advertisement
* informational
* auto
* not-included
| message class |
| | | **domain** string | | from address domain |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **from** string | | from address |
| | | **from-sender** string | **Choices:*** disable
* enable
| notification message sent from recipient |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **image** string | | Message string. |
| | | **message** string | | message text |
| | | **msg-type** string | | Message type. |
| | | **priority** string | **Choices:*** low
* normal
* high
* not-included
| message priority |
| | | **rsp-status** string | **Choices:*** ok
* err-unspecified
* err-srv-denied
* err-msg-fmt-corrupt
* err-snd-addr-unresolv
* err-net-prob
* err-content-not-accept
* err-unsupp-msg
| response status |
| | | **smil-part** string | | message encapsulation text |
| | | **subject** string | | subject text string |
| | **mm7** list / elements=string | | no description |
| | | **add-smil** string | **Choices:*** disable
* enable
| add message encapsulation |
| | | **addr-type** string | **Choices:*** rfc2822-addr
* number
* short-code
| from address type |
| | | **allow-content-adaptation** string | **Choices:*** disable
* enable
| allow content adaptations |
| | | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | | **class** string | **Choices:*** personal
* advertisement
* informational
* auto
* not-included
| message class |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **from** string | | from address |
| | | **from-sender** string | **Choices:*** disable
* enable
| notification message sent from recipient |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **image** string | | Message string. |
| | | **message** string | | message text |
| | | **msg-type** string | | Message type. |
| | | **priority** string | **Choices:*** low
* normal
* high
* not-included
| message priority |
| | | **rsp-status** string | **Choices:*** success
* partial-success
* client-err
* oper-restrict
* addr-err
* addr-not-found
* content-refused
* msg-id-not-found
* link-id-not-found
* msg-fmt-corrupt
* app-id-not-found
* repl-app-id-not-found
* srv-err
* not-possible
* msg-rejected
* multiple-addr-not-supp
* app-addr-not-supp
* gen-service-err
* improper-ident
* unsupp-ver
* unsupp-oper
* validation-err
* service-err
* service-unavail
* service-denied
* app-denied
| response status |
| | | **smil-part** string | | message encapsulation text |
| | | **subject** string | | subject text string |
| | **mms** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **image** string | | Message string. |
| | | **msg-type** string | | Message type. |
| | **nac-quar** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **name** string | | Group name. |
| | **nntp** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **spam** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **sslvpn** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **traffic-quota** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **utm** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| | **webproxy** list / elements=string | | no description |
| | | **buffer** string | | Message string. |
| | | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure replacement message groups.
fmgr_system_replacemsggroup:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
system_replacemsggroup:
admin:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
alertmail:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
auth:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
comment: <value of string>
custom-message:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
device-detection-portal:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
ec:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
fortiguard-wf:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
ftp:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
group-type: <value in [default, utm, auth, ...]>
http:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
icap:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
mail:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
mm1:
-
add-smil: <value in [disable, enable]>
charset: <value in [us-ascii, utf-8]>
class: <value in [personal, advertisement, information, ...]>
format: <value in [none, text, html, ...]>
from: <value of string>
from-sender: <value in [disable, enable]>
header: <value in [none, http, 8bit]>
image: <value of string>
message: <value of string>
msg-type: <value of string>
priority: <value in [low, normal, high, ...]>
rsp-status: <value in [ok, err-unspecified, err-srv-denied, ...]>
rsp-text: <value of string>
sender-visibility: <value in [hide, show, not-specified]>
smil-part: <value of string>
subject: <value of string>
mm3:
-
add-html: <value in [disable, enable]>
charset: <value in [us-ascii, utf-8]>
format: <value in [none, text, html, ...]>
from: <value of string>
from-sender: <value in [disable, enable]>
header: <value in [none, http, 8bit]>
html-part: <value of string>
image: <value of string>
message: <value of string>
msg-type: <value of string>
priority: <value in [low, normal, high, ...]>
subject: <value of string>
mm4:
-
add-smil: <value in [disable, enable]>
charset: <value in [us-ascii, utf-8]>
class: <value in [personal, advertisement, informational, ...]>
domain: <value of string>
format: <value in [none, text, html, ...]>
from: <value of string>
from-sender: <value in [disable, enable]>
header: <value in [none, http, 8bit]>
image: <value of string>
message: <value of string>
msg-type: <value of string>
priority: <value in [low, normal, high, ...]>
rsp-status: <value in [ok, err-unspecified, err-srv-denied, ...]>
smil-part: <value of string>
subject: <value of string>
mm7:
-
add-smil: <value in [disable, enable]>
addr-type: <value in [rfc2822-addr, number, short-code]>
allow-content-adaptation: <value in [disable, enable]>
charset: <value in [us-ascii, utf-8]>
class: <value in [personal, advertisement, informational, ...]>
format: <value in [none, text, html, ...]>
from: <value of string>
from-sender: <value in [disable, enable]>
header: <value in [none, http, 8bit]>
image: <value of string>
message: <value of string>
msg-type: <value of string>
priority: <value in [low, normal, high, ...]>
rsp-status: <value in [success, partial-success, client-err, ...]>
smil-part: <value of string>
subject: <value of string>
mms:
-
buffer: <value of string>
charset: <value in [us-ascii, utf-8]>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
image: <value of string>
msg-type: <value of string>
nac-quar:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
name: <value of string>
nntp:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
spam:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
sslvpn:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
traffic-quota:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
utm:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
webproxy:
-
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
automation:
-
buffer: <value of string>
format: <value in [none, text, html]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface β no description fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_interface β no description
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_interface** dictionary | | the top level parameters set |
| | **dhcp-relay-agent-option** string | **Choices:*** disable
* enable
| no description |
| | **dhcp-relay-ip** string | | no description |
| | **dhcp-relay-service** string | **Choices:*** disable
* enable
| no description |
| | **dhcp-relay-type** string | **Choices:*** regular
* ipsec
| no description |
| | **ip** string | | no description |
| | **ipv6** dictionary | | no description |
| | | **autoconf** string | **Choices:*** disable
* enable
| no description |
| | | **cli-conn6-status** integer | | no description |
| | | **dhcp6-client-options** list / elements=string | **Choices:*** rapid
* iapd
* iana
* dns
* dnsname
| no description |
| | | **dhcp6-information-request** string | **Choices:*** disable
* enable
| no description |
| | | **dhcp6-prefix-delegation** string | **Choices:*** disable
* enable
| no description |
| | | **dhcp6-prefix-hint** string | | no description |
| | | **dhcp6-prefix-hint-plt** integer | | no description |
| | | **dhcp6-prefix-hint-vlt** integer | | no description |
| | | **dhcp6-relay-ip** string | | no description |
| | | **dhcp6-relay-service** string | **Choices:*** disable
* enable
| no description |
| | | **dhcp6-relay-type** string | **Choices:*** regular
| no description |
| | | **icmp6-send-redirect** string | **Choices:*** disable
* enable
| Enable/disable sending of ICMPv6 redirects. |
| | | **interface-identifier** string | | no description |
| | | **ip6-address** string | | no description |
| | | **ip6-allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* capwap
* fabric
| no description |
| | | **ip6-default-life** integer | | no description |
| | | **ip6-delegated-prefix-list** list / elements=string | | no description |
| | | | **autonomous-flag** string | **Choices:*** disable
* enable
| no description |
| | | | **onlink-flag** string | **Choices:*** disable
* enable
| no description |
| | | | **prefix-id** integer | | no description |
| | | | **rdnss** string | | no description |
| | | | **rdnss-service** string | **Choices:*** delegated
* default
* specify
| no description |
| | | | **subnet** string | | no description |
| | | | **upstream-interface** string | | no description |
| | | **ip6-dns-server-override** string | **Choices:*** disable
* enable
| no description |
| | | **ip6-extra-addr** list / elements=string | | no description |
| | | | **prefix** string | | no description |
| | | **ip6-hop-limit** integer | | no description |
| | | **ip6-link-mtu** integer | | no description |
| | | **ip6-manage-flag** string | **Choices:*** disable
* enable
| no description |
| | | **ip6-max-interval** integer | | no description |
| | | **ip6-min-interval** integer | | no description |
| | | **ip6-mode** string | **Choices:*** static
* dhcp
* pppoe
* delegated
| no description |
| | | **ip6-other-flag** string | **Choices:*** disable
* enable
| no description |
| | | **ip6-prefix-list** list / elements=string | | no description |
| | | | **autonomous-flag** string | **Choices:*** disable
* enable
| no description |
| | | | **dnssl** string | | no description |
| | | | **onlink-flag** string | **Choices:*** disable
* enable
| no description |
| | | | **preferred-life-time** integer | | no description |
| | | | **prefix** string | | no description |
| | | | **rdnss** string | | no description |
| | | | **valid-life-time** integer | | no description |
| | | **ip6-prefix-mode** string | **Choices:*** dhcp6
* ra
| Assigning a prefix from DHCP or RA. |
| | | **ip6-reachable-time** integer | | no description |
| | | **ip6-retrans-time** integer | | no description |
| | | **ip6-send-adv** string | **Choices:*** disable
* enable
| no description |
| | | **ip6-subnet** string | | no description |
| | | **ip6-upstream-interface** string | | no description |
| | | **nd-cert** string | | no description |
| | | **nd-cga-modifier** string | | no description |
| | | **nd-mode** string | **Choices:*** basic
* SEND-compatible
| no description |
| | | **nd-security-level** integer | | no description |
| | | **nd-timestamp-delta** integer | | no description |
| | | **nd-timestamp-fuzz** integer | | no description |
| | | **ra-send-mtu** string | **Choices:*** disable
* enable
| Enable/disable sending link MTU in RA packet. |
| | | **unique-autoconf-addr** string | **Choices:*** disable
* enable
| no description |
| | | **vrip6\_link\_local** string | | no description |
| | | **vrrp-virtual-mac6** string | **Choices:*** disable
* enable
| no description |
| | | **vrrp6** list / elements=string | | no description |
| | | | **accept-mode** string | **Choices:*** disable
* enable
| no description |
| | | | **adv-interval** integer | | no description |
| | | | **preempt** string | **Choices:*** disable
* enable
| no description |
| | | | **priority** integer | | no description |
| | | | **start-time** integer | | no description |
| | | | **status** string | **Choices:*** disable
* enable
| no description |
| | | | **vrdst6** string | | no description |
| | | | **vrgrp** integer | | no description |
| | | | **vrid** integer | | no description |
| | | | **vrip6** string | | no description |
| | **secondary-IP** string | **Choices:*** disable
* enable
| no description |
| | **secondaryip** list / elements=string | | no description |
| | | **allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
* dnp
* ftm
* fabric
| no description |
| | | **detectprotocol** list / elements=string | **Choices:*** ping
* tcp-echo
* udp-echo
| no description |
| | | **detectserver** string | | no description |
| | | **gwdetect** string | **Choices:*** disable
* enable
| no description |
| | | **ha-priority** integer | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **ping-serv-status** integer | | no description |
| | | **seq** integer | | no description |
| | **vlanid** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_fsp_vlan_dynamicmapping_interface:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
fsp_vlan_dynamicmapping_interface:
ip: <value of string>
vlanid: <value of integer>
dhcp-relay-agent-option: <value in [disable, enable]>
dhcp-relay-ip: <value of string>
dhcp-relay-service: <value in [disable, enable]>
dhcp-relay-type: <value in [regular, ipsec]>
ipv6:
autoconf: <value in [disable, enable]>
dhcp6-client-options:
- rapid
- iapd
- iana
- dns
- dnsname
dhcp6-information-request: <value in [disable, enable]>
dhcp6-prefix-delegation: <value in [disable, enable]>
dhcp6-prefix-hint: <value of string>
dhcp6-prefix-hint-plt: <value of integer>
dhcp6-prefix-hint-vlt: <value of integer>
dhcp6-relay-ip: <value of string>
dhcp6-relay-service: <value in [disable, enable]>
dhcp6-relay-type: <value in [regular]>
ip6-address: <value of string>
ip6-allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- capwap
- fabric
ip6-default-life: <value of integer>
ip6-delegated-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
onlink-flag: <value in [disable, enable]>
prefix-id: <value of integer>
rdnss: <value of string>
rdnss-service: <value in [delegated, default, specify]>
subnet: <value of string>
upstream-interface: <value of string>
ip6-dns-server-override: <value in [disable, enable]>
ip6-extra-addr:
-
prefix: <value of string>
ip6-hop-limit: <value of integer>
ip6-link-mtu: <value of integer>
ip6-manage-flag: <value in [disable, enable]>
ip6-max-interval: <value of integer>
ip6-min-interval: <value of integer>
ip6-mode: <value in [static, dhcp, pppoe, ...]>
ip6-other-flag: <value in [disable, enable]>
ip6-prefix-list:
-
autonomous-flag: <value in [disable, enable]>
dnssl: <value of string>
onlink-flag: <value in [disable, enable]>
preferred-life-time: <value of integer>
prefix: <value of string>
rdnss: <value of string>
valid-life-time: <value of integer>
ip6-reachable-time: <value of integer>
ip6-retrans-time: <value of integer>
ip6-send-adv: <value in [disable, enable]>
ip6-subnet: <value of string>
ip6-upstream-interface: <value of string>
nd-cert: <value of string>
nd-cga-modifier: <value of string>
nd-mode: <value in [basic, SEND-compatible]>
nd-security-level: <value of integer>
nd-timestamp-delta: <value of integer>
nd-timestamp-fuzz: <value of integer>
vrip6_link_local: <value of string>
vrrp-virtual-mac6: <value in [disable, enable]>
vrrp6:
-
accept-mode: <value in [disable, enable]>
adv-interval: <value of integer>
preempt: <value in [disable, enable]>
priority: <value of integer>
start-time: <value of integer>
status: <value in [disable, enable]>
vrdst6: <value of string>
vrgrp: <value of integer>
vrid: <value of integer>
vrip6: <value of string>
interface-identifier: <value of string>
unique-autoconf-addr: <value in [disable, enable]>
icmp6-send-redirect: <value in [disable, enable]>
cli-conn6-status: <value of integer>
ip6-prefix-mode: <value in [dhcp6, ra]>
ra-send-mtu: <value in [disable, enable]>
secondary-IP: <value in [disable, enable]>
secondaryip:
-
allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
- dnp
- ftm
- fabric
detectprotocol:
- ping
- tcp-echo
- udp-echo
detectserver: <value of string>
gwdetect: <value in [disable, enable]>
ha-priority: <value of integer>
id: <value of integer>
ip: <value of string>
ping-serv-status: <value of integer>
seq: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_dospolicy_anomaly β Anomaly name. fortinet.fortimanager.fmgr\_pkg\_firewall\_dospolicy\_anomaly β Anomaly name.
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_dospolicy_anomaly`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **DoS-policy** string / required | | the parameter (DoS-policy) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_dospolicy\_anomaly** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* block
* proxy
| Action taken when the threshold is reached. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging for this anomaly. |
| | **name** string | | Anomaly name. |
| | **quarantine** string | **Choices:*** none
* attacker
* both
* interface
| Quarantine method. |
| | **quarantine-expiry** string | | Duration of quarantine, from 1 minute to 364 days, 23 hours, and 59 minutes from now. (format: ###d##h##m, default = 5m). Requ... |
| | **quarantine-log** string | **Choices:*** disable
* enable
| Enable/disable quarantine logging. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of this anomaly sensor. |
| | **threshold** integer | | Number of detected instances per minute which triggers action (1 - 2147483647, default = 1000). Note that each anomaly has a d... |
| | **threshold(default)** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Anomaly name.
fmgr_pkg_firewall_dospolicy_anomaly:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
DoS-policy: <your own value>
state: <value in [present, absent]>
pkg_firewall_dospolicy_anomaly:
action: <value in [pass, block, proxy]>
log: <value in [disable, enable]>
name: <value of string>
quarantine: <value in [none, attacker, both, ...]>
quarantine-expiry: <value of string>
quarantine-log: <value in [disable, enable]>
status: <value in [disable, enable]>
threshold: <value of integer>
threshold(default): <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_user_tacacs_dynamicmapping β Configure TACACS+ server entries. fortinet.fortimanager.fmgr\_user\_tacacs\_dynamicmapping β Configure TACACS+ server entries.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_tacacs_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **tacacs+** string / required | | the parameter (tacacs+) in requested url |
| **user\_tacacs\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **authen-type** string | **Choices:*** auto
* ascii
* pap
* chap
* mschap
| no description |
| | **authorization** string | **Choices:*** disable
* enable
| no description |
| | **interface** string | | no description |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| no description |
| | **key** string | | no description |
| | **port** integer | | no description |
| | **secondary-key** string | | no description |
| | **secondary-server** string | | no description |
| | **server** string | | no description |
| | **source-ip** string | | no description |
| | **tertiary-key** string | | no description |
| | **tertiary-server** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure TACACS+ server entries.
fmgr_user_tacacs_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
tacacs+: <your own value>
state: <value in [present, absent]>
user_tacacs_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
authen-type: <value in [auto, ascii, pap, ...]>
authorization: <value in [disable, enable]>
key: <value of string>
port: <value of integer>
secondary-key: <value of string>
secondary-server: <value of string>
server: <value of string>
source-ip: <value of string>
tertiary-key: <value of string>
tertiary-server: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_blockallowlist_entries β Anti-spam block/allow entries. fortinet.fortimanager.fmgr\_emailfilter\_blockallowlist\_entries β Anti-spam block/allow entries.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_blockallowlist_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **block-allow-list** string / required | | the parameter (block-allow-list) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_blockallowlist\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** spam
* clear
* reject
| Reject, mark as spam or good email. |
| | **addr-type** string | **Choices:*** ipv4
* ipv6
| IP address type. |
| | **email-pattern** string | | Email address pattern. |
| | **id** integer | | Entry ID. |
| | **ip4-subnet** string | | IPv4 network address/subnet mask bits. |
| | **ip6-subnet** string | | IPv6 network address/subnet mask bits. |
| | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **type** string | **Choices:*** ip
* email
| Entry type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Anti-spam block/allow entries.
fmgr_emailfilter_blockallowlist_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
block-allow-list: <your own value>
state: <value in [present, absent]>
emailfilter_blockallowlist_entries:
action: <value in [spam, clear, reject]>
addr-type: <value in [ipv4, ipv6]>
email-pattern: <value of string>
id: <value of integer>
ip4-subnet: <value of string>
ip6-subnet: <value of string>
pattern-type: <value in [wildcard, regexp]>
status: <value in [disable, enable]>
type: <value in [ip, email]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_mailsignature β Configure Mail signature. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_mailsignature β Configure Mail signature.
=======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_mailsignature`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_mailsignature** dictionary | | the top level parameters set |
| | **signature** string | | Email signature to be added to outgoing email (if the signature contains spaces, enclose with quotation marks). |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable adding an email signature to SMTP email messages as they pass through the FortiGate. |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Mail signature.
fmgr_firewall_profileprotocoloptions_mailsignature:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_mailsignature:
signature: <value of string>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_icap_profile_respmodforwardrules β ICAP response mode forward rules. fortinet.fortimanager.fmgr\_icap\_profile\_respmodforwardrules β ICAP response mode forward rules.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_icap_profile_respmodforwardrules`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **icap\_profile\_respmodforwardrules** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** bypass
* forward
| Action to be taken for ICAP server. |
| | **header-group** list / elements=string | | no description |
| | | **case-sensitivity** string | **Choices:*** disable
* enable
| Enable/disable case sensitivity when matching header. |
| | | **header** string | | HTTP header regular expression. |
| | | **header-name** string | | HTTP header. |
| | | **id** integer | | ID. |
| | **host** string | | Address object for the host. |
| | **http-resp-status-code** integer | | no description |
| | **name** string | | Address name. |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: ICAP response mode forward rules.
fmgr_icap_profile_respmodforwardrules:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
icap_profile_respmodforwardrules:
action: <value in [bypass, forward]>
header-group:
-
case-sensitivity: <value in [disable, enable]>
header: <value of string>
header-name: <value of string>
id: <value of integer>
host: <value of string>
http-resp-status-code: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_hotspot20_anqpnairealm_nailist_eapmethod_authparam β EAP auth param. fortinet.fortimanager.fmgr\_hotspot20\_anqpnairealm\_nailist\_eapmethod\_authparam β EAP auth param.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqpnairealm_nailist_eapmethod_authparam`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **anqp-nai-realm** string / required | | the parameter (anqp-nai-realm) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **eap-method** string / required | | the parameter (eap-method) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqpnairealm\_nailist\_eapmethod\_authparam** dictionary | | the top level parameters set |
| | **id** string | **Choices:*** non-eap-inner-auth
* inner-auth-eap
* credential
* tunneled-credential
| ID of authentication parameter. |
| | **index** integer | | Param index. |
| | **val** string | **Choices:*** eap-identity
* eap-md5
* eap-tls
* eap-ttls
* eap-peap
* eap-sim
* eap-aka
* eap-aka-prime
* non-eap-pap
* non-eap-chap
* non-eap-mschap
* non-eap-mschapv2
* cred-sim
* cred-usim
* cred-nfc
* cred-hardware-token
* cred-softoken
* cred-certificate
* cred-user-pwd
* cred-none
* cred-vendor-specific
* tun-cred-sim
* tun-cred-usim
* tun-cred-nfc
* tun-cred-hardware-token
* tun-cred-softoken
* tun-cred-certificate
* tun-cred-user-pwd
* tun-cred-anonymous
* tun-cred-vendor-specific
| Value of authentication parameter. |
| **nai-list** string / required | | the parameter (nai-list) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: EAP auth param.
fmgr_hotspot20_anqpnairealm_nailist_eapmethod_authparam:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
anqp-nai-realm: <your own value>
nai-list: <your own value>
eap-method: <your own value>
state: <value in [present, absent]>
hotspot20_anqpnairealm_nailist_eapmethod_authparam:
id: <value in [non-eap-inner-auth, inner-auth-eap, credential, ...]>
index: <value of integer>
val: <value in [eap-identity, eap-md5, eap-tls, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_autodelete_quarantinefilesautodeletion β Automatic deletion policy for quarantined files. fortinet.fortimanager.fmgr\_system\_autodelete\_quarantinefilesautodeletion β Automatic deletion policy for quarantined files.
==============================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_autodelete_quarantinefilesautodeletion`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_autodelete\_quarantinefilesautodeletion** dictionary | | the top level parameters set |
| | **retention** string | **Choices:*** **days** β
* weeks
* months
| Automatic deletion in days, weeks, or months. days - Auto-delete data older than <value> days. weeks - Auto-delete data older than <value> weeks. months - Auto-delete data older than <value> months. |
| | **runat** integer | **Default:**0 | Automatic deletion run at (0 - 23) oclock. |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable automatic deletion. disable - Disable automatic deletion. enable - Enable automatic deletion. |
| | **value** integer | **Default:**0 | Automatic deletion in x days, weeks, or months. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Automatic deletion policy for quarantined files.
fmgr_system_autodelete_quarantinefilesautodeletion:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_autodelete_quarantinefilesautodeletion:
retention: <value in [days, weeks, months]>
runat: <value of integer>
status: <value in [disable, enable]>
value: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpsysinfo β Configuration method to edit Simple Network Management Protocol fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_snmpsysinfo β Configuration method to edit Simple Network Management Protocol
==========================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpsysinfo`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_snmpsysinfo** dictionary | | the top level parameters set |
| | **contact-info** string | | Contact information. |
| | **description** string | | System description. |
| | **engine-id** string | | Local SNMP engine ID string (max 24 char). |
| | **location** string | | System location. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable SNMP. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit Simple Network Management Protocol
fmgr_switchcontroller_managedswitch_snmpsysinfo:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
switchcontroller_managedswitch_snmpsysinfo:
contact-info: <value of string>
description: <value of string>
engine-id: <value of string>
location: <value of string>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_cifs_profile β Configure CIFS profile. fortinet.fortimanager.fmgr\_cifs\_profile β Configure CIFS profile.
===================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_cifs_profile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **cifs\_profile** dictionary | | the top level parameters set |
| | **domain-controller** string | | Domain for which to decrypt CIFS traffic. |
| | **name** string | | Profile name. |
| | **server-credential-type** string | **Choices:*** none
* credential-replication
* credential-keytab
| CIFS server credential type. |
| | **server-keytab** list / elements=string | | no description |
| | | **keytab** string | | Base64 encoded keytab file containing credential of the server. |
| | | **password** string | | no description |
| | | **principal** string | | Service principal. For example, "host/[email protected]". |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure CIFS profile.
fmgr_cifs_profile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
cifs_profile:
domain-controller: <value of string>
name: <value of string>
server-credential-type: <value in [none, credential-replication, credential-keytab]>
server-keytab:
-
keytab: <value of string>
principal: <value of string>
password: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_fmupdate_fdssetting β Configure FortiGuard settings. fortinet.fortimanager.fmgr\_fmupdate\_fdssetting β Configure FortiGuard settings.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_fdssetting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_fdssetting** dictionary | | the top level parameters set |
| | **fds-clt-ssl-protocol** string | **Choices:*** sslv3
* tlsv1.0
* tlsv1.1
* **tlsv1.2** β
* tlsv1.3
| The SSL protocols version for connecting fds server (default = tlsv1.2). sslv3 - set SSLv3 as the client version. tlsv1.0 - set TLSv1.0 as the client version. tlsv1.1 - set TLSv1.1 as the client version. tlsv1.2 - set TLSv1.2 as the client version (default). |
| | **fds-ssl-protocol** string | **Choices:*** sslv3
* tlsv1.0
* tlsv1.1
* **tlsv1.2** β
* tlsv1.3
| The SSL protocols version for receiving fgt connection (default = tlsv1.2). sslv3 - set SSLv3 as the lowest version. tlsv1.0 - set TLSv1.0 as the lowest version. tlsv1.1 - set TLSv1.1 as the lowest version. tlsv1.2 - set TLSv1.2 as the lowest version (default). |
| | **fmtr-log** string | **Choices:*** emergency
* alert
* critical
* error
* warn
* notice
* **info** β
* debug
* disable
| fmtr log level emergency - Log level - emergency alert - Log level - alert critical - Log level - critical error - Log level - error warn - Log level - warn notice - Log level - notice info - Log level - info debug - Log level - debug disable - Disable linkd log |
| | **fortiguard-anycast** string | **Choices:*** **disable** β
* enable
| Enable/disable use of FortiGuards anycast network disable - Disable setting. enable - Enable setting. |
| | **fortiguard-anycast-source** string | **Choices:*** **fortinet** β
* aws
| Configure which of Fortinets servers to provide FortiGuard services in FortiGuards anycast network. Default is Fortinet fortinet - Use Fortinets servers to provide FortiGuard services in FortiGuards anycast network. aws - Use Fortinets AWS servers to provide FortiGuard services in FortiGuards anycast network. |
| | **linkd-log** string | **Choices:*** emergency
* alert
* critical
* error
* warn
* notice
* **info** β
* debug
* disable
| The linkd log level (default = info). emergency - Log level - emergency alert - Log level - alert critical - Log level - critical error - Log level - error warn - Log level - warn notice - Log level - notice info - Log level - info debug - Log level - debug disable - Disable linkd log |
| | **max-av-ips-version** integer | **Default:**20 | The maximum number of downloadable, full version AV/IPS packages (1 - 1000, default = 20). |
| | **max-work** integer | **Default:**1 | The maximum number of worker processing download requests (1 - 32, default = 1). |
| | **push-override** dictionary | | no description |
| | | **ip** string | **Default:**"0.0.0.0" | External or virtual IP address of the NAT device that will forward push messages to the FortiManager unit. |
| | | **port** integer | **Default:**9443 | Receiving port number on the NAT device (1 - 65535, default = 9443). |
| | | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable push updates for clients (default = disable). disable - Disable setting. enable - Enable setting. |
| | **push-override-to-client** dictionary | | no description |
| | | **announce-ip** list / elements=string | | no description |
| | | | **id** integer | **Default:**0 | ID of the announce IP address (1 - 10). |
| | | | **ip** string | **Default:**"0.0.0.0" | Announce IPv4 address. |
| | | | **port** integer | **Default:**8890 | Announce IP port (1 - 65535, default = 8890). |
| | | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable push updates (default = disable). disable - Disable setting. enable - Enable setting. |
| | **send\_report** string | **Choices:*** disable
* **enable** β
| send report/fssi to fds server. disable - Disable setting. enable - Enable setting. |
| | **send\_setup** string | **Choices:*** **disable** β
* enable
| forward setup to fds server. disable - Disable setting. enable - Enable setting. |
| | **server-override** dictionary | | no description |
| | | **servlist** list / elements=string | | no description |
| | | | **id** integer | **Default:**0 | Override server ID (1 - 10). |
| | | | **ip** string | **Default:**"0.0.0.0" | IPv4 address of the override server. |
| | | | **ip6** string | **Default:**"::" | IPv6 address of the override server. |
| | | | **port** integer | **Default:**443 | Port number to use when contacting FortiGuard (1 - 65535, default = 443). |
| | | | **service-type** list / elements=string | **Choices:*** fds
* fct
| no description |
| | | **status** string | **Choices:*** **disable** β
* enable
| Override status. disable - Disable setting. enable - Enable setting. |
| | **system-support-fct** list / elements=string | **Choices:*** 4.x
* 5.0
* 5.2
* 5.4
* 5.6
* 6.0
* 6.2
* 6.4
| no description |
| | **system-support-fgt** list / elements=string | **Choices:*** 5.4
* 5.6
* 6.0
* 6.2
* 6.4
* 7.0
| no description |
| | **system-support-fml** list / elements=string | **Choices:*** 4.x
* 5.x
* 6.x
| no description |
| | **system-support-fsa** list / elements=string | **Choices:*** 1.x
* 2.x
* 3.x
* 4.x
| no description |
| | **system-support-fsw** list / elements=string | **Choices:*** 5.4
* 5.6
* 6.0
* 6.2
* 4.x
* 5.0
* 5.2
* 6.4
| no description |
| | **umsvc-log** string | **Choices:*** emergency
* alert
* critical
* error
* warn
* notice
* **info** β
* debug
* disable
| The um\_service log level (default = info). emergency - Log level - emergency alert - Log level - alert critical - Log level - critical error - Log level - error warn - Log level - warn notice - Log level - notice info - Log level - info debug - Log level - debug disable - Disable linkd log |
| | **unreg-dev-option** string | **Choices:*** ignore
* svc-only
* **add-service** β
| set the option for unregister devices ignore - Ignore all unregistered devices. svc-only - Allow update requests without adding the device. add-service - Add unregistered devices and allow update request. |
| | **update-schedule** dictionary | | no description |
| | | **day** string | **Choices:*** Sunday
* **Monday** β
* Tuesday
* Wednesday
* Thursday
* Friday
* Saturday
| Configure the day the update will occur, if the freqnecy is weekly (Sunday - Saturday, default = Monday). Sunday - Update every Sunday. Monday - Update every Monday. Tuesday - Update every Tuesday. Wednesday - Update every Wednesday. Thursday - Update every Thursday. Friday - Update every Friday. Saturday - Update every Saturday. |
| | | **frequency** string | **Choices:*** **every** β
* daily
* weekly
| Configure update frequency: every - time interval, daily - once a day, weekly - once a week (default = every). every - Time interval. daily - Every day. weekly - Every week. |
| | | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable scheduled updates. disable - Disable setting. enable - Enable setting. |
| | | **time** string | | no description |
| | **User-Agent** string | **Default:**"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)" | Configure the user agent string. |
| | **wanip-query-mode** string | **Choices:*** **disable** β
* ipify
| public ip query mode disable - Do not query public ip ipify - Get public IP through https://api.ipify.org |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiGuard settings.
fmgr_fmupdate_fdssetting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_fdssetting:
User-Agent: <value of string>
fds-clt-ssl-protocol: <value in [sslv3, tlsv1.0, tlsv1.1, ...]>
fds-ssl-protocol: <value in [sslv3, tlsv1.0, tlsv1.1, ...]>
fmtr-log: <value in [emergency, alert, critical, ...]>
linkd-log: <value in [emergency, alert, critical, ...]>
max-av-ips-version: <value of integer>
max-work: <value of integer>
push-override:
ip: <value of string>
port: <value of integer>
status: <value in [disable, enable]>
push-override-to-client:
announce-ip:
-
id: <value of integer>
ip: <value of string>
port: <value of integer>
status: <value in [disable, enable]>
send_report: <value in [disable, enable]>
send_setup: <value in [disable, enable]>
server-override:
servlist:
-
id: <value of integer>
ip: <value of string>
ip6: <value of string>
port: <value of integer>
service-type:
- fds
- fct
status: <value in [disable, enable]>
system-support-fct:
- 4.x
- 5.0
- 5.2
- 5.4
- 5.6
- 6.0
- 6.2
- 6.4
system-support-fgt:
- 5.4
- 5.6
- 6.0
- 6.2
- 6.4
- 7.0
system-support-fml:
- 4.x
- 5.x
- 6.x
system-support-fsa:
- 1.x
- 2.x
- 3.x
- 4.x
system-support-fsw:
- 5.4
- 5.6
- 6.0
- 6.2
- 4.x
- 5.0
- 5.2
- 6.4
umsvc-log: <value in [emergency, alert, critical, ...]>
unreg-dev-option: <value in [ignore, svc-only, add-service]>
update-schedule:
day: <value in [Sunday, Monday, Tuesday, ...]>
frequency: <value in [every, daily, weekly]>
status: <value in [disable, enable]>
time: <value of string>
wanip-query-mode: <value in [disable, ipify]>
fortiguard-anycast: <value in [disable, enable]>
fortiguard-anycast-source: <value in [fortinet, aws]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_imap β IMAP. fortinet.fortimanager.fmgr\_emailfilter\_profile\_imap β IMAP.
==============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_imap`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_imap** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* tag
| Action for spam email. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **tag-msg** string | | Subject text or header added to spam email. |
| | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IMAP.
fmgr_emailfilter_profile_imap:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_imap:
action: <value in [pass, tag]>
log: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
log-all: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_devprof_pkg β no description fortinet.fortimanager.fmgr\_pm\_devprof\_pkg β no description
=============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_devprof_pkg`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg\_path** string / required | | the parameter (pkg\_path) in requested url |
| **pm\_devprof\_pkg** dictionary | | the top level parameters set |
| | **description** string | | no description |
| | **enabled options** list / elements=string | **Choices:*** none
* dns
* ntp
* email
* admin
* snmp
* repmsg
* ftgd
* log
| no description |
| | **name** string | | no description |
| | **oid** integer | | no description |
| | **scope member** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **type** string | **Choices:*** devprof
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pm_devprof_pkg:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg_path: <your own value>
state: <value in [present, absent]>
pm_devprof_pkg:
description: <value of string>
enabled options:
- none
- dns
- ntp
- email
- admin
- snmp
- repmsg
- ftgd
- log
name: <value of string>
oid: <value of integer>
scope member:
-
name: <value of string>
vdom: <value of string>
type: <value in [devprof]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pkg_firewall_multicastpolicy β Configure multicast NAT policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_multicastpolicy β Configure multicast NAT policies.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_multicastpolicy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_multicastpolicy** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
| Accept or deny traffic matching the policy. |
| | **auto-asic-offload** string | **Choices:*** disable
* enable
| Enable/disable offloading policy traffic for hardware acceleration. |
| | **comments** string | | Comment. |
| | **dnat** string | | IPv4 DNAT address used for multicast destination addresses. |
| | **dstaddr** string | | Destination address objects. |
| | **dstintf** string | | Destination interface name. |
| | **end-port** integer | | Integer value for ending TCP/UDP/SCTP destination port in range (1 - 65535, default = 1). |
| | **id** integer | | Policy ID. |
| | **logtraffic** string | **Choices:*** disable
* enable
| Enable/disable logging traffic accepted by this policy. |
| | **name** string | | Policy name. |
| | **protocol** integer | | Integer value for the protocol type as defined by IANA (0 - 255, default = 0). |
| | **snat** string | **Choices:*** disable
* enable
| Enable/disable substitution of the outgoing interface IP address for the original source IP address (called source NAT or SNAT). |
| | **snat-ip** string | | IPv4 address to be used as the source address for NATed traffic. |
| | **srcaddr** string | | Source address objects. |
| | **srcintf** string | | Source interface name. |
| | **start-port** integer | | Integer value for starting TCP/UDP/SCTP destination port in range (1 - 65535, default = 1). |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this policy. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure multicast NAT policies.
fmgr_pkg_firewall_multicastpolicy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_firewall_multicastpolicy:
action: <value in [deny, accept]>
auto-asic-offload: <value in [disable, enable]>
dnat: <value of string>
dstaddr: <value of string>
dstintf: <value of string>
end-port: <value of integer>
id: <value of integer>
logtraffic: <value in [disable, enable]>
protocol: <value of integer>
snat: <value in [disable, enable]>
snat-ip: <value of string>
srcaddr: <value of string>
srcintf: <value of string>
start-port: <value of integer>
status: <value in [disable, enable]>
comments: <value of string>
uuid: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_interface_secondaryip β Second IP address of interface. fortinet.fortimanager.fmgr\_fsp\_vlan\_interface\_secondaryip β Second IP address of interface.
===============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_interface_secondaryip`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_interface\_secondaryip** dictionary | | the top level parameters set |
| | **allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
* dnp
* ftm
* fabric
| no description |
| | **detectprotocol** list / elements=string | **Choices:*** ping
* tcp-echo
* udp-echo
| no description |
| | **detectserver** string | | no description |
| | **gwdetect** string | **Choices:*** disable
* enable
| no description |
| | **ha-priority** integer | | no description |
| | **id** integer | | no description |
| | **ip** string | | no description |
| | **ping-serv-status** integer | | no description |
| | **seq** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Second IP address of interface.
fmgr_fsp_vlan_interface_secondaryip:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
state: <value in [present, absent]>
fsp_vlan_interface_secondaryip:
allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
- dnp
- ftm
- fabric
detectprotocol:
- ping
- tcp-echo
- udp-echo
detectserver: <value of string>
gwdetect: <value in [disable, enable]>
ha-priority: <value of integer>
id: <value of integer>
ip: <value of string>
ping-serv-status: <value of integer>
seq: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnsslweb_portal_oschecklist β SSL VPN OS checks. fortinet.fortimanager.fmgr\_vpnsslweb\_portal\_oschecklist β SSL VPN OS checks.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnsslweb_portal_oschecklist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **portal** string / required | | the parameter (portal) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnsslweb\_portal\_oschecklist** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* check-up-to-date
* deny
| OS check options. |
| | **latest-patch-level** string | | Latest OS patch level. |
| | **name** string | | Name. |
| | **tolerance** integer | | OS patch level tolerance. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL VPN OS checks.
fmgr_vpnsslweb_portal_oschecklist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
portal: <your own value>
vpnsslweb_portal_oschecklist:
action: <value in [allow, check-up-to-date, deny]>
latest-patch-level: <value of string>
name: <value of string>
tolerance: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_videofilter_profile β Configure VideoFilter profile. fortinet.fortimanager.fmgr\_videofilter\_profile β Configure VideoFilter profile.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_videofilter_profile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **videofilter\_profile** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **dailymotion** string | **Choices:*** disable
* enable
| Enable/disable Dailymotion video source. |
| | **fortiguard-category** dictionary | | no description |
| | | **filters** list / elements=string | | no description |
| | | | **action** string | **Choices:*** block
* bypass
* monitor
| VideoFilter action. |
| | | | **category-id** integer | | Category ID. |
| | | | **id** integer | | ID. |
| | | | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **name** string | | Name. |
| | **vimeo** string | **Choices:*** disable
* enable
| Enable/disable Vimeo video source. |
| | **vimeo-restrict** string | | Set Vimeo-restrict ("7" = dont show mature content, "134" = dont show unrated and mature content). A value of cookie "content\_... |
| | **youtube** string | **Choices:*** disable
* enable
| Enable/disable YouTube video source. |
| | **youtube-channel-filter** string | | Set YouTube channel filter. |
| | **youtube-restrict** string | **Choices:*** strict
* none
* moderate
| Set YouTube-restrict mode. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure VideoFilter profile.
fmgr_videofilter_profile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
videofilter_profile:
comment: <value of string>
dailymotion: <value in [disable, enable]>
fortiguard-category:
filters:
-
action: <value in [block, bypass, monitor]>
category-id: <value of integer>
id: <value of integer>
log: <value in [disable, enable]>
name: <value of string>
vimeo: <value in [disable, enable]>
vimeo-restrict: <value of string>
youtube: <value in [disable, enable]>
youtube-channel-filter: <value of string>
youtube-restrict: <value in [strict, none, moderate]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_alertevent β Alert events. fortinet.fortimanager.fmgr\_system\_alertevent β Alert events.
==============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_alertevent`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_alertevent** dictionary | | the top level parameters set |
| | **alert-destination** list / elements=string | | no description |
| | | **from** string | | Sender email address to use in alert emails. |
| | | **smtp-name** string | | SMTP server name. |
| | | **snmp-name** string | | SNMP trap name. |
| | | **syslog-name** string | | Syslog server name. |
| | | **to** string | | Recipient email address to use in alert emails. |
| | | **type** string | **Choices:*** **mail** β
* snmp
* syslog
| Destination type. mail - Send email alert. snmp - Send SNMP trap. syslog - Send syslog message. |
| | **enable-generic-text** list / elements=string | **Choices:*** enable
* disable
| no description |
| | **enable-severity-filter** list / elements=string | **Choices:*** enable
* disable
| no description |
| | **event-time-period** string | **Choices:*** **0.5** β
* 1
* 3
* 6
* 12
* 24
* 72
* 168
| Time period (hours). 0.5 - 30 minutes. 1 - 1 hour. 3 - 3 hours. 6 - 6 hours. 12 - 12 hours. 24 - 1 day. 72 - 3 days. 168 - 1 week. |
| | **generic-text** string | | Text that must be contained in a log to trigger alert. |
| | **name** string | | Alert name. |
| | **num-events** string | **Choices:*** **1** β
* 5
* 10
* 50
* 100
| Minimum number of events required within time period. 1 - 1 event. 5 - 5 events. 10 - 10 events. 50 - 50 events. 100 - 100 events. |
| | **severity-filter** string | **Choices:*** **high** β
* medium-high
* medium
* medium-low
* low
| Required log severity to trigger alert. high - High level alert. medium-high - Medium-high level alert. medium - Medium level alert. medium-low - Medium-low level alert. low - Low level alert. |
| | **severity-level-comp** list / elements=string | **Choices:*** >=
* =
* <=
| no description |
| | **severity-level-logs** list / elements=string | **Choices:*** no-check
* information
* notify
* warning
* error
* critical
* alert
* emergency
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Alert events.
fmgr_system_alertevent:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_alertevent:
alert-destination:
-
from: <value of string>
smtp-name: <value of string>
snmp-name: <value of string>
syslog-name: <value of string>
to: <value of string>
type: <value in [mail, snmp, syslog]>
enable-generic-text:
- enable
- disable
enable-severity-filter:
- enable
- disable
event-time-period: <value in [0.5, 1, 3, ...]>
generic-text: <value of string>
name: <value of string>
num-events: <value in [1, 5, 10, ...]>
severity-filter: <value in [high, medium-high, medium, ...]>
severity-level-comp:
- '>='
- '='
- '<='
severity-level-logs:
- no-check
- information
- notify
- warning
- error
- critical
- alert
- emergency
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_vip46_dynamicmapping β Configure IPv4 to IPv6 virtual IPs. fortinet.fortimanager.fmgr\_firewall\_vip46\_dynamicmapping β Configure IPv4 to IPv6 virtual IPs.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip46_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip46\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **arp-reply** string | **Choices:*** disable
* enable
| no description |
| | **color** integer | | no description |
| | **comment** string | | no description |
| | **extip** string | | no description |
| | **extport** string | | no description |
| | **id** integer | | no description |
| | **ldb-method** string | **Choices:*** static
* round-robin
* weighted
* least-session
* least-rtt
* first-alive
| no description |
| | **mappedip** string | | no description |
| | **mappedport** string | | no description |
| | **monitor** string | | no description |
| | **portforward** string | **Choices:*** disable
* enable
| no description |
| | **protocol** string | **Choices:*** tcp
* udp
| no description |
| | **server-type** string | **Choices:*** http
* tcp
* udp
* ip
| no description |
| | **src-filter** string | | no description |
| | **srcintf-filter** string | | Interfaces to which the VIP46 applies. Separate the names with spaces. |
| | **type** string | **Choices:*** static-nat
* server-load-balance
| no description |
| | **uuid** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip46** string / required | | the parameter (vip46) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 to IPv6 virtual IPs.
fmgr_firewall_vip46_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip46: <your own value>
state: <value in [present, absent]>
firewall_vip46_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
arp-reply: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
extip: <value of string>
extport: <value of string>
id: <value of integer>
ldb-method: <value in [static, round-robin, weighted, ...]>
mappedip: <value of string>
mappedport: <value of string>
monitor: <value of string>
portforward: <value in [disable, enable]>
protocol: <value in [tcp, udp]>
server-type: <value in [http, tcp, udp, ...]>
src-filter: <value of string>
type: <value in [static-nat, server-load-balance]>
uuid: <value of string>
srcintf-filter: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_ippool6 β Configure IPv6 IP pools. fortinet.fortimanager.fmgr\_firewall\_ippool6 β Configure IPv6 IP pools.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_ippool6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_ippool6** dictionary | | the top level parameters set |
| | **comments** string | | Comment. |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **comments** string | | no description |
| | | **endip** string | | no description |
| | | **startip** string | | no description |
| | **endip** string | | Final IPv6 address (inclusive) in the range for the address pool (format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, Default: ::). |
| | **name** string | | IPv6 IP pool name. |
| | **startip** string | | First IPv6 address (inclusive) in the range for the address pool (format xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, Default: ::). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 IP pools.
fmgr_firewall_ippool6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_ippool6:
comments: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
comments: <value of string>
endip: <value of string>
startip: <value of string>
endip: <value of string>
name: <value of string>
startip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_cifs_profile_filefilter_entries β File filter entries. fortinet.fortimanager.fmgr\_cifs\_profile\_filefilter\_entries β File filter entries.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_cifs_profile_filefilter_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **cifs\_profile\_filefilter\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** block
* log
| Action taken for matched file. |
| | **comment** string | | Comment. |
| | **direction** string | **Choices:*** incoming
* outgoing
* any
| Match files transmitted in the sessions originating or reply direction. |
| | **file-type** string | | no description |
| | **filter** string | | Add a file filter. |
| | **protocol** list / elements=string | **Choices:*** cifs
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: File filter entries.
fmgr_cifs_profile_filefilter_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
cifs_profile_filefilter_entries:
action: <value in [block, log]>
comment: <value of string>
direction: <value in [incoming, outgoing, any]>
file-type: <value of string>
filter: <value of string>
protocol:
- cifs
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_application_list_entries_parameters_members β Parameter tuple members. fortinet.fortimanager.fmgr\_application\_list\_entries\_parameters\_members β Parameter tuple members.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_application_list_entries_parameters_members`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **application\_list\_entries\_parameters\_members** dictionary | | the top level parameters set |
| | **id** integer | | Parameter. |
| | **name** string | | Parameter name. |
| | **value** string | | Parameter value. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **entries** string / required | | the parameter (entries) in requested url |
| **list** string / required | | the parameter (list) in requested url |
| **parameters** string / required | | the parameter (parameters) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Parameter tuple members.
fmgr_application_list_entries_parameters_members:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
list: <your own value>
entries: <your own value>
parameters: <your own value>
state: <value in [present, absent]>
application_list_entries_parameters_members:
id: <value of integer>
name: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_alertconsole β Alert console. fortinet.fortimanager.fmgr\_system\_alertconsole β Alert console.
=================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_alertconsole`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_alertconsole** dictionary | | the top level parameters set |
| | **period** string | **Choices:*** 1
* 2
* 3
* 4
* 5
* 6
* **7** β
| Alert console keeps alerts for this period. 1 - 1 day. 2 - 2 days. 3 - 3 days. 4 - 4 days. 5 - 5 days. 6 - 6 days. 7 - 7 days. |
| | **severity-level** list / elements=string | **Choices:*** debug
* information
* notify
* warning
* error
* critical
* alert
* emergency
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Alert console.
fmgr_system_alertconsole:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_alertconsole:
period: <value in [1, 2, 3, ...]>
severity-level:
- debug
- information
- notify
- warning
- error
- critical
- alert
- emergency
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_iptrust_entries β Spam filter trusted IP addresses. fortinet.fortimanager.fmgr\_emailfilter\_iptrust\_entries β Spam filter trusted IP addresses.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_iptrust_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_iptrust\_entries** dictionary | | the top level parameters set |
| | **addr-type** string | **Choices:*** ipv4
* ipv6
| Type of address. |
| | **id** integer | | Trusted IP entry ID. |
| | **ip4-subnet** string | | IPv4 network address or network address/subnet mask bits. |
| | **ip6-subnet** string | | IPv6 network address/subnet mask bits. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **iptrust** string / required | | the parameter (iptrust) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Spam filter trusted IP addresses.
fmgr_emailfilter_iptrust_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
iptrust: <your own value>
state: <value in [present, absent]>
emailfilter_iptrust_entries:
addr-type: <value in [ipv4, ipv6]>
id: <value of integer>
ip4-subnet: <value of string>
ip6-subnet: <value of string>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_device_replace_sn β Replace devices serial number with new value. fortinet.fortimanager.fmgr\_dvmdb\_device\_replace\_sn β Replace devices serial number with new value.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_device_replace_sn`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device\_name** string / required | | the parameter (device\_name) in requested url |
| **dvmdb\_device\_replace\_sn** dictionary | | the top level parameters set |
| | **sn** string | | New serial number. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replace devices serial number with new value.
fmgr_dvmdb_device_replace_sn:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
device_name: <your own value>
dvmdb_device_replace_sn:
sn: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_webspam_fgdsetting β Configure the FortiGuard run parameters. fortinet.fortimanager.fmgr\_fmupdate\_webspam\_fgdsetting β Configure the FortiGuard run parameters.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_webspam_fgdsetting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_webspam\_fgdsetting** dictionary | | the top level parameters set |
| | **as-cache** integer | **Default:**300 | Antispam service maximum memory usage in megabytes (Maximum = Physical memory-1024, 0: no limit, default = 300). |
| | **as-log** string | **Choices:*** disable
* **nospam** β
* all
| Antispam log setting (default = nospam). disable - Disable spam log. nospam - Log non-spam events. all - Log all spam lookups. |
| | **as-preload** string | **Choices:*** **disable** β
* enable
| Enable/disable preloading antispam database to memory (default = disable). disable - Disable antispam database preload. enable - Enable antispam database preload. |
| | **av-cache** integer | **Default:**300 | Antivirus service maximum memory usage, in megabytes (100 - 500, default = 300). |
| | **av-log** string | **Choices:*** disable
* **novirus** β
* all
| Antivirus log setting (default = novirus). disable - Disable virus log. novirus - Log non-virus events. all - Log all virus lookups. |
| | **av-preload** string | **Choices:*** **disable** β
* enable
| Enable/disable preloading antivirus database to memory (default = disable). disable - Disable antivirus database preload. enable - Enable antivirus database preload. |
| | **av2-cache** integer | **Default:**800 | Antispam service maximum memory usage in megabytes (Maximum = Physical memory-1024, 0: no limit, default = 800). |
| | **av2-log** string | **Choices:*** disable
* **noav2** β
* all
| Outbreak prevention log setting (default = noav2). disable - Disable av2 log. noav2 - Log non-av2 events. all - Log all av2 lookups. |
| | **av2-preload** string | **Choices:*** **disable** β
* enable
| Enable/disable preloading outbreak prevention database to memory (default = disable). disable - Disable outbreak prevention database preload. enable - Enable outbreak prevention database preload. |
| | **eventlog-query** string | **Choices:*** **disable** β
* enable
| Enable/disable record query to event-log besides fgd-log (default = disable). disable - Record query to event-log besides fgd-log. enable - Do not log to event-log. |
| | **fgd-pull-interval** integer | **Default:**10 | Fgd pull interval setting, in minutes (1 - 1440, default = 10). |
| | **fq-cache** integer | **Default:**300 | File query service maximum memory usage, in megabytes (100 - 500, default = 300). |
| | **fq-log** string | **Choices:*** disable
* **nofilequery** β
* all
| File query log setting (default = nofilequery). disable - Disable file query log. nofilequery - Log non-file query events. all - Log all file query events. |
| | **fq-preload** string | **Choices:*** **disable** β
* enable
| Enable/disable preloading file query database to memory (default = disable). disable - Disable file query db preload. enable - Enable file query db preload. |
| | **linkd-log** string | **Choices:*** emergency
* alert
* critical
* error
* warn
* notice
* info
* **debug** β
* disable
| Linkd log setting (default = debug). emergency - The unit is unusable. alert - Immediate action is required critical - Functionality is affected. error - Functionality is probably affected. warn - Functionality might be affected. notice - Information about normal events. info - General information. debug - Debug information. disable - Linkd logging is disabled. |
| | **max-client-worker** integer | **Default:**0 | max worker for tcp client connection (0~16: 0 means use cpu number up to 4). |
| | **max-log-quota** integer | **Default:**6144 | Maximum log quota setting, in megabytes (100 - 20480, default = 6144). |
| | **max-unrated-site** integer | **Default:**500 | Maximum number of unrated site in memory, in kilobytes(10 - 5120, default = 500). |
| | **restrict-as1-dbver** string | | Restrict system update to indicated antispam(1) database version (character limit = 127). |
| | **restrict-as2-dbver** string | | Restrict system update to indicated antispam(2) database version (character limit = 127). |
| | **restrict-as4-dbver** string | | Restrict system update to indicated antispam(4) database version (character limit = 127). |
| | **restrict-av-dbver** string | | Restrict system update to indicated antivirus database version (character limit = 127). |
| | **restrict-av2-dbver** string | | Restrict system update to indicated outbreak prevention database version (character limit = 127). |
| | **restrict-fq-dbver** string | | Restrict system update to indicated file query database version (character limit = 127). |
| | **restrict-wf-dbver** string | | Restrict system update to indicated web filter database version (character limit = 127). |
| | **server-override** dictionary | | no description |
| | | **servlist** list / elements=string | | no description |
| | | | **id** integer | **Default:**0 | Override server ID (1 - 10). |
| | | | **ip** string | **Default:**"0.0.0.0" | IPv4 address of the override server. |
| | | | **ip6** string | **Default:**"::" | IPv6 address of the override server. |
| | | | **port** integer | **Default:**443 | Port number to use when contacting FortiGuard (1 - 65535, default = 443). |
| | | | **service-type** list / elements=string | **Choices:*** fgd
* fgc
* fsa
| no description |
| | | **status** string | **Choices:*** **disable** β
* enable
| Override status. disable - Disable setting. enable - Enable setting. |
| | **stat-log-interval** integer | **Default:**60 | Statistic log interval setting, in minutes (1 - 1440, default = 60). |
| | **stat-sync-interval** integer | **Default:**60 | Synchronization interval for statistic of unrated site in minutes (1 - 60, default = 60). |
| | **update-interval** integer | **Default:**6 | FortiGuard database update wait time if not enough delta files, in hours (2 - 24, default = 6). |
| | **update-log** string | **Choices:*** disable
* **enable** β
| Enable/disable update log setting (default = enable). disable - Disable update log. enable - Enable update log. |
| | **wf-cache** integer | **Default:**0 | Web filter service maximum memory usage, in megabytes (maximum = Physical memory-1024, 0 = no limit, default = 600). |
| | **wf-dn-cache-expire-time** integer | **Default:**30 | Web filter DN cache expire time, in minutes (1 - 1440, 0 = never, default = 30). |
| | **wf-dn-cache-max-number** integer | **Default:**10000 | Maximum number of Web filter DN cache (0 = disable, default = 10000). |
| | **wf-log** string | **Choices:*** disable
* **nourl** β
* all
| Web filter log setting (default = nour1) disable - Disable URL log. nourl - Log non-URL events. all - Log all URL lookups. |
| | **wf-preload** string | **Choices:*** disable
* **enable** β
| Enable/disable preloading the web filter database into memory (default = disable). disable - Disable web filter database preload. enable - Enable web filter database preload. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure the FortiGuard run parameters.
fmgr_fmupdate_webspam_fgdsetting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_webspam_fgdsetting:
as-cache: <value of integer>
as-log: <value in [disable, nospam, all]>
as-preload: <value in [disable, enable]>
av-cache: <value of integer>
av-log: <value in [disable, novirus, all]>
av-preload: <value in [disable, enable]>
av2-cache: <value of integer>
av2-log: <value in [disable, noav2, all]>
av2-preload: <value in [disable, enable]>
eventlog-query: <value in [disable, enable]>
fgd-pull-interval: <value of integer>
fq-cache: <value of integer>
fq-log: <value in [disable, nofilequery, all]>
fq-preload: <value in [disable, enable]>
linkd-log: <value in [emergency, alert, critical, ...]>
max-client-worker: <value of integer>
max-log-quota: <value of integer>
max-unrated-site: <value of integer>
restrict-as1-dbver: <value of string>
restrict-as2-dbver: <value of string>
restrict-as4-dbver: <value of string>
restrict-av-dbver: <value of string>
restrict-av2-dbver: <value of string>
restrict-fq-dbver: <value of string>
restrict-wf-dbver: <value of string>
server-override:
servlist:
-
id: <value of integer>
ip: <value of string>
ip6: <value of string>
port: <value of integer>
service-type:
- fgd
- fgc
- fsa
status: <value in [disable, enable]>
stat-log-interval: <value of integer>
stat-sync-interval: <value of integer>
update-interval: <value of integer>
update-log: <value in [disable, enable]>
wf-cache: <value of integer>
wf-dn-cache-expire-time: <value of integer>
wf-dn-cache-max-number: <value of integer>
wf-log: <value in [disable, nourl, all]>
wf-preload: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pkg_authentication_rule β Configure Authentication Rules. fortinet.fortimanager.fmgr\_pkg\_authentication\_rule β Configure Authentication Rules.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_authentication_rule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_authentication\_rule** dictionary | | the top level parameters set |
| | **active-auth-method** string | | Select an active authentication method. |
| | **comments** string | | Comment. |
| | **dstaddr** string | | Select an IPv4 destination address from available options. Required for web proxy authentication. |
| | **dstaddr6** string | | Select an IPv6 destination address from available options. Required for web proxy authentication. |
| | **ip-based** string | **Choices:*** disable
* enable
| Enable/disable IP-based authentication. Once a user authenticates all traffic from the IP address the user authenticated from ... |
| | **name** string | | Authentication rule name. |
| | **protocol** string | **Choices:*** http
* ftp
* socks
* ssh
| Select the protocol to use for authentication (default = http). Users connect to the FortiGate using this protocol and are ask... |
| | **srcaddr** string | | Select an IPv4 source address from available options. Required for web proxy authentication. |
| | **srcaddr6** string | | Select an IPv6 source address. Required for web proxy authentication. |
| | **srcintf** string | | Incoming (ingress) interface. |
| | **sso-auth-method** string | | Select a single-sign on (SSO) authentication method. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this authentication rule. |
| | **transaction-based** string | **Choices:*** disable
* enable
| Enable/disable transaction based authentication (default = disable). |
| | **web-auth-cookie** string | **Choices:*** disable
* enable
| Enable/disable Web authentication cookies (default = disable). |
| | **web-portal** string | **Choices:*** disable
* enable
| Enable/disable web portal for proxy transparent policy (default = enable). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Authentication Rules.
fmgr_pkg_authentication_rule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_authentication_rule:
active-auth-method: <value of string>
comments: <value of string>
ip-based: <value in [disable, enable]>
name: <value of string>
protocol: <value in [http, ftp, socks, ...]>
srcaddr: <value of string>
srcaddr6: <value of string>
sso-auth-method: <value of string>
status: <value in [disable, enable]>
transaction-based: <value in [disable, enable]>
web-auth-cookie: <value in [disable, enable]>
web-portal: <value in [disable, enable]>
dstaddr: <value of string>
dstaddr6: <value of string>
srcintf: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_fortianalyzer3_setting β Settings for locallog to fortianalyzer. fortinet.fortimanager.fmgr\_system\_locallog\_fortianalyzer3\_setting β Settings for locallog to fortianalyzer.
===============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_fortianalyzer3_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_fortianalyzer3\_setting** dictionary | | the top level parameters set |
| | **reliable** string | **Choices:*** **disable** β
* enable
| Enable/disable reliable realtime logging. disable - Disable reliable realtime logging. enable - Enable reliable realtime logging. |
| | **secure-connection** string | **Choices:*** **disable** β
* enable
| Enable/disable connection secured by TLS/SSL. disable - Disable SSL connection. enable - Enable SSL connection. |
| | **server** string | | Remote FortiAnalyzer server FQDN, hostname, or IP address |
| | **server-ip** string | **Default:**"0.0.0.0" | Remote FortiAnalyzer server IP address. |
| | **severity** string | **Choices:*** emergency
* alert
* critical
* error
* warning
* **notification** β
* information
* debug
| Least severity level to log. emergency - Emergency level. alert - Alert level. critical - Critical level. error - Error level. warning - Warning level. notification - Notification level. information - Information level. debug - Debug level. |
| | **status** string | **Choices:*** **disable** β
* realtime
* upload
| Log to FortiAnalyzer status. disable - Log to FortiAnalyzer disabled. realtime - Log to FortiAnalyzer in realtime. upload - Log to FortiAnalyzer at schedule time. |
| | **upload-time** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Settings for locallog to fortianalyzer.
fmgr_system_locallog_fortianalyzer3_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_fortianalyzer3_setting:
reliable: <value in [disable, enable]>
secure-connection: <value in [disable, enable]>
server-ip: <value of string>
severity: <value in [emergency, alert, critical, ...]>
status: <value in [disable, realtime, upload]>
upload-time: <value of string>
server: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_profile_filefilter_entries β File filter entries. fortinet.fortimanager.fmgr\_webfilter\_profile\_filefilter\_entries β File filter entries.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_filefilter_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_filefilter\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** log
* block
| Action taken for matched file. |
| | **comment** string | | Comment. |
| | **direction** string | **Choices:*** any
* incoming
* outgoing
| Match files transmitted in the sessions originating or reply direction. |
| | **encryption** string | **Choices:*** any
* yes
| Match encrypted files or not. |
| | **file-type** string | | no description |
| | **filter** string | | Add a file filter. |
| | **password-protected** string | **Choices:*** any
* yes
| Match password-protected files. |
| | **protocol** list / elements=string | **Choices:*** http
* ftp
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: File filter entries.
fmgr_webfilter_profile_filefilter_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
webfilter_profile_filefilter_entries:
action: <value in [log, block]>
comment: <value of string>
direction: <value in [any, incoming, outgoing]>
encryption: <value in [any, yes]>
file-type: <value of string>
filter: <value of string>
password-protected: <value in [any, yes]>
protocol:
- http
- ftp
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_sys_generate_wsdl β Generate WSDL for specific module and objects. fortinet.fortimanager.fmgr\_sys\_generate\_wsdl β Generate WSDL for specific module and objects.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_sys_generate_wsdl`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sys\_generate\_wsdl** dictionary | | the top level parameters set |
| | **endpoint** string | | no description |
| | **target** string | | URL to the module, ADOM, and object. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Generate WSDL for specific module and objects.
fmgr_sys_generate_wsdl:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
sys_generate_wsdl:
endpoint: <value of string>
target: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_sys_login_challenge β Answer a log in challenge question, used following a login/user or login/challenge command. fortinet.fortimanager.fmgr\_sys\_login\_challenge β Answer a log in challenge question, used following a login/user or login/challenge command.
===============================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_sys_login_challenge`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sys\_login\_challenge** dictionary | | the top level parameters set |
| | **answer** string | | Answer to the challenge question from previous request. |
| | **session** string | | Session ID returned from login/user or previous login/challenge command. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Answer a log in challenge question, used following a login/user or login/challenge command.
fmgr_sys_login_challenge:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
sys_login_challenge:
answer: <value of string>
session: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_profile_filefilter β File filter. fortinet.fortimanager.fmgr\_webfilter\_profile\_filefilter β File filter.
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_filefilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_filefilter** dictionary | | the top level parameters set |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** log
* block
| Action taken for matched file. |
| | | **comment** string | | Comment. |
| | | **direction** string | **Choices:*** any
* incoming
* outgoing
| Match files transmitted in the sessions originating or reply direction. |
| | | **encryption** string | **Choices:*** any
* yes
| Match encrypted files or not. |
| | | **file-type** string | | no description |
| | | **filter** string | | Add a file filter. |
| | | **password-protected** string | **Choices:*** any
* yes
| Match password-protected files. |
| | | **protocol** list / elements=string | **Choices:*** http
* ftp
| no description |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable file filter logging. |
| | **scan-archive-contents** string | **Choices:*** disable
* enable
| Enable/disable file filter archive contents scan. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable file filter. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: File filter.
fmgr_webfilter_profile_filefilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
webfilter_profile_filefilter:
entries:
-
action: <value in [log, block]>
comment: <value of string>
direction: <value in [any, incoming, outgoing]>
encryption: <value in [any, yes]>
file-type: <value of string>
filter: <value of string>
password-protected: <value in [any, yes]>
protocol:
- http
- ftp
log: <value in [disable, enable]>
scan-archive-contents: <value in [disable, enable]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpcommunity_hosts β Configure IPv4 SNMP managers fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_snmpcommunity\_hosts β Configure IPv4 SNMP managers
================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmpcommunity_hosts`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **snmp-community** string / required | | the parameter (snmp-community) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_snmpcommunity\_hosts** dictionary | | the top level parameters set |
| | **id** integer | | Host entry ID. |
| | **ip** string | | IPv4 address of the SNMP manager (host). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 SNMP managers
fmgr_switchcontroller_managedswitch_snmpcommunity_hosts:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
snmp-community: <your own value>
state: <value in [present, absent]>
switchcontroller_managedswitch_snmpcommunity_hosts:
id: <value of integer>
ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_start β Continue a workflow session. fortinet.fortimanager.fmgr\_dvmdb\_workflow\_start β Continue a workflow session.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_start`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_workflow\_start** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| | **name** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Continue a workflow session.
fmgr_dvmdb_workflow_start:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
dvmdb_workflow_start:
desc: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dnsfilter_profile_ftgddns β FortiGuard DNS Filter settings. fortinet.fortimanager.fmgr\_dnsfilter\_profile\_ftgddns β FortiGuard DNS Filter settings.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dnsfilter_profile_ftgddns`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dnsfilter\_profile\_ftgddns** dictionary | | the top level parameters set |
| | **filters** list / elements=string | | no description |
| | | **action** string | **Choices:*** monitor
* block
| Action to take for DNS requests matching the category. |
| | | **category** string | | Category number. |
| | | **id** integer | | ID number. |
| | | **log** string | **Choices:*** disable
* enable
| Enable/disable DNS filter logging for this DNS profile. |
| | **options** list / elements=string | **Choices:*** error-allow
* ftgd-disable
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiGuard DNS Filter settings.
fmgr_dnsfilter_profile_ftgddns:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
dnsfilter_profile_ftgddns:
filters:
-
action: <value in [monitor, block]>
category: <value of string>
id: <value of integer>
log: <value in [disable, enable]>
options:
- error-allow
- ftgd-disable
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_sslserver β SSL servers. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_sslserver β SSL servers.
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_sslserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_sslserver** dictionary | | the top level parameters set |
| | **ftps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the FTPS handshake. |
| | **ftps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the FTPS handshake. |
| | **https-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the HTTPS handshake. |
| | **https-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the HTTPS handshake. |
| | **id** integer | | SSL server ID. |
| | **imaps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the IMAPS handshake. |
| | **imaps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the IMAPS handshake. |
| | **ip** string | | IPv4 address of the SSL server. |
| | **pop3s-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the POP3S handshake. |
| | **pop3s-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the POP3S handshake. |
| | **smtps-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during the SMTPS handshake. |
| | **smtps-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during the SMTPS handshake. |
| | **ssl-other-client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request during an SSL protocol handshake. |
| | **ssl-other-client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate during an SSL protocol handshake. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL servers.
fmgr_firewall_sslsshprofile_sslserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
state: <value in [present, absent]>
firewall_sslsshprofile_sslserver:
ftps-client-cert-request: <value in [bypass, inspect, block]>
https-client-cert-request: <value in [bypass, inspect, block]>
id: <value of integer>
imaps-client-cert-request: <value in [bypass, inspect, block]>
ip: <value of string>
pop3s-client-cert-request: <value in [bypass, inspect, block]>
smtps-client-cert-request: <value in [bypass, inspect, block]>
ssl-other-client-cert-request: <value in [bypass, inspect, block]>
ftps-client-certificate: <value in [bypass, inspect, block]>
https-client-certificate: <value in [bypass, inspect, block]>
imaps-client-certificate: <value in [bypass, inspect, block]>
pop3s-client-certificate: <value in [bypass, inspect, block]>
smtps-client-certificate: <value in [bypass, inspect, block]>
ssl-other-client-certificate: <value in [bypass, inspect, block]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_setting β Settings for locallog logging. fortinet.fortimanager.fmgr\_system\_locallog\_setting β Settings for locallog logging.
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_setting** dictionary | | the top level parameters set |
| | **log-interval-dev-no-logging** integer | **Default:**1440 | Interval in minute for logging the event of no logs received from a device. |
| | **log-interval-disk-full** integer | **Default:**5 | Interval in minute for logging the event of disk full. |
| | **log-interval-gbday-exceeded** integer | **Default:**1440 | Interval in minute for logging the event of the GB/Day license exceeded. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Settings for locallog logging.
fmgr_system_locallog_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_setting:
log-interval-dev-no-logging: <value of integer>
log-interval-disk-full: <value of integer>
log-interval-gbday-exceeded: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_user_appfilter β App filter. fortinet.fortimanager.fmgr\_system\_admin\_user\_appfilter β App filter.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_user_appfilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_user\_appfilter** dictionary | | the top level parameters set |
| | **app-filter-name** string | | App filter name. |
| **user** string / required | | the parameter (user) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: App filter.
fmgr_system_admin_user_appfilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
user: <your own value>
state: <value in [present, absent]>
system_admin_user_appfilter:
app-filter-name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wanprof_system_sdwan_healthcheck β SD-WAN status checking or health checking. fortinet.fortimanager.fmgr\_wanprof\_system\_sdwan\_healthcheck β SD-WAN status checking or health checking.
============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanprof_system_sdwan_healthcheck`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanprof** string / required | | the parameter (wanprof) in requested url |
| **wanprof\_system\_sdwan\_healthcheck** dictionary | | the top level parameters set |
| | **\_dynamic-server** string | | no description |
| | **addr-mode** string | **Choices:*** ipv4
* ipv6
| Address mode (IPv4 or IPv6). |
| | **detect-mode** string | **Choices:*** active
* passive
* prefer-passive
| The mode determining how to detect the server. |
| | **diffservcode** string | | Differentiated services code point (DSCP) in the IP header of the probe packet. |
| | **dns-match-ip** string | | Response IP expected from DNS server if the protocol is DNS. |
| | **dns-request-domain** string | | Fully qualified domain name to resolve for the DNS probe. |
| | **failtime** integer | | Number of failures before server is considered lost (1 - 3600, default = 5). |
| | **ftp-file** string | | Full path and file name on the FTP server to download for FTP health-check to probe. |
| | **ftp-mode** string | **Choices:*** passive
* port
| FTP mode. |
| | **ha-priority** integer | | HA election priority (1 - 50). |
| | **http-agent** string | | String in the http-agent field in the HTTP header. |
| | **http-get** string | | URL used to communicate with the server if the protocol if the protocol is HTTP. |
| | **http-match** string | | Response string expected from the server if the protocol is HTTP. |
| | **interval** integer | | Status check interval in milliseconds, or the time between attempting to connect to the server (500 - 3600\*1000 msec, default ... |
| | **members** string | | Member sequence number list. |
| | **name** string | | Status check or health check name. |
| | **packet-size** integer | | Packet size of a twamp test session, |
| | **password** string | | no description |
| | **port** integer | | Port number used to communicate with the server over the selected protocol (0-65535, default = 0, auto select. http, twamp: 80... |
| | **probe-count** integer | | Number of most recent probes that should be used to calculate latency and jitter (5 - 30, default = 30). |
| | **probe-packets** string | **Choices:*** disable
* enable
| Enable/disable transmission of probe packets. |
| | **probe-timeout** integer | | Time to wait before a probe packet is considered lost (500 - 3600\*1000 msec, default = 500). |
| | **protocol** string | **Choices:*** ping
* tcp-echo
* udp-echo
* http
* twamp
* ping6
* dns
* tcp-connect
* ftp
| Protocol used to determine if the FortiGate can communicate with the server. |
| | **quality-measured-method** string | **Choices:*** half-close
* half-open
| Method to measure the quality of tcp-connect. |
| | **recoverytime** integer | | Number of successful responses received before server is considered recovered (1 - 3600, default = 5). |
| | **security-mode** string | **Choices:*** none
* authentication
| Twamp controller security mode. |
| | **server** string | | no description |
| | **sla** list / elements=string | | no description |
| | | **id** integer | | SLA ID. |
| | | **jitter-threshold** integer | | Jitter for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | | **latency-threshold** integer | | Latency for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | | **link-cost-factor** list / elements=string | **Choices:*** latency
* jitter
* packet-loss
| no description |
| | | **packetloss-threshold** integer | | Packet loss for SLA to make decision in percentage. (0 - 100, default = 0). |
| | **sla-fail-log-period** integer | | Time interval in seconds that SLA fail log messages will be generated (0 - 3600, default = 0). |
| | **sla-pass-log-period** integer | | Time interval in seconds that SLA pass log messages will be generated (0 - 3600, default = 0). |
| | **system-dns** string | **Choices:*** disable
* enable
| Enable/disable system DNS as the probe server. |
| | **threshold-alert-jitter** integer | | Alert threshold for jitter (ms, default = 0). |
| | **threshold-alert-latency** integer | | Alert threshold for latency (ms, default = 0). |
| | **threshold-alert-packetloss** integer | | Alert threshold for packet loss (percentage, default = 0). |
| | **threshold-warning-jitter** integer | | Warning threshold for jitter (ms, default = 0). |
| | **threshold-warning-latency** integer | | Warning threshold for latency (ms, default = 0). |
| | **threshold-warning-packetloss** integer | | Warning threshold for packet loss (percentage, default = 0). |
| | **update-cascade-interface** string | **Choices:*** disable
* enable
| Enable/disable update cascade interface. |
| | **update-static-route** string | **Choices:*** disable
* enable
| Enable/disable updating the static route. |
| | **user** string | | The user name to access probe server. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SD-WAN status checking or health checking.
fmgr_wanprof_system_sdwan_healthcheck:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wanprof: <your own value>
state: <value in [present, absent]>
wanprof_system_sdwan_healthcheck:
_dynamic-server: <value of string>
addr-mode: <value in [ipv4, ipv6]>
diffservcode: <value of string>
dns-match-ip: <value of string>
dns-request-domain: <value of string>
failtime: <value of integer>
ftp-file: <value of string>
ftp-mode: <value in [passive, port]>
ha-priority: <value of integer>
http-agent: <value of string>
http-get: <value of string>
http-match: <value of string>
interval: <value of integer>
members: <value of string>
name: <value of string>
packet-size: <value of integer>
password: <value of string>
port: <value of integer>
probe-count: <value of integer>
probe-packets: <value in [disable, enable]>
probe-timeout: <value of integer>
protocol: <value in [ping, tcp-echo, udp-echo, ...]>
quality-measured-method: <value in [half-close, half-open]>
recoverytime: <value of integer>
security-mode: <value in [none, authentication]>
server: <value of string>
sla:
-
id: <value of integer>
jitter-threshold: <value of integer>
latency-threshold: <value of integer>
link-cost-factor:
- latency
- jitter
- packet-loss
packetloss-threshold: <value of integer>
sla-fail-log-period: <value of integer>
sla-pass-log-period: <value of integer>
system-dns: <value in [disable, enable]>
threshold-alert-jitter: <value of integer>
threshold-alert-latency: <value of integer>
threshold-alert-packetloss: <value of integer>
threshold-warning-jitter: <value of integer>
threshold-warning-latency: <value of integer>
threshold-warning-packetloss: <value of integer>
update-cascade-interface: <value in [disable, enable]>
update-static-route: <value in [disable, enable]>
user: <value of string>
detect-mode: <value in [active, passive, prefer-passive]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pkg_header_shapingpolicy β Configure shaping policies. fortinet.fortimanager.fmgr\_pkg\_header\_shapingpolicy β Configure shaping policies.
====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_header_shapingpolicy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_header\_shapingpolicy** dictionary | | the top level parameters set |
| | **app-category** string | | no description |
| | **app-group** string | | no description |
| | **application** integer | | no description |
| | **class-id** integer | | no description |
| | **comment** string | | no description |
| | **diffserv-forward** string | **Choices:*** disable
* enable
| no description |
| | **diffserv-reverse** string | **Choices:*** disable
* enable
| no description |
| | **diffservcode-forward** string | | no description |
| | **diffservcode-rev** string | | no description |
| | **dstaddr** string | | no description |
| | **dstaddr6** string | | no description |
| | **dstintf** string | | no description |
| | **groups** string | | no description |
| | **id** integer | | no description |
| | **internet-service** string | **Choices:*** disable
* enable
| no description |
| | **internet-service-custom** string | | no description |
| | **internet-service-custom-group** string | | no description |
| | **internet-service-group** string | | no description |
| | **internet-service-id** string | | no description |
| | **internet-service-name** string | | no description |
| | **internet-service-src** string | **Choices:*** disable
* enable
| no description |
| | **internet-service-src-custom** string | | no description |
| | **internet-service-src-custom-group** string | | no description |
| | **internet-service-src-group** string | | no description |
| | **internet-service-src-id** string | | no description |
| | **internet-service-src-name** string | | no description |
| | **ip-version** string | **Choices:*** 4
* 6
| no description |
| | **per-ip-shaper** string | | no description |
| | **schedule** string | | no description |
| | **service** string | | no description |
| | **srcaddr** string | | no description |
| | **srcaddr6** string | | no description |
| | **srcintf** string | | no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **tos** string | | no description |
| | **tos-mask** string | | no description |
| | **tos-negate** string | **Choices:*** disable
* enable
| no description |
| | **traffic-shaper** string | | no description |
| | **traffic-shaper-reverse** string | | no description |
| | **url-category** string | | no description |
| | **users** string | | no description |
| | **uuid** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure shaping policies.
fmgr_pkg_header_shapingpolicy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pkg: <your own value>
state: <value in [present, absent]>
pkg_header_shapingpolicy:
app-category: <value of string>
app-group: <value of string>
application: <value of integer>
class-id: <value of integer>
comment: <value of string>
diffserv-forward: <value in [disable, enable]>
diffserv-reverse: <value in [disable, enable]>
diffservcode-forward: <value of string>
diffservcode-rev: <value of string>
dstaddr: <value of string>
dstaddr6: <value of string>
dstintf: <value of string>
groups: <value of string>
id: <value of integer>
internet-service: <value in [disable, enable]>
internet-service-custom: <value of string>
internet-service-custom-group: <value of string>
internet-service-group: <value of string>
internet-service-id: <value of string>
internet-service-src: <value in [disable, enable]>
internet-service-src-custom: <value of string>
internet-service-src-custom-group: <value of string>
internet-service-src-group: <value of string>
internet-service-src-id: <value of string>
ip-version: <value in [4, 6]>
per-ip-shaper: <value of string>
schedule: <value of string>
service: <value of string>
srcaddr: <value of string>
srcaddr6: <value of string>
srcintf: <value of string>
status: <value in [disable, enable]>
tos: <value of string>
tos-mask: <value of string>
tos-negate: <value in [disable, enable]>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
url-category: <value of string>
users: <value of string>
uuid: <value of string>
internet-service-name: <value of string>
internet-service-src-name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_devprof_adom β no description fortinet.fortimanager.fmgr\_pm\_devprof\_adom β no description
==============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_devprof_adom`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pm\_devprof\_adom** dictionary | | the top level parameters set |
| | **description** string | | no description |
| | **enabled options** list / elements=string | **Choices:*** none
* dns
* ntp
* email
* admin
* snmp
* repmsg
* ftgd
* log
| no description |
| | **name** string | | no description |
| | **oid** integer | | no description |
| | **scope member** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **type** string | **Choices:*** devprof
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pm_devprof_adom:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pm_devprof_adom:
description: <value of string>
enabled options:
- none
- dns
- ntp
- email
- admin
- snmp
- repmsg
- ftgd
- log
name: <value of string>
oid: <value of integer>
scope member:
-
name: <value of string>
vdom: <value of string>
type: <value in [devprof]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_profile_ftgdwf_filters β FortiGuard filters. fortinet.fortimanager.fmgr\_webfilter\_profile\_ftgdwf\_filters β FortiGuard filters.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_ftgdwf_filters`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_ftgdwf\_filters** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** block
* monitor
* warning
* authenticate
| Action to take for matches. |
| | **auth-usr-grp** string | | Groups with permission to authenticate. |
| | **category** string | | Categories and groups the filter examines. |
| | **id** integer | | ID number. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **override-replacemsg** string | | Override replacement message. |
| | **warn-duration** string | | Duration of warnings. |
| | **warning-duration-type** string | **Choices:*** session
* timeout
| Re-display warning after closing browser or after a timeout. |
| | **warning-prompt** string | **Choices:*** per-domain
* per-category
| Warning prompts in each category or each domain. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiGuard filters.
fmgr_webfilter_profile_ftgdwf_filters:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
webfilter_profile_ftgdwf_filters:
action: <value in [block, monitor, warning, ...]>
auth-usr-grp: <value of string>
category: <value of string>
id: <value of integer>
log: <value in [disable, enable]>
override-replacemsg: <value of string>
warn-duration: <value of string>
warning-duration-type: <value in [session, timeout]>
warning-prompt: <value in [per-domain, per-category]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_mm3 β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_mm3 β Replacement message table entries.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_mm3`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_mm3** dictionary | | the top level parameters set |
| | **add-html** string | **Choices:*** disable
* enable
| add message encapsulation |
| | **charset** string | **Choices:*** us-ascii
* utf-8
| character encoding used for replacement message |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **from** string | | from address |
| | **from-sender** string | **Choices:*** disable
* enable
| notification message sent from recipient |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **html-part** string | | message encapsulation text |
| | **image** string | | Message string. |
| | **message** string | | message text |
| | **msg-type** string | | Message type. |
| | **priority** string | **Choices:*** low
* normal
* high
* not-included
| message priority |
| | **subject** string | | subject text string |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_mm3:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_mm3:
add-html: <value in [disable, enable]>
charset: <value in [us-ascii, utf-8]>
format: <value in [none, text, html, ...]>
from: <value of string>
from-sender: <value in [disable, enable]>
header: <value in [none, http, 8bit]>
html-part: <value of string>
image: <value of string>
message: <value of string>
msg-type: <value of string>
priority: <value in [low, normal, high, ...]>
subject: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping_realservers β Select the real servers that this server load balancing VIP will distribute traffic to. fortinet.fortimanager.fmgr\_firewall\_vip\_dynamicmapping\_realservers β Select the real servers that this server load balancing VIP will distribute traffic to.
================================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping_realservers`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip\_dynamicmapping\_realservers** dictionary | | the top level parameters set |
| | **address** string | | no description |
| | **client-ip** string | | no description |
| | **healthcheck** string | **Choices:*** disable
* enable
* vip
| no description |
| | **holddown-interval** integer | | no description |
| | **http-host** string | | no description |
| | **id** integer | | no description |
| | **ip** string | | no description |
| | **max-connections** integer | | no description |
| | **monitor** string | | no description |
| | **port** integer | | no description |
| | **seq** integer | | no description |
| | **status** string | **Choices:*** active
* standby
* disable
| no description |
| | **type** string | **Choices:*** ip
* address
| no description |
| | **weight** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip** string / required | | the parameter (vip) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Select the real servers that this server load balancing VIP will distribute traffic to.
fmgr_firewall_vip_dynamicmapping_realservers:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
firewall_vip_dynamicmapping_realservers:
client-ip: <value of string>
healthcheck: <value in [disable, enable, vip]>
holddown-interval: <value of integer>
http-host: <value of string>
ip: <value of string>
max-connections: <value of integer>
monitor: <value of string>
port: <value of integer>
seq: <value of integer>
status: <value in [active, standby, disable]>
weight: <value of integer>
address: <value of string>
id: <value of integer>
type: <value in [ip, address]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_user_webfilter β Web filter. fortinet.fortimanager.fmgr\_system\_admin\_user\_webfilter β Web filter.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_user_webfilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_user\_webfilter** dictionary | | the top level parameters set |
| | **web-filter-name** string | | Web filter name. |
| **user** string / required | | the parameter (user) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Web filter.
fmgr_system_admin_user_webfilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
user: <your own value>
state: <value in [present, absent]>
system_admin_user_webfilter:
web-filter-name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_mheader_entries β Spam filter mime header content. fortinet.fortimanager.fmgr\_spamfilter\_mheader\_entries β Spam filter mime header content.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_mheader_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **mheader** string / required | | the parameter (mheader) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_mheader\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** spam
* clear
| Mark spam or good. |
| | **fieldbody** string | | Pattern for the header field body. |
| | **fieldname** string | | Pattern for header field name. |
| | **id** integer | | Mime header entry ID. |
| | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Spam filter mime header content.
fmgr_spamfilter_mheader_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mheader: <your own value>
state: <value in [present, absent]>
spamfilter_mheader_entries:
action: <value in [spam, clear]>
fieldbody: <value of string>
fieldname: <value of string>
id: <value of integer>
pattern-type: <value in [wildcard, regexp]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_mpskprofile_mpskgroup_mpskkey β List of multiple PSK entries. fortinet.fortimanager.fmgr\_mpskprofile\_mpskgroup\_mpskkey β List of multiple PSK entries.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_mpskprofile_mpskgroup_mpskkey`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **mpsk-group** string / required | | the parameter (mpsk-group) in requested url |
| **mpsk-profile** string / required | | the parameter (mpsk-profile) in requested url |
| **mpskprofile\_mpskgroup\_mpskkey** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **concurrent-client-limit-type** string | **Choices:*** default
* unlimited
* specified
| MPSK client limit type options. |
| | **concurrent-clients** integer | | Number of clients that can connect using this pre-shared key (1 - 65535, default is 256). |
| | **mac** string | | MAC address. |
| | **mpsk-schedules** string | | Firewall schedule for MPSK passphrase. The passphrase will be effective only when at least one schedule is valid. |
| | **name** string | | Pre-shared key name. |
| | **passphrase** string | | no description |
| | **pmk** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: List of multiple PSK entries.
fmgr_mpskprofile_mpskgroup_mpskkey:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mpsk-profile: <your own value>
mpsk-group: <your own value>
state: <value in [present, absent]>
mpskprofile_mpskgroup_mpskkey:
comment: <value of string>
concurrent-client-limit-type: <value in [default, unlimited, specified]>
concurrent-clients: <value of integer>
mac: <value of string>
mpsk-schedules: <value of string>
name: <value of string>
passphrase: <value of string>
pmk: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_sql_customindex β List of SQL index fields. fortinet.fortimanager.fmgr\_system\_sql\_customindex β List of SQL index fields.
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sql_customindex`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sql\_customindex** dictionary | | the top level parameters set |
| | **case-sensitive** string | **Choices:*** **disable** β
* enable
| Disable/Enable case sensitive index. disable - Build a case insensitive index. enable - Build a case sensitive index. |
| | **device-type** string | **Choices:*** **FortiGate** β
* FortiManager
* FortiClient
* FortiMail
* FortiWeb
* FortiCache
* FortiSandbox
* FortiDDoS
* FortiAuthenticator
* FortiProxy
| Device type. FortiGate - Device type to FortiGate. FortiManager - Set device type to FortiManager FortiClient - Set device type to FortiClient FortiMail - Device type to FortiMail. FortiWeb - Device type to FortiWeb. FortiCache - Set device type to FortiCache FortiSandbox - Set device type to FortiSandbox FortiDDoS - Set device type to FortiDDoS FortiAuthenticator - Set device type to FortiAuthenticator FortiProxy - Set device type to FortiProxy |
| | **id** integer | **Default:**0 | Add or Edit log index fields. |
| | **index-field** string | | Log field name to be indexed. |
| | **log-type** string | **Choices:*** none
* app-ctrl
* attack
* content
* dlp
* emailfilter
* event
* generic
* history
* **traffic** β
* virus
* voip
* webfilter
* netscan
* fct-event
* fct-traffic
* fct-netscan
* waf
* gtp
* dns
* ssh
* ssl
* file-filter
* asset
* protocol
* siem
| Log type. none - none app-ctrl attack content dlp emailfilter event generic history traffic virus voip webfilter netscan fct-event fct-traffic fct-netscan waf gtp dns ssh ssl |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: List of SQL index fields.
fmgr_system_sql_customindex:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_sql_customindex:
case-sensitive: <value in [disable, enable]>
device-type: <value in [FortiGate, FortiManager, FortiClient, ...]>
id: <value of integer>
index-field: <value of string>
log-type: <value in [none, app-ctrl, attack, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_ldbmonitor β Configure server load balancing health monitors. fortinet.fortimanager.fmgr\_firewall\_ldbmonitor β Configure server load balancing health monitors.
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_ldbmonitor`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_ldbmonitor** dictionary | | the top level parameters set |
| | **dns-match-ip** string | | Response IP expected from DNS server. |
| | **dns-protocol** string | **Choices:*** udp
* tcp
| Select the protocol used by the DNS health check monitor to check the health of the server (UDP | TCP). |
| | **dns-request-domain** string | | Fully qualified domain name to resolve for the DNS probe. |
| | **http-get** string | | URL used to send a GET request to check the health of an HTTP server. |
| | **http-match** string | | String to match the value expected in response to an HTTP-GET request. |
| | **http-max-redirects** integer | | The maximum number of HTTP redirects to be allowed (0 - 5, default = 0). |
| | **interval** integer | | Time between health checks (5 - 65635 sec, default = 10). |
| | **name** string | | Monitor name. |
| | **port** integer | | Service port used to perform the health check. If 0, health check monitor inherits port configured for the server (0 - 65635, ... |
| | **retry** integer | | Number health check attempts before the server is considered down (1 - 255, default = 3). |
| | **src-ip** string | | Source IP for ldb-monitor. |
| | **timeout** integer | | Time to wait to receive response to a health check from a server. Reaching the timeout means the health check failed (1 - 255 ... |
| | **type** string | **Choices:*** ping
* tcp
* http
* passive-sip
* https
* dns
| Select the Monitor type used by the health check monitor to check the health of the server (PING | TCP | HTTP). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure server load balancing health monitors.
fmgr_firewall_ldbmonitor:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_ldbmonitor:
http-get: <value of string>
http-match: <value of string>
http-max-redirects: <value of integer>
interval: <value of integer>
name: <value of string>
port: <value of integer>
retry: <value of integer>
timeout: <value of integer>
type: <value in [ping, tcp, http, ...]>
src-ip: <value of string>
dns-match-ip: <value of string>
dns-protocol: <value in [udp, tcp]>
dns-request-domain: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_fortianalyzer2_setting β Settings for locallog to fortianalyzer. fortinet.fortimanager.fmgr\_system\_locallog\_fortianalyzer2\_setting β Settings for locallog to fortianalyzer.
===============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_fortianalyzer2_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_fortianalyzer2\_setting** dictionary | | the top level parameters set |
| | **reliable** string | **Choices:*** **disable** β
* enable
| Enable/disable reliable realtime logging. disable - Disable reliable realtime logging. enable - Enable reliable realtime logging. |
| | **secure-connection** string | **Choices:*** **disable** β
* enable
| Enable/disable connection secured by TLS/SSL. disable - Disable SSL connection. enable - Enable SSL connection. |
| | **server** string | | Remote FortiAnalyzer server FQDN, hostname, or IP address |
| | **server-ip** string | **Default:**"0.0.0.0" | Remote FortiAnalyzer server IP address. |
| | **severity** string | **Choices:*** emergency
* alert
* critical
* error
* warning
* **notification** β
* information
* debug
| Least severity level to log. emergency - Emergency level. alert - Alert level. critical - Critical level. error - Error level. warning - Warning level. notification - Notification level. information - Information level. debug - Debug level. |
| | **status** string | **Choices:*** **disable** β
* realtime
* upload
| Log to FortiAnalyzer status. disable - Log to FortiAnalyzer disabled. realtime - Log to FortiAnalyzer in realtime. upload - Log to FortiAnalyzer at schedule time. |
| | **upload-time** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Settings for locallog to fortianalyzer.
fmgr_system_locallog_fortianalyzer2_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_fortianalyzer2_setting:
reliable: <value in [disable, enable]>
secure-connection: <value in [disable, enable]>
server-ip: <value of string>
severity: <value in [emergency, alert, critical, ...]>
status: <value in [disable, realtime, upload]>
upload-time: <value of string>
server: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_alert β Log based alert settings. fortinet.fortimanager.fmgr\_system\_log\_alert β Log based alert settings.
==========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_alert`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_alert** dictionary | | the top level parameters set |
| | **max-alert-count** integer | **Default:**1000 | Maximum number of alerts supported. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log based alert settings.
fmgr_system_log_alert:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_alert:
max-alert-count: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_user_devicegroup_dynamicmapping β no description fortinet.fortimanager.fmgr\_user\_devicegroup\_dynamicmapping β no description
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_devicegroup_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device-group** string / required | | the parameter (device-group) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_devicegroup\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_if\_unmanaged** integer | | no description |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **comment** string | | no description |
| | **member** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_user_devicegroup_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
device-group: <your own value>
state: <value in [present, absent]>
user_devicegroup_dynamicmapping:
_if_unmanaged: <value of integer>
_scope:
-
name: <value of string>
vdom: <value of string>
comment: <value of string>
member: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_log_customfield β Configure custom log fields. fortinet.fortimanager.fmgr\_log\_customfield β Configure custom log fields.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_log_customfield`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **log\_customfield** dictionary | | the top level parameters set |
| | **id** string | | field ID <string>. |
| | **name** string | | Field name (max: 15 characters). |
| | **value** string | | Field value (max: 15 characters). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure custom log fields.
fmgr_log_customfield:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
log_customfield:
id: <value of string>
name: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnsslweb_realm β Realm. fortinet.fortimanager.fmgr\_vpnsslweb\_realm β Realm.
=====================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnsslweb_realm`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnsslweb\_realm** dictionary | | the top level parameters set |
| | **login-page** string | | Replacement HTML for SSL-VPN login page. |
| | **max-concurrent-user** integer | | Maximum concurrent users (0 - 65535, 0 means unlimited). |
| | **nas-ip** string | | IP address used as a NAS-IP to communicate with the RADIUS server. |
| | **radius-port** integer | | RADIUS service port number (0 - 65535, 0 means user.radius.radius-port). |
| | **radius-server** string | | RADIUS server associated with realm. |
| | **url-path** string | | URL path to access SSL-VPN login page. |
| | **virtual-host** string | | Virtual host name for realm. |
| | **virtual-host-only** string | **Choices:*** disable
* enable
| Enable/disable enforcement of virtual host method for SSL-VPN client access. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Realm.
fmgr_vpnsslweb_realm:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vpnsslweb_realm:
login-page: <value of string>
max-concurrent-user: <value of integer>
url-path: <value of string>
virtual-host: <value of string>
nas-ip: <value of string>
radius-server: <value of string>
radius-port: <value of integer>
virtual-host-only: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_settings_rollingregular β Log rolling policy for device logs. fortinet.fortimanager.fmgr\_system\_log\_settings\_rollingregular β Log rolling policy for device logs.
=======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_settings_rollingregular`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_settings\_rollingregular** dictionary | | the top level parameters set |
| | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | **directory** string | | Upload server directory, for Unix server, use absolute |
| | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | **password** string | | no description |
| | **password2** string | | no description |
| | **password3** string | | no description |
| | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | **username** string | | Upload server login username. |
| | **username2** string | | Upload server login username2. |
| | **username3** string | | Upload server login username3. |
| | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log rolling policy for device logs.
fmgr_system_log_settings_rollingregular:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_settings_rollingregular:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_virtualwirepair β Configure virtual wire pairs. fortinet.fortimanager.fmgr\_system\_virtualwirepair β Configure virtual wire pairs.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_virtualwirepair`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_virtualwirepair** dictionary | | the top level parameters set |
| | **member** list / elements=string | | no description |
| | **name** string | | Virtual-wire-pair name. Must be a unique interface name. |
| | **vlan-filter** string | | Set VLAN filters. |
| | **wildcard-vlan** string | **Choices:*** disable
* enable
| Enable/disable wildcard VLAN. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure virtual wire pairs.
fmgr_system_virtualwirepair:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
system_virtualwirepair:
member: <value of list>
name: <value of string>
vlan-filter: <value of string>
wildcard-vlan: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_version β Enable/disable HTTP version check. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_version β Enable/disable HTTP version check.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_version`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_version** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable HTTP version check.
fmgr_waf_profile_constraint_version:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_version:
action: <value in [allow, block]>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_smsserver β Configure SMS server for sending SMS messages to support user authentication. fortinet.fortimanager.fmgr\_system\_smsserver β Configure SMS server for sending SMS messages to support user authentication.
=============================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_smsserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_smsserver** dictionary | | the top level parameters set |
| | **mail-server** string | | Email-to-SMS server domain name. |
| | **name** string | | Name of SMS server. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SMS server for sending SMS messages to support user authentication.
fmgr_system_smsserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
system_smsserver:
mail-server: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqpvenuename_valuelist β Name list. fortinet.fortimanager.fmgr\_hotspot20\_anqpvenuename\_valuelist β Name list.
============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqpvenuename_valuelist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **anqp-venue-name** string / required | | the parameter (anqp-venue-name) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqpvenuename\_valuelist** dictionary | | the top level parameters set |
| | **index** integer | | Value index. |
| | **lang** string | | Language code. |
| | **value** string | | Venue name value. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Name list.
fmgr_hotspot20_anqpvenuename_valuelist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
anqp-venue-name: <your own value>
state: <value in [present, absent]>
hotspot20_anqpvenuename_valuelist:
index: <value of integer>
lang: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_domaincontroller β Configure domain controller entries. fortinet.fortimanager.fmgr\_user\_domaincontroller β Configure domain controller entries.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_domaincontroller`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_domaincontroller** dictionary | | the top level parameters set |
| | **ad-mode** string | **Choices:*** none
* ds
* lds
| Set Active Directory mode. |
| | **adlds-dn** string | | AD LDS distinguished name. |
| | **adlds-ip-address** string | | AD LDS IPv4 address. |
| | **adlds-ip6** string | | AD LDS IPv6 address. |
| | **adlds-port** integer | | Port number of AD LDS service (default = 389). |
| | **dns-srv-lookup** string | **Choices:*** disable
* enable
| Enable/disable DNS service lookup. |
| | **domain-name** string | | Domain DNS name. |
| | **extra-server** list / elements=string | | no description |
| | | **id** integer | | Server ID. |
| | | **ip-address** string | | Domain controller IP address. |
| | | **port** integer | | Port to be used for communication with the domain controller (default = 445). |
| | | **source-ip-address** string | | FortiGate IPv4 address to be used for communication with the domain controller. |
| | | **source-port** integer | | Source port to be used for communication with the domain controller. |
| | **hostname** string | | Hostname of the server to connect to. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **ip-address** string | | Domain controller IP address. |
| | **ip6** string | | Domain controller IPv6 address. |
| | **ldap-server** string | | LDAP server name. |
| | **name** string | | Domain controller entry name. |
| | **password** string | | no description |
| | **port** integer | | Port to be used for communication with the domain controller (default = 445). |
| | **replication-port** integer | | Port to be used for communication with the domain controller for replication service. Port number 0 indicates automatic discov... |
| | **source-ip-address** string | | FortiGate IPv4 address to be used for communication with the domain controller. |
| | **source-ip6** string | | FortiGate IPv6 address to be used for communication with the domain controller. |
| | **source-port** integer | | Source port to be used for communication with the domain controller. |
| | **username** string | | User name to sign in with. Must have proper permissions for service. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure domain controller entries.
fmgr_user_domaincontroller:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_domaincontroller:
domain-name: <value of string>
extra-server:
-
id: <value of integer>
ip-address: <value of string>
port: <value of integer>
source-ip-address: <value of string>
source-port: <value of integer>
ip-address: <value of string>
ldap-server: <value of string>
name: <value of string>
port: <value of integer>
ad-mode: <value in [none, ds, lds]>
adlds-dn: <value of string>
adlds-ip-address: <value of string>
adlds-ip6: <value of string>
adlds-port: <value of integer>
dns-srv-lookup: <value in [disable, enable]>
hostname: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
ip6: <value of string>
password: <value of string>
replication-port: <value of integer>
source-ip-address: <value of string>
source-ip6: <value of string>
source-port: <value of integer>
username: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_snmp_community β SNMP community configuration. fortinet.fortimanager.fmgr\_system\_snmp\_community β SNMP community configuration.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_snmp_community`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_snmp\_community** dictionary | | the top level parameters set |
| | **events** list / elements=string | **Choices:*** disk\_low
* ha\_switch
* intf\_ip\_chg
* sys\_reboot
* cpu\_high
* mem\_low
* log-alert
* log-rate
* log-data-rate
* lic-gbday
* lic-dev-quota
* cpu-high-exclude-nice
| no description |
| | **hosts** list / elements=string | | no description |
| | | **id** integer | **Default:**0 | Host entry ID. |
| | | **interface** string | | Allow interface name. |
| | | **ip** string | **Default:**"0.0.0.0 0.0.0.0" | Allow host IP address. |
| | **hosts6** list / elements=string | | no description |
| | | **id** integer | **Default:**0 | Host entry ID. |
| | | **interface** string | | Allow interface name. |
| | | **ip** string | **Default:**"::/0" | Allow host IP address. |
| | **id** integer | **Default:**0 | Community ID. |
| | **name** string | | Community name. |
| | **query\_v1\_port** integer | **Default:**161 | SNMP v1 query port. |
| | **query\_v1\_status** string | **Choices:*** disable
* **enable** β
| Enable/disable SNMP v1 query. disable - Disable setting. enable - Enable setting. |
| | **query\_v2c\_port** integer | **Default:**161 | SNMP v2c query port. |
| | **query\_v2c\_status** string | **Choices:*** disable
* **enable** β
| Enable/disable SNMP v2c query. disable - Disable setting. enable - Enable setting. |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable community. disable - Disable setting. enable - Enable setting. |
| | **trap\_v1\_rport** integer | **Default:**162 | SNMP v1 trap remote port. |
| | **trap\_v1\_status** string | **Choices:*** disable
* **enable** β
| Enable/disable SNMP v1 trap. disable - Disable setting. enable - Enable setting. |
| | **trap\_v2c\_rport** integer | **Default:**162 | SNMP v2c trap remote port. |
| | **trap\_v2c\_status** string | **Choices:*** disable
* **enable** β
| Enable/disable SNMP v2c trap. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SNMP community configuration.
fmgr_system_snmp_community:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_snmp_community:
events:
- disk_low
- ha_switch
- intf_ip_chg
- sys_reboot
- cpu_high
- mem_low
- log-alert
- log-rate
- log-data-rate
- lic-gbday
- lic-dev-quota
- cpu-high-exclude-nice
hosts:
-
id: <value of integer>
interface: <value of string>
ip: <value of string>
hosts6:
-
id: <value of integer>
interface: <value of string>
ip: <value of string>
id: <value of integer>
name: <value of string>
query_v1_port: <value of integer>
query_v1_status: <value in [disable, enable]>
query_v2c_port: <value of integer>
query_v2c_status: <value in [disable, enable]>
status: <value in [disable, enable]>
trap_v1_rport: <value of integer>
trap_v1_status: <value in [disable, enable]>
trap_v2c_rport: <value of integer>
trap_v2c_status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_application_group β Configure firewall application groups. fortinet.fortimanager.fmgr\_application\_group β Configure firewall application groups.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_application_group`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **application\_group** dictionary | | the top level parameters set |
| | **application** integer | | no description |
| | **behavior** string | | Application behavior filter. |
| | **category** integer | | no description |
| | **comment** string | | Comment |
| | **name** string | | Application group name. |
| | **popularity** list / elements=string | **Choices:*** 1
* 2
* 3
* 4
* 5
| no description |
| | **protocols** string | | Application protocol filter. |
| | **risk** integer | | no description |
| | **technology** string | | Application technology filter. |
| | **type** string | **Choices:*** application
* category
* filter
| Application group type. |
| | **vendor** string | | Application vendor filter. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure firewall application groups.
fmgr_application_group:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
application_group:
application: <value of integer>
category: <value of integer>
comment: <value of string>
name: <value of string>
type: <value in [application, category, filter]>
behavior: <value of string>
popularity:
- 1
- 2
- 3
- 4
- 5
protocols: <value of string>
risk: <value of integer>
technology: <value of string>
vendor: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webproxy_wisp β Configure Wireless Internet service provider fortinet.fortimanager.fmgr\_webproxy\_wisp β Configure Wireless Internet service provider
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webproxy_wisp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webproxy\_wisp** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **max-connections** integer | | Maximum number of web proxy WISP connections (4 - 4096, default = 64). |
| | **name** string | | Server name. |
| | **outgoing-ip** string | | WISP outgoing IP address. |
| | **server-ip** string | | WISP server IP address. |
| | **server-port** integer | | WISP server port (1 - 65535, default = 15868). |
| | **timeout** integer | | Period of time before WISP requests time out (1 - 15 sec, default = 5). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Wireless Internet service provider
fmgr_webproxy_wisp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
webproxy_wisp:
comment: <value of string>
max-connections: <value of integer>
name: <value of string>
outgoing-ip: <value of string>
server-ip: <value of string>
server-port: <value of integer>
timeout: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_qos_ipdscpmap β Configure FortiSwitch QoS IP precedence/DSCP. fortinet.fortimanager.fmgr\_switchcontroller\_qos\_ipdscpmap β Configure FortiSwitch QoS IP precedence/DSCP.
============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_qos_ipdscpmap`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_qos\_ipdscpmap** dictionary | | the top level parameters set |
| | **description** string | | Description of the ip-dscp map name. |
| | **map** list / elements=string | | no description |
| | | **cos-queue** integer | | COS queue number. |
| | | **diffserv** list / elements=string | **Choices:*** CS0
* CS1
* AF11
* AF12
* AF13
* CS2
* AF21
* AF22
* AF23
* CS3
* AF31
* AF32
* AF33
* CS4
* AF41
* AF42
* AF43
* CS5
* EF
* CS6
* CS7
| no description |
| | | **ip-precedence** list / elements=string | **Choices:*** network-control
* internetwork-control
* critic-ecp
* flashoverride
* flash
* immediate
* priority
* routine
| no description |
| | | **name** string | | Dscp mapping entry name. |
| | | **value** string | | Raw values of DSCP (0 - 63). |
| | **name** string | | Dscp map name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiSwitch QoS IP precedence/DSCP.
fmgr_switchcontroller_qos_ipdscpmap:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
switchcontroller_qos_ipdscpmap:
description: <value of string>
map:
-
cos-queue: <value of integer>
diffserv:
- CS0
- CS1
- AF11
- AF12
- AF13
- CS2
- AF21
- AF22
- AF23
- CS3
- AF31
- AF32
- AF33
- CS4
- AF41
- AF42
- AF43
- CS5
- EF
- CS6
- CS7
ip-precedence:
- network-control
- internetwork-control
- critic-ecp
- flashoverride
- flash
- immediate
- priority
- routine
name: <value of string>
value: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_address6_dynamicmapping β Configure IPv6 firewall addresses. fortinet.fortimanager.fmgr\_firewall\_address6\_dynamicmapping β Configure IPv6 firewall addresses.
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_address6_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **address6** string / required | | the parameter (address6) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_address6\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_image-base64** string | | no description |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **cache-ttl** integer | | no description |
| | **color** integer | | no description |
| | **comment** string | | no description |
| | **country** string | | no description |
| | **end-ip** string | | no description |
| | **end-mac** string | | no description |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **fqdn** string | | no description |
| | **global-object** integer | | no description |
| | **host** string | | no description |
| | **host-type** string | **Choices:*** any
* specific
| no description |
| | **ip6** string | | no description |
| | **macaddr** string | | no description |
| | **obj-id** string | | no description |
| | **sdn** string | **Choices:*** nsx
| no description |
| | **start-ip** string | | no description |
| | **start-mac** string | | no description |
| | **subnet-segment** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **type** string | **Choices:*** any
* specific
| no description |
| | | **value** string | | no description |
| | **tags** string | | no description |
| | **template** string | | no description |
| | **type** string | **Choices:*** ipprefix
* iprange
* nsx
* dynamic
* fqdn
* template
* mac
* geography
| no description |
| | **uuid** string | | no description |
| | **visibility** string | **Choices:*** disable
* enable
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 firewall addresses.
fmgr_firewall_address6_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
address6: <your own value>
state: <value in [present, absent]>
firewall_address6_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
cache-ttl: <value of integer>
color: <value of integer>
comment: <value of string>
end-ip: <value of string>
fqdn: <value of string>
host: <value of string>
host-type: <value in [any, specific]>
ip6: <value of string>
obj-id: <value of string>
sdn: <value in [nsx]>
start-ip: <value of string>
tags: <value of string>
template: <value of string>
type: <value in [ipprefix, iprange, nsx, ...]>
uuid: <value of string>
visibility: <value in [disable, enable]>
subnet-segment:
-
name: <value of string>
type: <value in [any, specific]>
value: <value of string>
_image-base64: <value of string>
end-mac: <value of string>
start-mac: <value of string>
country: <value of string>
global-object: <value of integer>
fabric-object: <value in [disable, enable]>
macaddr: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wanprof_system_sdwan_healthcheck_sla β Service level agreement fortinet.fortimanager.fmgr\_wanprof\_system\_sdwan\_healthcheck\_sla β Service level agreement
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanprof_system_sdwan_healthcheck_sla`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **health-check** string / required | | the parameter (health-check) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanprof** string / required | | the parameter (wanprof) in requested url |
| **wanprof\_system\_sdwan\_healthcheck\_sla** dictionary | | the top level parameters set |
| | **id** integer | | SLA ID. |
| | **jitter-threshold** integer | | Jitter for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | **latency-threshold** integer | | Latency for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | **link-cost-factor** list / elements=string | **Choices:*** latency
* jitter
* packet-loss
| no description |
| | **packetloss-threshold** integer | | Packet loss for SLA to make decision in percentage. (0 - 100, default = 0). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Service level agreement
fmgr_wanprof_system_sdwan_healthcheck_sla:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wanprof: <your own value>
health-check: <your own value>
state: <value in [present, absent]>
wanprof_system_sdwan_healthcheck_sla:
id: <value of integer>
jitter-threshold: <value of integer>
latency-threshold: <value of integer>
link-cost-factor:
- latency
- jitter
- packet-loss
packetloss-threshold: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver β Configure DHCP servers. fortinet.fortimanager.fmgr\_fsp\_vlan\_dhcpserver β Configure DHCP servers.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dhcpserver** dictionary | | the top level parameters set |
| | **auto-configuration** string | **Choices:*** disable
* enable
| no description |
| | **auto-managed-status** string | **Choices:*** disable
* enable
| no description |
| | **conflicted-ip-timeout** integer | | no description |
| | **ddns-auth** string | **Choices:*** disable
* tsig
| no description |
| | **ddns-key** string | | no description |
| | **ddns-keyname** string | | no description |
| | **ddns-server-ip** string | | no description |
| | **ddns-ttl** integer | | no description |
| | **ddns-update** string | **Choices:*** disable
* enable
| no description |
| | **ddns-update-override** string | **Choices:*** disable
* enable
| no description |
| | **ddns-zone** string | | no description |
| | **default-gateway** string | | no description |
| | **dhcp-settings-from-fortiipam** string | **Choices:*** disable
* enable
| no description |
| | **dns-server1** string | | no description |
| | **dns-server2** string | | no description |
| | **dns-server3** string | | no description |
| | **dns-server4** string | | no description |
| | **dns-service** string | **Choices:*** default
* specify
* local
| no description |
| | **domain** string | | no description |
| | **enable** string | **Choices:*** disable
* enable
| no description |
| | **exclude-range** list / elements=string | | no description |
| | | **end-ip** string | | no description |
| | | **id** integer | | no description |
| | | **start-ip** string | | no description |
| | **filename** string | | no description |
| | **forticlient-on-net-status** string | **Choices:*** disable
* enable
| no description |
| | **id** integer | | no description |
| | **interface** string | | no description |
| | **ip-mode** string | **Choices:*** range
* usrgrp
| no description |
| | **ip-range** list / elements=string | | no description |
| | | **end-ip** string | | no description |
| | | **id** integer | | no description |
| | | **start-ip** string | | no description |
| | **ipsec-lease-hold** integer | | no description |
| | **lease-time** integer | | no description |
| | **mac-acl-default-action** string | **Choices:*** assign
* block
| no description |
| | **netmask** string | | no description |
| | **next-server** string | | no description |
| | **ntp-server1** string | | no description |
| | **ntp-server2** string | | no description |
| | **ntp-server3** string | | no description |
| | **ntp-service** string | **Choices:*** default
* specify
* local
| no description |
| | **option1** string | | no description |
| | **option2** string | | no description |
| | **option3** string | | no description |
| | **option4** string | | no description |
| | **option5** string | | no description |
| | **option6** string | | no description |
| | **options** list / elements=string | | no description |
| | | **code** integer | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **type** string | **Choices:*** hex
* string
* ip
* fqdn
| no description |
| | | **value** string | | no description |
| | **reserved-address** list / elements=string | | no description |
| | | **action** string | **Choices:*** assign
* block
* reserved
| no description |
| | | **circuit-id** string | | no description |
| | | **circuit-id-type** string | **Choices:*** hex
* string
| no description |
| | | **description** string | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **mac** string | | no description |
| | | **remote-id** string | | no description |
| | | **remote-id-type** string | **Choices:*** hex
* string
| no description |
| | | **type** string | **Choices:*** mac
* option82
| no description |
| | **server-type** string | **Choices:*** regular
* ipsec
| no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **tftp-server** string | | no description |
| | **timezone** string | **Choices:*** 00
* 01
* 02
* 03
* 04
* 05
* 06
* 07
* 08
* 09
* 10
* 11
* 12
* 13
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 22
* 23
* 24
* 25
* 26
* 27
* 28
* 29
* 30
* 31
* 32
* 33
* 34
* 35
* 36
* 37
* 38
* 39
* 40
* 41
* 42
* 43
* 44
* 45
* 46
* 47
* 48
* 49
* 50
* 51
* 52
* 53
* 54
* 55
* 56
* 57
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 66
* 67
* 68
* 69
* 70
* 71
* 72
* 73
* 74
* 75
* 76
* 77
* 78
* 79
* 80
* 81
* 82
* 83
* 84
* 85
* 86
* 87
| no description |
| | **timezone-option** string | **Choices:*** disable
* default
* specify
| no description |
| | **vci-match** string | **Choices:*** disable
* enable
| no description |
| | **vci-string** string | | no description |
| | **wifi-ac-service** string | **Choices:*** specify
* local
| no description |
| | **wifi-ac1** string | | no description |
| | **wifi-ac2** string | | no description |
| | **wifi-ac3** string | | no description |
| | **wins-server1** string | | no description |
| | **wins-server2** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure DHCP servers.
fmgr_fsp_vlan_dhcpserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
fsp_vlan_dhcpserver:
auto-configuration: <value in [disable, enable]>
conflicted-ip-timeout: <value of integer>
ddns-auth: <value in [disable, tsig]>
ddns-key: <value of string>
ddns-keyname: <value of string>
ddns-server-ip: <value of string>
ddns-ttl: <value of integer>
ddns-update: <value in [disable, enable]>
ddns-update-override: <value in [disable, enable]>
ddns-zone: <value of string>
default-gateway: <value of string>
dns-server1: <value of string>
dns-server2: <value of string>
dns-server3: <value of string>
dns-service: <value in [default, specify, local]>
domain: <value of string>
enable: <value in [disable, enable]>
exclude-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
filename: <value of string>
forticlient-on-net-status: <value in [disable, enable]>
id: <value of integer>
interface: <value of string>
ip-mode: <value in [range, usrgrp]>
ip-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
ipsec-lease-hold: <value of integer>
lease-time: <value of integer>
mac-acl-default-action: <value in [assign, block]>
netmask: <value of string>
next-server: <value of string>
ntp-server1: <value of string>
ntp-server2: <value of string>
ntp-server3: <value of string>
ntp-service: <value in [default, specify, local]>
option1: <value of string>
option2: <value of string>
option3: <value of string>
option4: <value of string>
option5: <value of string>
option6: <value of string>
options:
-
code: <value of integer>
id: <value of integer>
ip: <value of string>
type: <value in [hex, string, ip, ...]>
value: <value of string>
reserved-address:
-
action: <value in [assign, block, reserved]>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
server-type: <value in [regular, ipsec]>
status: <value in [disable, enable]>
tftp-server: <value of string>
timezone: <value in [00, 01, 02, ...]>
timezone-option: <value in [disable, default, specify]>
vci-match: <value in [disable, enable]>
vci-string: <value of string>
wifi-ac1: <value of string>
wifi-ac2: <value of string>
wifi-ac3: <value of string>
wins-server1: <value of string>
wins-server2: <value of string>
dns-server4: <value of string>
wifi-ac-service: <value in [specify, local]>
auto-managed-status: <value in [disable, enable]>
dhcp-settings-from-fortiipam: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_snmp_community_hosts6 β Allow hosts configuration for IPv6. fortinet.fortimanager.fmgr\_system\_snmp\_community\_hosts6 β Allow hosts configuration for IPv6.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_snmp_community_hosts6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **community** string / required | | the parameter (community) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_snmp\_community\_hosts6** dictionary | | the top level parameters set |
| | **id** integer | **Default:**0 | Host entry ID. |
| | **interface** string | | Allow interface name. |
| | **ip** string | **Default:**"::/0" | Allow host IP address. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Allow hosts configuration for IPv6.
fmgr_system_snmp_community_hosts6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
community: <your own value>
state: <value in [present, absent]>
system_snmp_community_hosts6:
id: <value of integer>
interface: <value of string>
ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_connector β Configure connector. fortinet.fortimanager.fmgr\_system\_connector β Configure connector.
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_connector`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_connector** dictionary | | the top level parameters set |
| | **fsso-refresh-interval** integer | **Default:**180 | FSSO refresh interval (60 - 1800 seconds). |
| | **fsso-sess-timeout** integer | **Default:**300 | FSSO session timeout (30 - 600 seconds). |
| | **px-refresh-interval** integer | **Default:**300 | pxGrid refresh interval (60 - 1800 seconds). |
| | **px-svr-timeout** integer | **Default:**900 | pxGrid server timeout (30 - 600 seconds). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure connector.
fmgr_system_connector:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_connector:
fsso-refresh-interval: <value of integer>
fsso-sess-timeout: <value of integer>
px-refresh-interval: <value of integer>
px-svr-timeout: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_webproxy β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_webproxy β Replacement message table entries.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_webproxy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_webproxy** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_webproxy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_webproxy:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_securitypolicy_captiveportal β Names of VLANs that use captive portal authentication. fortinet.fortimanager.fmgr\_switchcontroller\_securitypolicy\_captiveportal β Names of VLANs that use captive portal authentication.
====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_securitypolicy_captiveportal`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_securitypolicy\_captiveportal** dictionary | | the top level parameters set |
| | **name** string | | Policy name. |
| | **policy-type** string | **Choices:*** captive-portal
| Policy type. |
| | **vlan** string | | Names of VLANs that use captive portal authentication. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Names of VLANs that use captive portal authentication.
fmgr_switchcontroller_securitypolicy_captiveportal:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
switchcontroller_securitypolicy_captiveportal:
name: <value of string>
policy-type: <value in [captive-portal]>
vlan: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_admin β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_admin β Replacement message table entries.
===============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_admin`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_admin** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_admin:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_admin:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_spamfilter_profile_yahoomail β Yahoo! Mail. fortinet.fortimanager.fmgr\_spamfilter\_profile\_yahoomail β Yahoo! Mail.
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_profile_yahoomail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_profile\_yahoomail** dictionary | | the top level parameters set |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Yahoo! Mail.
fmgr_spamfilter_profile_yahoomail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
spamfilter_profile_yahoomail:
log: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_footer_policy β Configure IPv4/IPv6 policies. fortinet.fortimanager.fmgr\_pkg\_footer\_policy β Configure IPv4/IPv6 policies.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_footer_policy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_footer\_policy** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
* ipsec
* ssl-vpn
| no description |
| | **active-auth-method** string | **Choices:*** ntlm
* basic
* digest
* form
| no description |
| | **anti-replay** string | **Choices:*** disable
* enable
| no description |
| | **app-category** string | | no description |
| | **app-group** string | | no description |
| | **application** integer | | no description |
| | **application-charts** list / elements=string | **Choices:*** top10-app
* top10-p2p-user
* top10-media-user
| no description |
| | **application-list** string | | no description |
| | **auth-cert** string | | no description |
| | **auth-method** string | **Choices:*** basic
* digest
* ntlm
* fsae
* form
* fsso
* rsso
| no description |
| | **auth-path** string | **Choices:*** disable
* enable
| no description |
| | **auth-portal** string | **Choices:*** disable
* enable
| no description |
| | **auth-redirect-addr** string | | no description |
| | **auto-asic-offload** string | **Choices:*** disable
* enable
| no description |
| | **av-profile** string | | no description |
| | **bandwidth** string | **Choices:*** disable
* enable
| no description |
| | **best-route** string | **Choices:*** disable
* enable
| no description |
| | **block-notification** string | **Choices:*** disable
* enable
| no description |
| | **captive-portal-exempt** string | **Choices:*** disable
* enable
| no description |
| | **capture-packet** string | **Choices:*** disable
* enable
| no description |
| | **casi-profile** string | | no description |
| | **central-nat** string | **Choices:*** disable
* enable
| no description |
| | **cgn-eif** string | **Choices:*** disable
* enable
| no description |
| | **cgn-eim** string | **Choices:*** disable
* enable
| no description |
| | **cgn-log-server-grp** string | | no description |
| | **cgn-resource-quota** integer | | no description |
| | **cgn-session-quota** integer | | no description |
| | **cifs-profile** string | | no description |
| | **client-reputation** string | **Choices:*** disable
* enable
| no description |
| | **client-reputation-mode** string | **Choices:*** learning
* monitoring
| no description |
| | **comments** string | | no description |
| | **custom-log-fields** string | | no description |
| | **decrypted-traffic-mirror** string | | no description |
| | **deep-inspection-options** string | | no description |
| | **delay-tcp-npu-session** string | **Choices:*** disable
* enable
| no description |
| | **delay-tcp-npu-sessoin** string | **Choices:*** disable
* enable
| no description |
| | **device-detection-portal** string | **Choices:*** disable
* enable
| no description |
| | **devices** string | | no description |
| | **diffserv-forward** string | **Choices:*** disable
* enable
| no description |
| | **diffserv-reverse** string | **Choices:*** disable
* enable
| no description |
| | **diffservcode-forward** string | | no description |
| | **diffservcode-rev** string | | no description |
| | **disclaimer** string | **Choices:*** disable
* enable
| no description |
| | **dlp-sensor** string | | no description |
| | **dnsfilter-profile** string | | no description |
| | **dponly** string | **Choices:*** disable
* enable
| no description |
| | **dscp-match** string | **Choices:*** disable
* enable
| no description |
| | **dscp-negate** string | **Choices:*** disable
* enable
| no description |
| | **dscp-value** string | | no description |
| | **dsri** string | **Choices:*** disable
* enable
| no description |
| | **dstaddr** string | | no description |
| | **dstaddr-negate** string | **Choices:*** disable
* enable
| no description |
| | **dstaddr6** string | | no description |
| | **dstintf** string | | no description |
| | **dynamic-profile** string | **Choices:*** disable
* enable
| no description |
| | **dynamic-profile-access** list / elements=string | **Choices:*** imap
* smtp
* pop3
* http
* ftp
* im
* nntp
* imaps
* smtps
* pop3s
* https
* ftps
* ssh
| no description |
| | **dynamic-profile-fallthrough** string | **Choices:*** disable
* enable
| no description |
| | **dynamic-profile-group** string | | no description |
| | **dynamic-shaping** string | **Choices:*** disable
* enable
| Enable/disable dynamic RADIUS defined traffic shaping. |
| | **email-collect** string | **Choices:*** disable
* enable
| no description |
| | **email-collection-portal** string | **Choices:*** disable
* enable
| no description |
| | **emailfilter-profile** string | | no description |
| | **endpoint-check** string | **Choices:*** disable
* enable
| no description |
| | **endpoint-compliance** string | **Choices:*** disable
* enable
| no description |
| | **endpoint-keepalive-interface** string | | no description |
| | **endpoint-profile** string | | no description |
| | **failed-connection** string | **Choices:*** disable
* enable
| no description |
| | **fall-through-unauthenticated** string | **Choices:*** disable
* enable
| no description |
| | **file-filter-profile** string | | no description |
| | **firewall-session-dirty** string | **Choices:*** check-all
* check-new
| no description |
| | **fixedport** string | **Choices:*** disable
* enable
| no description |
| | **forticlient-compliance-devices** list / elements=string | **Choices:*** windows-pc
* mac
* iphone-ipad
* android
| no description |
| | **forticlient-compliance-enforcement-portal** string | **Choices:*** disable
* enable
| no description |
| | **fsae** string | **Choices:*** disable
* enable
| no description |
| | **fsae-server-for-ntlm** string | | no description |
| | **fsso** string | **Choices:*** disable
* enable
| no description |
| | **fsso-agent-for-ntlm** string | | no description |
| | **fsso-groups** string | | no description |
| | **geo-location** string | **Choices:*** disable
* enable
| no description |
| | **geoip-anycast** string | **Choices:*** disable
* enable
| no description |
| | **geoip-match** string | **Choices:*** physical-location
* registered-location
| no description |
| | **global-label** string | | no description |
| | **groups** string | | no description |
| | **gtp-profile** string | | no description |
| | **http-policy-redirect** string | **Choices:*** disable
* enable
| no description |
| | **icap-profile** string | | no description |
| | **identity-based** string | **Choices:*** disable
* enable
| no description |
| | **identity-based-policy** list / elements=string | | no description |
| | | **action** string | **Choices:*** deny
* accept
| no description |
| | | **application-charts** list / elements=string | **Choices:*** top10-app
* top10-p2p-user
* top10-media-user
| no description |
| | | **application-list** string | | no description |
| | | **av-profile** string | | no description |
| | | **capture-packet** string | **Choices:*** disable
* enable
| no description |
| | | **deep-inspection-options** string | | no description |
| | | **devices** string | | no description |
| | | **dlp-sensor** string | | no description |
| | | **dstaddr** string | | no description |
| | | **dstaddr-negate** string | **Choices:*** disable
* enable
| no description |
| | | **endpoint-compliance** string | **Choices:*** disable
* enable
| no description |
| | | **groups** string | | no description |
| | | **icap-profile** string | | no description |
| | | **id** integer | | no description |
| | | **ips-sensor** string | | no description |
| | | **logtraffic** string | **Choices:*** disable
* enable
* all
* utm
| no description |
| | | **logtraffic-app** string | **Choices:*** disable
* enable
| no description |
| | | **logtraffic-start** string | **Choices:*** disable
* enable
| no description |
| | | **mms-profile** string | | no description |
| | | **per-ip-shaper** string | | no description |
| | | **profile-group** string | | no description |
| | | **profile-protocol-options** string | | no description |
| | | **profile-type** string | **Choices:*** single
* group
| no description |
| | | **replacemsg-group** string | | no description |
| | | **schedule** string | | no description |
| | | **send-deny-packet** string | **Choices:*** disable
* enable
| no description |
| | | **service** string | | no description |
| | | **service-negate** string | **Choices:*** disable
* enable
| no description |
| | | **spamfilter-profile** string | | no description |
| | | **sslvpn-portal** string | | no description |
| | | **sslvpn-realm** string | | no description |
| | | **traffic-shaper** string | | no description |
| | | **traffic-shaper-reverse** string | | no description |
| | | **users** string | | no description |
| | | **utm-status** string | **Choices:*** disable
* enable
| no description |
| | | **voip-profile** string | | no description |
| | | **webfilter-profile** string | | no description |
| | **identity-based-route** string | | no description |
| | **identity-from** string | **Choices:*** auth
* device
| no description |
| | **inbound** string | **Choices:*** disable
* enable
| no description |
| | **inspection-mode** string | **Choices:*** proxy
* flow
| no description |
| | **internet-service** string | **Choices:*** disable
* enable
| no description |
| | **internet-service-custom** string | | no description |
| | **internet-service-custom-group** string | | no description |
| | **internet-service-group** string | | no description |
| | **internet-service-id** string | | no description |
| | **internet-service-name** string | | no description |
| | **internet-service-negate** string | **Choices:*** disable
* enable
| no description |
| | **internet-service-src** string | **Choices:*** disable
* enable
| no description |
| | **internet-service-src-custom** string | | no description |
| | **internet-service-src-custom-group** string | | no description |
| | **internet-service-src-group** string | | no description |
| | **internet-service-src-id** string | | no description |
| | **internet-service-src-name** string | | no description |
| | **internet-service-src-negate** string | **Choices:*** disable
* enable
| no description |
| | **ip-based** string | **Choices:*** disable
* enable
| no description |
| | **ippool** string | **Choices:*** disable
* enable
| no description |
| | **ips-sensor** string | | no description |
| | **label** string | | no description |
| | **learning-mode** string | **Choices:*** disable
* enable
| no description |
| | **log-unmatched-traffic** string | **Choices:*** disable
* enable
| no description |
| | **logtraffic** string | **Choices:*** disable
* enable
* all
* utm
| no description |
| | **logtraffic-app** string | **Choices:*** disable
* enable
| no description |
| | **logtraffic-start** string | **Choices:*** disable
* enable
| no description |
| | **match-vip** string | **Choices:*** disable
* enable
| no description |
| | **match-vip-only** string | **Choices:*** disable
* enable
| no description |
| | **mms-profile** string | | no description |
| | **name** string | | no description |
| | **nat** string | **Choices:*** disable
* enable
| no description |
| | **natinbound** string | **Choices:*** disable
* enable
| no description |
| | **natip** string | | no description |
| | **natoutbound** string | **Choices:*** disable
* enable
| no description |
| | **np-acceleration** string | **Choices:*** disable
* enable
| no description |
| | **ntlm** string | **Choices:*** disable
* enable
| no description |
| | **ntlm-enabled-browsers** string | | no description |
| | **ntlm-guest** string | **Choices:*** disable
* enable
| no description |
| | **outbound** string | **Choices:*** disable
* enable
| no description |
| | **passive-wan-health-measurement** string | **Choices:*** disable
* enable
| Enable/disable passive WAN health measurement. When enabled, auto-asic-offload is disabled. |
| | **per-ip-shaper** string | | no description |
| | **permit-any-host** string | **Choices:*** disable
* enable
| no description |
| | **permit-stun-host** string | **Choices:*** disable
* enable
| no description |
| | **policy-offload** string | **Choices:*** disable
* enable
| no description |
| | **policyid** integer | | no description |
| | **poolname** string | | no description |
| | **poolname6** string | | no description |
| | **profile-group** string | | no description |
| | **profile-protocol-options** string | | no description |
| | **profile-type** string | **Choices:*** single
* group
| no description |
| | **radius-mac-auth-bypass** string | **Choices:*** disable
* enable
| no description |
| | **redirect-url** string | | no description |
| | **replacemsg-group** string | | no description |
| | **replacemsg-override-group** string | | no description |
| | **reputation-direction** string | **Choices:*** source
* destination
| no description |
| | **reputation-minimum** integer | | no description |
| | **require-tfa** string | **Choices:*** disable
* enable
| no description |
| | **rsso** string | **Choices:*** disable
* enable
| no description |
| | **rtp-addr** string | | no description |
| | **rtp-nat** string | **Choices:*** disable
* enable
| no description |
| | **scan-botnet-connections** string | **Choices:*** disable
* block
* monitor
| no description |
| | **schedule** string | | no description |
| | **schedule-timeout** string | **Choices:*** disable
* enable
| no description |
| | **send-deny-packet** string | **Choices:*** disable
* enable
| no description |
| | **service** string | | no description |
| | **service-negate** string | **Choices:*** disable
* enable
| no description |
| | **session-ttl** integer | | no description |
| | **sessions** string | **Choices:*** disable
* enable
| no description |
| | **spamfilter-profile** string | | no description |
| | **src-vendor-mac** string | | no description |
| | **srcaddr** string | | no description |
| | **srcaddr-negate** string | **Choices:*** disable
* enable
| no description |
| | **srcaddr6** string | | no description |
| | **srcintf** string | | no description |
| | **ssh-filter-profile** string | | no description |
| | **ssh-policy-redirect** string | **Choices:*** disable
* enable
| no description |
| | **ssl-mirror** string | **Choices:*** disable
* enable
| no description |
| | **ssl-mirror-intf** string | | no description |
| | **ssl-ssh-profile** string | | no description |
| | **sslvpn-auth** string | **Choices:*** any
* local
* radius
* ldap
* tacacs+
| no description |
| | **sslvpn-ccert** string | **Choices:*** disable
* enable
| no description |
| | **sslvpn-cipher** string | **Choices:*** any
* high
* medium
| no description |
| | **sso-auth-method** string | **Choices:*** fsso
* rsso
| no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **tags** string | | no description |
| | **tcp-mss-receiver** integer | | no description |
| | **tcp-mss-sender** integer | | no description |
| | **tcp-reset** string | **Choices:*** disable
* enable
| no description |
| | **tcp-session-without-syn** string | **Choices:*** all
* data-only
* disable
| no description |
| | **timeout-send-rst** string | **Choices:*** disable
* enable
| no description |
| | **tos** string | | no description |
| | **tos-mask** string | | no description |
| | **tos-negate** string | **Choices:*** disable
* enable
| no description |
| | **traffic-shaper** string | | no description |
| | **traffic-shaper-reverse** string | | no description |
| | **transaction-based** string | **Choices:*** disable
* enable
| no description |
| | **url-category** string | | no description |
| | **users** string | | no description |
| | **utm-inspection-mode** string | **Choices:*** proxy
* flow
| no description |
| | **utm-status** string | **Choices:*** disable
* enable
| no description |
| | **uuid** string | | no description |
| | **vendor-mac** string | | no description |
| | **videofilter-profile** string | | Name of an existing VideoFilter profile. |
| | **vlan-cos-fwd** integer | | no description |
| | **vlan-cos-rev** integer | | no description |
| | **vlan-filter** string | | no description |
| | **voip-profile** string | | no description |
| | **vpntunnel** string | | no description |
| | **waf-profile** string | | no description |
| | **wanopt** string | **Choices:*** disable
* enable
| no description |
| | **wanopt-detection** string | **Choices:*** active
* passive
* off
| no description |
| | **wanopt-passive-opt** string | **Choices:*** default
* transparent
* non-transparent
| no description |
| | **wanopt-peer** string | | no description |
| | **wanopt-profile** string | | no description |
| | **wccp** string | **Choices:*** disable
* enable
| no description |
| | **web-auth-cookie** string | **Choices:*** disable
* enable
| no description |
| | **webcache** string | **Choices:*** disable
* enable
| no description |
| | **webcache-https** string | **Choices:*** disable
* ssl-server
* any
* enable
| no description |
| | **webfilter-profile** string | | no description |
| | **webproxy-forward-server** string | | no description |
| | **webproxy-profile** string | | no description |
| | **wsso** string | **Choices:*** disable
* enable
| no description |
| | **ztna-ems-tag** string | | Source ztna-ems-tag names. |
| | **ztna-geo-tag** string | | Source ztna-geo-tag names. |
| | **ztna-status** string | **Choices:*** disable
* enable
| Enable/disable zero trust access. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4/IPv6 policies.
fmgr_pkg_footer_policy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pkg: <your own value>
state: <value in [present, absent]>
pkg_footer_policy:
action: <value in [deny, accept, ipsec, ...]>
active-auth-method: <value in [ntlm, basic, digest, ...]>
anti-replay: <value in [disable, enable]>
app-category: <value of string>
app-group: <value of string>
application: <value of integer>
application-charts:
- top10-app
- top10-p2p-user
- top10-media-user
application-list: <value of string>
auth-cert: <value of string>
auth-method: <value in [basic, digest, ntlm, ...]>
auth-path: <value in [disable, enable]>
auth-portal: <value in [disable, enable]>
auth-redirect-addr: <value of string>
auto-asic-offload: <value in [disable, enable]>
av-profile: <value of string>
bandwidth: <value in [disable, enable]>
block-notification: <value in [disable, enable]>
captive-portal-exempt: <value in [disable, enable]>
capture-packet: <value in [disable, enable]>
casi-profile: <value of string>
central-nat: <value in [disable, enable]>
cifs-profile: <value of string>
client-reputation: <value in [disable, enable]>
client-reputation-mode: <value in [learning, monitoring]>
comments: <value of string>
custom-log-fields: <value of string>
deep-inspection-options: <value of string>
delay-tcp-npu-session: <value in [disable, enable]>
delay-tcp-npu-sessoin: <value in [disable, enable]>
device-detection-portal: <value in [disable, enable]>
devices: <value of string>
diffserv-forward: <value in [disable, enable]>
diffserv-reverse: <value in [disable, enable]>
diffservcode-forward: <value of string>
diffservcode-rev: <value of string>
disclaimer: <value in [disable, enable]>
dlp-sensor: <value of string>
dnsfilter-profile: <value of string>
dponly: <value in [disable, enable]>
dscp-match: <value in [disable, enable]>
dscp-negate: <value in [disable, enable]>
dscp-value: <value of string>
dsri: <value in [disable, enable]>
dstaddr: <value of string>
dstaddr-negate: <value in [disable, enable]>
dstaddr6: <value of string>
dstintf: <value of string>
dynamic-profile: <value in [disable, enable]>
dynamic-profile-access:
- imap
- smtp
- pop3
- http
- ftp
- im
- nntp
- imaps
- smtps
- pop3s
- https
- ftps
- ssh
dynamic-profile-fallthrough: <value in [disable, enable]>
dynamic-profile-group: <value of string>
email-collect: <value in [disable, enable]>
email-collection-portal: <value in [disable, enable]>
emailfilter-profile: <value of string>
endpoint-check: <value in [disable, enable]>
endpoint-compliance: <value in [disable, enable]>
endpoint-keepalive-interface: <value of string>
endpoint-profile: <value of string>
failed-connection: <value in [disable, enable]>
fall-through-unauthenticated: <value in [disable, enable]>
firewall-session-dirty: <value in [check-all, check-new]>
fixedport: <value in [disable, enable]>
forticlient-compliance-devices:
- windows-pc
- mac
- iphone-ipad
- android
forticlient-compliance-enforcement-portal: <value in [disable, enable]>
fsae: <value in [disable, enable]>
fsae-server-for-ntlm: <value of string>
fsso: <value in [disable, enable]>
fsso-agent-for-ntlm: <value of string>
geo-location: <value in [disable, enable]>
geoip-anycast: <value in [disable, enable]>
global-label: <value of string>
groups: <value of string>
gtp-profile: <value of string>
http-policy-redirect: <value in [disable, enable]>
icap-profile: <value of string>
identity-based: <value in [disable, enable]>
identity-based-policy:
-
action: <value in [deny, accept]>
application-charts:
- top10-app
- top10-p2p-user
- top10-media-user
application-list: <value of string>
av-profile: <value of string>
capture-packet: <value in [disable, enable]>
deep-inspection-options: <value of string>
devices: <value of string>
dlp-sensor: <value of string>
dstaddr: <value of string>
dstaddr-negate: <value in [disable, enable]>
endpoint-compliance: <value in [disable, enable]>
groups: <value of string>
icap-profile: <value of string>
id: <value of integer>
ips-sensor: <value of string>
logtraffic: <value in [disable, enable, all, ...]>
logtraffic-app: <value in [disable, enable]>
logtraffic-start: <value in [disable, enable]>
mms-profile: <value of string>
per-ip-shaper: <value of string>
profile-group: <value of string>
profile-protocol-options: <value of string>
profile-type: <value in [single, group]>
replacemsg-group: <value of string>
schedule: <value of string>
send-deny-packet: <value in [disable, enable]>
service: <value of string>
service-negate: <value in [disable, enable]>
spamfilter-profile: <value of string>
sslvpn-portal: <value of string>
sslvpn-realm: <value of string>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
users: <value of string>
utm-status: <value in [disable, enable]>
voip-profile: <value of string>
webfilter-profile: <value of string>
identity-based-route: <value of string>
identity-from: <value in [auth, device]>
inbound: <value in [disable, enable]>
inspection-mode: <value in [proxy, flow]>
internet-service: <value in [disable, enable]>
internet-service-custom: <value of string>
internet-service-custom-group: <value of string>
internet-service-group: <value of string>
internet-service-id: <value of string>
internet-service-negate: <value in [disable, enable]>
internet-service-src: <value in [disable, enable]>
internet-service-src-custom: <value of string>
internet-service-src-custom-group: <value of string>
internet-service-src-group: <value of string>
internet-service-src-id: <value of string>
internet-service-src-negate: <value in [disable, enable]>
ip-based: <value in [disable, enable]>
ippool: <value in [disable, enable]>
ips-sensor: <value of string>
label: <value of string>
learning-mode: <value in [disable, enable]>
log-unmatched-traffic: <value in [disable, enable]>
logtraffic: <value in [disable, enable, all, ...]>
logtraffic-app: <value in [disable, enable]>
logtraffic-start: <value in [disable, enable]>
match-vip: <value in [disable, enable]>
mms-profile: <value of string>
name: <value of string>
nat: <value in [disable, enable]>
natinbound: <value in [disable, enable]>
natip: <value of string>
natoutbound: <value in [disable, enable]>
np-acceleration: <value in [disable, enable]>
ntlm: <value in [disable, enable]>
ntlm-enabled-browsers: <value of string>
ntlm-guest: <value in [disable, enable]>
outbound: <value in [disable, enable]>
per-ip-shaper: <value of string>
permit-any-host: <value in [disable, enable]>
permit-stun-host: <value in [disable, enable]>
policyid: <value of integer>
poolname: <value of string>
profile-group: <value of string>
profile-protocol-options: <value of string>
profile-type: <value in [single, group]>
radius-mac-auth-bypass: <value in [disable, enable]>
redirect-url: <value of string>
replacemsg-group: <value of string>
replacemsg-override-group: <value of string>
reputation-direction: <value in [source, destination]>
reputation-minimum: <value of integer>
require-tfa: <value in [disable, enable]>
rsso: <value in [disable, enable]>
rtp-addr: <value of string>
rtp-nat: <value in [disable, enable]>
scan-botnet-connections: <value in [disable, block, monitor]>
schedule: <value of string>
schedule-timeout: <value in [disable, enable]>
send-deny-packet: <value in [disable, enable]>
service: <value of string>
service-negate: <value in [disable, enable]>
session-ttl: <value of integer>
sessions: <value in [disable, enable]>
spamfilter-profile: <value of string>
srcaddr: <value of string>
srcaddr-negate: <value in [disable, enable]>
srcaddr6: <value of string>
srcintf: <value of string>
ssh-filter-profile: <value of string>
ssh-policy-redirect: <value in [disable, enable]>
ssl-mirror: <value in [disable, enable]>
ssl-mirror-intf: <value of string>
ssl-ssh-profile: <value of string>
sslvpn-auth: <value in [any, local, radius, ...]>
sslvpn-ccert: <value in [disable, enable]>
sslvpn-cipher: <value in [any, high, medium]>
sso-auth-method: <value in [fsso, rsso]>
status: <value in [disable, enable]>
tags: <value of string>
tcp-mss-receiver: <value of integer>
tcp-mss-sender: <value of integer>
tcp-reset: <value in [disable, enable]>
tcp-session-without-syn: <value in [all, data-only, disable]>
timeout-send-rst: <value in [disable, enable]>
tos: <value of string>
tos-mask: <value of string>
tos-negate: <value in [disable, enable]>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
transaction-based: <value in [disable, enable]>
url-category: <value of string>
users: <value of string>
utm-inspection-mode: <value in [proxy, flow]>
utm-status: <value in [disable, enable]>
uuid: <value of string>
vlan-cos-fwd: <value of integer>
vlan-cos-rev: <value of integer>
vlan-filter: <value of string>
voip-profile: <value of string>
vpntunnel: <value of string>
waf-profile: <value of string>
wanopt: <value in [disable, enable]>
wanopt-detection: <value in [active, passive, off]>
wanopt-passive-opt: <value in [default, transparent, non-transparent]>
wanopt-peer: <value of string>
wanopt-profile: <value of string>
wccp: <value in [disable, enable]>
web-auth-cookie: <value in [disable, enable]>
webcache: <value in [disable, enable]>
webcache-https: <value in [disable, ssl-server, any, ...]>
webfilter-profile: <value of string>
webproxy-forward-server: <value of string>
webproxy-profile: <value of string>
wsso: <value in [disable, enable]>
fsso-groups: <value of string>
match-vip-only: <value in [disable, enable]>
best-route: <value in [disable, enable]>
decrypted-traffic-mirror: <value of string>
geoip-match: <value in [physical-location, registered-location]>
internet-service-name: <value of string>
internet-service-src-name: <value of string>
poolname6: <value of string>
src-vendor-mac: <value of string>
vendor-mac: <value of string>
file-filter-profile: <value of string>
cgn-eif: <value in [disable, enable]>
cgn-eim: <value in [disable, enable]>
cgn-log-server-grp: <value of string>
cgn-resource-quota: <value of integer>
cgn-session-quota: <value of integer>
policy-offload: <value in [disable, enable]>
dynamic-shaping: <value in [disable, enable]>
passive-wan-health-measurement: <value in [disable, enable]>
videofilter-profile: <value of string>
ztna-ems-tag: <value of string>
ztna-geo-tag: <value of string>
ztna-status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_user_devicecategory β Configure device categories. fortinet.fortimanager.fmgr\_user\_devicecategory β Configure device categories.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_devicecategory`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_devicecategory** dictionary | | the top level parameters set |
| | **comment** string | | no description |
| | **desc** string | | no description |
| | **name** string | | Device category name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure device categories.
fmgr_user_devicecategory:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_devicecategory:
comment: <value of string>
desc: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_avips_advancedlog β Enable/disable logging of FortiGuard antivirus and IPS update packages received by FortiManagers built-in FortiGuard. fortinet.fortimanager.fmgr\_fmupdate\_avips\_advancedlog β Enable/disable logging of FortiGuard antivirus and IPS update packages received by FortiManagers built-in FortiGuard.
================================================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_avips_advancedlog`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_avips\_advancedlog** dictionary | | the top level parameters set |
| | **log-fortigate** string | **Choices:*** **disable** β
* enable
| Enable/disable logging of FortiGuard antivirus and IPS service updates of FortiGate devices (default = disable). disable - Disable setting. enable - Enable setting. |
| | **log-server** string | **Choices:*** disable
* **enable** β
| Enable/disable logging of update packages received by the build-in FortiGuard server (default = disable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable logging of FortiGuard antivirus and IPS update packages received by FortiManagers built-in FortiGuard.
fmgr_fmupdate_avips_advancedlog:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_avips_advancedlog:
log-fortigate: <value in [disable, enable]>
log-server: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_guiact β System settings through GUI. fortinet.fortimanager.fmgr\_system\_guiact β System settings through GUI.
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_guiact`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_guiact** dictionary | | the top level parameters set |
| | **backup\_all** string | | Backup all settings. |
| | **backup\_conf** string | | Backup config file. |
| | **eventlog\_msg** string | | Write event log. |
| | **eventlog\_path** string | | Event log path. |
| | **reboot** integer | **Default:**0 | Reboot system. |
| | **reset2default** integer | **Default:**0 | Reset to factory default. |
| | **restore\_all** string | | Restore all settings. |
| | **restore\_conf** string | | Restore config file. |
| | **time** string | | Time. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: System settings through GUI.
fmgr_system_guiact:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_guiact:
backup_all: <value of string>
backup_conf: <value of string>
eventlog_msg: <value of string>
eventlog_path: <value of string>
reboot: <value of integer>
reset2default: <value of integer>
restore_all: <value of string>
restore_conf: <value of string>
time: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_ippool β Configure IPv4 IP pools. fortinet.fortimanager.fmgr\_firewall\_ippool β Configure IPv4 IP pools.
=======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_ippool`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_ippool** dictionary | | the top level parameters set |
| | **arp-intf** string | | Select an interface from available options that will reply to ARP requests. (If blank, any is selected). |
| | **arp-reply** string | **Choices:*** disable
* enable
| Enable/disable replying to ARP requests when an IP Pool is added to a policy (default = enable). |
| | **associated-interface** string | | Associated interface name. |
| | **block-size** integer | | Number of addresses in a block (64 to 4096, default = 128). |
| | **comments** string | | Comment. |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **arp-intf** string | | no description |
| | | **arp-reply** string | **Choices:*** disable
* enable
| no description |
| | | **associated-interface** string | | no description |
| | | **block-size** integer | | no description |
| | | **cgn-block-size** integer | | no description |
| | | **cgn-client-endip** string | | no description |
| | | **cgn-client-startip** string | | no description |
| | | **cgn-fixedalloc** string | **Choices:*** disable
* enable
| no description |
| | | **cgn-overload** string | **Choices:*** disable
* enable
| no description |
| | | **cgn-port-end** integer | | no description |
| | | **cgn-port-start** integer | | no description |
| | | **cgn-spa** string | **Choices:*** disable
* enable
| no description |
| | | **comments** string | | no description |
| | | **endip** string | | no description |
| | | **endport** integer | | Final port number (inclusive) in the range for the address pool (Default: 65533). |
| | | **num-blocks-per-user** integer | | no description |
| | | **pba-timeout** integer | | no description |
| | | **permit-any-host** string | **Choices:*** disable
* enable
| no description |
| | | **port-per-user** integer | | Number of port for each user (32 to 60416, default = 0, auto). |
| | | **source-endip** string | | no description |
| | | **source-startip** string | | no description |
| | | **startip** string | | no description |
| | | **startport** integer | | First port number (inclusive) in the range for the address pool (Default: 5117). |
| | | **type** string | **Choices:*** overload
* one-to-one
* fixed-port-range
* port-block-allocation
* cgn-resource-allocation
| no description |
| | | **utilization-alarm-clear** integer | | no description |
| | | **utilization-alarm-raise** integer | | no description |
| | **endip** string | | Final IPv4 address (inclusive) in the range for the address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). |
| | **endport** integer | | Final port number (inclusive) in the range for the address pool (Default: 65533). |
| | **name** string | | IP pool name. |
| | **num-blocks-per-user** integer | | Number of addresses blocks that can be used by a user (1 to 128, default = 8). |
| | **pba-timeout** integer | | Port block allocation timeout (seconds). |
| | **permit-any-host** string | **Choices:*** disable
* enable
| Enable/disable full cone NAT. |
| | **port-per-user** integer | | Number of port for each user (32 to 60416, default = 0, auto). |
| | **source-endip** string | | Final IPv4 address (inclusive) in the range of the source addresses to be translated (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). |
| | **source-startip** string | | First IPv4 address (inclusive) in the range of the source addresses to be translated (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). |
| | **startip** string | | First IPv4 address (inclusive) in the range for the address pool (format xxx.xxx.xxx.xxx, Default: 0.0.0.0). |
| | **startport** integer | | First port number (inclusive) in the range for the address pool (Default: 5117). |
| | **type** string | **Choices:*** overload
* one-to-one
* fixed-port-range
* port-block-allocation
* cgn-resource-allocation
| IP pool type (overload, one-to-one, fixed port range, or port block allocation). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 IP pools.
fmgr_firewall_ippool:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_ippool:
arp-intf: <value of string>
arp-reply: <value in [disable, enable]>
associated-interface: <value of string>
block-size: <value of integer>
comments: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
arp-intf: <value of string>
arp-reply: <value in [disable, enable]>
associated-interface: <value of string>
block-size: <value of integer>
comments: <value of string>
endip: <value of string>
num-blocks-per-user: <value of integer>
pba-timeout: <value of integer>
permit-any-host: <value in [disable, enable]>
source-endip: <value of string>
source-startip: <value of string>
startip: <value of string>
type: <value in [overload, one-to-one, fixed-port-range, ...]>
cgn-block-size: <value of integer>
cgn-client-endip: <value of string>
cgn-client-startip: <value of string>
cgn-fixedalloc: <value in [disable, enable]>
cgn-overload: <value in [disable, enable]>
cgn-port-end: <value of integer>
cgn-port-start: <value of integer>
cgn-spa: <value in [disable, enable]>
utilization-alarm-clear: <value of integer>
utilization-alarm-raise: <value of integer>
endport: <value of integer>
port-per-user: <value of integer>
startport: <value of integer>
endip: <value of string>
name: <value of string>
num-blocks-per-user: <value of integer>
pba-timeout: <value of integer>
permit-any-host: <value in [disable, enable]>
source-endip: <value of string>
source-startip: <value of string>
startip: <value of string>
type: <value in [overload, one-to-one, fixed-port-range, ...]>
endport: <value of integer>
port-per-user: <value of integer>
startport: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_wtpprofile_radio4 β Configuration options for radio 4. fortinet.fortimanager.fmgr\_wtpprofile\_radio4 β Configuration options for radio 4.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wtpprofile_radio4`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
| **wtp-profile** string / required | | the parameter (wtp-profile) in requested url |
| **wtpprofile\_radio4** dictionary | | the top level parameters set |
| | **airtime-fairness** string | **Choices:*** disable
* enable
| Enable/disable airtime fairness (default = disable). |
| | **amsdu** string | **Choices:*** disable
* enable
| Enable/disable 802.11n AMSDU support. AMSDU can improve performance if supported by your WiFi clients (default = enable). |
| | **ap-handoff** string | **Choices:*** disable
* enable
| Enable/disable AP handoff of clients to other APs (default = disable). |
| | **ap-sniffer-addr** string | | MAC address to monitor. |
| | **ap-sniffer-bufsize** integer | | Sniffer buffer size (1 - 32 MB, default = 16). |
| | **ap-sniffer-chan** integer | | Channel on which to operate the sniffer (default = 6). |
| | **ap-sniffer-ctl** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi control frame (default = enable). |
| | **ap-sniffer-data** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi data frame (default = enable). |
| | **ap-sniffer-mgmt-beacon** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management Beacon frames (default = enable). |
| | **ap-sniffer-mgmt-other** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management other frames (default = enable). |
| | **ap-sniffer-mgmt-probe** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management probe frames (default = enable). |
| | **auto-power-high** integer | | The upper bound of automatic transmit power adjustment in dBm (the actual range of transmit power depends on the AP platform t... |
| | **auto-power-level** string | **Choices:*** disable
* enable
| Enable/disable automatic power-level adjustment to prevent co-channel interference (default = enable). |
| | **auto-power-low** integer | | The lower bound of automatic transmit power adjustment in dBm (the actual range of transmit power depends on the AP platform t... |
| | **auto-power-target** string | | The target of automatic transmit power adjustment in dBm. (-95 to -20, default = -70). |
| | **band** string | **Choices:*** 802.11b
* 802.11a
* 802.11g
* 802.11n
* 802.11ac
* 802.11n-5G
* 802.11ax-5G
* 802.11ax
* 802.11g-only
* 802.11n-only
* 802.11n,g-only
* 802.11ac-only
* 802.11ac,n-only
* 802.11n-5G-only
* 802.11ax-5G-only
* 802.11ax,ac-only
* 802.11ax,ac,n-only
* 802.11ax-only
* 802.11ax,n-only
* 802.11ax,n,g-only
* 802.11ac-2G
| WiFi band that Radio 3 operates on. |
| | **band-5g-type** string | **Choices:*** 5g-full
* 5g-high
* 5g-low
| WiFi 5G band type. |
| | **bandwidth-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WiFi multimedia (WMM) bandwidth admission control to optimize WiFi bandwidth use. A request to join the wireles... |
| | **bandwidth-capacity** integer | | Maximum bandwidth capacity allowed (1 - 600000 Kbps, default = 2000). |
| | **beacon-interval** integer | | Beacon interval. The time between beacon frames in msec (the actual range of beacon interval depends on the AP platform type, ... |
| | **bss-color** integer | | BSS color value for this 11ax radio (0 - 63, 0 means disable. default = 0). |
| | **call-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WiFi multimedia (WMM) call admission control to optimize WiFi bandwidth use for VoIP calls. New VoIP calls are ... |
| | **call-capacity** integer | | Maximum number of Voice over WLAN (VoWLAN) phones supported by the radio (0 - 60, default = 10). |
| | **channel** string | | no description |
| | **channel-bonding** string | **Choices:*** 80MHz
* 40MHz
* 20MHz
* 160MHz
| Channel bandwidth: 160,80, 40, or 20MHz. Channels may use both 20 and 40 by enabling coexistence. |
| | **channel-utilization** string | **Choices:*** disable
* enable
| Enable/disable measuring channel utilization. |
| | **coexistence** string | **Choices:*** disable
* enable
| Enable/disable allowing both HT20 and HT40 on the same radio (default = enable). |
| | **darrp** string | **Choices:*** disable
* enable
| Enable/disable Distributed Automatic Radio Resource Provisioning (DARRP) to make sure the radio is always using the most optim... |
| | **drma** string | **Choices:*** disable
* enable
| Enable/disable dynamic radio mode assignment (DRMA) (default = disable). |
| | **drma-sensitivity** string | **Choices:*** low
* medium
* high
| Network Coverage Factor (NCF) percentage required to consider a radio as redundant (default = low). |
| | **dtim** integer | | Delivery Traffic Indication Map (DTIM) period (1 - 255, default = 1). Set higher to save battery life of WiFi client in power-... |
| | **frag-threshold** integer | | Maximum packet size that can be sent without fragmentation (800 - 2346 bytes, default = 2346). |
| | **frequency-handoff** string | **Choices:*** disable
* enable
| Enable/disable frequency handoff of clients to other channels (default = disable). |
| | **iperf-protocol** string | **Choices:*** udp
* tcp
| Iperf test protocol (default = "UDP"). |
| | **iperf-server-port** integer | | Iperf service port number. |
| | **max-clients** integer | | Maximum number of stations (STAs) or WiFi clients supported by the radio. Range depends on the hardware. |
| | **max-distance** integer | | Maximum expected distance between the AP and clients (0 - 54000 m, default = 0). |
| | **mode** string | **Choices:*** ap
* monitor
* sniffer
* disabled
* sam
| Mode of radio 3. Radio 3 can be disabled, configured as an access point, a rogue AP monitor, or a sniffer. |
| | **power-level** integer | | Radio power level as a percentage of the maximum transmit power (0 - 100, default = 100). |
| | **power-mode** string | **Choices:*** dBm
* percentage
| Set radio effective isotropic radiated power (EIRP) in dBm or by a percentage of the maximum EIRP (default = percentage). This... |
| | **power-value** integer | | Radio EIRP power in dBm (1 - 33, default = 27). |
| | **powersave-optimize** list / elements=string | **Choices:*** tim
* ac-vo
* no-obss-scan
* no-11b-rate
* client-rate-follow
| no description |
| | **protection-mode** string | **Choices:*** rtscts
* ctsonly
* disable
| Enable/disable 802.11g protection modes to support backwards compatibility with older clients (rtscts, ctsonly, disable). |
| | **radio-id** integer | | no description |
| | **rts-threshold** integer | | Maximum packet size for RTS transmissions, specifying the maximum size of a data packet before RTS/CTS (256 - 2346 bytes, defa... |
| | **sam-bssid** string | | BSSID for WiFi network. |
| | **sam-captive-portal** string | **Choices:*** disable
* enable
| Enable/disable Captive Portal Authentication (default = disable). |
| | **sam-password** string | | no description |
| | **sam-report-intv** integer | | SAM report interval (sec), 0 for a one-time report. |
| | **sam-security-type** string | **Choices:*** open
* wpa-personal
* wpa-enterprise
| Select WiFi network security type (default = "wpa-personal"). |
| | **sam-server** string | | SAM test server IP address or domain name. |
| | **sam-ssid** string | | SSID for WiFi network. |
| | **sam-test** string | **Choices:*** ping
* iperf
| Select SAM test type (default = "PING"). |
| | **sam-username** string | | Username for WiFi network connection. |
| | **short-guard-interval** string | **Choices:*** disable
* enable
| Use either the short guard interval (Short GI) of 400 ns or the long guard interval (Long GI) of 800 ns. |
| | **spectrum-analysis** string | **Choices:*** disable
* enable
* scan-only
| Enable/disable spectrum analysis to find interference that would negatively impact wireless performance. |
| | **transmit-optimize** list / elements=string | **Choices:*** disable
* power-save
* aggr-limit
* retry-limit
* send-bar
| no description |
| | **vap-all** string | **Choices:*** disable
* enable
* tunnel
* bridge
* manual
| Enable/disable the automatic inheritance of all Virtual Access Points (VAPs) (default = enable). |
| | **vap1** string | | Virtual Access Point (VAP) for wlan ID 1 |
| | **vap2** string | | Virtual Access Point (VAP) for wlan ID 2 |
| | **vap3** string | | Virtual Access Point (VAP) for wlan ID 3 |
| | **vap4** string | | Virtual Access Point (VAP) for wlan ID 4 |
| | **vap5** string | | Virtual Access Point (VAP) for wlan ID 5 |
| | **vap6** string | | Virtual Access Point (VAP) for wlan ID 6 |
| | **vap7** string | | Virtual Access Point (VAP) for wlan ID 7 |
| | **vap8** string | | Virtual Access Point (VAP) for wlan ID 8 |
| | **vaps** string | | Manually selected list of Virtual Access Points (VAPs). |
| | **wids-profile** string | | Wireless Intrusion Detection System (WIDS) profile name to assign to the radio. |
| | **zero-wait-dfs** string | **Choices:*** disable
* enable
| Enable/disable zero wait DFS on radio (default = enable). |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration options for radio 4.
fmgr_wtpprofile_radio4:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wtp-profile: <your own value>
wtpprofile_radio4:
airtime-fairness: <value in [disable, enable]>
amsdu: <value in [disable, enable]>
ap-handoff: <value in [disable, enable]>
ap-sniffer-addr: <value of string>
ap-sniffer-bufsize: <value of integer>
ap-sniffer-chan: <value of integer>
ap-sniffer-ctl: <value in [disable, enable]>
ap-sniffer-data: <value in [disable, enable]>
ap-sniffer-mgmt-beacon: <value in [disable, enable]>
ap-sniffer-mgmt-other: <value in [disable, enable]>
ap-sniffer-mgmt-probe: <value in [disable, enable]>
auto-power-high: <value of integer>
auto-power-level: <value in [disable, enable]>
auto-power-low: <value of integer>
band: <value in [802.11b, 802.11a, 802.11g, ...]>
band-5g-type: <value in [5g-full, 5g-high, 5g-low]>
bandwidth-admission-control: <value in [disable, enable]>
bandwidth-capacity: <value of integer>
beacon-interval: <value of integer>
call-admission-control: <value in [disable, enable]>
call-capacity: <value of integer>
channel: <value of string>
channel-bonding: <value in [80MHz, 40MHz, 20MHz, ...]>
channel-utilization: <value in [disable, enable]>
coexistence: <value in [disable, enable]>
darrp: <value in [disable, enable]>
dtim: <value of integer>
frag-threshold: <value of integer>
frequency-handoff: <value in [disable, enable]>
max-clients: <value of integer>
max-distance: <value of integer>
mode: <value in [ap, monitor, sniffer, ...]>
power-level: <value of integer>
powersave-optimize:
- tim
- ac-vo
- no-obss-scan
- no-11b-rate
- client-rate-follow
protection-mode: <value in [rtscts, ctsonly, disable]>
radio-id: <value of integer>
rts-threshold: <value of integer>
short-guard-interval: <value in [disable, enable]>
spectrum-analysis: <value in [disable, enable, scan-only]>
transmit-optimize:
- disable
- power-save
- aggr-limit
- retry-limit
- send-bar
vap-all: <value in [disable, enable, tunnel, ...]>
vaps: <value of string>
wids-profile: <value of string>
zero-wait-dfs: <value in [disable, enable]>
vap1: <value of string>
vap2: <value of string>
vap3: <value of string>
vap4: <value of string>
vap5: <value of string>
vap6: <value of string>
vap7: <value of string>
vap8: <value of string>
bss-color: <value of integer>
auto-power-target: <value of string>
drma: <value in [disable, enable]>
drma-sensitivity: <value in [low, medium, high]>
iperf-protocol: <value in [udp, tcp]>
iperf-server-port: <value of integer>
power-mode: <value in [dBm, percentage]>
power-value: <value of integer>
sam-bssid: <value of string>
sam-captive-portal: <value in [disable, enable]>
sam-password: <value of string>
sam-report-intv: <value of integer>
sam-security-type: <value in [open, wpa-personal, wpa-enterprise]>
sam-server: <value of string>
sam-ssid: <value of string>
sam-test: <value in [ping, iperf]>
sam-username: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_service_category β Configure service categories. fortinet.fortimanager.fmgr\_firewall\_service\_category β Configure service categories.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_service_category`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_service\_category** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **global-object** integer | | Global Object. |
| | **name** string | | Service category name. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure service categories.
fmgr_firewall_service_category:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_service_category:
comment: <value of string>
name: <value of string>
global-object: <value of integer>
fabric-object: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_wanopt_profile_cifs β Enable/disable CIFS fortinet.fortimanager.fmgr\_wanopt\_profile\_cifs β Enable/disable CIFS
=======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanopt_profile_cifs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanopt\_profile\_cifs** dictionary | | the top level parameters set |
| | **byte-caching** string | **Choices:*** disable
* enable
| Enable/disable byte-caching for HTTP. Byte caching reduces the amount of traffic by caching file data sent across the WAN and ... |
| | **log-traffic** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **port** integer | | no description |
| | **prefer-chunking** string | **Choices:*** dynamic
* fix
| Select dynamic or fixed-size data chunking for HTTP WAN Optimization. |
| | **protocol-opt** string | **Choices:*** protocol
* tcp
| Select Protocol specific optimitation or generic TCP optimization. |
| | **secure-tunnel** string | **Choices:*** disable
* enable
| Enable/disable securing the WAN Opt tunnel using SSL. Secure and non-secure tunnels use the same TCP port (7810). |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable HTTP WAN Optimization. |
| | **tunnel-sharing** string | **Choices:*** private
* shared
* express-shared
| Tunnel sharing mode for aggressive/non-aggressive and/or interactive/non-interactive protocols. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable CIFS
fmgr_wanopt_profile_cifs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
wanopt_profile_cifs:
byte-caching: <value in [disable, enable]>
log-traffic: <value in [disable, enable]>
port: <value of integer>
prefer-chunking: <value in [dynamic, fix]>
secure-tunnel: <value in [disable, enable]>
status: <value in [disable, enable]>
tunnel-sharing: <value in [private, shared, express-shared]>
protocol-opt: <value in [protocol, tcp]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_settings_rollinglocal β Log rolling policy for local logs. fortinet.fortimanager.fmgr\_system\_log\_settings\_rollinglocal β Log rolling policy for local logs.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_settings_rollinglocal`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_settings\_rollinglocal** dictionary | | the top level parameters set |
| | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | **directory** string | | Upload server directory, for Unix server, use absolute |
| | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | **password** string | | no description |
| | **password2** string | | no description |
| | **password3** string | | no description |
| | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | **username** string | | Upload server login username. |
| | **username2** string | | Upload server login username2. |
| | **username3** string | | Upload server login username3. |
| | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log rolling policy for local logs.
fmgr_system_log_settings_rollinglocal:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_settings_rollinglocal:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_profile_smtp β SMTP. fortinet.fortimanager.fmgr\_spamfilter\_profile\_smtp β SMTP.
=============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_profile_smtp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_profile\_smtp** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* tag
* discard
| Action for spam email. |
| | **hdrip** string | **Choices:*** disable
* enable
| Enable/disable SMTP email header IP checks for spamfsip, spamrbl and spambwl filters. |
| | **local-override** string | **Choices:*** disable
* enable
| Enable/disable local filter to override SMTP remote check result. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **tag-msg** string | | Subject text or header added to spam email. |
| | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SMTP.
fmgr_spamfilter_profile_smtp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
spamfilter_profile_smtp:
action: <value in [pass, tag, discard]>
hdrip: <value in [disable, enable]>
local-override: <value in [disable, enable]>
log: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_dhcpserver β Configure DHCP servers. fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver β Configure DHCP servers.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_dhcpserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_dhcpserver** dictionary | | the top level parameters set |
| | **auto-configuration** string | **Choices:*** disable
* enable
| no description |
| | **auto-managed-status** string | **Choices:*** disable
* enable
| no description |
| | **conflicted-ip-timeout** integer | | no description |
| | **ddns-auth** string | **Choices:*** disable
* tsig
| no description |
| | **ddns-key** string | | no description |
| | **ddns-keyname** string | | no description |
| | **ddns-server-ip** string | | no description |
| | **ddns-ttl** integer | | no description |
| | **ddns-update** string | **Choices:*** disable
* enable
| no description |
| | **ddns-update-override** string | **Choices:*** disable
* enable
| no description |
| | **ddns-zone** string | | no description |
| | **default-gateway** string | | no description |
| | **dhcp-settings-from-fortiipam** string | **Choices:*** disable
* enable
| no description |
| | **dns-server1** string | | no description |
| | **dns-server2** string | | no description |
| | **dns-server3** string | | no description |
| | **dns-server4** string | | no description |
| | **dns-service** string | **Choices:*** default
* specify
* local
| no description |
| | **domain** string | | no description |
| | **enable** string | **Choices:*** disable
* enable
| no description |
| | **exclude-range** list / elements=string | | no description |
| | | **end-ip** string | | no description |
| | | **id** integer | | no description |
| | | **start-ip** string | | no description |
| | **filename** string | | no description |
| | **forticlient-on-net-status** string | **Choices:*** disable
* enable
| no description |
| | **id** integer | | no description |
| | **interface** string | | no description |
| | **ip-mode** string | **Choices:*** range
* usrgrp
| no description |
| | **ip-range** list / elements=string | | no description |
| | | **end-ip** string | | no description |
| | | **id** integer | | no description |
| | | **start-ip** string | | no description |
| | **ipsec-lease-hold** integer | | no description |
| | **lease-time** integer | | no description |
| | **mac-acl-default-action** string | **Choices:*** assign
* block
| no description |
| | **netmask** string | | no description |
| | **next-server** string | | no description |
| | **ntp-server1** string | | no description |
| | **ntp-server2** string | | no description |
| | **ntp-server3** string | | no description |
| | **ntp-service** string | **Choices:*** default
* specify
* local
| no description |
| | **option1** string | | no description |
| | **option2** string | | no description |
| | **option3** string | | no description |
| | **option4** string | | no description |
| | **option5** string | | no description |
| | **option6** string | | no description |
| | **options** list / elements=string | | no description |
| | | **code** integer | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **type** string | **Choices:*** hex
* string
* ip
* fqdn
| no description |
| | | **value** string | | no description |
| | **reserved-address** list / elements=string | | no description |
| | | **action** string | **Choices:*** assign
* block
* reserved
| no description |
| | | **circuit-id** string | | no description |
| | | **circuit-id-type** string | **Choices:*** hex
* string
| no description |
| | | **description** string | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **mac** string | | no description |
| | | **remote-id** string | | no description |
| | | **remote-id-type** string | **Choices:*** hex
* string
| no description |
| | | **type** string | **Choices:*** mac
* option82
| no description |
| | **server-type** string | **Choices:*** regular
* ipsec
| no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **tftp-server** string | | no description |
| | **timezone** string | **Choices:*** 00
* 01
* 02
* 03
* 04
* 05
* 06
* 07
* 08
* 09
* 10
* 11
* 12
* 13
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 22
* 23
* 24
* 25
* 26
* 27
* 28
* 29
* 30
* 31
* 32
* 33
* 34
* 35
* 36
* 37
* 38
* 39
* 40
* 41
* 42
* 43
* 44
* 45
* 46
* 47
* 48
* 49
* 50
* 51
* 52
* 53
* 54
* 55
* 56
* 57
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 66
* 67
* 68
* 69
* 70
* 71
* 72
* 73
* 74
* 75
* 76
* 77
* 78
* 79
* 80
* 81
* 82
* 83
* 84
* 85
* 86
* 87
| no description |
| | **timezone-option** string | **Choices:*** disable
* default
* specify
| no description |
| | **vci-match** string | **Choices:*** disable
* enable
| no description |
| | **vci-string** string | | no description |
| | **wifi-ac-service** string | **Choices:*** specify
* local
| no description |
| | **wifi-ac1** string | | no description |
| | **wifi-ac2** string | | no description |
| | **wifi-ac3** string | | no description |
| | **wins-server1** string | | no description |
| | **wins-server2** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure DHCP servers.
fmgr_fsp_vlan_dynamicmapping_dhcpserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
fsp_vlan_dynamicmapping_dhcpserver:
auto-configuration: <value in [disable, enable]>
conflicted-ip-timeout: <value of integer>
ddns-auth: <value in [disable, tsig]>
ddns-key: <value of string>
ddns-keyname: <value of string>
ddns-server-ip: <value of string>
ddns-ttl: <value of integer>
ddns-update: <value in [disable, enable]>
ddns-update-override: <value in [disable, enable]>
ddns-zone: <value of string>
default-gateway: <value of string>
dns-server1: <value of string>
dns-server2: <value of string>
dns-server3: <value of string>
dns-service: <value in [default, specify, local]>
domain: <value of string>
enable: <value in [disable, enable]>
exclude-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
filename: <value of string>
forticlient-on-net-status: <value in [disable, enable]>
id: <value of integer>
interface: <value of string>
ip-mode: <value in [range, usrgrp]>
ip-range:
-
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
ipsec-lease-hold: <value of integer>
lease-time: <value of integer>
mac-acl-default-action: <value in [assign, block]>
netmask: <value of string>
next-server: <value of string>
ntp-server1: <value of string>
ntp-server2: <value of string>
ntp-server3: <value of string>
ntp-service: <value in [default, specify, local]>
option1: <value of string>
option2: <value of string>
option3: <value of string>
option4: <value of string>
option5: <value of string>
option6: <value of string>
options:
-
code: <value of integer>
id: <value of integer>
ip: <value of string>
type: <value in [hex, string, ip, ...]>
value: <value of string>
reserved-address:
-
action: <value in [assign, block, reserved]>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
server-type: <value in [regular, ipsec]>
status: <value in [disable, enable]>
tftp-server: <value of string>
timezone: <value in [00, 01, 02, ...]>
timezone-option: <value in [disable, default, specify]>
vci-match: <value in [disable, enable]>
vci-string: <value of string>
wifi-ac1: <value of string>
wifi-ac2: <value of string>
wifi-ac3: <value of string>
wins-server1: <value of string>
wins-server2: <value of string>
dns-server4: <value of string>
wifi-ac-service: <value in [specify, local]>
auto-managed-status: <value in [disable, enable]>
dhcp-settings-from-fortiipam: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_revert β no description fortinet.fortimanager.fmgr\_dvmdb\_workflow\_revert β no description
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_revert`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_workflow\_revert** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| | **fmgip** string | | no description |
| | **mail\_user** string | | no description |
| | **no\_diff** integer | | no description |
| | **no\_mail** integer | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_workflow_revert:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
dvmdb_workflow_revert:
desc: <value of string>
fmgip: <value of string>
mail_user: <value of string>
no_diff: <value of integer>
no_mail: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_dnsbl β Configure AntiSpam DNSBL/ORBL. fortinet.fortimanager.fmgr\_emailfilter\_dnsbl β Configure AntiSpam DNSBL/ORBL.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_dnsbl`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_dnsbl** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** spam
* reject
| Reject connection or mark as spam email. |
| | | **id** integer | | DNSBL/ORBL entry ID. |
| | | **server** string | | DNSBL or ORBL server name. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure AntiSpam DNSBL/ORBL.
fmgr_emailfilter_dnsbl:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
emailfilter_dnsbl:
comment: <value of string>
entries:
-
action: <value in [spam, reject]>
id: <value of integer>
server: <value of string>
status: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_fortitoken β Configure FortiToken. fortinet.fortimanager.fmgr\_user\_fortitoken β Configure FortiToken.
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_fortitoken`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_fortitoken** dictionary | | the top level parameters set |
| | **comments** string | | Comment. |
| | **license** string | | Mobile token license. |
| | **os-ver** string | | Device Mobile Version. |
| | **reg-id** string | | Device Reg ID. |
| | **serial-number** string | | Serial number. |
| | **status** string | **Choices:*** lock
* active
| Status |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiToken.
fmgr_user_fortitoken:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_fortitoken:
comments: <value of string>
license: <value of string>
os-ver: <value of string>
reg-id: <value of string>
serial-number: <value of string>
status: <value in [lock, active]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_interface_ipv6_ip6extraaddr β Extra IPv6 address prefixes of interface. fortinet.fortimanager.fmgr\_fsp\_vlan\_interface\_ipv6\_ip6extraaddr β Extra IPv6 address prefixes of interface.
================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_interface_ipv6_ip6extraaddr`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_interface\_ipv6\_ip6extraaddr** dictionary | | the top level parameters set |
| | **prefix** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Extra IPv6 address prefixes of interface.
fmgr_fsp_vlan_interface_ipv6_ip6extraaddr:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
state: <value in [present, absent]>
fsp_vlan_interface_ipv6_ip6extraaddr:
prefix: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_ntp_ntpserver β NTP server. fortinet.fortimanager.fmgr\_system\_ntp\_ntpserver β NTP server.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_ntp_ntpserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_ntp\_ntpserver** dictionary | | the top level parameters set |
| | **authentication** string | **Choices:*** **disable** β
* enable
| Enable/disable MD5 authentication. disable - Disable setting. enable - Enable setting. |
| | **id** integer | **Default:**0 | Time server ID. |
| | **key** string | | no description |
| | **key-id** integer | **Default:**0 | Key ID for authentication. |
| | **ntpv3** string | **Choices:*** **disable** β
* enable
| Enable/disable NTPv3. disable - Disable setting. enable - Enable setting. |
| | **server** string | | IP address/hostname of NTP Server. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: NTP server.
fmgr_system_ntp_ntpserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_ntp_ntpserver:
authentication: <value in [disable, enable]>
id: <value of integer>
key: <value of string>
key-id: <value of integer>
ntpv3: <value in [disable, enable]>
server: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vip_sslserverciphersuites β SSL/TLS cipher suites to offer to a server, ordered by priority. fortinet.fortimanager.fmgr\_firewall\_vip\_sslserverciphersuites β SSL/TLS cipher suites to offer to a server, ordered by priority.
===================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip_sslserverciphersuites`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip\_sslserverciphersuites** dictionary | | the top level parameters set |
| | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | **priority** integer | | SSL/TLS cipher suites priority. |
| | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip** string / required | | the parameter (vip) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL/TLS cipher suites to offer to a server, ordered by priority.
fmgr_firewall_vip_sslserverciphersuites:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip: <your own value>
state: <value in [present, absent]>
firewall_vip_sslserverciphersuites:
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
priority: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_certificate_ssh β SSH certificates and keys. fortinet.fortimanager.fmgr\_system\_certificate\_ssh β SSH certificates and keys.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_certificate_ssh`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_certificate\_ssh** dictionary | | the top level parameters set |
| | **certificate** string | | no description |
| | **comment** string | | SSH certificate comment. |
| | **name** string | | Name of SSH certificate. |
| | **private-key** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSH certificates and keys.
fmgr_system_certificate_ssh:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_certificate_ssh:
certificate: <value of string>
comment: <value of string>
name: <value of string>
private-key: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dynamic_certificate_local_dynamicmapping β no description fortinet.fortimanager.fmgr\_dynamic\_certificate\_local\_dynamicmapping β no description
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dynamic_certificate_local_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_certificate\_local\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **local-cert** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **local** string / required | | the parameter (local) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dynamic_certificate_local_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
local: <your own value>
state: <value in [present, absent]>
dynamic_certificate_local_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
local-cert: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6delegatedprefixlist β Advertised IPv6 delegated prefix list. fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6delegatedprefixlist β Advertised IPv6 delegated prefix list.
=======================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6delegatedprefixlist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6delegatedprefixlist** dictionary | | the top level parameters set |
| | **autonomous-flag** string | **Choices:*** disable
* enable
| no description |
| | **onlink-flag** string | **Choices:*** disable
* enable
| no description |
| | **prefix-id** integer | | no description |
| | **rdnss** string | | no description |
| | **rdnss-service** string | **Choices:*** delegated
* default
* specify
| no description |
| | **subnet** string | | no description |
| | **upstream-interface** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Advertised IPv6 delegated prefix list.
fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6delegatedprefixlist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
fsp_vlan_dynamicmapping_interface_ipv6_ip6delegatedprefixlist:
autonomous-flag: <value in [disable, enable]>
onlink-flag: <value in [disable, enable]>
prefix-id: <value of integer>
rdnss: <value of string>
rdnss-service: <value in [delegated, default, specify]>
subnet: <value of string>
upstream-interface: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_switchcontroller_lldpprofile_customtlvs β Configuration method to edit custom TLV entries. fortinet.fortimanager.fmgr\_switchcontroller\_lldpprofile\_customtlvs β Configuration method to edit custom TLV entries.
========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_lldpprofile_customtlvs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **lldp-profile** string / required | | the parameter (lldp-profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_lldpprofile\_customtlvs** dictionary | | the top level parameters set |
| | **information-string** string | | Organizationally defined information string (0 - 507 hexadecimal bytes). |
| | **name** string | | TLV name (not sent). |
| | **oui** string | | Organizationally unique identifier (OUI), a 3-byte hexadecimal number, for this TLV. |
| | **subtype** integer | | Organizationally defined subtype (0 - 255). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit custom TLV entries.
fmgr_switchcontroller_lldpprofile_customtlvs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
lldp-profile: <your own value>
state: <value in [present, absent]>
switchcontroller_lldpprofile_customtlvs:
information-string: <value of string>
name: <value of string>
oui: <value of string>
subtype: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_report_group β Report group. fortinet.fortimanager.fmgr\_system\_report\_group β Report group.
=================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_report_group`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_report\_group** dictionary | | the top level parameters set |
| | **adom** string | | Admin domain name. |
| | **case-insensitive** string | **Choices:*** disable
* **enable** β
| Case insensitive. disable - Disable the case insensitive match. enable - Enable the case insensitive match. |
| | **chart-alternative** list / elements=string | | no description |
| | | **chart-name** string | | Chart name. |
| | | **chart-replace** string | | Chart replacement. |
| | **group-by** list / elements=string | | no description |
| | | **var-expression** string | | Variable expression. |
| | | **var-name** string | | Variable name. |
| | | **var-type** string | **Choices:*** integer
* **string** β
* enum
* ip
| Variable type. integer - Integer. string - String. enum - Enum. ip - IP. |
| | **group-id** integer | **Default:**0 | Group ID. |
| | **report-like** string | | Report pattern. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Report group.
fmgr_system_report_group:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_report_group:
adom: <value of string>
case-insensitive: <value in [disable, enable]>
chart-alternative:
-
chart-name: <value of string>
chart-replace: <value of string>
group-by:
-
var-expression: <value of string>
var-name: <value of string>
var-type: <value in [integer, string, enum, ...]>
group-id: <value of integer>
report-like: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_config_metafields_firewall_service_group β no description fortinet.fortimanager.fmgr\_pm\_config\_metafields\_firewall\_service\_group β no description
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_metafields_firewall_service_group`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pm\_config\_metafields\_firewall\_service\_group** dictionary | | the top level parameters set |
| | **importance** string | **Choices:*** optional
* required
| no description |
| | **length** integer | | no description |
| | **name** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pm_config_metafields_firewall_service_group:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pm_config_metafields_firewall_service_group:
importance: <value in [optional, required]>
length: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_stormcontrol β Configuration method to edit FortiSwitch storm control for measuring traffic activity using data rates to prevent traffic disruption. fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_stormcontrol β Configuration method to edit FortiSwitch storm control for measuring traffic activity using data rates to prevent traffic disruption.
=================================================================================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_stormcontrol`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device** string / required | | the parameter (device) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vdom** string / required | | the parameter (vdom) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit FortiSwitch storm control for measuring traffic activity using data rates to prevent traffic disruption.
fmgr_switchcontroller_managedswitch_stormcontrol:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
device: <your own value>
vdom: <your own value>
managed-switch: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_address6template β Configure IPv6 address templates. fortinet.fortimanager.fmgr\_firewall\_address6template β Configure IPv6 address templates.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_address6template`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_address6template** dictionary | | the top level parameters set |
| | **\_image-base64** string | | no description |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **ip6** string | | IPv6 address prefix. |
| | **name** string | | IPv6 address template name. |
| | **subnet-segment** list / elements=string | | no description |
| | | **bits** integer | | Number of bits. |
| | | **exclusive** string | **Choices:*** disable
* enable
| Enable/disable exclusive value. |
| | | **id** integer | | Subnet segment ID. |
| | | **name** string | | Subnet segment name. |
| | | **values** list / elements=string | | no description |
| | | | **name** string | | Subnet segment value name. |
| | | | **value** string | | Subnet segment value. |
| | **subnet-segment-count** integer | | Number of IPv6 subnet segments. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 address templates.
fmgr_firewall_address6template:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_address6template:
ip6: <value of string>
name: <value of string>
subnet-segment:
-
bits: <value of integer>
exclusive: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
values:
-
name: <value of string>
value: <value of string>
subnet-segment-count: <value of integer>
_image-base64: <value of string>
fabric-object: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_ftp β Configure FTP protocol options. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_ftp β Configure FTP protocol options.
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_ftp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_ftp** dictionary | | the top level parameters set |
| | **comfort-amount** integer | | Amount of data to send in a transmission for client comforting (1 - 10240 bytes, default = 1). |
| | **comfort-interval** integer | | Period of time between start, or last transmission, and the next client comfort transmission of data (1 - 900 sec, default = 10). |
| | **inspect-all** string | **Choices:*** disable
* enable
| Enable/disable the inspection of all ports for the protocol. |
| | **options** list / elements=string | **Choices:*** clientcomfort
* no-content-summary
* oversize
* splice
* bypass-rest-command
* bypass-mode-command
| no description |
| | **oversize-limit** integer | | Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10). |
| | **ports** integer | | no description |
| | **scan-bzip2** string | **Choices:*** disable
* enable
| Enable/disable scanning of BZip2 compressed files. |
| | **ssl-offloaded** string | **Choices:*** no
* yes
| SSL decryption and encryption performed by an external device. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of scanning for this protocol. |
| | **stream-based-uncompressed-limit** integer | | Maximum stream-based uncompressed data size that will be scanned (MB, 0 = unlimited (default). Stream-based uncompression use... |
| | **tcp-window-maximum** integer | | Maximum dynamic TCP window size. |
| | **tcp-window-minimum** integer | | Minimum dynamic TCP window size. |
| | **tcp-window-size** integer | | Set TCP static window size. |
| | **tcp-window-type** string | **Choices:*** system
* static
* dynamic
| TCP window type to use for this protocol. |
| | **uncompressed-nest-limit** integer | | Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12). |
| | **uncompressed-oversize-limit** integer | | Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10). |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FTP protocol options.
fmgr_firewall_profileprotocoloptions_ftp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_ftp:
comfort-amount: <value of integer>
comfort-interval: <value of integer>
inspect-all: <value in [disable, enable]>
options:
- clientcomfort
- no-content-summary
- oversize
- splice
- bypass-rest-command
- bypass-mode-command
oversize-limit: <value of integer>
ports: <value of integer>
scan-bzip2: <value in [disable, enable]>
status: <value in [disable, enable]>
uncompressed-nest-limit: <value of integer>
uncompressed-oversize-limit: <value of integer>
ssl-offloaded: <value in [no, yes]>
stream-based-uncompressed-limit: <value of integer>
tcp-window-maximum: <value of integer>
tcp-window-minimum: <value of integer>
tcp-window-size: <value of integer>
tcp-window-type: <value in [system, static, dynamic]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dynamic_vpntunnel β no description fortinet.fortimanager.fmgr\_dynamic\_vpntunnel β no description
===============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dynamic_vpntunnel`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_vpntunnel** dictionary | | the top level parameters set |
| | **description** string | | no description |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **local-ipsec** string | | no description |
| | **name** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dynamic_vpntunnel:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dynamic_vpntunnel:
description: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
local-ipsec: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_certificate_ca β CA certificate. fortinet.fortimanager.fmgr\_system\_certificate\_ca β CA certificate.
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_certificate_ca`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_certificate\_ca** dictionary | | the top level parameters set |
| | **ca** string | | no description |
| | **comment** string | | CA certificate comment. |
| | **name** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: CA certificate.
fmgr_system_certificate_ca:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_certificate_ca:
ca: <value of string>
comment: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_fortiview_setting β FortiView settings. fortinet.fortimanager.fmgr\_system\_fortiview\_setting β FortiView settings.
============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_fortiview_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_fortiview\_setting** dictionary | | the top level parameters set |
| | **not-scanned-apps** string | **Choices:*** exclude
* **include** β
| Include/Exclude Not.Scanned applications in FortiView. Set as exclude if you want to filter out never scanned applications. exclude - Exclude Not.Scanned applications in FortiView. include - Include Not.Scanned applications in FortiView. |
| | **resolve-ip** string | **Choices:*** **disable** β
* enable
| Enable or disable resolving IP address to hostname in FortiView. disable - Disable resolving IP address to hostname. enable - Enable resolving IP address to hostname. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiView settings.
fmgr_system_fortiview_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_fortiview_setting:
not-scanned-apps: <value in [exclude, include]>
resolve-ip: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnsslweb_hostchecksoftware β SSL-VPN host check software. fortinet.fortimanager.fmgr\_vpnsslweb\_hostchecksoftware β SSL-VPN host check software.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnsslweb_hostchecksoftware`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnsslweb\_hostchecksoftware** dictionary | | the top level parameters set |
| | **check-item-list** list / elements=string | | no description |
| | | **action** string | **Choices:*** deny
* require
| Action. |
| | | **id** integer | | ID (0 - 4294967295). |
| | | **md5s** string | | no description |
| | | **target** string | | Target. |
| | | **type** string | **Choices:*** file
* registry
* process
| Type. |
| | | **version** string | | Version. |
| | **guid** string | | Globally unique ID. |
| | **name** string | | Name. |
| | **os-type** string | **Choices:*** macos
* windows
| OS type. |
| | **type** string | **Choices:*** av
* fw
| Type. |
| | **version** string | | Version. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL-VPN host check software.
fmgr_vpnsslweb_hostchecksoftware:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vpnsslweb_hostchecksoftware:
check-item-list:
-
action: <value in [deny, require]>
id: <value of integer>
md5s: <value of string>
target: <value of string>
type: <value in [file, registry, process]>
version: <value of string>
guid: <value of string>
name: <value of string>
os-type: <value in [macos, windows]>
type: <value in [av, fw]>
version: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_radius_accountingserver β Additional accounting servers. fortinet.fortimanager.fmgr\_user\_radius\_accountingserver β Additional accounting servers.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_radius_accountingserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **radius** string / required | | the parameter (radius) in requested url |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_radius\_accountingserver** dictionary | | the top level parameters set |
| | **id** integer | | ID (0 - 4294967295). |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **port** integer | | RADIUS accounting port number. |
| | **secret** string | | no description |
| | **server** string | | {<name\_str|ip\_str>} Server CN domain name or IP. |
| | **source-ip** string | | Source IP address for communications to the RADIUS server. |
| | **status** string | **Choices:*** disable
* enable
| Status. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Additional accounting servers.
fmgr_user_radius_accountingserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
radius: <your own value>
state: <value in [present, absent]>
user_radius_accountingserver:
id: <value of integer>
port: <value of integer>
secret: <value of string>
server: <value of string>
source-ip: <value of string>
status: <value in [disable, enable]>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_schedule_onetime β Onetime schedule configuration. fortinet.fortimanager.fmgr\_firewall\_schedule\_onetime β Onetime schedule configuration.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_schedule_onetime`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_schedule\_onetime** dictionary | | the top level parameters set |
| | **color** integer | | Color of icon on the GUI. |
| | **end** string | | Schedule end date and time, format hh:mm yyyy/mm/dd. |
| | **expiration-days** integer | | Write an event log message this many days before the schedule expires. |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **global-object** integer | | Global Object. |
| | **name** string | | Onetime schedule name. |
| | **start** string | | Schedule start date and time, format hh:mm yyyy/mm/dd. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Onetime schedule configuration.
fmgr_firewall_schedule_onetime:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_schedule_onetime:
color: <value of integer>
end: <value of string>
expiration-days: <value of integer>
name: <value of string>
start: <value of string>
global-object: <value of integer>
fabric-object: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_locallog_syslogd2_filter β Filter for syslog logging. fortinet.fortimanager.fmgr\_system\_locallog\_syslogd2\_filter β Filter for syslog logging.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_syslogd2_filter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_syslogd2\_filter** dictionary | | the top level parameters set |
| | **aid** string | **Choices:*** disable
* **enable** β
| Log aid messages. disable - Disable setting. enable - Enable setting. |
| | **devcfg** string | **Choices:*** disable
* **enable** β
| Log device configuration message. disable - Disable setting. enable - Enable setting. |
| | **devops** string | **Choices:*** disable
* **enable** β
| Managered devices operations messages. disable - Disable setting. enable - Enable setting. |
| | **diskquota** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer disk quota messages. disable - Disable setting. enable - Enable setting. |
| | **dm** string | **Choices:*** disable
* **enable** β
| Log deployment manager message. disable - Disable setting. enable - Enable setting. |
| | **docker** string | **Choices:*** disable
* **enable** β
| Docker application generic messages. disable - Disable setting. enable - Enable setting. |
| | **dvm** string | **Choices:*** disable
* **enable** β
| Log device manager messages. disable - Disable setting. enable - Enable setting. |
| | **ediscovery** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer ediscovery messages. disable - Disable setting. enable - Enable setting. |
| | **epmgr** string | **Choices:*** disable
* **enable** β
| Log endpoint manager message. disable - Disable setting. enable - Enable setting. |
| | **event** string | **Choices:*** disable
* **enable** β
| Log event messages. disable - Disable setting. enable - Enable setting. |
| | **eventmgmt** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer event handler messages. disable - Disable setting. enable - Enable setting. |
| | **faz** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer messages. disable - Disable setting. enable - Enable setting. |
| | **fazha** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer HA messages. disable - Disable setting. enable - Enable setting. |
| | **fazsys** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer system messages. disable - Disable setting. enable - Enable setting. |
| | **fgd** string | **Choices:*** disable
* **enable** β
| Log FortiGuard service message. disable - Disable setting. enable - Enable setting. |
| | **fgfm** string | **Choices:*** disable
* **enable** β
| Log FGFM protocol message. disable - Disable setting. enable - Enable setting. |
| | **fips** string | **Choices:*** disable
* **enable** β
| Whether to log fips messages. disable - Disable setting. enable - Enable setting. |
| | **fmgws** string | **Choices:*** disable
* **enable** β
| Log web service messages. disable - Disable setting. enable - Enable setting. |
| | **fmlmgr** string | **Choices:*** disable
* **enable** β
| Log FortiMail manager message. disable - Disable setting. enable - Enable setting. |
| | **fmwmgr** string | **Choices:*** disable
* **enable** β
| Log firmware manager message. disable - Disable setting. enable - Enable setting. |
| | **fortiview** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer FortiView messages. disable - Disable setting. enable - Enable setting. |
| | **glbcfg** string | **Choices:*** disable
* **enable** β
| Log global database message. disable - Disable setting. enable - Enable setting. |
| | **ha** string | **Choices:*** disable
* **enable** β
| Log HA message. disable - Disable setting. enable - Enable setting. |
| | **hcache** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer hcache messages. disable - Disable setting. enable - Enable setting. |
| | **incident** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer incident messages. disable - Disable setting. enable - Enable setting. |
| | **iolog** string | **Choices:*** disable
* **enable** β
| Log debug IO log message. disable - Disable setting. enable - Enable setting. |
| | **logd** string | **Choices:*** disable
* **enable** β
| Log the status of log daemon. disable - Disable setting. enable - Enable setting. |
| | **logdb** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log DB messages. disable - Disable setting. enable - Enable setting. |
| | **logdev** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log device messages. disable - Disable setting. enable - Enable setting. |
| | **logfile** string | **Choices:*** enable
* disable
| Log Fortianalyzer log file messages. enable - Enable setting. disable - Disable setting. |
| | **logging** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer logging messages. disable - Disable setting. enable - Enable setting. |
| | **lrmgr** string | **Choices:*** disable
* **enable** β
| Log log and report manager message. disable - Disable setting. enable - Enable setting. |
| | **objcfg** string | **Choices:*** disable
* **enable** β
| Log object configuration change message. disable - Disable setting. enable - Enable setting. |
| | **report** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer report messages. disable - Disable setting. enable - Enable setting. |
| | **rev** string | **Choices:*** disable
* **enable** β
| Log revision history message. disable - Disable setting. enable - Enable setting. |
| | **rtmon** string | **Choices:*** disable
* **enable** β
| Log real-time monitor message. disable - Disable setting. enable - Enable setting. |
| | **scfw** string | **Choices:*** disable
* **enable** β
| Log firewall objects message. disable - Disable setting. enable - Enable setting. |
| | **scply** string | **Choices:*** disable
* **enable** β
| Log policy console message. disable - Disable setting. enable - Enable setting. |
| | **scrmgr** string | **Choices:*** disable
* **enable** β
| Log script manager message. disable - Disable setting. enable - Enable setting. |
| | **scvpn** string | **Choices:*** disable
* **enable** β
| Log VPN console message. disable - Disable setting. enable - Enable setting. |
| | **system** string | **Choices:*** disable
* **enable** β
| Log system manager message. disable - Disable setting. enable - Enable setting. |
| | **webport** string | **Choices:*** disable
* **enable** β
| Log web portal message. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Filter for syslog logging.
fmgr_system_locallog_syslogd2_filter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_syslogd2_filter:
devcfg: <value in [disable, enable]>
devops: <value in [disable, enable]>
diskquota: <value in [disable, enable]>
dm: <value in [disable, enable]>
dvm: <value in [disable, enable]>
ediscovery: <value in [disable, enable]>
epmgr: <value in [disable, enable]>
event: <value in [disable, enable]>
eventmgmt: <value in [disable, enable]>
faz: <value in [disable, enable]>
fazha: <value in [disable, enable]>
fazsys: <value in [disable, enable]>
fgd: <value in [disable, enable]>
fgfm: <value in [disable, enable]>
fips: <value in [disable, enable]>
fmgws: <value in [disable, enable]>
fmlmgr: <value in [disable, enable]>
fmwmgr: <value in [disable, enable]>
fortiview: <value in [disable, enable]>
glbcfg: <value in [disable, enable]>
ha: <value in [disable, enable]>
hcache: <value in [disable, enable]>
iolog: <value in [disable, enable]>
logd: <value in [disable, enable]>
logdb: <value in [disable, enable]>
logdev: <value in [disable, enable]>
logfile: <value in [enable, disable]>
logging: <value in [disable, enable]>
lrmgr: <value in [disable, enable]>
objcfg: <value in [disable, enable]>
report: <value in [disable, enable]>
rev: <value in [disable, enable]>
rtmon: <value in [disable, enable]>
scfw: <value in [disable, enable]>
scply: <value in [disable, enable]>
scrmgr: <value in [disable, enable]>
scvpn: <value in [disable, enable]>
system: <value in [disable, enable]>
webport: <value in [disable, enable]>
incident: <value in [disable, enable]>
aid: <value in [disable, enable]>
docker: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_nacquar β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_nacquar β Replacement message table entries.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_nacquar`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_nacquar** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_nacquar:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_nacquar:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_bword_entries β Spam filter banned word. fortinet.fortimanager.fmgr\_spamfilter\_bword\_entries β Spam filter banned word.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_bword_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bword** string / required | | the parameter (bword) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_bword\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** spam
* clear
| Mark spam or good. |
| | **id** integer | | Banned word entry ID. |
| | **language** string | **Choices:*** western
* simch
* trach
* japanese
* korean
* french
* thai
* spanish
| Language for the banned word. |
| | **pattern** string | | Pattern for the banned word. |
| | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | **score** integer | | Score value. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **where** string | **Choices:*** subject
* body
* all
| Component of the email to be scanned. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Spam filter banned word.
fmgr_spamfilter_bword_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
bword: <your own value>
state: <value in [present, absent]>
spamfilter_bword_entries:
action: <value in [spam, clear]>
id: <value of integer>
language: <value in [western, simch, trach, ...]>
pattern: <value of string>
pattern-type: <value in [wildcard, regexp]>
score: <value of integer>
status: <value in [disable, enable]>
where: <value in [subject, body, all]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pm_config_workspace_lock β Lock an ADOM in workspace mode. fortinet.fortimanager.fmgr\_pm\_config\_workspace\_lock β Lock an ADOM in workspace mode.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_workspace_lock`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Lock an ADOM in workspace mode.
fmgr_pm_config_workspace_lock:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_sql_customskipidx β List of aditional SQL skip index fields. fortinet.fortimanager.fmgr\_system\_sql\_customskipidx β List of aditional SQL skip index fields.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sql_customskipidx`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sql\_customskipidx** dictionary | | the top level parameters set |
| | **device-type** string | **Choices:*** **FortiGate** β
* FortiManager
* FortiClient
* FortiMail
* FortiWeb
* FortiSandbox
* FortiProxy
| Device type. FortiGate - Set device type to FortiGate. FortiManager - Set device type to FortiManager FortiClient - Set device type to FortiClient. FortiMail - Set device type to FortiMail. FortiWeb - Set device type to FortiWeb. FortiSandbox - Set device type to FortiSandbox FortiProxy - Set device type to FortiProxy |
| | **id** integer | **Default:**0 | Add or Edit log index fields. |
| | **index-field** string | | Field to be added to skip index. |
| | **log-type** string | **Choices:*** **app-ctrl** β
* attack
* content
* dlp
* emailfilter
* event
* generic
* history
* traffic
* virus
* voip
* webfilter
* netscan
* fct-event
* fct-traffic
* fct-netscan
* waf
* gtp
* dns
* ssh
* ssl
* file-filter
* asset
* protocol
* siem
| Log type. app-ctrl attack content dlp emailfilter event generic history traffic virus voip webfilter netscan fct-event fct-traffic fct-netscan waf gtp dns ssh ssl file-filter asset |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: List of aditional SQL skip index fields.
fmgr_system_sql_customskipidx:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_sql_customskipidx:
device-type: <value in [FortiGate, FortiManager, FortiClient, ...]>
id: <value of integer>
index-field: <value of string>
log-type: <value in [app-ctrl, attack, content, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_address6template_subnetsegment β IPv6 subnet segments. fortinet.fortimanager.fmgr\_firewall\_address6template\_subnetsegment β IPv6 subnet segments.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_address6template_subnetsegment`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **address6-template** string / required | | the parameter (address6-template) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_address6template\_subnetsegment** dictionary | | the top level parameters set |
| | **bits** integer | | Number of bits. |
| | **exclusive** string | **Choices:*** disable
* enable
| Enable/disable exclusive value. |
| | **id** integer | | Subnet segment ID. |
| | **name** string | | Subnet segment name. |
| | **values** list / elements=string | | no description |
| | | **name** string | | Subnet segment value name. |
| | | **value** string | | Subnet segment value. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IPv6 subnet segments.
fmgr_firewall_address6template_subnetsegment:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
address6-template: <your own value>
state: <value in [present, absent]>
firewall_address6template_subnetsegment:
bits: <value of integer>
exclusive: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
values:
-
name: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_accessproxy_apigateway_realservers β Select the real servers that this Access Proxy will distribute traffic to. fortinet.fortimanager.fmgr\_firewall\_accessproxy\_apigateway\_realservers β Select the real servers that this Access Proxy will distribute traffic to.
=======================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_accessproxy_apigateway_realservers`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **access-proxy** string / required | | the parameter (access-proxy) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **api-gateway** string / required | | the parameter (api-gateway) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_accessproxy\_apigateway\_realservers** dictionary | | the top level parameters set |
| | **address** string | | Address or address group of the real server. |
| | **health-check** string | **Choices:*** disable
* enable
| Enable to check the responsiveness of the real server before forwarding traffic. |
| | **health-check-proto** string | **Choices:*** ping
* http
* tcp-connect
| Protocol of the health check monitor to use when polling to determine servers connectivity status. |
| | **http-host** string | | HTTP server domain name in HTTP header. |
| | **id** integer | | Real server ID. |
| | **ip** string | | IP address of the real server. |
| | **mappedport** string | | Port for communicating with the real server. |
| | **port** integer | | Port for communicating with the real server. |
| | **status** string | **Choices:*** active
* standby
* disable
| Set the status of the real server to active so that it can accept traffic, or on standby or disabled so no traffic is sent. |
| | **weight** integer | | Weight of the real server. If weighted load balancing is enabled, the server with the highest weight gets more connections. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Select the real servers that this Access Proxy will distribute traffic to.
fmgr_firewall_accessproxy_apigateway_realservers:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
access-proxy: <your own value>
api-gateway: <your own value>
state: <value in [present, absent]>
firewall_accessproxy_apigateway_realservers:
address: <value of string>
health-check: <value in [disable, enable]>
health-check-proto: <value in [ping, http, tcp-connect]>
http-host: <value of string>
id: <value of integer>
ip: <value of string>
mappedport: <value of string>
port: <value of integer>
status: <value in [active, standby, disable]>
weight: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_admin_user_metadata β Configure meta data. fortinet.fortimanager.fmgr\_system\_admin\_user\_metadata β Configure meta data.
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_user_metadata`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_user\_metadata** dictionary | | the top level parameters set |
| | **fieldlength** integer | **Default:**0 | Field length. |
| | **fieldname** string | | Field name. |
| | **fieldvalue** string | | Field value. |
| | **importance** string | **Choices:*** **optional** β
* required
| Importance. optional - This field is optional. required - This field is required. |
| | **status** string | **Choices:*** disabled
* **enabled** β
| Status. disabled - This field is disabled. enabled - This field is enabled. |
| **user** string / required | | the parameter (user) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure meta data.
fmgr_system_admin_user_metadata:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
user: <your own value>
state: <value in [present, absent]>
system_admin_user_metadata:
fieldlength: <value of integer>
fieldname: <value of string>
fieldvalue: <value of string>
importance: <value in [optional, required]>
status: <value in [disabled, enabled]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_snmp_community_hosts β Configure IPv4 SNMP managers fortinet.fortimanager.fmgr\_devprof\_system\_snmp\_community\_hosts β Configure IPv4 SNMP managers
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_snmp_community_hosts`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **community** string / required | | the parameter (community) in requested url |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_snmp\_community\_hosts** dictionary | | the top level parameters set |
| | **ha-direct** string | **Choices:*** disable
* enable
| Enable/disable direct management of HA cluster members. |
| | **host-type** string | **Choices:*** any
* query
* trap
| Control whether the SNMP manager sends SNMP queries, receives SNMP traps, or both. |
| | **id** integer | | Host entry ID. |
| | **ip** string | | IPv4 address of the SNMP manager (host). |
| | **source-ip** string | | Source IPv4 address for SNMP traps. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 SNMP managers
fmgr_devprof_system_snmp_community_hosts:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
community: <your own value>
state: <value in [present, absent]>
devprof_system_snmp_community_hosts:
ha-direct: <value in [disable, enable]>
host-type: <value in [any, query, trap]>
id: <value of integer>
ip: <value of string>
source-ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_dhcp_server_excluderange β Exclude one or more ranges of IP addresses from being assigned to clients. fortinet.fortimanager.fmgr\_system\_dhcp\_server\_excluderange β Exclude one or more ranges of IP addresses from being assigned to clients.
===========================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_dhcp_server_excluderange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **server** string / required | | the parameter (server) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_dhcp\_server\_excluderange** dictionary | | the top level parameters set |
| | **end-ip** string | | End of IP range. |
| | **id** integer | | ID. |
| | **start-ip** string | | Start of IP range. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Exclude one or more ranges of IP addresses from being assigned to clients.
fmgr_system_dhcp_server_excluderange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
server: <your own value>
state: <value in [present, absent]>
system_dhcp_server_excluderange:
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_maxcookie β Maximum number of cookies in HTTP request. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_maxcookie β Maximum number of cookies in HTTP request.
============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_maxcookie`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_maxcookie** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **max-cookie** integer | | Maximum number of cookies in HTTP request (0 to 2147483647). |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Maximum number of cookies in HTTP request.
fmgr_waf_profile_constraint_maxcookie:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_maxcookie:
action: <value in [allow, block]>
log: <value in [disable, enable]>
max-cookie: <value of integer>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_script_execute β Run script. fortinet.fortimanager.fmgr\_dvmdb\_script\_execute β Run script.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_script_execute`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_script\_execute** dictionary | | the top level parameters set |
| | **adom** string | | no description |
| | **package** string | | no description |
| | **scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **script** string | | Script name. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Run script.
fmgr_dvmdb_script_execute:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
dvmdb_script_execute:
adom: <value of string>
package: <value of string>
scope:
-
name: <value of string>
vdom: <value of string>
script: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_package_move β Move and/or rename a policy package within the same ADOM. fortinet.fortimanager.fmgr\_securityconsole\_package\_move β Move and/or rename a policy package within the same ADOM.
======================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_package_move`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_package\_move** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| | **dst\_name** string | | Name of the new policy package. If omitted from request, original name will be kept or a new name will be generated in case of... |
| | **dst\_parent** string | | Path to the folder for the target package. If the package is to be placed in root, leave this field blank. |
| | **pkg** string | | Source package path and name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Move and/or rename a policy package within the same ADOM.
fmgr_securityconsole_package_move:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_package_move:
adom: <value of string>
dst_name: <value of string>
dst_parent: <value of string>
pkg: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqpnetworkauthtype β Configure network authentication type. fortinet.fortimanager.fmgr\_hotspot20\_anqpnetworkauthtype β Configure network authentication type.
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqpnetworkauthtype`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqpnetworkauthtype** dictionary | | the top level parameters set |
| | **auth-type** string | **Choices:*** acceptance-of-terms
* online-enrollment
* http-redirection
* dns-redirection
| Network authentication type. |
| | **name** string | | Authentication type name. |
| | **url** string | | Redirect URL. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure network authentication type.
fmgr_hotspot20_anqpnetworkauthtype:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
hotspot20_anqpnetworkauthtype:
auth-type: <value in [acceptance-of-terms, online-enrollment, http-redirection, ...]>
name: <value of string>
url: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_backup_allsettings β Scheduled backup settings. fortinet.fortimanager.fmgr\_system\_backup\_allsettings β Scheduled backup settings.
====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_backup_allsettings`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_backup\_allsettings** dictionary | | the top level parameters set |
| | **cert** string | | SSH certificate for authentication. |
| | **crptpasswd** string | | no description |
| | **directory** string | | Directory in which file will be stored on backup server. |
| | **passwd** string | | no description |
| | **protocol** string | **Choices:*** **sftp** β
* ftp
* scp
| Protocol used to backup. sftp - SFTP. ftp - FTP. scp - SCP. |
| | **server** string | | Backup server name/IP. |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable schedule backup. disable - Disable setting. enable - Enable setting. |
| | **time** string | | Time to backup. |
| | **user** string | | Backup server login user. |
| | **week\_days** list / elements=string | **Choices:*** monday
* tuesday
* wednesday
* thursday
* friday
* saturday
* sunday
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Scheduled backup settings.
fmgr_system_backup_allsettings:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_backup_allsettings:
cert: <value of string>
crptpasswd: <value of string>
directory: <value of string>
passwd: <value of string>
protocol: <value in [sftp, ftp, scp]>
server: <value of string>
status: <value in [disable, enable]>
time: <value of string>
user: <value of string>
week_days:
- monday
- tuesday
- wednesday
- thursday
- friday
- saturday
- sunday
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_profile_datamaskcustomfields β Customized datamask fields. fortinet.fortimanager.fmgr\_system\_admin\_profile\_datamaskcustomfields β Customized datamask fields.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_profile_datamaskcustomfields`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_profile\_datamaskcustomfields** dictionary | | the top level parameters set |
| | **field-category** list / elements=string | **Choices:*** log
* fortiview
* alert
* ueba
* all
| no description |
| | **field-name** string | | Field name. |
| | **field-status** string | **Choices:*** disable
* **enable** β
| Field status. disable - Disable field. enable - Enable field. |
| | **field-type** string | **Choices:*** **string** β
* ip
* mac
* email
* unknown
| Field type. string - String. ip - IP. mac - MAC address. email - Email address. unknown - Unknown. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Customized datamask fields.
fmgr_system_admin_profile_datamaskcustomfields:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
profile: <your own value>
state: <value in [present, absent]>
system_admin_profile_datamaskcustomfields:
field-category:
- log
- fortiview
- alert
- ueba
- all
field-name: <value of string>
field-status: <value in [disable, enable]>
field-type: <value in [string, ip, mac, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_workspace_lock_obj β Lock a specific object, where the url contains the full path to the object fortinet.fortimanager.fmgr\_dvmdb\_workspace\_lock\_obj β Lock a specific object, where the url contains the full path to the object
====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workspace_lock_obj`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **object\_url\_name** string / required | | the parameter (object\_url\_name) in requested url |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Lock a specific object, where the url contains the full path to the object
fmgr_dvmdb_workspace_lock_obj:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
object_url_name: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_device_tagging β Config object tagging. fortinet.fortimanager.fmgr\_user\_device\_tagging β Config object tagging.
==========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_device_tagging`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device** string / required | | the parameter (device) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_device\_tagging** dictionary | | the top level parameters set |
| | **category** string | | Tag category. |
| | **name** string | | Tagging entry name. |
| | **tags** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Config object tagging.
fmgr_user_device_tagging:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
device: <your own value>
state: <value in [present, absent]>
user_device_tagging:
category: <value of string>
name: <value of string>
tags: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpn_certificate_remote β Remote certificate as a PEM file. fortinet.fortimanager.fmgr\_vpn\_certificate\_remote β Remote certificate as a PEM file.
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpn_certificate_remote`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpn\_certificate\_remote** dictionary | | the top level parameters set |
| | **name** string | | Name. |
| | **range** string | **Choices:*** global
* vdom
| Either the global or VDOM IP address range for the remote certificate. |
| | **remote** string | | Remote certificate. |
| | **source** string | **Choices:*** factory
* user
* bundle
* fortiguard
| Remote certificate source type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Remote certificate as a PEM file.
fmgr_vpn_certificate_remote:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vpn_certificate_remote:
name: <value of string>
range: <value in [global, vdom]>
remote: <value of string>
source: <value in [factory, user, bundle, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_interface_ipv6 β IPv6 of interface. fortinet.fortimanager.fmgr\_system\_interface\_ipv6 β IPv6 of interface.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_interface_ipv6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **interface** string / required | | the parameter (interface) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_interface\_ipv6** dictionary | | the top level parameters set |
| | **ip6-address** string | **Default:**"::/0" | IPv6 address/prefix of interface. |
| | **ip6-allowaccess** list / elements=string | **Choices:*** ping
* https
* ssh
* snmp
* http
* webservice
* https-logging
| no description |
| | **ip6-autoconf** string | **Choices:*** disable
* **enable** β
| Enable/disable address auto config (SLAAC). disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IPv6 of interface.
fmgr_system_interface_ipv6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
interface: <your own value>
system_interface_ipv6:
ip6-address: <value of string>
ip6-allowaccess:
- ping
- https
- ssh
- snmp
- http
- webservice
- https-logging
ip6-autoconf: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dlp_filepattern β Configure file patterns used by DLP blocking. fortinet.fortimanager.fmgr\_dlp\_filepattern β Configure file patterns used by DLP blocking.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dlp_filepattern`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dlp\_filepattern** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **file-type** string | **Choices:*** unknown
* ignored
* exe
* elf
* bat
* javascript
* html
* hta
* msoffice
* gzip
* rar
* tar
* lzh
* upx
* zip
* cab
* bzip2
* bzip
* activemime
* mime
* hlp
* arj
* base64
* binhex
* uue
* fsg
* aspack
* msc
* petite
* jpeg
* gif
* tiff
* png
* bmp
* msi
* mpeg
* mov
* mp3
* wma
* wav
* pdf
* avi
* rm
* torrent
* hibun
* 7z
* xz
* msofficex
* mach-o
* dmg
* .net
* xar
* chm
* iso
* crx
* sis
* prc
* class
* jad
* cod
* flac
| Select a file type. |
| | | **filter-type** string | **Choices:*** pattern
* type
| Filter by file name pattern or by file type. |
| | | **pattern** string | | Add a file name pattern. |
| | **id** integer | | ID. |
| | **name** string | | Name of table containing the file pattern list. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure file patterns used by DLP blocking.
fmgr_dlp_filepattern:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dlp_filepattern:
comment: <value of string>
entries:
-
file-type: <value in [unknown, ignored, exe, ...]>
filter-type: <value in [pattern, type]>
pattern: <value of string>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_application_list_entries_parameters β Application parameters. fortinet.fortimanager.fmgr\_application\_list\_entries\_parameters β Application parameters.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_application_list_entries_parameters`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **application\_list\_entries\_parameters** dictionary | | the top level parameters set |
| | **id** integer | | Parameter ID. |
| | **members** list / elements=string | | no description |
| | | **id** integer | | Parameter. |
| | | **name** string | | Parameter name. |
| | | **value** string | | Parameter value. |
| | **value** string | | Parameter value. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **entries** string / required | | the parameter (entries) in requested url |
| **list** string / required | | the parameter (list) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Application parameters.
fmgr_application_list_entries_parameters:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
list: <your own value>
entries: <your own value>
state: <value in [present, absent]>
application_list_entries_parameters:
id: <value of integer>
value: <value of string>
members:
-
id: <value of integer>
name: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqpnairealm_nailist_eapmethod β EAP Methods. fortinet.fortimanager.fmgr\_hotspot20\_anqpnairealm\_nailist\_eapmethod β EAP Methods.
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqpnairealm_nailist_eapmethod`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **anqp-nai-realm** string / required | | the parameter (anqp-nai-realm) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqpnairealm\_nailist\_eapmethod** dictionary | | the top level parameters set |
| | **auth-param** list / elements=string | | no description |
| | | **id** string | **Choices:*** non-eap-inner-auth
* inner-auth-eap
* credential
* tunneled-credential
| ID of authentication parameter. |
| | | **index** integer | | Param index. |
| | | **val** string | **Choices:*** eap-identity
* eap-md5
* eap-tls
* eap-ttls
* eap-peap
* eap-sim
* eap-aka
* eap-aka-prime
* non-eap-pap
* non-eap-chap
* non-eap-mschap
* non-eap-mschapv2
* cred-sim
* cred-usim
* cred-nfc
* cred-hardware-token
* cred-softoken
* cred-certificate
* cred-user-pwd
* cred-none
* cred-vendor-specific
* tun-cred-sim
* tun-cred-usim
* tun-cred-nfc
* tun-cred-hardware-token
* tun-cred-softoken
* tun-cred-certificate
* tun-cred-user-pwd
* tun-cred-anonymous
* tun-cred-vendor-specific
| Value of authentication parameter. |
| | **index** integer | | EAP method index. |
| | **method** string | **Choices:*** eap-identity
* eap-md5
* eap-tls
* eap-ttls
* eap-peap
* eap-sim
* eap-aka
* eap-aka-prime
| EAP method type. |
| **nai-list** string / required | | the parameter (nai-list) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: EAP Methods.
fmgr_hotspot20_anqpnairealm_nailist_eapmethod:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
anqp-nai-realm: <your own value>
nai-list: <your own value>
state: <value in [present, absent]>
hotspot20_anqpnairealm_nailist_eapmethod:
auth-param:
-
id: <value in [non-eap-inner-auth, inner-auth-eap, credential, ...]>
index: <value of integer>
val: <value in [eap-identity, eap-md5, eap-tls, ...]>
index: <value of integer>
method: <value in [eap-identity, eap-md5, eap-tls, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_script_scriptschedule β Script schedule table. fortinet.fortimanager.fmgr\_dvmdb\_script\_scriptschedule β Script schedule table.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_script_scriptschedule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_script\_scriptschedule** dictionary | | the top level parameters set |
| | **datetime** string | | Indicates the date and time of the schedule. It should follow the following format for each scheduling type: onetime: "YYYY-MM-DD hh:mm:ss" daily: "hh:mm" weekly: "hh:mm" monthly: "DD hh:mm" |
| | **day\_of\_week** string | **Choices:*** unknown
* **sun** β
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | **device** integer | | Name or id of an existing device in the database. |
| | **name** string | | no description |
| | **run\_on\_db** string | **Choices:*** **disable** β
* enable
| Indicates if the scheduled script should be executed on device database. It should always be disable for tcl scripts. |
| | **type** string | **Choices:*** auto
* onetime
* daily
* weekly
* monthly
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **script** string / required | | the parameter (script) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Script schedule table.
fmgr_dvmdb_script_scriptschedule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
script: <your own value>
state: <value in [present, absent]>
dvmdb_script_scriptschedule:
datetime: <value of string>
day_of_week: <value in [unknown, sun, mon, ...]>
device: <value of integer>
name: <value of string>
run_on_db: <value in [disable, enable]>
type: <value in [auto, onetime, daily, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_ioc β IoC settings. fortinet.fortimanager.fmgr\_system\_log\_ioc β IoC settings.
============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_ioc`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_ioc** dictionary | | the top level parameters set |
| | **notification** string | **Choices:*** disable
* **enable** β
| Disable/Enable IoC notification. disable - Disable IoC feature. enable - Enable IoC feature. |
| | **notification-throttle** integer | **Default:**1440 | Minute value for throttling the rate of IoC notifications. |
| | **rescan-max-runner** integer | **Default:**8 | Max count of cocurrent runner of IoC rescan. |
| | **rescan-run-at** integer | **Default:**24 | When to run IoC rescan. |
| | **rescan-status** string | **Choices:*** disable
* **enable** β
| Disable/Enable IoC rescan. disable - Disable IoC feature. enable - Enable IoC feature. |
| | **status** string | **Choices:*** disable
* **enable** β
| Disable/Enable IoC feature. disable - Disable IoC feature. enable - Enable IoC feature. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IoC settings.
fmgr_system_log_ioc:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_ioc:
notification: <value in [disable, enable]>
notification-throttle: <value of integer>
rescan-max-runner: <value of integer>
rescan-run-at: <value of integer>
rescan-status: <value in [disable, enable]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_ntp β NTP settings. fortinet.fortimanager.fmgr\_system\_ntp β NTP settings.
=======================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_ntp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_ntp** dictionary | | the top level parameters set |
| | **ntpserver** list / elements=string | | no description |
| | | **authentication** string | **Choices:*** **disable** β
* enable
| Enable/disable MD5 authentication. disable - Disable setting. enable - Enable setting. |
| | | **id** integer | **Default:**0 | Time server ID. |
| | | **key** string | | no description |
| | | **key-id** integer | **Default:**0 | Key ID for authentication. |
| | | **ntpv3** string | **Choices:*** **disable** β
* enable
| Enable/disable NTPv3. disable - Disable setting. enable - Enable setting. |
| | | **server** string | | IP address/hostname of NTP Server. |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable NTP. disable - Disable setting. enable - Enable setting. |
| | **sync\_interval** integer | **Default:**60 | NTP sync interval (min). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: NTP settings.
fmgr_system_ntp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_ntp:
ntpserver:
-
authentication: <value in [disable, enable]>
id: <value of integer>
key: <value of string>
key-id: <value of integer>
ntpv3: <value in [disable, enable]>
server: <value of string>
status: <value in [disable, enable]>
sync_interval: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dynamic_interface β no description fortinet.fortimanager.fmgr\_dynamic\_interface β no description
===============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dynamic_interface`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_interface** dictionary | | the top level parameters set |
| | **color** integer | | no description |
| | **default-mapping** string | **Choices:*** disable
* enable
| no description |
| | **defmap-intf** string | | no description |
| | **defmap-intrazone-deny** string | **Choices:*** disable
* enable
| no description |
| | **defmap-zonemember** string | | no description |
| | **description** string | | no description |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **egress-shaping-profile** string | | no description |
| | | **ingress-shaping-profile** string | | no description |
| | | **intrazone-deny** string | **Choices:*** disable
* enable
| no description |
| | | **local-intf** string | | no description |
| | **egress-shaping-profile** string | | no description |
| | **ingress-shaping-profile** string | | no description |
| | **name** string | | no description |
| | **platform\_mapping** list / elements=string | | no description |
| | | **egress-shaping-profile** string | | no description |
| | | **ingress-shaping-profile** string | | no description |
| | | **intf-zone** string | | no description |
| | | **intrazone-deny** string | **Choices:*** disable
* enable
| no description |
| | | **name** string | | no description |
| | **single-intf** string | **Choices:*** disable
* **enable** β
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dynamic_interface:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dynamic_interface:
color: <value of integer>
default-mapping: <value in [disable, enable]>
defmap-intf: <value of string>
defmap-intrazone-deny: <value in [disable, enable]>
defmap-zonemember: <value of string>
description: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
egress-shaping-profile: <value of string>
intrazone-deny: <value in [disable, enable]>
local-intf: <value of string>
ingress-shaping-profile: <value of string>
egress-shaping-profile: <value of string>
name: <value of string>
single-intf: <value in [disable, enable]>
ingress-shaping-profile: <value of string>
platform_mapping:
-
egress-shaping-profile: <value of string>
ingress-shaping-profile: <value of string>
intf-zone: <value of string>
intrazone-deny: <value in [disable, enable]>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dnsfilter_domainfilter_entries β DNS domain filter entries. fortinet.fortimanager.fmgr\_dnsfilter\_domainfilter\_entries β DNS domain filter entries.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dnsfilter_domainfilter_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dnsfilter\_domainfilter\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** block
* allow
* monitor
| Action to take for domain filter matches. |
| | **domain** string | | Domain entries to be filtered. |
| | **id** integer | | Id. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this domain filter. |
| | **type** string | **Choices:*** simple
* regex
* wildcard
| DNS domain filter type. |
| **domain-filter** string / required | | the parameter (domain-filter) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: DNS domain filter entries.
fmgr_dnsfilter_domainfilter_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
domain-filter: <your own value>
state: <value in [present, absent]>
dnsfilter_domainfilter_entries:
action: <value in [block, allow, monitor]>
domain: <value of string>
id: <value of integer>
status: <value in [disable, enable]>
type: <value in [simple, regex, wildcard]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_fdssetting_updateschedule β Configure the schedule when built-in FortiGuard retrieves antivirus and IPS updates. fortinet.fortimanager.fmgr\_fmupdate\_fdssetting\_updateschedule β Configure the schedule when built-in FortiGuard retrieves antivirus and IPS updates.
=======================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_fdssetting_updateschedule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_fdssetting\_updateschedule** dictionary | | the top level parameters set |
| | **day** string | **Choices:*** Sunday
* **Monday** β
* Tuesday
* Wednesday
* Thursday
* Friday
* Saturday
| Configure the day the update will occur, if the freqnecy is weekly (Sunday - Saturday, default = Monday). Sunday - Update every Sunday. Monday - Update every Monday. Tuesday - Update every Tuesday. Wednesday - Update every Wednesday. Thursday - Update every Thursday. Friday - Update every Friday. Saturday - Update every Saturday. |
| | **frequency** string | **Choices:*** **every** β
* daily
* weekly
| Configure update frequency: every - time interval, daily - once a day, weekly - once a week (default = every). every - Time interval. daily - Every day. weekly - Every week. |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable scheduled updates. disable - Disable setting. enable - Enable setting. |
| | **time** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure the schedule when built-in FortiGuard retrieves antivirus and IPS updates.
fmgr_fmupdate_fdssetting_updateschedule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_fdssetting_updateschedule:
day: <value in [Sunday, Monday, Tuesday, ...]>
frequency: <value in [every, daily, weekly]>
status: <value in [disable, enable]>
time: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_locallog_disk_setting β Settings for local disk logging. fortinet.fortimanager.fmgr\_system\_locallog\_disk\_setting β Settings for local disk logging.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_disk_setting`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_disk\_setting** dictionary | | the top level parameters set |
| | **diskfull** string | **Choices:*** **overwrite** β
* nolog
| Policy to apply when disk is full. overwrite - Overwrite oldest log when disk is full. nolog - Stop logging when disk is full. |
| | **log-disk-full-percentage** integer | **Default:**80 | Consider log disk as full at this usage percentage. |
| | **max-log-file-size** integer | **Default:**100 | Maximum log file size before rolling. |
| | **roll-day** list / elements=string | **Choices:*** sunday
* monday
* tuesday
* wednesday
* thursday
* friday
* saturday
| no description |
| | **roll-schedule** string | **Choices:*** **none** β
* daily
* weekly
| Frequency to check log file for rolling. none - Not scheduled. daily - Every day. weekly - Every week. |
| | **roll-time** string | | no description |
| | **server-type** string | **Choices:*** **FTP** β
* SFTP
* SCP
| Server type. FTP - Upload via FTP. SFTP - Upload via SFTP. SCP - Upload via SCP. |
| | **severity** string | **Choices:*** emergency
* alert
* critical
* error
* warning
* notification
* **information** β
* debug
| Least severity level to log. emergency - Emergency level. alert - Alert level. critical - Critical level. error - Error level. warning - Warning level. notification - Notification level. information - Information level. debug - Debug level. |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable local disk log. disable - Do not log to local disk. enable - Log to local disk. |
| | **upload** string | **Choices:*** **disable** β
* enable
| Upload log file when rolling. disable - Disable uploading when rolling log file. enable - Enable uploading when rolling log file. |
| | **upload-delete-files** string | **Choices:*** disable
* **enable** β
| Delete log files after uploading (default = enable). disable - Do not delete log files after uploading. enable - Delete log files after uploading. |
| | **upload-time** string | | no description |
| | **uploaddir** string | | Log file upload remote directory. |
| | **uploadip** string | **Default:**"0.0.0.0" | IP address of log uploading server. |
| | **uploadpass** string | | no description |
| | **uploadport** integer | **Default:**0 | Server port (0 = default protocol port). |
| | **uploadsched** string | **Choices:*** **disable** β
* enable
| Scheduled upload (disable = upload when rolling). disable - Upload when rolling. enable - Scheduled upload. |
| | **uploadtype** list / elements=string | **Choices:*** event
| no description |
| | **uploaduser** string | | User account in upload server. |
| | **uploadzip** string | **Choices:*** **disable** β
* enable
| Compress upload logs. disable - Upload log files as plain text. enable - Upload log files compressed. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Settings for local disk logging.
fmgr_system_locallog_disk_setting:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_disk_setting:
diskfull: <value in [overwrite, nolog]>
log-disk-full-percentage: <value of integer>
max-log-file-size: <value of integer>
roll-day:
- sunday
- monday
- tuesday
- wednesday
- thursday
- friday
- saturday
roll-schedule: <value in [none, daily, weekly]>
roll-time: <value of string>
server-type: <value in [FTP, SFTP, SCP]>
severity: <value in [emergency, alert, critical, ...]>
status: <value in [disable, enable]>
upload: <value in [disable, enable]>
upload-delete-files: <value in [disable, enable]>
upload-time: <value of string>
uploaddir: <value of string>
uploadip: <value of string>
uploadpass: <value of string>
uploadport: <value of integer>
uploadsched: <value in [disable, enable]>
uploadtype:
- event
uploaduser: <value of string>
uploadzip: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_multicastaddress6_tagging β Config object tagging. fortinet.fortimanager.fmgr\_firewall\_multicastaddress6\_tagging β Config object tagging.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_multicastaddress6_tagging`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_multicastaddress6\_tagging** dictionary | | the top level parameters set |
| | **category** string | | Tag category. |
| | **name** string | | Tagging entry name. |
| | **tags** string | | no description |
| **multicast-address6** string / required | | the parameter (multicast-address6) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Config object tagging.
fmgr_firewall_multicastaddress6_tagging:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
multicast-address6: <your own value>
state: <value in [present, absent]>
firewall_multicastaddress6_tagging:
category: <value of string>
name: <value of string>
tags: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_certificate_template β no description fortinet.fortimanager.fmgr\_certificate\_template β no description
==================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_certificate_template`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **certificate\_template** dictionary | | the top level parameters set |
| | **city** string | | no description |
| | **country** string | | no description |
| | **curve-name** string | **Choices:*** **secp256r1** β
* secp384r1
* secp521r1
| no description |
| | **digest-type** string | **Choices:*** **sha1** β
* sha256
| no description |
| | **email** string | | no description |
| | **id-type** string | **Choices:*** **host-ip** β
* domain-name
* email
| no description |
| | **key-size** string | **Choices:*** 512
* 1024
* 1536
* **2048** β
* 4096
| no description |
| | **key-type** string | **Choices:*** **rsa** β
* ec
| no description |
| | **name** string | | no description |
| | **organization** string | | no description |
| | **organization-unit** string | | no description |
| | **scep-password** string | | no description |
| | **scep-server** string | | no description |
| | **state** string | | no description |
| | **subject-name** string | | no description |
| | **type** string | **Choices:*** **external** β
* local
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_certificate_template:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
certificate_template:
city: <value of string>
country: <value of string>
digest-type: <value in [sha1, sha256]>
email: <value of string>
id-type: <value in [host-ip, domain-name, email]>
key-size: <value in [512, 1024, 1536, ...]>
key-type: <value in [rsa, ec]>
name: <value of string>
organization: <value of string>
organization-unit: <value of string>
scep-password: <value of string>
scep-server: <value of string>
state: <value of string>
subject-name: <value of string>
type: <value in [external, local]>
curve-name: <value in [secp256r1, secp384r1, secp521r1]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_analyzer_virusreport β Send virus detection notification to FortiGuard. fortinet.fortimanager.fmgr\_fmupdate\_analyzer\_virusreport β Send virus detection notification to FortiGuard.
==============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_analyzer_virusreport`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_analyzer\_virusreport** dictionary | | the top level parameters set |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable sending virus detection notification to FortiGuard (default = enable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Send virus detection notification to FortiGuard.
fmgr_fmupdate_analyzer_virusreport:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_analyzer_virusreport:
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pkg_firewall_localinpolicy β Configure user defined IPv4 local-in policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_localinpolicy β Configure user defined IPv4 local-in policies.
=========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_localinpolicy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_localinpolicy** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
| Action performed on traffic matching the policy (default = deny). |
| | **comments** string | | Comment. |
| | **dstaddr** string | | Destination address object from available options. |
| | **dstaddr-negate** string | **Choices:*** disable
* enable
| When enabled dstaddr specifies what the destination address must NOT be. |
| | **ha-mgmt-intf-only** string | **Choices:*** disable
* enable
| Enable/disable dedicating the HA management interface only for local-in policy. |
| | **intf** string | | Incoming interface name from available options. |
| | **policyid** integer | | User defined local in policy ID. |
| | **schedule** string | | Schedule object from available options. |
| | **service** string | | Service object from available options. |
| | **service-negate** string | **Choices:*** disable
* enable
| When enabled service specifies what the service must NOT be. |
| | **srcaddr** string | | Source address object from available options. |
| | **srcaddr-negate** string | **Choices:*** disable
* enable
| When enabled srcaddr specifies what the source address must NOT be. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this local-in policy. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure user defined IPv4 local-in policies.
fmgr_pkg_firewall_localinpolicy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
state: <value in [present, absent]>
pkg_firewall_localinpolicy:
action: <value in [deny, accept]>
dstaddr: <value of string>
ha-mgmt-intf-only: <value in [disable, enable]>
intf: <value of string>
policyid: <value of integer>
schedule: <value of string>
service: <value of string>
srcaddr: <value of string>
status: <value in [disable, enable]>
comments: <value of string>
uuid: <value of string>
dstaddr-negate: <value in [disable, enable]>
service-negate: <value in [disable, enable]>
srcaddr-negate: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_config_reset_database β Reset Global ADOM to a specific version. fortinet.fortimanager.fmgr\_pm\_config\_reset\_database β Reset Global ADOM to a specific version.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_reset_database`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pm\_config\_reset\_database** dictionary | | the top level parameters set |
| | **mr** integer | | no description |
| | **version** integer | | Integer major release value (eg. 500 or 5). |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Reset Global ADOM to a specific version.
fmgr_pm_config_reset_database:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pm_config_reset_database:
mr: <value of integer>
version: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_bwl_entries β Anti-spam black/white list entries. fortinet.fortimanager.fmgr\_spamfilter\_bwl\_entries β Anti-spam black/white list entries.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_bwl_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bwl** string / required | | the parameter (bwl) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_bwl\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** spam
* clear
* reject
| Reject, mark as spam or good email. |
| | **addr-type** string | **Choices:*** ipv4
* ipv6
| IP address type. |
| | **email-pattern** string | | Email address pattern. |
| | **id** integer | | Entry ID. |
| | **ip4-subnet** string | | IPv4 network address/subnet mask bits. |
| | **ip6-subnet** string | | IPv6 network address/subnet mask bits. |
| | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **type** string | **Choices:*** ip
* email
| Entry type. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Anti-spam black/white list entries.
fmgr_spamfilter_bwl_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
bwl: <your own value>
state: <value in [present, absent]>
spamfilter_bwl_entries:
action: <value in [spam, clear, reject]>
addr-type: <value in [ipv4, ipv6]>
email-pattern: <value of string>
id: <value of integer>
ip4-subnet: <value of string>
ip6-subnet: <value of string>
pattern-type: <value in [wildcard, regexp]>
status: <value in [disable, enable]>
type: <value in [ip, email]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_antivirus_notification_entries β modify this antivirus notification list fortinet.fortimanager.fmgr\_antivirus\_notification\_entries β modify this antivirus notification list
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_notification_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_notification\_entries** dictionary | | the top level parameters set |
| | **name** string | | virus name or prefix |
| | **prefix** string | **Choices:*** disable
* enable
| enable prefix matches based on this name |
| | **status** string | **Choices:*** disable
* enable
| enable this entry for notifications |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **notification** string / required | | the parameter (notification) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: modify this antivirus notification list
fmgr_antivirus_notification_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
notification: <your own value>
state: <value in [present, absent]>
antivirus_notification_entries:
name: <value of string>
prefix: <value in [disable, enable]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_fips β Settings for FIPS-CC mode. fortinet.fortimanager.fmgr\_system\_fips β Settings for FIPS-CC mode.
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_fips`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_fips** dictionary | | the top level parameters set |
| | **entropy-token** string | **Choices:*** **enable** β
* disable
* dynamic
| Enable/disable entropy token when switching to FIPS mode. enable - Enable entropy token. disable - Disable entropy token. dynamic - Dynamically detect entropy token during bootup. |
| | **re-seed-interval** integer | **Default:**1440 | Kernel FIPS-compliant PRNG re-seed interval (0 to 1440 minutes) |
| | **status** string | **Choices:*** **disable** β
* enable
| Enable/disable FIPS-CC mode. disable - Disable FIPS-CC mode. enable - Enable FIPS-CC mode. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Settings for FIPS-CC mode.
fmgr_system_fips:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_fips:
entropy-token: <value in [enable, disable, dynamic]>
re-seed-interval: <value of integer>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvm_cmd_discover_device β Probe a remote device and retrieve its device information and system status. fortinet.fortimanager.fmgr\_dvm\_cmd\_discover\_device β Probe a remote device and retrieve its device information and system status.
=====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvm_cmd_discover_device`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvm\_cmd\_discover\_device** dictionary | | the top level parameters set |
| | **device** dictionary | | no description |
| | | **adm\_pass** string | | no description |
| | | **adm\_usr** string | | no description |
| | | **ip** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Probe a remote device and retrieve its device information and system status.
fmgr_dvm_cmd_discover_device:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
dvm_cmd_discover_device:
device:
adm_pass: <value of string>
adm_usr: <value of string>
ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_header_policy6 β Configure IPv6 policies. fortinet.fortimanager.fmgr\_pkg\_header\_policy6 β Configure IPv6 policies.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_header_policy6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_header\_policy6** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
* ipsec
* ssl-vpn
| no description |
| | **anti-replay** string | **Choices:*** disable
* enable
| no description |
| | **app-category** string | | no description |
| | **app-group** string | | no description |
| | **application** integer | | no description |
| | **application-charts** list / elements=string | **Choices:*** top10-app
* top10-p2p-user
* top10-media-user
| no description |
| | **application-list** string | | no description |
| | **auto-asic-offload** string | **Choices:*** disable
* enable
| no description |
| | **av-profile** string | | no description |
| | **casi-profile** string | | no description |
| | **cgn-log-server-grp** string | | no description |
| | **cifs-profile** string | | no description |
| | **comments** string | | no description |
| | **custom-log-fields** string | | no description |
| | **decrypted-traffic-mirror** string | | no description |
| | **deep-inspection-options** string | | no description |
| | **device-detection-portal** string | **Choices:*** disable
* enable
| no description |
| | **devices** string | | no description |
| | **diffserv-forward** string | **Choices:*** disable
* enable
| no description |
| | **diffserv-reverse** string | **Choices:*** disable
* enable
| no description |
| | **diffservcode-forward** string | | no description |
| | **diffservcode-rev** string | | no description |
| | **dlp-sensor** string | | no description |
| | **dnsfilter-profile** string | | no description |
| | **dscp-match** string | **Choices:*** disable
* enable
| no description |
| | **dscp-negate** string | **Choices:*** disable
* enable
| no description |
| | **dscp-value** string | | no description |
| | **dsri** string | **Choices:*** disable
* enable
| no description |
| | **dstaddr** string | | no description |
| | **dstaddr-negate** string | **Choices:*** disable
* enable
| no description |
| | **dstintf** string | | no description |
| | **dynamic-profile** string | **Choices:*** disable
* enable
| no description |
| | **dynamic-profile-access** list / elements=string | **Choices:*** imap
* smtp
* pop3
* http
* ftp
* im
* nntp
* imaps
* smtps
* pop3s
* https
* ftps
| no description |
| | **dynamic-profile-group** string | | no description |
| | **email-collection-portal** string | **Choices:*** disable
* enable
| no description |
| | **emailfilter-profile** string | | no description |
| | **file-filter-profile** string | | no description |
| | **firewall-session-dirty** string | **Choices:*** check-all
* check-new
| no description |
| | **fixedport** string | **Choices:*** disable
* enable
| no description |
| | **fsae** string | **Choices:*** disable
* enable
| no description |
| | **fsso-groups** string | | no description |
| | **global-label** string | | no description |
| | **groups** string | | no description |
| | **http-policy-redirect** string | **Choices:*** disable
* enable
| no description |
| | **icap-profile** string | | no description |
| | **identity-based** string | **Choices:*** disable
* enable
| no description |
| | **identity-based-policy6** list / elements=string | | no description |
| | | **action** string | **Choices:*** deny
* accept
| no description |
| | | **application-list** string | | no description |
| | | **av-profile** string | | no description |
| | | **deep-inspection-options** string | | no description |
| | | **devices** string | | no description |
| | | **dlp-sensor** string | | no description |
| | | **endpoint-compliance** string | **Choices:*** disable
* enable
| no description |
| | | **groups** string | | no description |
| | | **icap-profile** string | | no description |
| | | **id** integer | | no description |
| | | **ips-sensor** string | | no description |
| | | **logtraffic** string | **Choices:*** disable
* enable
* all
* utm
| no description |
| | | **mms-profile** string | | no description |
| | | **per-ip-shaper** string | | no description |
| | | **profile-group** string | | no description |
| | | **profile-protocol-options** string | | no description |
| | | **profile-type** string | **Choices:*** single
* group
| no description |
| | | **replacemsg-group** string | | no description |
| | | **schedule** string | | no description |
| | | **send-deny-packet** string | **Choices:*** disable
* enable
| no description |
| | | **service** string | | no description |
| | | **service-negate** string | **Choices:*** disable
* enable
| no description |
| | | **spamfilter-profile** string | | no description |
| | | **sslvpn-portal** string | | no description |
| | | **sslvpn-realm** string | | no description |
| | | **traffic-shaper** string | | no description |
| | | **traffic-shaper-reverse** string | | no description |
| | | **utm-status** string | **Choices:*** disable
* enable
| no description |
| | | **voip-profile** string | | no description |
| | | **webfilter-profile** string | | no description |
| | **identity-from** string | **Choices:*** auth
* device
| no description |
| | **inbound** string | **Choices:*** disable
* enable
| no description |
| | **inspection-mode** string | **Choices:*** proxy
* flow
| no description |
| | **ippool** string | **Choices:*** disable
* enable
| no description |
| | **ips-sensor** string | | no description |
| | **label** string | | no description |
| | **logtraffic** string | **Choices:*** disable
* enable
* all
* utm
| no description |
| | **logtraffic-start** string | **Choices:*** disable
* enable
| no description |
| | **mms-profile** string | | no description |
| | **name** string | | no description |
| | **nat** string | **Choices:*** disable
* enable
| no description |
| | **natinbound** string | **Choices:*** disable
* enable
| no description |
| | **natoutbound** string | **Choices:*** disable
* enable
| no description |
| | **np-accelation** string | **Choices:*** disable
* enable
| no description |
| | **np-acceleration** string | **Choices:*** disable
* enable
| no description |
| | **outbound** string | **Choices:*** disable
* enable
| no description |
| | **per-ip-shaper** string | | no description |
| | **policy-offload** string | **Choices:*** disable
* enable
| no description |
| | **policyid** integer | | no description |
| | **poolname** string | | no description |
| | **profile-group** string | | no description |
| | **profile-protocol-options** string | | no description |
| | **profile-type** string | **Choices:*** single
* group
| no description |
| | **replacemsg-group** string | | no description |
| | **replacemsg-override-group** string | | no description |
| | **rsso** string | **Choices:*** disable
* enable
| no description |
| | **schedule** string | | no description |
| | **send-deny-packet** string | **Choices:*** disable
* enable
| no description |
| | **service** string | | no description |
| | **service-negate** string | **Choices:*** disable
* enable
| no description |
| | **session-ttl** integer | | no description |
| | **spamfilter-profile** string | | no description |
| | **srcaddr** string | | no description |
| | **srcaddr-negate** string | **Choices:*** disable
* enable
| no description |
| | **srcintf** string | | no description |
| | **ssh-filter-profile** string | | no description |
| | **ssh-policy-redirect** string | **Choices:*** disable
* enable
| no description |
| | **ssl-mirror** string | **Choices:*** disable
* enable
| no description |
| | **ssl-mirror-intf** string | | no description |
| | **ssl-ssh-profile** string | | no description |
| | **sslvpn-auth** string | **Choices:*** any
* local
* radius
* ldap
* tacacs+
| no description |
| | **sslvpn-ccert** string | **Choices:*** disable
* enable
| no description |
| | **sslvpn-cipher** string | **Choices:*** any
* high
* medium
| no description |
| | **status** string | **Choices:*** disable
* enable
| no description |
| | **tags** string | | no description |
| | **tcp-mss-receiver** integer | | no description |
| | **tcp-mss-sender** integer | | no description |
| | **tcp-session-without-syn** string | **Choices:*** all
* data-only
* disable
| no description |
| | **timeout-send-rst** string | **Choices:*** disable
* enable
| no description |
| | **tos** string | | no description |
| | **tos-mask** string | | no description |
| | **tos-negate** string | **Choices:*** disable
* enable
| no description |
| | **traffic-shaper** string | | no description |
| | **traffic-shaper-reverse** string | | no description |
| | **url-category** string | | no description |
| | **users** string | | no description |
| | **utm-inspection-mode** string | **Choices:*** proxy
* flow
| no description |
| | **utm-status** string | **Choices:*** disable
* enable
| no description |
| | **uuid** string | | no description |
| | **vlan-cos-fwd** integer | | no description |
| | **vlan-cos-rev** integer | | no description |
| | **vlan-filter** string | | no description |
| | **voip-profile** string | | no description |
| | **vpntunnel** string | | no description |
| | **waf-profile** string | | no description |
| | **webcache** string | **Choices:*** disable
* enable
| no description |
| | **webcache-https** string | **Choices:*** disable
* enable
| no description |
| | **webfilter-profile** string | | no description |
| | **webproxy-forward-server** string | | no description |
| | **webproxy-profile** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 policies.
fmgr_pkg_header_policy6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pkg: <your own value>
state: <value in [present, absent]>
pkg_header_policy6:
action: <value in [deny, accept, ipsec, ...]>
anti-replay: <value in [disable, enable]>
app-category: <value of string>
app-group: <value of string>
application: <value of integer>
application-charts:
- top10-app
- top10-p2p-user
- top10-media-user
application-list: <value of string>
auto-asic-offload: <value in [disable, enable]>
av-profile: <value of string>
casi-profile: <value of string>
cifs-profile: <value of string>
comments: <value of string>
custom-log-fields: <value of string>
deep-inspection-options: <value of string>
device-detection-portal: <value in [disable, enable]>
devices: <value of string>
diffserv-forward: <value in [disable, enable]>
diffserv-reverse: <value in [disable, enable]>
diffservcode-forward: <value of string>
diffservcode-rev: <value of string>
dlp-sensor: <value of string>
dnsfilter-profile: <value of string>
dscp-match: <value in [disable, enable]>
dscp-negate: <value in [disable, enable]>
dscp-value: <value of string>
dsri: <value in [disable, enable]>
dstaddr: <value of string>
dstaddr-negate: <value in [disable, enable]>
dstintf: <value of string>
dynamic-profile: <value in [disable, enable]>
dynamic-profile-access:
- imap
- smtp
- pop3
- http
- ftp
- im
- nntp
- imaps
- smtps
- pop3s
- https
- ftps
dynamic-profile-group: <value of string>
email-collection-portal: <value in [disable, enable]>
emailfilter-profile: <value of string>
firewall-session-dirty: <value in [check-all, check-new]>
fixedport: <value in [disable, enable]>
fsae: <value in [disable, enable]>
global-label: <value of string>
groups: <value of string>
http-policy-redirect: <value in [disable, enable]>
icap-profile: <value of string>
identity-based: <value in [disable, enable]>
identity-based-policy6:
-
action: <value in [deny, accept]>
application-list: <value of string>
av-profile: <value of string>
deep-inspection-options: <value of string>
devices: <value of string>
dlp-sensor: <value of string>
endpoint-compliance: <value in [disable, enable]>
groups: <value of string>
icap-profile: <value of string>
id: <value of integer>
ips-sensor: <value of string>
logtraffic: <value in [disable, enable, all, ...]>
mms-profile: <value of string>
per-ip-shaper: <value of string>
profile-group: <value of string>
profile-protocol-options: <value of string>
profile-type: <value in [single, group]>
replacemsg-group: <value of string>
schedule: <value of string>
send-deny-packet: <value in [disable, enable]>
service: <value of string>
service-negate: <value in [disable, enable]>
spamfilter-profile: <value of string>
sslvpn-portal: <value of string>
sslvpn-realm: <value of string>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
utm-status: <value in [disable, enable]>
voip-profile: <value of string>
webfilter-profile: <value of string>
identity-from: <value in [auth, device]>
inbound: <value in [disable, enable]>
inspection-mode: <value in [proxy, flow]>
ippool: <value in [disable, enable]>
ips-sensor: <value of string>
label: <value of string>
logtraffic: <value in [disable, enable, all, ...]>
logtraffic-start: <value in [disable, enable]>
mms-profile: <value of string>
name: <value of string>
nat: <value in [disable, enable]>
natinbound: <value in [disable, enable]>
natoutbound: <value in [disable, enable]>
np-accelation: <value in [disable, enable]>
np-acceleration: <value in [disable, enable]>
outbound: <value in [disable, enable]>
per-ip-shaper: <value of string>
policyid: <value of integer>
poolname: <value of string>
profile-group: <value of string>
profile-protocol-options: <value of string>
profile-type: <value in [single, group]>
replacemsg-group: <value of string>
replacemsg-override-group: <value of string>
rsso: <value in [disable, enable]>
schedule: <value of string>
send-deny-packet: <value in [disable, enable]>
service: <value of string>
service-negate: <value in [disable, enable]>
session-ttl: <value of integer>
spamfilter-profile: <value of string>
srcaddr: <value of string>
srcaddr-negate: <value in [disable, enable]>
srcintf: <value of string>
ssh-filter-profile: <value of string>
ssh-policy-redirect: <value in [disable, enable]>
ssl-mirror: <value in [disable, enable]>
ssl-mirror-intf: <value of string>
ssl-ssh-profile: <value of string>
sslvpn-auth: <value in [any, local, radius, ...]>
sslvpn-ccert: <value in [disable, enable]>
sslvpn-cipher: <value in [any, high, medium]>
status: <value in [disable, enable]>
tags: <value of string>
tcp-mss-receiver: <value of integer>
tcp-mss-sender: <value of integer>
tcp-session-without-syn: <value in [all, data-only, disable]>
timeout-send-rst: <value in [disable, enable]>
tos: <value of string>
tos-mask: <value of string>
tos-negate: <value in [disable, enable]>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
url-category: <value of string>
users: <value of string>
utm-inspection-mode: <value in [proxy, flow]>
utm-status: <value in [disable, enable]>
uuid: <value of string>
vlan-cos-fwd: <value of integer>
vlan-cos-rev: <value of integer>
vlan-filter: <value of string>
voip-profile: <value of string>
vpntunnel: <value of string>
webfilter-profile: <value of string>
waf-profile: <value of string>
webcache: <value in [disable, enable]>
webcache-https: <value in [disable, enable]>
webproxy-forward-server: <value of string>
webproxy-profile: <value of string>
fsso-groups: <value of string>
decrypted-traffic-mirror: <value of string>
file-filter-profile: <value of string>
cgn-log-server-grp: <value of string>
policy-offload: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_log_ratelimit_device β Device log rate limit. fortinet.fortimanager.fmgr\_system\_log\_ratelimit\_device β Device log rate limit.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_ratelimit_device`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_ratelimit\_device** dictionary | | the top level parameters set |
| | **device** string | | Device(s) filter according to filter-type setting, wildcard expression supported. |
| | **filter-type** string | **Choices:*** **devid** β
| Device filter type. devid - Device ID. |
| | **id** integer | **Default:**0 | Device filter ID. |
| | **ratelimit** integer | **Default:**0 | Maximum device log rate limit. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Device log rate limit.
fmgr_system_log_ratelimit_device:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_log_ratelimit_device:
device: <value of string>
filter-type: <value in [devid]>
id: <value of integer>
ratelimit: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_vip_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority. fortinet.fortimanager.fmgr\_firewall\_vip\_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority.
=================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip_sslciphersuites`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip\_sslciphersuites** dictionary | | the top level parameters set |
| | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | **id** integer | | no description |
| | **priority** integer | | SSL/TLS cipher suites priority. |
| | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip** string / required | | the parameter (vip) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL/TLS cipher suites acceptable from a client, ordered by priority.
fmgr_firewall_vip_sslciphersuites:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip: <your own value>
state: <value in [present, absent]>
firewall_vip_sslciphersuites:
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
id: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
priority: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_workflow_approvalmatrix_approver β Approver. fortinet.fortimanager.fmgr\_system\_workflow\_approvalmatrix\_approver β Approver.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_workflow_approvalmatrix_approver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **approval-matrix** string / required | | the parameter (approval-matrix) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_workflow\_approvalmatrix\_approver** dictionary | | the top level parameters set |
| | **member** string | | Member of approver. |
| | **seq\_num** integer | **Default:**0 | Entry number. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Approver.
fmgr_system_workflow_approvalmatrix_approver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
approval-matrix: <your own value>
state: <value in [present, absent]>
system_workflow_approvalmatrix_approver:
member: <value of string>
seq_num: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_fdssetting_pushoverridetoclient_announceip β Announce IP addresses for the device. fortinet.fortimanager.fmgr\_fmupdate\_fdssetting\_pushoverridetoclient\_announceip β Announce IP addresses for the device.
==========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_fdssetting_pushoverridetoclient_announceip`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_fdssetting\_pushoverridetoclient\_announceip** dictionary | | the top level parameters set |
| | **id** integer | **Default:**0 | ID of the announce IP address (1 - 10). |
| | **ip** string | **Default:**"0.0.0.0" | Announce IPv4 address. |
| | **port** integer | **Default:**8890 | Announce IP port (1 - 65535, default = 8890). |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Announce IP addresses for the device.
fmgr_fmupdate_fdssetting_pushoverridetoclient_announceip:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
fmupdate_fdssetting_pushoverridetoclient_announceip:
id: <value of integer>
ip: <value of string>
port: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmptrapthreshold β Configuration method to edit Simple Network Management Protocol fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_snmptrapthreshold β Configuration method to edit Simple Network Management Protocol
================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_snmptrapthreshold`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_snmptrapthreshold** dictionary | | the top level parameters set |
| | **trap-high-cpu-threshold** integer | | CPU usage when trap is sent. |
| | **trap-log-full-threshold** integer | | Log disk usage when trap is sent. |
| | **trap-low-memory-threshold** integer | | Memory usage when trap is sent. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit Simple Network Management Protocol
fmgr_switchcontroller_managedswitch_snmptrapthreshold:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
switchcontroller_managedswitch_snmptrapthreshold:
trap-high-cpu-threshold: <value of integer>
trap-log-full-threshold: <value of integer>
trap-low-memory-threshold: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_settings β Log settings. fortinet.fortimanager.fmgr\_system\_log\_settings β Log settings.
=================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_settings`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_settings** dictionary | | the top level parameters set |
| | **browse-max-logfiles** integer | **Default:**10000 | Maximum number of log files for each log browse attempt for each Adom. |
| | **dns-resolve-dstip** string | **Choices:*** **disable** β
* enable
| Enable/Disable resolving destination IP by DNS. disable - Disable resolving destination IP by DNS. enable - Enable resolving destination IP by DNS. |
| | **download-max-logs** integer | **Default:**500000 | Maximum number of logs for each log download attempt. |
| | **FAC-custom-field1** string | | Name of custom log field to index. |
| | **FAZ-custom-field1** string | | Name of custom log field to index. |
| | **FCH-custom-field1** string | | Name of custom log field to index. |
| | **FCT-custom-field1** string | | Name of custom log field to index. |
| | **FDD-custom-field1** string | | Name of custom log field to index. |
| | **FGT-custom-field1** string | | Name of custom log field to index. |
| | **FMG-custom-field1** string | | Name of custom log field to index. |
| | **FML-custom-field1** string | | Name of custom log field to index. |
| | **FPX-custom-field1** string | | Name of custom log field to index. |
| | **FSA-custom-field1** string | | Name of custom log field to index. |
| | **FWB-custom-field1** string | | Name of custom log field to index. |
| | **ha-auto-migrate** string | **Choices:*** **disable** β
* enable
| Enabled/Disable automatically merging HA members logs to HA cluster. disable - Disable automatically merging HA members logs to HA cluster. enable - Enable automatically merging HA members logs to HA cluster. |
| | **import-max-logfiles** integer | **Default:**10000 | Maximum number of log files for each log import attempt. |
| | **log-file-archive-name** string | **Choices:*** **basic** β
* extended
| Log file name format for archiving, such as backup, upload or download. basic - Basic format for log archive file name, e.g. FGT20C0000000001.tlog.1417797247.log. extended - Extended format for log archive file name, e.g. FGT20C0000000001.2014-12-05-08:34:58.tlog.1417797247.log. |
| | **rolling-analyzer** dictionary | | no description |
| | | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | | **directory** string | | Upload server directory, for Unix server, use absolute |
| | | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | | **password** string | | no description |
| | | **password2** string | | no description |
| | | **password3** string | | no description |
| | | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | | **username** string | | Upload server login username. |
| | | **username2** string | | Upload server login username2. |
| | | **username3** string | | Upload server login username3. |
| | | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| | **rolling-local** dictionary | | no description |
| | | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | | **directory** string | | Upload server directory, for Unix server, use absolute |
| | | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | | **password** string | | no description |
| | | **password2** string | | no description |
| | | **password3** string | | no description |
| | | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | | **username** string | | Upload server login username. |
| | | **username2** string | | Upload server login username2. |
| | | **username3** string | | Upload server login username3. |
| | | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| | **rolling-regular** dictionary | | no description |
| | | **days** list / elements=string | **Choices:*** sun
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | | **del-files** string | **Choices:*** **disable** β
* enable
| Enable/disable log file deletion after uploading. disable - Disable log file deletion. enable - Enable log file deletion. |
| | | **directory** string | | Upload server directory, for Unix server, use absolute |
| | | **file-size** integer | **Default:**200 | Roll log files when they reach this size (MB). |
| | | **gzip-format** string | **Choices:*** **disable** β
* enable
| Enable/disable compression of uploaded log files. disable - Disable compression. enable - Enable compression. |
| | | **hour** integer | **Default:**0 | Log files rolling schedule (hour). |
| | | **ip** string | **Default:**"0.0.0.0" | Upload server IP address. |
| | | **ip2** string | **Default:**"0.0.0.0" | Upload server IP2 address. |
| | | **ip3** string | **Default:**"0.0.0.0" | Upload server IP3 address. |
| | | **log-format** string | **Choices:*** **native** β
* text
* csv
| Format of uploaded log files. native - Native format (text or compact). text - Text format (convert if necessary). csv - CSV (comma-separated value) format. |
| | | **min** integer | **Default:**0 | Log files rolling schedule (minutes). |
| | | **password** string | | no description |
| | | **password2** string | | no description |
| | | **password3** string | | no description |
| | | **port** integer | **Default:**0 | Upload server IP1 port number. |
| | | **port2** integer | **Default:**0 | Upload server IP2 port number. |
| | | **port3** integer | **Default:**0 | Upload server IP3 port number. |
| | | **server-type** string | **Choices:*** **ftp** β
* sftp
* scp
| Upload server type. ftp - Upload via FTP. sftp - Upload via SFTP. scp - Upload via SCP. |
| | | **upload** string | **Choices:*** **disable** β
* enable
| Enable/disable log file uploads. disable - Disable log files uploading. enable - Enable log files uploading. |
| | | **upload-hour** integer | **Default:**0 | Log files upload schedule (hour). |
| | | **upload-mode** string | **Choices:*** **backup** β
* mirror
| Upload mode with multiple servers. backup - Servers are attempted and used one after the other upon failure to connect. mirror - All configured servers are attempted and used. |
| | | **upload-trigger** string | **Choices:*** **on-roll** β
* on-schedule
| Event triggering log files upload. on-roll - Upload log files after they are rolled. on-schedule - Upload log files daily. |
| | | **username** string | | Upload server login username. |
| | | **username2** string | | Upload server login username2. |
| | | **username3** string | | Upload server login username3. |
| | | **when** string | **Choices:*** **none** β
* daily
* weekly
| Roll log files periodically. none - Do not roll log files periodically. daily - Roll log files daily. weekly - Roll log files on certain days of week. |
| | **sync-search-timeout** integer | **Default:**60 | Maximum number of seconds for running a log search session in synchronous mode. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log settings.
fmgr_system_log_settings:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_log_settings:
FAC-custom-field1: <value of string>
FAZ-custom-field1: <value of string>
FCH-custom-field1: <value of string>
FCT-custom-field1: <value of string>
FDD-custom-field1: <value of string>
FGT-custom-field1: <value of string>
FMG-custom-field1: <value of string>
FML-custom-field1: <value of string>
FPX-custom-field1: <value of string>
FSA-custom-field1: <value of string>
FWB-custom-field1: <value of string>
browse-max-logfiles: <value of integer>
dns-resolve-dstip: <value in [disable, enable]>
download-max-logs: <value of integer>
ha-auto-migrate: <value in [disable, enable]>
import-max-logfiles: <value of integer>
log-file-archive-name: <value in [basic, extended]>
rolling-analyzer:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
rolling-local:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
rolling-regular:
days:
- sun
- mon
- tue
- wed
- thu
- fri
- sat
del-files: <value in [disable, enable]>
directory: <value of string>
file-size: <value of integer>
gzip-format: <value in [disable, enable]>
hour: <value of integer>
ip: <value of string>
ip2: <value of string>
ip3: <value of string>
log-format: <value in [native, text, csv]>
min: <value of integer>
password: <value of string>
password2: <value of string>
password3: <value of string>
server-type: <value in [ftp, sftp, scp]>
upload: <value in [disable, enable]>
upload-hour: <value of integer>
upload-mode: <value in [backup, mirror]>
upload-trigger: <value in [on-roll, on-schedule]>
username: <value of string>
username2: <value of string>
username3: <value of string>
when: <value in [none, daily, weekly]>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
sync-search-timeout: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvm_cmd_reload_devlist β Retrieve a list of devices. fortinet.fortimanager.fmgr\_dvm\_cmd\_reload\_devlist β Retrieve a list of devices.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvm_cmd_reload_devlist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvm\_cmd\_reload\_devlist** dictionary | | the top level parameters set |
| | **adom** string | | Name or ID of the ADOM where the command is to be executed on. |
| | **flags** list / elements=string | **Choices:*** none
* create\_task
* nonblocking
* log\_dev
| no description |
| | **from** string | **Choices:*** um
* fgfm
* apache
* dvm
* fwm
* xml
* **json** β
| no description |
| | **reload-dev-member-list** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **tag** string | | Revision name for the retrieved configuration. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Retrieve a list of devices.
fmgr_dvm_cmd_reload_devlist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
dvm_cmd_reload_devlist:
adom: <value of string>
flags:
- none
- create_task
- nonblocking
- log_dev
from: <value in [um, fgfm, apache, ...]>
reload-dev-member-list:
-
name: <value of string>
vdom: <value of string>
tag: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_profile_antiphish_inspectionentries β AntiPhishing entries. fortinet.fortimanager.fmgr\_webfilter\_profile\_antiphish\_inspectionentries β AntiPhishing entries.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_antiphish_inspectionentries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_antiphish\_inspectionentries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** log
* block
* exempt
| Action to be taken upon an AntiPhishing match. |
| | **fortiguard-category** string | | no description |
| | **name** string | | Inspection target name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: AntiPhishing entries.
fmgr_webfilter_profile_antiphish_inspectionentries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
webfilter_profile_antiphish_inspectionentries:
action: <value in [log, block, exempt]>
fortiguard-category: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_radius_dynamicmapping β Configure RADIUS server entries. fortinet.fortimanager.fmgr\_user\_radius\_dynamicmapping β Configure RADIUS server entries.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_radius_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **radius** string / required | | the parameter (radius) in requested url |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_radius\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **accounting-server** list / elements=string | | no description |
| | | **id** integer | | no description |
| | | **interface** string | | no description |
| | | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| no description |
| | | **port** integer | | no description |
| | | **secret** string | | no description |
| | | **server** string | | no description |
| | | **source-ip** string | | no description |
| | | **status** string | **Choices:*** disable
* enable
| no description |
| | **acct-all-servers** string | **Choices:*** disable
* enable
| no description |
| | **acct-interim-interval** integer | | no description |
| | **all-usergroup** string | **Choices:*** disable
* enable
| no description |
| | **auth-type** string | **Choices:*** pap
* chap
* ms\_chap
* ms\_chap\_v2
* auto
| no description |
| | **class** string | | no description |
| | **dp-carrier-endpoint-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Vendor-Specific
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **dp-carrier-endpoint-block-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Vendor-Specific
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **dp-context-timeout** integer | | no description |
| | **dp-flush-ip-session** string | **Choices:*** disable
* enable
| no description |
| | **dp-hold-time** integer | | no description |
| | **dp-http-header** string | | no description |
| | **dp-http-header-fallback** string | **Choices:*** ip-header-address
* default-profile
| no description |
| | **dp-http-header-status** string | **Choices:*** disable
* enable
| no description |
| | **dp-http-header-suppress** string | **Choices:*** disable
* enable
| no description |
| | **dp-log-dyn\_flags** list / elements=string | **Choices:*** none
* protocol-error
* profile-missing
* context-missing
* accounting-stop-missed
* accounting-event
* radiusd-other
* endpoint-block
| no description |
| | **dp-log-period** integer | | no description |
| | **dp-mem-percent** integer | | no description |
| | **dp-profile-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Vendor-Specific
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **dp-profile-attribute-key** string | | no description |
| | **dp-radius-response** string | **Choices:*** disable
* enable
| no description |
| | **dp-radius-server-port** integer | | no description |
| | **dp-secret** string | | no description |
| | **dp-validate-request-secret** string | **Choices:*** disable
* enable
| no description |
| | **dynamic-profile** string | **Choices:*** disable
* enable
| no description |
| | **endpoint-translation** string | **Choices:*** disable
* enable
| no description |
| | **ep-carrier-endpoint-convert-hex** string | **Choices:*** disable
* enable
| no description |
| | **ep-carrier-endpoint-header** string | | no description |
| | **ep-carrier-endpoint-header-suppress** string | **Choices:*** disable
* enable
| no description |
| | **ep-carrier-endpoint-prefix** string | **Choices:*** disable
* enable
| no description |
| | **ep-carrier-endpoint-prefix-range-max** integer | | no description |
| | **ep-carrier-endpoint-prefix-range-min** integer | | no description |
| | **ep-carrier-endpoint-prefix-string** string | | no description |
| | **ep-carrier-endpoint-source** string | **Choices:*** http-header
* cookie
| no description |
| | **ep-ip-header** string | | no description |
| | **ep-ip-header-suppress** string | **Choices:*** disable
* enable
| no description |
| | **ep-missing-header-fallback** string | **Choices:*** session-ip
* policy-profile
| no description |
| | **ep-profile-query-type** string | **Choices:*** session-ip
* extract-ip
* extract-carrier-endpoint
| no description |
| | **group-override-attr-type** string | **Choices:*** filter-Id
* class
| no description |
| | **h3c-compatibility** string | **Choices:*** disable
* enable
| no description |
| | **interface** string | | no description |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| no description |
| | **nas-ip** string | | no description |
| | **password-encoding** string | **Choices:*** ISO-8859-1
* auto
| no description |
| | **password-renewal** string | **Choices:*** disable
* enable
| no description |
| | **radius-coa** string | **Choices:*** disable
* enable
| no description |
| | **radius-port** integer | | no description |
| | **rsso** string | **Choices:*** disable
* enable
| no description |
| | **rsso-context-timeout** integer | | no description |
| | **rsso-endpoint-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **rsso-endpoint-block-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **rsso-ep-one-ip-only** string | **Choices:*** disable
* enable
| no description |
| | **rsso-flush-ip-session** string | **Choices:*** disable
* enable
| no description |
| | **rsso-log-flags** list / elements=string | **Choices:*** none
* protocol-error
* profile-missing
* context-missing
* accounting-stop-missed
* accounting-event
* radiusd-other
* endpoint-block
| no description |
| | **rsso-log-period** integer | | no description |
| | **rsso-radius-response** string | **Choices:*** disable
* enable
| no description |
| | **rsso-radius-server-port** integer | | no description |
| | **rsso-secret** string | | no description |
| | **rsso-validate-request-secret** string | **Choices:*** disable
* enable
| no description |
| | **secondary-secret** string | | no description |
| | **secondary-server** string | | no description |
| | **secret** string | | no description |
| | **server** string | | no description |
| | **source-ip** string | | no description |
| | **sso-attribute** string | **Choices:*** User-Name
* User-Password
* CHAP-Password
* NAS-IP-Address
* NAS-Port
* Service-Type
* Framed-Protocol
* Framed-IP-Address
* Framed-IP-Netmask
* Framed-Routing
* Filter-Id
* Framed-MTU
* Framed-Compression
* Login-IP-Host
* Login-Service
* Login-TCP-Port
* Reply-Message
* Callback-Number
* Callback-Id
* Framed-Route
* Framed-IPX-Network
* State
* Class
* Session-Timeout
* Idle-Timeout
* Termination-Action
* Called-Station-Id
* Calling-Station-Id
* NAS-Identifier
* Proxy-State
* Login-LAT-Service
* Login-LAT-Node
* Login-LAT-Group
* Framed-AppleTalk-Link
* Framed-AppleTalk-Network
* Framed-AppleTalk-Zone
* Acct-Status-Type
* Acct-Delay-Time
* Acct-Input-Octets
* Acct-Output-Octets
* Acct-Session-Id
* Acct-Authentic
* Acct-Session-Time
* Acct-Input-Packets
* Acct-Output-Packets
* Acct-Terminate-Cause
* Acct-Multi-Session-Id
* Acct-Link-Count
* CHAP-Challenge
* NAS-Port-Type
* Port-Limit
* Login-LAT-Port
| no description |
| | **sso-attribute-key** string | | no description |
| | **sso-attribute-value-override** string | **Choices:*** disable
* enable
| no description |
| | **switch-controller-acct-fast-framedip-detect** integer | | no description |
| | **switch-controller-service-type** list / elements=string | **Choices:*** login
* framed
* callback-login
* callback-framed
* outbound
* administrative
* nas-prompt
* authenticate-only
* callback-nas-prompt
* call-check
* callback-administrative
| no description |
| | **tertiary-secret** string | | no description |
| | **tertiary-server** string | | no description |
| | **timeout** integer | | no description |
| | **use-group-for-profile** string | **Choices:*** disable
* enable
| no description |
| | **use-management-vdom** string | **Choices:*** disable
* enable
| no description |
| | **username-case-sensitive** string | **Choices:*** disable
* enable
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure RADIUS server entries.
fmgr_user_radius_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
radius: <your own value>
state: <value in [present, absent]>
user_radius_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
acct-all-servers: <value in [disable, enable]>
acct-interim-interval: <value of integer>
all-usergroup: <value in [disable, enable]>
auth-type: <value in [pap, chap, ms_chap, ...]>
class: <value of string>
dp-carrier-endpoint-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
dp-carrier-endpoint-block-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
dp-context-timeout: <value of integer>
dp-flush-ip-session: <value in [disable, enable]>
dp-hold-time: <value of integer>
dp-http-header: <value of string>
dp-http-header-fallback: <value in [ip-header-address, default-profile]>
dp-http-header-status: <value in [disable, enable]>
dp-http-header-suppress: <value in [disable, enable]>
dp-log-dyn_flags:
- none
- protocol-error
- profile-missing
- context-missing
- accounting-stop-missed
- accounting-event
- radiusd-other
- endpoint-block
dp-log-period: <value of integer>
dp-mem-percent: <value of integer>
dp-profile-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
dp-profile-attribute-key: <value of string>
dp-radius-response: <value in [disable, enable]>
dp-radius-server-port: <value of integer>
dp-secret: <value of string>
dp-validate-request-secret: <value in [disable, enable]>
dynamic-profile: <value in [disable, enable]>
endpoint-translation: <value in [disable, enable]>
ep-carrier-endpoint-convert-hex: <value in [disable, enable]>
ep-carrier-endpoint-header: <value of string>
ep-carrier-endpoint-header-suppress: <value in [disable, enable]>
ep-carrier-endpoint-prefix: <value in [disable, enable]>
ep-carrier-endpoint-prefix-range-max: <value of integer>
ep-carrier-endpoint-prefix-range-min: <value of integer>
ep-carrier-endpoint-prefix-string: <value of string>
ep-carrier-endpoint-source: <value in [http-header, cookie]>
ep-ip-header: <value of string>
ep-ip-header-suppress: <value in [disable, enable]>
ep-missing-header-fallback: <value in [session-ip, policy-profile]>
ep-profile-query-type: <value in [session-ip, extract-ip, extract-carrier-endpoint]>
h3c-compatibility: <value in [disable, enable]>
nas-ip: <value of string>
password-encoding: <value in [ISO-8859-1, auto]>
password-renewal: <value in [disable, enable]>
radius-coa: <value in [disable, enable]>
radius-port: <value of integer>
rsso: <value in [disable, enable]>
rsso-context-timeout: <value of integer>
rsso-endpoint-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
rsso-endpoint-block-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
rsso-ep-one-ip-only: <value in [disable, enable]>
rsso-flush-ip-session: <value in [disable, enable]>
rsso-log-flags:
- none
- protocol-error
- profile-missing
- context-missing
- accounting-stop-missed
- accounting-event
- radiusd-other
- endpoint-block
rsso-log-period: <value of integer>
rsso-radius-response: <value in [disable, enable]>
rsso-radius-server-port: <value of integer>
rsso-secret: <value of string>
rsso-validate-request-secret: <value in [disable, enable]>
secondary-secret: <value of string>
secondary-server: <value of string>
secret: <value of string>
server: <value of string>
source-ip: <value of string>
sso-attribute: <value in [User-Name, User-Password, CHAP-Password, ...]>
sso-attribute-key: <value of string>
sso-attribute-value-override: <value in [disable, enable]>
tertiary-secret: <value of string>
tertiary-server: <value of string>
timeout: <value of integer>
use-group-for-profile: <value in [disable, enable]>
use-management-vdom: <value in [disable, enable]>
username-case-sensitive: <value in [disable, enable]>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
group-override-attr-type: <value in [filter-Id, class]>
switch-controller-acct-fast-framedip-detect: <value of integer>
accounting-server:
-
id: <value of integer>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
port: <value of integer>
secret: <value of string>
server: <value of string>
source-ip: <value of string>
status: <value in [disable, enable]>
switch-controller-service-type:
- login
- framed
- callback-login
- callback-framed
- outbound
- administrative
- nas-prompt
- authenticate-only
- callback-nas-prompt
- call-check
- callback-administrative
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vip6_realservers β Select the real servers that this server load balancing VIP will distribute traffic to. fortinet.fortimanager.fmgr\_firewall\_vip6\_realservers β Select the real servers that this server load balancing VIP will distribute traffic to.
=================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip6_realservers`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip6\_realservers** dictionary | | the top level parameters set |
| | **client-ip** string | | Only clients in this IP range can connect to this real server. |
| | **healthcheck** string | **Choices:*** disable
* enable
* vip
| Enable to check the responsiveness of the real server before forwarding traffic. |
| | **holddown-interval** integer | | Time in seconds that the health check monitor continues to monitor an unresponsive server that should be active. |
| | **http-host** string | | HTTP server domain name in HTTP header. |
| | **id** integer | | Real server ID. |
| | **ip** string | | IPv6 address of the real server. |
| | **max-connections** integer | | Max number of active connections that can directed to the real server. When reached, sessions are sent to other real servers. |
| | **monitor** string | | Name of the health check monitor to use when polling to determine a virtual servers connectivity status. |
| | **port** integer | | Port for communicating with the real server. Required if port forwarding is enabled. |
| | **status** string | **Choices:*** active
* standby
* disable
| Set the status of the real server to active so that it can accept traffic, or on standby or disabled so no traffic is sent. |
| | **weight** integer | | Weight of the real server. If weighted load balancing is enabled, the server with the highest weight gets more connections. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip6** string / required | | the parameter (vip6) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Select the real servers that this server load balancing VIP will distribute traffic to.
fmgr_firewall_vip6_realservers:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip6: <your own value>
state: <value in [present, absent]>
firewall_vip6_realservers:
client-ip: <value of string>
healthcheck: <value in [disable, enable, vip]>
holddown-interval: <value of integer>
http-host: <value of string>
id: <value of integer>
ip: <value of string>
max-connections: <value of integer>
monitor: <value of string>
port: <value of integer>
status: <value in [active, standby, disable]>
weight: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_tacacs β Configure TACACS+ server entries. fortinet.fortimanager.fmgr\_user\_tacacs β Configure TACACS+ server entries.
============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_tacacs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_tacacs** dictionary | | the top level parameters set |
| | **authen-type** string | **Choices:*** auto
* ascii
* pap
* chap
* mschap
| Allowed authentication protocols/methods. |
| | **authorization** string | **Choices:*** disable
* enable
| Enable/disable TACACS+ authorization. |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **authen-type** string | **Choices:*** auto
* ascii
* pap
* chap
* mschap
| no description |
| | | **authorization** string | **Choices:*** disable
* enable
| no description |
| | | **interface** string | | no description |
| | | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| no description |
| | | **key** string | | no description |
| | | **port** integer | | no description |
| | | **secondary-key** string | | no description |
| | | **secondary-server** string | | no description |
| | | **server** string | | no description |
| | | **source-ip** string | | no description |
| | | **tertiary-key** string | | no description |
| | | **tertiary-server** string | | no description |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **key** string | | no description |
| | **name** string | | TACACS+ server entry name. |
| | **port** integer | | Port number of the TACACS+ server. |
| | **secondary-key** string | | no description |
| | **secondary-server** string | | Secondary TACACS+ server CN domain name or IP address. |
| | **server** string | | Primary TACACS+ server CN domain name or IP address. |
| | **source-ip** string | | source IP for communications to TACACS+ server. |
| | **tertiary-key** string | | no description |
| | **tertiary-server** string | | Tertiary TACACS+ server CN domain name or IP address. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure TACACS+ server entries.
fmgr_user_tacacs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_tacacs:
authen-type: <value in [auto, ascii, pap, ...]>
authorization: <value in [disable, enable]>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
authen-type: <value in [auto, ascii, pap, ...]>
authorization: <value in [disable, enable]>
key: <value of string>
port: <value of integer>
secondary-key: <value of string>
secondary-server: <value of string>
server: <value of string>
source-ip: <value of string>
tertiary-key: <value of string>
tertiary-server: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
key: <value of string>
name: <value of string>
port: <value of integer>
secondary-key: <value of string>
secondary-server: <value of string>
server: <value of string>
source-ip: <value of string>
tertiary-key: <value of string>
tertiary-server: <value of string>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_pop3 β POP3. fortinet.fortimanager.fmgr\_emailfilter\_profile\_pop3 β POP3.
==============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_pop3`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_pop3** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* tag
| Action for spam email. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| | **tag-msg** string | | Subject text or header added to spam email. |
| | **tag-type** list / elements=string | **Choices:*** subject
* header
* spaminfo
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: POP3.
fmgr_emailfilter_profile_pop3:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_pop3:
action: <value in [pass, tag]>
log: <value in [disable, enable]>
tag-msg: <value of string>
tag-type:
- subject
- header
- spaminfo
log-all: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_filefilter β File filter. fortinet.fortimanager.fmgr\_emailfilter\_profile\_filefilter β File filter.
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_filefilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_filefilter** dictionary | | the top level parameters set |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** log
* block
| Action taken for matched file. |
| | | **comment** string | | Comment. |
| | | **encryption** string | **Choices:*** any
* yes
| Match encrypted files or not. |
| | | **file-type** string | | no description |
| | | **filter** string | | Add a file filter. |
| | | **password-protected** string | **Choices:*** any
* yes
| Match password-protected files. |
| | | **protocol** list / elements=string | **Choices:*** smtp
* imap
* pop3
| no description |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable file filter logging. |
| | **scan-archive-contents** string | **Choices:*** disable
* enable
| Enable/disable file filter archive contents scan. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable file filter. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: File filter.
fmgr_emailfilter_profile_filefilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_filefilter:
entries:
-
action: <value in [log, block]>
comment: <value of string>
encryption: <value in [any, yes]>
file-type: <value of string>
filter: <value of string>
password-protected: <value in [any, yes]>
protocol:
- smtp
- imap
- pop3
log: <value in [disable, enable]>
scan-archive-contents: <value in [disable, enable]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vip64_dynamicmapping β Configure IPv6 to IPv4 virtual IPs. fortinet.fortimanager.fmgr\_firewall\_vip64\_dynamicmapping β Configure IPv6 to IPv4 virtual IPs.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip64_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip64\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **arp-reply** string | **Choices:*** disable
* enable
| no description |
| | **color** integer | | no description |
| | **comment** string | | no description |
| | **extip** string | | no description |
| | **extport** string | | no description |
| | **id** integer | | no description |
| | **ldb-method** string | **Choices:*** static
* round-robin
* weighted
* least-session
* least-rtt
* first-alive
| no description |
| | **mappedip** string | | no description |
| | **mappedport** string | | no description |
| | **monitor** string | | no description |
| | **portforward** string | **Choices:*** disable
* enable
| no description |
| | **protocol** string | **Choices:*** tcp
* udp
| no description |
| | **server-type** string | **Choices:*** http
* tcp
* udp
* ip
| no description |
| | **src-filter** string | | no description |
| | **type** string | **Choices:*** static-nat
* server-load-balance
| no description |
| | **uuid** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip64** string / required | | the parameter (vip64) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 to IPv4 virtual IPs.
fmgr_firewall_vip64_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip64: <your own value>
state: <value in [present, absent]>
firewall_vip64_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
arp-reply: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
extip: <value of string>
extport: <value of string>
id: <value of integer>
ldb-method: <value in [static, round-robin, weighted, ...]>
mappedip: <value of string>
mappedport: <value of string>
monitor: <value of string>
portforward: <value in [disable, enable]>
protocol: <value in [tcp, udp]>
server-type: <value in [http, tcp, udp, ...]>
src-filter: <value of string>
type: <value in [static-nat, server-load-balance]>
uuid: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_antivirus_notification β Configure AntiVirus notification lists. fortinet.fortimanager.fmgr\_antivirus\_notification β Configure AntiVirus notification lists.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_notification`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_notification** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **name** string | | virus name or prefix |
| | | **prefix** string | **Choices:*** disable
* enable
| enable prefix matches based on this name |
| | | **status** string | **Choices:*** disable
* enable
| enable this entry for notifications |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure AntiVirus notification lists.
fmgr_antivirus_notification:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
antivirus_notification:
comment: <value of string>
entries:
-
name: <value of string>
prefix: <value in [disable, enable]>
status: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_malformed β Enable/disable malformed HTTP request check. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_malformed β Enable/disable malformed HTTP request check.
==============================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_malformed`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_malformed** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable malformed HTTP request check.
fmgr_waf_profile_constraint_malformed:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_malformed:
action: <value in [allow, block]>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vap_portalmessageoverrides β Individual message overrides. fortinet.fortimanager.fmgr\_vap\_portalmessageoverrides β Individual message overrides.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vap_portalmessageoverrides`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vap** string / required | | the parameter (vap) in requested url |
| **vap\_portalmessageoverrides** dictionary | | the top level parameters set |
| | **auth-disclaimer-page** string | | Override auth-disclaimer-page message with message from portal-message-overrides group. |
| | **auth-login-failed-page** string | | Override auth-login-failed-page message with message from portal-message-overrides group. |
| | **auth-login-page** string | | Override auth-login-page message with message from portal-message-overrides group. |
| | **auth-reject-page** string | | Override auth-reject-page message with message from portal-message-overrides group. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Individual message overrides.
fmgr_vap_portalmessageoverrides:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vap: <your own value>
vap_portalmessageoverrides:
auth-disclaimer-page: <value of string>
auth-login-failed-page: <value of string>
auth-login-page: <value of string>
auth-reject-page: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_fmupdate_multilayer β Configure multilayer mode. fortinet.fortimanager.fmgr\_fmupdate\_multilayer β Configure multilayer mode.
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_multilayer`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_multilayer** dictionary | | the top level parameters set |
| | **webspam-rating** string | **Choices:*** disable
* **enable** β
| Enable/disable URL/Antispam rating service (default = enable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure multilayer mode.
fmgr_fmupdate_multilayer:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_multilayer:
webspam-rating: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_sys_api_sdnconnector β Query SDN connector data. fortinet.fortimanager.fmgr\_sys\_api\_sdnconnector β Query SDN connector data.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_sys_api_sdnconnector`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sys\_api\_sdnconnector** dictionary | | the top level parameters set |
| | **adom** string | | ADOM name. |
| | **command** string | | For ACI and Nuage connector only, can be either egps or tenants. |
| | **connector\_name** string | | Connector object in ADOM to be queried. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Query SDN connector data.
fmgr_sys_api_sdnconnector:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
sys_api_sdnconnector:
adom: <value of string>
command: <value of string>
connector_name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnsslweb_portal_bookmarkgroup β Portal bookmark group. fortinet.fortimanager.fmgr\_vpnsslweb\_portal\_bookmarkgroup β Portal bookmark group.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnsslweb_portal_bookmarkgroup`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **portal** string / required | | the parameter (portal) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnsslweb\_portal\_bookmarkgroup** dictionary | | the top level parameters set |
| | **bookmarks** list / elements=string | | no description |
| | | **additional-params** string | | Additional parameters. |
| | | **apptype** string | **Choices:*** web
* telnet
* ssh
* ftp
* smb
* vnc
* rdp
* citrix
* rdpnative
* portforward
* sftp
| Application type. |
| | | **description** string | | Description. |
| | | **domain** string | | Login domain. |
| | | **folder** string | | Network shared file folder parameter. |
| | | **form-data** list / elements=string | | no description |
| | | | **name** string | | Name. |
| | | | **value** string | | Value. |
| | | **host** string | | Host name/IP parameter. |
| | | **listening-port** integer | | Listening port (0 - 65535). |
| | | **load-balancing-info** string | | The load balancing information or cookie which should be provided to the connection broker. |
| | | **logon-password** string | | no description |
| | | **logon-user** string | | Logon user. |
| | | **name** string | | Bookmark name. |
| | | **port** integer | | Remote port. |
| | | **preconnection-blob** string | | An arbitrary string which identifies the RDP source. |
| | | **preconnection-id** integer | | The numeric ID of the RDP source (0-2147483648). |
| | | **remote-port** integer | | Remote port (0 - 65535). |
| | | **security** string | **Choices:*** rdp
* nla
* tls
* any
| Security mode for RDP connection. |
| | | **server-layout** string | **Choices:*** en-us-qwerty
* de-de-qwertz
* fr-fr-azerty
* it-it-qwerty
* sv-se-qwerty
* failsafe
* en-gb-qwerty
* es-es-qwerty
* fr-ch-qwertz
* ja-jp-qwerty
* pt-br-qwerty
* tr-tr-qwerty
* fr-ca-qwerty
| Server side keyboard layout. |
| | | **show-status-window** string | **Choices:*** disable
* enable
| Enable/disable showing of status window. |
| | | **sso** string | **Choices:*** disable
* static
* auto
| Single Sign-On. |
| | | **sso-credential** string | **Choices:*** sslvpn-login
* alternative
| Single sign-on credentials. |
| | | **sso-credential-sent-once** string | **Choices:*** disable
* enable
| Single sign-on credentials are only sent once to remote server. |
| | | **sso-password** string | | no description |
| | | **sso-username** string | | SSO user name. |
| | | **url** string | | URL parameter. |
| | **name** string | | Bookmark group name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Portal bookmark group.
fmgr_vpnsslweb_portal_bookmarkgroup:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
portal: <your own value>
state: <value in [present, absent]>
vpnsslweb_portal_bookmarkgroup:
bookmarks:
-
additional-params: <value of string>
apptype: <value in [web, telnet, ssh, ...]>
description: <value of string>
folder: <value of string>
form-data:
-
name: <value of string>
value: <value of string>
host: <value of string>
listening-port: <value of integer>
load-balancing-info: <value of string>
logon-password: <value of string>
logon-user: <value of string>
name: <value of string>
port: <value of integer>
preconnection-blob: <value of string>
preconnection-id: <value of integer>
remote-port: <value of integer>
security: <value in [rdp, nla, tls, ...]>
server-layout: <value in [en-us-qwerty, de-de-qwertz, fr-fr-azerty, ...]>
show-status-window: <value in [disable, enable]>
sso: <value in [disable, static, auto]>
sso-credential: <value in [sslvpn-login, alternative]>
sso-credential-sent-once: <value in [disable, enable]>
sso-password: <value of string>
sso-username: <value of string>
url: <value of string>
domain: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_bonjourprofile β Configure Bonjour profiles. fortinet.fortimanager.fmgr\_bonjourprofile β Configure Bonjour profiles.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_bonjourprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bonjourprofile** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **name** string | | Bonjour profile name. |
| | **policy-list** list / elements=string | | no description |
| | | **description** string | | Description. |
| | | **from-vlan** string | | VLAN ID from which the Bonjour service is advertised (0 - 4094, default = 0). |
| | | **policy-id** integer | | Policy ID. |
| | | **services** list / elements=string | **Choices:*** airplay
* afp
* bit-torrent
* ftp
* ichat
* itunes
* printers
* samba
* scanners
* ssh
* chromecast
* all
| no description |
| | | **to-vlan** string | | VLAN ID to which the Bonjour service is made available (0 - 4094, default = all). |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Bonjour profiles.
fmgr_bonjourprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
bonjourprofile:
comment: <value of string>
name: <value of string>
policy-list:
-
description: <value of string>
from-vlan: <value of string>
policy-id: <value of integer>
services:
- airplay
- afp
- bit-torrent
- ftp
- ichat
- itunes
- printers
- samba
- scanners
- ssh
- chromecast
- all
to-vlan: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_internetservicecustom_entry_portrange β Port ranges in the custom entry. fortinet.fortimanager.fmgr\_firewall\_internetservicecustom\_entry\_portrange β Port ranges in the custom entry.
================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_internetservicecustom_entry_portrange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **entry** string / required | | the parameter (entry) in requested url |
| **firewall\_internetservicecustom\_entry\_portrange** dictionary | | the top level parameters set |
| | **end-port** integer | | Integer value for ending TCP/UDP/SCTP destination port in range (1 to 65535). |
| | **id** integer | | Custom entry port range ID. |
| | **start-port** integer | | Integer value for starting TCP/UDP/SCTP destination port in range (1 to 65535). |
| **internet-service-custom** string / required | | the parameter (internet-service-custom) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Port ranges in the custom entry.
fmgr_firewall_internetservicecustom_entry_portrange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
internet-service-custom: <your own value>
entry: <your own value>
state: <value in [present, absent]>
firewall_internetservicecustom_entry_portrange:
end-port: <value of integer>
id: <value of integer>
start-port: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wtpprofile_lbs β Set various location based service fortinet.fortimanager.fmgr\_wtpprofile\_lbs β Set various location based service
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wtpprofile_lbs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
| **wtp-profile** string / required | | the parameter (wtp-profile) in requested url |
| **wtpprofile\_lbs** dictionary | | the top level parameters set |
| | **aeroscout** string | **Choices:*** disable
* enable
| Enable/disable AeroScout Real Time Location Service (RTLS) support. |
| | **aeroscout-ap-mac** string | **Choices:*** bssid
* board-mac
| Use BSSID or board MAC address as AP MAC address in the Aeroscout AP message. |
| | **aeroscout-mmu-report** string | **Choices:*** disable
* enable
| Enable/disable MU compounded report. |
| | **aeroscout-mu** string | **Choices:*** disable
* enable
| Enable/disable AeroScout support. |
| | **aeroscout-mu-factor** integer | | AeroScout Mobile Unit (MU) mode dilution factor (default = 20). |
| | **aeroscout-mu-timeout** integer | | AeroScout MU mode timeout (0 - 65535 sec, default = 5). |
| | **aeroscout-server-ip** string | | IP address of AeroScout server. |
| | **aeroscout-server-port** integer | | AeroScout server UDP listening port. |
| | **ekahau-blink-mode** string | **Choices:*** disable
* enable
| Enable/disable Ekahua blink mode (also called AiRISTA Flow Blink Mode) to find the location of devices connected to a wireless... |
| | **ekahau-tag** string | | WiFi frame MAC address or WiFi Tag. |
| | **erc-server-ip** string | | IP address of Ekahua RTLS Controller (ERC). |
| | **erc-server-port** integer | | Ekahua RTLS Controller (ERC) UDP listening port. |
| | **fortipresence** string | **Choices:*** disable
* enable
* enable2
* foreign
* both
| Enable/disable FortiPresence to monitor the location and activity of WiFi clients even if they dont connect to this WiFi netwo... |
| | **fortipresence-ble** string | **Choices:*** disable
* enable
| Enable/disable FortiPresence finding and reporting BLE devices. |
| | **fortipresence-frequency** integer | | FortiPresence report transmit frequency (5 - 65535 sec, default = 30). |
| | **fortipresence-port** integer | | FortiPresence server UDP listening port (default = 3000). |
| | **fortipresence-project** string | | FortiPresence project name (max. 16 characters, default = fortipresence). |
| | **fortipresence-rogue** string | **Choices:*** disable
* enable
| Enable/disable FortiPresence finding and reporting rogue APs. |
| | **fortipresence-secret** string | | no description |
| | **fortipresence-server** string | | FortiPresence server IP address. |
| | **fortipresence-unassoc** string | **Choices:*** disable
* enable
| Enable/disable FortiPresence finding and reporting unassociated stations. |
| | **station-locate** string | **Choices:*** disable
* enable
| Enable/disable client station locating services for all clients, whether associated or not (default = disable). |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Set various location based service
fmgr_wtpprofile_lbs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wtp-profile: <your own value>
wtpprofile_lbs:
aeroscout: <value in [disable, enable]>
aeroscout-ap-mac: <value in [bssid, board-mac]>
aeroscout-mmu-report: <value in [disable, enable]>
aeroscout-mu: <value in [disable, enable]>
aeroscout-mu-factor: <value of integer>
aeroscout-mu-timeout: <value of integer>
aeroscout-server-ip: <value of string>
aeroscout-server-port: <value of integer>
ekahau-blink-mode: <value in [disable, enable]>
ekahau-tag: <value of string>
erc-server-ip: <value of string>
erc-server-port: <value of integer>
fortipresence: <value in [disable, enable, enable2, ...]>
fortipresence-frequency: <value of integer>
fortipresence-port: <value of integer>
fortipresence-project: <value of string>
fortipresence-rogue: <value in [disable, enable]>
fortipresence-secret: <value of string>
fortipresence-server: <value of string>
fortipresence-unassoc: <value in [disable, enable]>
station-locate: <value in [disable, enable]>
fortipresence-ble: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_serveroverridestatus β Configure strict/loose server override. fortinet.fortimanager.fmgr\_fmupdate\_serveroverridestatus β Configure strict/loose server override.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_serveroverridestatus`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_serveroverridestatus** dictionary | | the top level parameters set |
| | **mode** string | **Choices:*** strict
* **loose** β
| Server override mode (default = loose). strict - Access override server only. loose - Allow access other servers. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure strict/loose server override.
fmgr_fmupdate_serveroverridestatus:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_serveroverridestatus:
mode: <value in [strict, loose]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_securitypolicy_8021x β Configure 802. fortinet.fortimanager.fmgr\_switchcontroller\_securitypolicy\_8021x β Configure 802.
====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_securitypolicy_8021x`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_securitypolicy\_8021x** dictionary | | the top level parameters set |
| | **auth-fail-vlan** string | **Choices:*** disable
* enable
| Enable to allow limited access to clients that cannot authenticate. |
| | **auth-fail-vlan-id** string | | VLAN ID on which authentication failed. |
| | **auth-fail-vlanid** integer | | VLAN ID on which authentication failed. |
| | **authserver-timeout-period** integer | | Authentication server timeout period (3 - 15 sec, default = 3). |
| | **authserver-timeout-vlan** string | **Choices:*** disable
* enable
| Enable/disable the authentication server timeout VLAN to allow limited access when RADIUS is unavailable. |
| | **authserver-timeout-vlanid** string | | Authentication server timeout VLAN name. |
| | **eap-auto-untagged-vlans** string | **Choices:*** disable
* enable
| Enable/disable automatic inclusion of untagged VLANs. |
| | **eap-passthru** string | **Choices:*** disable
* enable
| Enable/disable EAP pass-through mode, allowing protocols (such as LLDP) to pass through ports for more flexible authentication. |
| | **framevid-apply** string | **Choices:*** disable
* enable
| Enable/disable the capability to apply the EAP/MAB frame VLAN to the port native VLAN. |
| | **guest-auth-delay** integer | | Guest authentication delay (1 - 900 sec, default = 30). |
| | **guest-vlan** string | **Choices:*** disable
* enable
| Enable the guest VLAN feature to allow limited access to non-802.1X-compliant clients. |
| | **guest-vlan-id** string | | Guest VLAN name. |
| | **guest-vlanid** integer | | Guest VLAN ID. |
| | **mac-auth-bypass** string | **Choices:*** disable
* enable
| Enable/disable MAB for this policy. |
| | **name** string | | Policy name. |
| | **open-auth** string | **Choices:*** disable
* enable
| Enable/disable open authentication for this policy. |
| | **policy-type** string | **Choices:*** 802.1X
| Policy type. |
| | **radius-timeout-overwrite** string | **Choices:*** disable
* enable
| Enable to override the global RADIUS session timeout. |
| | **security-mode** string | **Choices:*** 802.1X
* 802.1X-mac-based
| Port or MAC based 802.1X security mode. |
| | **user-group** string | | Name of user-group to assign to this MAC Authentication Bypass (MAB) policy. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure 802.
fmgr_switchcontroller_securitypolicy_8021x:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
switchcontroller_securitypolicy_8021x:
auth-fail-vlan: <value in [disable, enable]>
auth-fail-vlan-id: <value of string>
auth-fail-vlanid: <value of integer>
eap-passthru: <value in [disable, enable]>
guest-auth-delay: <value of integer>
guest-vlan: <value in [disable, enable]>
guest-vlan-id: <value of string>
guest-vlanid: <value of integer>
mac-auth-bypass: <value in [disable, enable]>
name: <value of string>
open-auth: <value in [disable, enable]>
policy-type: <value in [802.1X]>
radius-timeout-overwrite: <value in [disable, enable]>
security-mode: <value in [802.1X, 802.1X-mac-based]>
user-group: <value of string>
framevid-apply: <value in [disable, enable]>
eap-auto-untagged-vlans: <value in [disable, enable]>
authserver-timeout-period: <value of integer>
authserver-timeout-vlan: <value in [disable, enable]>
authserver-timeout-vlanid: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_antivirus_profile_ssh β Configure SFTP and SCP AntiVirus options. fortinet.fortimanager.fmgr\_antivirus\_profile\_ssh β Configure SFTP and SCP AntiVirus options.
===============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_profile_ssh`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_profile\_ssh** dictionary | | the top level parameters set |
| | **archive-block** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **archive-log** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **av-scan** string | **Choices:*** disable
* monitor
* block
| Enable AntiVirus scan service. |
| | **emulator** string | **Choices:*** disable
* enable
| Enable/disable the virus emulator. |
| | **external-blocklist** string | **Choices:*** disable
* monitor
* block
| Enable external-blocklist. |
| | **options** list / elements=string | **Choices:*** avmonitor
* quarantine
* scan
| no description |
| | **outbreak-prevention** string | **Choices:*** disabled
* files
* full-archive
* disable
* block
* monitor
| Enable Virus Outbreak Prevention service. |
| | **quarantine** string | **Choices:*** disable
* enable
| Enable/disable quarantine for infected files. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SFTP and SCP AntiVirus options.
fmgr_antivirus_profile_ssh:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
antivirus_profile_ssh:
archive-block:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
archive-log:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
emulator: <value in [disable, enable]>
options:
- avmonitor
- quarantine
- scan
outbreak-prevention: <value in [disabled, files, full-archive, ...]>
av-scan: <value in [disable, monitor, block]>
external-blocklist: <value in [disable, monitor, block]>
quarantine: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_log_devicedisable β Disable client device logging. fortinet.fortimanager.fmgr\_system\_log\_devicedisable β Disable client device logging.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_log_devicedisable`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_log\_devicedisable** dictionary | | the top level parameters set |
| | **device** string | | Device to be disabled logging |
| | **id** integer | **Default:**0 | ID of device logging disable entry. |
| | **TTL** string | | Time to Live |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Disable client device logging.
fmgr_system_log_devicedisable:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_log_devicedisable:
TTL: <value of string>
device: <value of string>
id: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_gtp_messageratelimitv0 β Message rate limiting for GTP version 0. fortinet.fortimanager.fmgr\_firewall\_gtp\_messageratelimitv0 β Message rate limiting for GTP version 0.
========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_gtp_messageratelimitv0`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_gtp\_messageratelimitv0** dictionary | | the top level parameters set |
| | **create-pdp-request** integer | | Rate limit (packets/s) for create PDP context request. |
| | **delete-pdp-request** integer | | Rate limit (packets/s) for delete PDP context request. |
| | **echo-request** integer | | Rate limit (packets/s) for echo request. |
| **gtp** string / required | | the parameter (gtp) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Message rate limiting for GTP version 0.
fmgr_firewall_gtp_messageratelimitv0:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
gtp: <your own value>
firewall_gtp_messageratelimitv0:
create-pdp-request: <value of integer>
delete-pdp-request: <value of integer>
echo-request: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_service_custom β Configure custom services. fortinet.fortimanager.fmgr\_firewall\_service\_custom β Configure custom services.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_service_custom`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_service\_custom** dictionary | | the top level parameters set |
| | **app-category** integer | | no description |
| | **app-service-type** string | **Choices:*** disable
* app-id
* app-category
| Application service type. |
| | **application** integer | | no description |
| | **category** string | | Service category. |
| | **check-reset-range** string | **Choices:*** disable
* default
* strict
| Configure the type of ICMP error message verification. |
| | **color** integer | | Color of icon on the GUI. |
| | **comment** string | | no description |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **fqdn** string | | Fully qualified domain name. |
| | **global-object** integer | | Global Object. |
| | **helper** string | **Choices:*** disable
* auto
* ftp
* tftp
* ras
* h323
* tns
* mms
* sip
* pptp
* rtsp
* dns-udp
* dns-tcp
* pmap
* rsh
* dcerpc
* mgcp
* gtp-c
* gtp-u
* gtp-b
| Helper name. |
| | **icmpcode** integer | | ICMP code. |
| | **icmptype** integer | | ICMP type. |
| | **iprange** string | | Start and end of the IP range associated with service. |
| | **name** string | | Custom service name. |
| | **protocol** string | **Choices:*** ICMP
* IP
* TCP/UDP/SCTP
* ICMP6
* HTTP
* FTP
* CONNECT
* SOCKS
* ALL
* SOCKS-TCP
* SOCKS-UDP
| Protocol type based on IANA numbers. |
| | **protocol-number** integer | | IP protocol number. |
| | **proxy** string | **Choices:*** disable
* enable
| Enable/disable web proxy service. |
| | **sctp-portrange** string | | Multiple SCTP port ranges. |
| | **session-ttl** integer | | Session TTL (300 - 604800, 0 = default). |
| | **tcp-halfclose-timer** integer | | Wait time to close a TCP session waiting for an unanswered FIN packet (1 - 86400 sec, 0 = default). |
| | **tcp-halfopen-timer** integer | | Wait time to close a TCP session waiting for an unanswered open session packet (1 - 86400 sec, 0 = default). |
| | **tcp-portrange** string | | Multiple TCP port ranges. |
| | **tcp-rst-timer** integer | | Set the length of the TCP CLOSE state in seconds (5 - 300 sec, 0 = default). |
| | **tcp-timewait-timer** integer | | Set the length of the TCP TIME-WAIT state in seconds (1 - 300 sec, 0 = default). |
| | **udp-idle-timer** integer | | UDP half close timeout (0 - 86400 sec, 0 = default). |
| | **udp-portrange** string | | Multiple UDP port ranges. |
| | **visibility** string | **Choices:*** disable
* enable
| Enable/disable the visibility of the service on the GUI. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure custom services.
fmgr_firewall_service_custom:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_service_custom:
app-category: <value of integer>
app-service-type: <value in [disable, app-id, app-category]>
application: <value of integer>
category: <value of string>
check-reset-range: <value in [disable, default, strict]>
color: <value of integer>
comment: <value of string>
fqdn: <value of string>
helper: <value in [disable, auto, ftp, ...]>
icmpcode: <value of integer>
icmptype: <value of integer>
iprange: <value of string>
name: <value of string>
protocol: <value in [ICMP, IP, TCP/UDP/SCTP, ...]>
protocol-number: <value of integer>
proxy: <value in [disable, enable]>
sctp-portrange: <value of string>
session-ttl: <value of integer>
tcp-halfclose-timer: <value of integer>
tcp-halfopen-timer: <value of integer>
tcp-portrange: <value of string>
tcp-timewait-timer: <value of integer>
udp-idle-timer: <value of integer>
udp-portrange: <value of string>
visibility: <value in [disable, enable]>
global-object: <value of integer>
fabric-object: <value in [disable, enable]>
tcp-rst-timer: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_wanopt_profile_mapi β Enable/disable MAPI email WAN Optimization and configure MAPI WAN Optimization features. fortinet.fortimanager.fmgr\_wanopt\_profile\_mapi β Enable/disable MAPI email WAN Optimization and configure MAPI WAN Optimization features.
============================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanopt_profile_mapi`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanopt\_profile\_mapi** dictionary | | the top level parameters set |
| | **byte-caching** string | **Choices:*** disable
* enable
| Enable/disable byte-caching for HTTP. Byte caching reduces the amount of traffic by caching file data sent across the WAN and ... |
| | **log-traffic** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **port** integer | | no description |
| | **secure-tunnel** string | **Choices:*** disable
* enable
| Enable/disable securing the WAN Opt tunnel using SSL. Secure and non-secure tunnels use the same TCP port (7810). |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable HTTP WAN Optimization. |
| | **tunnel-sharing** string | **Choices:*** private
* shared
* express-shared
| Tunnel sharing mode for aggressive/non-aggressive and/or interactive/non-interactive protocols. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable MAPI email WAN Optimization and configure MAPI WAN Optimization features.
fmgr_wanopt_profile_mapi:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
wanopt_profile_mapi:
byte-caching: <value in [disable, enable]>
log-traffic: <value in [disable, enable]>
port: <value of integer>
secure-tunnel: <value in [disable, enable]>
status: <value in [disable, enable]>
tunnel-sharing: <value in [private, shared, express-shared]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wtpprofile_lan β WTP LAN port mapping. fortinet.fortimanager.fmgr\_wtpprofile\_lan β WTP LAN port mapping.
===================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wtpprofile_lan`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
| **wtp-profile** string / required | | the parameter (wtp-profile) in requested url |
| **wtpprofile\_lan** dictionary | | the top level parameters set |
| | **port-esl-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| ESL port mode. |
| | **port-esl-ssid** string | | Bridge ESL port to SSID. |
| | **port-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port mode. |
| | **port-ssid** string | | Bridge LAN port to SSID. |
| | **port1-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 1 mode. |
| | **port1-ssid** string | | Bridge LAN port 1 to SSID. |
| | **port2-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 2 mode. |
| | **port2-ssid** string | | Bridge LAN port 2 to SSID. |
| | **port3-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 3 mode. |
| | **port3-ssid** string | | Bridge LAN port 3 to SSID. |
| | **port4-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 4 mode. |
| | **port4-ssid** string | | Bridge LAN port 4 to SSID. |
| | **port5-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 5 mode. |
| | **port5-ssid** string | | Bridge LAN port 5 to SSID. |
| | **port6-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 6 mode. |
| | **port6-ssid** string | | Bridge LAN port 6 to SSID. |
| | **port7-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 7 mode. |
| | **port7-ssid** string | | Bridge LAN port 7 to SSID. |
| | **port8-mode** string | **Choices:*** offline
* bridge-to-wan
* bridge-to-ssid
* nat-to-wan
| LAN port 8 mode. |
| | **port8-ssid** string | | Bridge LAN port 8 to SSID. |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: WTP LAN port mapping.
fmgr_wtpprofile_lan:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wtp-profile: <your own value>
wtpprofile_lan:
port-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port-ssid: <value of string>
port1-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port1-ssid: <value of string>
port2-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port2-ssid: <value of string>
port3-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port3-ssid: <value of string>
port4-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port4-ssid: <value of string>
port5-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port5-ssid: <value of string>
port6-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port6-ssid: <value of string>
port7-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port7-ssid: <value of string>
port8-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port8-ssid: <value of string>
port-esl-mode: <value in [offline, bridge-to-wan, bridge-to-ssid, ...]>
port-esl-ssid: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_dhcp_server_iprange β DHCP IP range configuration. fortinet.fortimanager.fmgr\_system\_dhcp\_server\_iprange β DHCP IP range configuration.
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_dhcp_server_iprange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **server** string / required | | the parameter (server) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_dhcp\_server\_iprange** dictionary | | the top level parameters set |
| | **end-ip** string | | End of IP range. |
| | **id** integer | | ID. |
| | **start-ip** string | | Start of IP range. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: DHCP IP range configuration.
fmgr_system_dhcp_server_iprange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
server: <your own value>
state: <value in [present, absent]>
system_dhcp_server_iprange:
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_consolidated_policy_sectionvalue β Configure consolidated IPv4/IPv6 policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_consolidated\_policy\_sectionvalue β Configure consolidated IPv4/IPv6 policies.
==========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_consolidated_policy_sectionvalue`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_consolidated\_policy\_sectionvalue** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** deny
* accept
* ipsec
| Policy action (allow/deny/ipsec). |
| | **app-category** string | | Application category ID list. |
| | **app-group** string | | Application group names. |
| | **application** integer | | no description |
| | **application-list** string | | Name of an existing Application list. |
| | **auto-asic-offload** string | **Choices:*** disable
* enable
| Enable/disable offloading security profile processing to CP processors. |
| | **av-profile** string | | Name of an existing Antivirus profile. |
| | **captive-portal-exempt** string | **Choices:*** disable
* enable
| Enable exemption of some users from the captive portal. |
| | **cifs-profile** string | | Name of an existing CIFS profile. |
| | **comments** string | | Comment. |
| | **diffserv-forward** string | **Choices:*** disable
* enable
| Enable to change packets DiffServ values to the specified diffservcode-forward value. |
| | **diffserv-reverse** string | **Choices:*** disable
* enable
| Enable to change packets reverse (reply) DiffServ values to the specified diffservcode-rev value. |
| | **diffservcode-forward** string | | Change packets DiffServ to this value. |
| | **diffservcode-rev** string | | Change packets reverse (reply) DiffServ to this value. |
| | **dlp-sensor** string | | Name of an existing DLP sensor. |
| | **dnsfilter-profile** string | | Name of an existing DNS filter profile. |
| | **dstaddr-negate** string | **Choices:*** disable
* enable
| When enabled dstaddr specifies what the destination address must NOT be. |
| | **dstaddr4** string | | Destination IPv4 address name and address group names. |
| | **dstaddr6** string | | Destination IPv6 address name and address group names. |
| | **dstintf** string | | Outgoing (egress) interface. |
| | **emailfilter-profile** string | | Name of an existing email filter profile. |
| | **fixedport** string | **Choices:*** disable
* enable
| Enable to prevent source NAT from changing a sessions source port. |
| | **fsso-groups** string | | Names of FSSO groups. |
| | **global-label** string | | Label for the policy that appears when the GUI is in Global View mode. |
| | **groups** string | | Names of user groups that can authenticate with this policy. |
| | **http-policy-redirect** string | **Choices:*** disable
* enable
| Redirect HTTP(S) traffic to matching transparent web proxy policy. |
| | **icap-profile** string | | Name of an existing ICAP profile. |
| | **inbound** string | **Choices:*** disable
* enable
| Policy-based IPsec VPN: only traffic from the remote network can initiate a VPN. |
| | **inspection-mode** string | **Choices:*** proxy
* flow
| Policy inspection mode (Flow/proxy). Default is Flow mode. |
| | **internet-service** string | **Choices:*** disable
* enable
| Enable/disable use of Internet Services for this policy. If enabled, destination address and service are not used. |
| | **internet-service-custom** string | | Custom Internet Service name. |
| | **internet-service-custom-group** string | | Custom Internet Service group name. |
| | **internet-service-group** string | | Internet Service group name. |
| | **internet-service-id** string | | Internet Service ID. |
| | **internet-service-negate** string | **Choices:*** disable
* enable
| When enabled internet-service specifies what the service must NOT be. |
| | **internet-service-src** string | **Choices:*** disable
* enable
| Enable/disable use of Internet Services in source for this policy. If enabled, source address is not used. |
| | **internet-service-src-custom** string | | Custom Internet Service source name. |
| | **internet-service-src-custom-group** string | | Custom Internet Service source group name. |
| | **internet-service-src-group** string | | Internet Service source group name. |
| | **internet-service-src-id** string | | Internet Service source ID. |
| | **internet-service-src-negate** string | **Choices:*** disable
* enable
| When enabled internet-service-src specifies what the service must NOT be. |
| | **ippool** string | **Choices:*** disable
* enable
| Enable to use IP Pools for source NAT. |
| | **ips-sensor** string | | Name of an existing IPS sensor. |
| | **logtraffic** string | **Choices:*** disable
* all
* utm
| Enable or disable logging. Log all sessions or security profile sessions. |
| | **logtraffic-start** string | **Choices:*** disable
* enable
| Record logs when a session starts. |
| | **mms-profile** string | | Name of an existing MMS profile. |
| | **name** string | | Policy name. |
| | **nat** string | **Choices:*** disable
* enable
| Enable/disable source NAT. |
| | **outbound** string | **Choices:*** disable
* enable
| Policy-based IPsec VPN: only traffic from the internal network can initiate a VPN. |
| | **per-ip-shaper** string | | Per-IP traffic shaper. |
| | **policyid** integer | | Policy ID (0 - 4294967294). |
| | **poolname4** string | | IPv4 pool names. |
| | **poolname6** string | | IPv6 pool names. |
| | **profile-group** string | | Name of profile group. |
| | **profile-protocol-options** string | | Name of an existing Protocol options profile. |
| | **profile-type** string | **Choices:*** single
* group
| Determine whether the firewall policy allows security profile groups or single profiles only. |
| | **schedule** string | | Schedule name. |
| | **service** string | | Service and service group names. |
| | **service-negate** string | **Choices:*** disable
* enable
| When enabled service specifies what the service must NOT be. |
| | **session-ttl** integer | | TTL in seconds for sessions accepted by this policy (0 means use the system default session TTL). |
| | **srcaddr-negate** string | **Choices:*** disable
* enable
| When enabled srcaddr specifies what the source address must NOT be. |
| | **srcaddr4** string | | Source IPv4 address name and address group names. |
| | **srcaddr6** string | | Source IPv6 address name and address group names. |
| | **srcintf** string | | Incoming (ingress) interface. |
| | **ssh-filter-profile** string | | Name of an existing SSH filter profile. |
| | **ssh-policy-redirect** string | **Choices:*** disable
* enable
| Redirect SSH traffic to matching transparent proxy policy. |
| | **ssl-ssh-profile** string | | Name of an existing SSL SSH profile. |
| | **status** string | **Choices:*** disable
* enable
| Enable or disable this policy. |
| | **tcp-mss-receiver** integer | | Receiver TCP maximum segment size (MSS). |
| | **tcp-mss-sender** integer | | Sender TCP maximum segment size (MSS). |
| | **traffic-shaper** string | | Traffic shaper. |
| | **traffic-shaper-reverse** string | | Reverse traffic shaper. |
| | **url-category** string | | URL category ID list. |
| | **users** string | | Names of individual users that can authenticate with this policy. |
| | **utm-status** string | **Choices:*** disable
* enable
| Enable to add one or more security profiles (AV, IPS, etc.) to the firewall policy. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **voip-profile** string | | Name of an existing VoIP profile. |
| | **vpntunnel** string | | Policy-based IPsec VPN: name of the IPsec VPN Phase 1. |
| | **waf-profile** string | | Name of an existing Web application firewall profile. |
| | **wanopt** string | **Choices:*** disable
* enable
| Enable/disable WAN optimization. |
| | **wanopt-detection** string | **Choices:*** active
* passive
* off
| WAN optimization auto-detection mode. |
| | **wanopt-passive-opt** string | **Choices:*** default
* transparent
* non-transparent
| WAN optimization passive mode options. This option decides what IP address will be used to connect to server. |
| | **wanopt-peer** string | | WAN optimization peer. |
| | **wanopt-profile** string | | WAN optimization profile. |
| | **webcache** string | **Choices:*** disable
* enable
| Enable/disable web cache. |
| | **webcache-https** string | **Choices:*** disable
* enable
| Enable/disable web cache for HTTPS. |
| | **webfilter-profile** string | | Name of an existing Web filter profile. |
| | **webproxy-forward-server** string | | Webproxy forward server name. |
| | **webproxy-profile** string | | Webproxy profile name. |
| **policy** string / required | | the parameter (policy) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure consolidated IPv4/IPv6 policies.
fmgr_pkg_firewall_consolidated_policy_sectionvalue:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
policy: <your own value>
state: <value in [present, absent]>
pkg_firewall_consolidated_policy_sectionvalue:
action: <value in [deny, accept, ipsec]>
app-category: <value of string>
app-group: <value of string>
application: <value of integer>
application-list: <value of string>
auto-asic-offload: <value in [disable, enable]>
av-profile: <value of string>
cifs-profile: <value of string>
comments: <value of string>
diffserv-forward: <value in [disable, enable]>
diffserv-reverse: <value in [disable, enable]>
diffservcode-forward: <value of string>
diffservcode-rev: <value of string>
dlp-sensor: <value of string>
dnsfilter-profile: <value of string>
dstaddr4: <value of string>
dstaddr6: <value of string>
dstintf: <value of string>
emailfilter-profile: <value of string>
fixedport: <value in [disable, enable]>
groups: <value of string>
http-policy-redirect: <value in [disable, enable]>
icap-profile: <value of string>
inbound: <value in [disable, enable]>
inspection-mode: <value in [proxy, flow]>
internet-service: <value in [disable, enable]>
internet-service-custom: <value of string>
internet-service-custom-group: <value of string>
internet-service-group: <value of string>
internet-service-id: <value of string>
internet-service-src: <value in [disable, enable]>
internet-service-src-custom: <value of string>
internet-service-src-custom-group: <value of string>
internet-service-src-group: <value of string>
internet-service-src-id: <value of string>
ippool: <value in [disable, enable]>
ips-sensor: <value of string>
logtraffic: <value in [disable, all, utm]>
logtraffic-start: <value in [disable, enable]>
mms-profile: <value of string>
name: <value of string>
nat: <value in [disable, enable]>
outbound: <value in [disable, enable]>
per-ip-shaper: <value of string>
policyid: <value of integer>
poolname4: <value of string>
poolname6: <value of string>
profile-group: <value of string>
profile-protocol-options: <value of string>
profile-type: <value in [single, group]>
schedule: <value of string>
service: <value of string>
session-ttl: <value of integer>
srcaddr4: <value of string>
srcaddr6: <value of string>
srcintf: <value of string>
ssh-filter-profile: <value of string>
ssh-policy-redirect: <value in [disable, enable]>
ssl-ssh-profile: <value of string>
status: <value in [disable, enable]>
tcp-mss-receiver: <value of integer>
tcp-mss-sender: <value of integer>
traffic-shaper: <value of string>
traffic-shaper-reverse: <value of string>
url-category: <value of string>
users: <value of string>
utm-status: <value in [disable, enable]>
uuid: <value of string>
voip-profile: <value of string>
vpntunnel: <value of string>
waf-profile: <value of string>
wanopt: <value in [disable, enable]>
wanopt-detection: <value in [active, passive, off]>
wanopt-passive-opt: <value in [default, transparent, non-transparent]>
wanopt-peer: <value of string>
wanopt-profile: <value of string>
webcache: <value in [disable, enable]>
webcache-https: <value in [disable, enable]>
webfilter-profile: <value of string>
webproxy-forward-server: <value of string>
webproxy-profile: <value of string>
captive-portal-exempt: <value in [disable, enable]>
dstaddr-negate: <value in [disable, enable]>
fsso-groups: <value of string>
global-label: <value of string>
internet-service-negate: <value in [disable, enable]>
internet-service-src-negate: <value in [disable, enable]>
service-negate: <value in [disable, enable]>
srcaddr-negate: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_waf_profile_constraint_contentlength β HTTP content length in request. fortinet.fortimanager.fmgr\_waf\_profile\_constraint\_contentlength β HTTP content length in request.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_constraint_contentlength`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_constraint\_contentlength** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** allow
* block
| Action. |
| | **length** integer | | Length of HTTP content in bytes (0 to 2147483647). |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the constraint. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: HTTP content length in request.
fmgr_waf_profile_constraint_contentlength:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_constraint_contentlength:
action: <value in [allow, block]>
length: <value of integer>
log: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_exchange β Configure MS Exchange server entries. fortinet.fortimanager.fmgr\_user\_exchange β Configure MS Exchange server entries.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_exchange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_exchange** dictionary | | the top level parameters set |
| | **addr-type** string | **Choices:*** ipv4
* ipv6
| Indicate whether the server IP-address is IPv4 or IPv6. |
| | **auth-level** string | **Choices:*** low
* medium
* normal
* high
* connect
* call
* packet
* integrity
* privacy
| Authentication security level used for the RPC protocol layer. |
| | **auth-type** string | **Choices:*** spnego
* ntlm
* kerberos
| Authentication security type used for the RPC protocol layer. |
| | **auto-discover-kdc** string | **Choices:*** disable
* enable
| Enable/disable automatic discovery of KDC IP addresses. |
| | **connect-protocol** string | **Choices:*** rpc-over-tcp
* rpc-over-http
* rpc-over-https
| Connection protocol used to connect to MS Exchange service. |
| | **domain-name** string | | MS Exchange server fully qualified domain name. |
| | **http-auth-type** string | **Choices:*** ntlm
* basic
| Authentication security type used for the HTTP transport. |
| | **ip** string | | Server IPv4 address. |
| | **ip6** string | | Server IPv6 address. |
| | **kdc-ip** string | | no description |
| | **name** string | | MS Exchange server entry name. |
| | **password** string | | no description |
| | **server-name** string | | MS Exchange server hostname. |
| | **ssl-min-proto-version** string | **Choices:*** default
* TLSv1-1
* TLSv1-2
* SSLv3
* TLSv1
| Minimum SSL/TLS protocol version for HTTPS transport (default is to follow system global setting). |
| | **username** string | | User name used to sign in to the server. Must have proper permissions for service. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure MS Exchange server entries.
fmgr_user_exchange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_exchange:
addr-type: <value in [ipv4, ipv6]>
auth-level: <value in [low, medium, normal, ...]>
auth-type: <value in [spnego, ntlm, kerberos]>
connect-protocol: <value in [rpc-over-tcp, rpc-over-http, rpc-over-https]>
domain-name: <value of string>
http-auth-type: <value in [ntlm, basic]>
ip: <value of string>
ip6: <value of string>
kdc-ip: <value of string>
name: <value of string>
password: <value of string>
server-name: <value of string>
ssl-min-proto-version: <value in [default, TLSv1-1, TLSv1-2, ...]>
username: <value of string>
auto-discover-kdc: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_devicedetectionportal β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_devicedetectionportal β Replacement messages.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_devicedetectionportal`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_devicedetectionportal** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_devicedetectionportal:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_devicedetectionportal:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_publicnetwork β Enable/disable access to the public FortiGuard. fortinet.fortimanager.fmgr\_fmupdate\_publicnetwork β Enable/disable access to the public FortiGuard.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_publicnetwork`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_publicnetwork** dictionary | | the top level parameters set |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable public network (default = enable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Enable/disable access to the public FortiGuard.
fmgr_fmupdate_publicnetwork:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_publicnetwork:
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_qosprofile β Configure WiFi quality of service fortinet.fortimanager.fmgr\_qosprofile β Configure WiFi quality of service
==========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_qosprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **qosprofile** dictionary | | the top level parameters set |
| | **bandwidth-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WMM bandwidth admission control. |
| | **bandwidth-capacity** integer | | Maximum bandwidth capacity allowed (1 - 600000 Kbps, default = 2000). |
| | **burst** string | **Choices:*** disable
* enable
| Enable/disable client rate burst. |
| | **call-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WMM call admission control. |
| | **call-capacity** integer | | Maximum number of Voice over WLAN (VoWLAN) phones allowed (0 - 60, default = 10). |
| | **comment** string | | Comment. |
| | **downlink** integer | | Maximum downlink bandwidth for Virtual Access Points (VAPs) (0 - 2097152 Kbps, default = 0, 0 means no limit). |
| | **downlink-sta** integer | | Maximum downlink bandwidth for clients (0 - 2097152 Kbps, default = 0, 0 means no limit). |
| | **dscp-wmm-be** integer | | no description |
| | **dscp-wmm-bk** integer | | no description |
| | **dscp-wmm-mapping** string | **Choices:*** disable
* enable
| Enable/disable Differentiated Services Code Point (DSCP) mapping. |
| | **dscp-wmm-vi** integer | | no description |
| | **dscp-wmm-vo** integer | | no description |
| | **name** string | | WiFi QoS profile name. |
| | **uplink** integer | | Maximum uplink bandwidth for Virtual Access Points (VAPs) (0 - 2097152 Kbps, default = 0, 0 means no limit). |
| | **uplink-sta** integer | | Maximum uplink bandwidth for clients (0 - 2097152 Kbps, default = 0, 0 means no limit). |
| | **wmm** string | **Choices:*** disable
* enable
| Enable/disable WiFi multi-media (WMM) control. |
| | **wmm-be-dscp** integer | | DSCP marking for best effort access (default = 0). |
| | **wmm-bk-dscp** integer | | DSCP marking for background access (default = 8). |
| | **wmm-dscp-marking** string | **Choices:*** disable
* enable
| Enable/disable WMM Differentiated Services Code Point (DSCP) marking. |
| | **wmm-uapsd** string | **Choices:*** disable
* enable
| Enable/disable WMM Unscheduled Automatic Power Save Delivery (U-APSD) power save mode. |
| | **wmm-vi-dscp** integer | | DSCP marking for video access (default = 32). |
| | **wmm-vo-dscp** integer | | DSCP marking for voice access (default = 48). |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure WiFi quality of service
fmgr_qosprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
qosprofile:
bandwidth-admission-control: <value in [disable, enable]>
bandwidth-capacity: <value of integer>
burst: <value in [disable, enable]>
call-admission-control: <value in [disable, enable]>
call-capacity: <value of integer>
comment: <value of string>
downlink: <value of integer>
downlink-sta: <value of integer>
dscp-wmm-be: <value of integer>
dscp-wmm-bk: <value of integer>
dscp-wmm-mapping: <value in [disable, enable]>
dscp-wmm-vi: <value of integer>
dscp-wmm-vo: <value of integer>
name: <value of string>
uplink: <value of integer>
uplink-sta: <value of integer>
wmm: <value in [disable, enable]>
wmm-uapsd: <value in [disable, enable]>
wmm-be-dscp: <value of integer>
wmm-bk-dscp: <value of integer>
wmm-dscp-marking: <value in [disable, enable]>
wmm-vi-dscp: <value of integer>
wmm-vo-dscp: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority. fortinet.fortimanager.fmgr\_firewall\_vip\_dynamicmapping\_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority.
=================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping_sslciphersuites`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip\_dynamicmapping\_sslciphersuites** dictionary | | the top level parameters set |
| | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| no description |
| | **id** integer | | no description |
| | **priority** integer | | no description |
| | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip** string / required | | the parameter (vip) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL/TLS cipher suites acceptable from a client, ordered by priority.
fmgr_firewall_vip_dynamicmapping_sslciphersuites:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
firewall_vip_dynamicmapping_sslciphersuites:
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
id: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
priority: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vap_dynamicmapping β Configure Virtual Access Points fortinet.fortimanager.fmgr\_vap\_dynamicmapping β Configure Virtual Access Points
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vap_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vap** string / required | | the parameter (vap) in requested url |
| **vap\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_centmgmt** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_dhcp\_svr\_id** string | | no description |
| | **\_intf\_allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* fgfm
* auto-ipsec
* radius-acct
* probe-response
* capwap
| no description |
| | **\_intf\_device-access-list** string | | no description |
| | **\_intf\_device-identification** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_intf\_device-netscan** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_intf\_dhcp-relay-ip** string | | no description |
| | **\_intf\_dhcp-relay-service** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_intf\_dhcp-relay-type** string | **Choices:*** **regular** β
* ipsec
| no description |
| | **\_intf\_dhcp6-relay-ip** string | | no description |
| | **\_intf\_dhcp6-relay-service** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_intf\_dhcp6-relay-type** string | **Choices:*** **regular** β
| no description |
| | **\_intf\_ip** string | | no description |
| | **\_intf\_ip6-address** string | | no description |
| | **\_intf\_ip6-allowaccess** list / elements=string | **Choices:*** https
* ping
* ssh
* snmp
* http
* telnet
* any
* fgfm
* capwap
| no description |
| | **\_intf\_listen-forticlient-connection** string | **Choices:*** **disable** β
* enable
| no description |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **access-control-list** string | | no description |
| | **acct-interim-interval** integer | | no description |
| | **additional-akms** list / elements=string | **Choices:*** akm6
| no description |
| | **address-group** string | | no description |
| | **alias** string | | no description |
| | **atf-weight** integer | | no description |
| | **auth** string | **Choices:*** PSK
* psk
* RADIUS
* radius
* usergroup
| no description |
| | **broadcast-ssid** string | **Choices:*** disable
* enable
| no description |
| | **broadcast-suppression** list / elements=string | **Choices:*** dhcp
* arp
* dhcp2
* arp2
* netbios-ns
* netbios-ds
* arp3
* dhcp-up
* dhcp-down
* arp-known
* arp-unknown
* arp-reply
* ipv6
* dhcp-starvation
* arp-poison
* all-other-mc
* all-other-bc
* arp-proxy
* dhcp-ucast
| no description |
| | **bss-color-partial** string | **Choices:*** disable
* enable
| no description |
| | **bstm-disassociation-imminent** string | **Choices:*** disable
* enable
| Enable/disable forcing of disassociation after the BSTM request timer has been reached (default = enable). |
| | **bstm-load-balancing-disassoc-timer** integer | | Time interval for client to voluntarily leave AP before forcing a disassociation due to AP load-balancing (0 to 30, default = ... |
| | **bstm-rssi-disassoc-timer** integer | | Time interval for client to voluntarily leave AP before forcing a disassociation due to low RSSI (0 to 2000, default = 200). |
| | **captive-portal-ac-name** string | | no description |
| | **captive-portal-auth-timeout** integer | | no description |
| | **captive-portal-macauth-radius-secret** string | | no description |
| | **captive-portal-macauth-radius-server** string | | no description |
| | **captive-portal-radius-secret** string | | no description |
| | **captive-portal-radius-server** string | | no description |
| | **captive-portal-session-timeout-interval** integer | | no description |
| | **client-count** integer | | no description |
| | **dhcp-address-enforcement** string | **Choices:*** disable
* enable
| Enable/disable DHCP address enforcement (default = disable). |
| | **dhcp-lease-time** integer | | no description |
| | **dhcp-option43-insertion** string | **Choices:*** disable
* enable
| no description |
| | **dhcp-option82-circuit-id-insertion** string | **Choices:*** disable
* style-1
* style-2
* style-3
| no description |
| | **dhcp-option82-insertion** string | **Choices:*** disable
* enable
| no description |
| | **dhcp-option82-remote-id-insertion** string | **Choices:*** disable
* style-1
| no description |
| | **dynamic-vlan** string | **Choices:*** disable
* enable
| no description |
| | **eap-reauth** string | **Choices:*** disable
* enable
| no description |
| | **eap-reauth-intv** integer | | no description |
| | **eapol-key-retries** string | **Choices:*** disable
* enable
| no description |
| | **encrypt** string | **Choices:*** TKIP
* AES
* TKIP-AES
| no description |
| | **external-fast-roaming** string | **Choices:*** disable
* enable
| no description |
| | **external-logout** string | | no description |
| | **external-web** string | | no description |
| | **external-web-format** string | **Choices:*** auto-detect
* no-query-string
* partial-query-string
| no description |
| | **fast-bss-transition** string | **Choices:*** disable
* enable
| no description |
| | **fast-roaming** string | **Choices:*** disable
* enable
| no description |
| | **ft-mobility-domain** integer | | no description |
| | **ft-over-ds** string | **Choices:*** disable
* enable
| no description |
| | **ft-r0-key-lifetime** integer | | no description |
| | **gas-comeback-delay** integer | | GAS comeback delay (0 or 100 - 10000 milliseconds, default = 500). |
| | **gas-fragmentation-limit** integer | | GAS fragmentation limit (512 - 4096, default = 1024). |
| | **gtk-rekey** string | **Choices:*** disable
* enable
| no description |
| | **gtk-rekey-intv** integer | | no description |
| | **high-efficiency** string | **Choices:*** disable
* enable
| no description |
| | **hotspot20-profile** string | | no description |
| | **igmp-snooping** string | **Choices:*** disable
* enable
| Enable/disable IGMP snooping. |
| | **intra-vap-privacy** string | **Choices:*** disable
* enable
| no description |
| | **ip** string | | no description |
| | **ipv6-rules** list / elements=string | **Choices:*** drop-icmp6ra
* drop-icmp6rs
* drop-llmnr6
* drop-icmp6mld2
* drop-dhcp6s
* drop-dhcp6c
* ndp-proxy
* drop-ns-dad
* drop-ns-nondad
| no description |
| | **key** string | | no description |
| | **keyindex** integer | | no description |
| | **ldpc** string | **Choices:*** disable
* tx
* rx
* rxtx
| no description |
| | **local-authentication** string | **Choices:*** disable
* enable
| no description |
| | **local-bridging** string | **Choices:*** disable
* enable
| no description |
| | **local-lan** string | **Choices:*** deny
* allow
| no description |
| | **local-standalone** string | **Choices:*** disable
* enable
| no description |
| | **local-standalone-nat** string | **Choices:*** disable
* enable
| no description |
| | **local-switching** string | **Choices:*** disable
* enable
| no description |
| | **mac-auth-bypass** string | **Choices:*** disable
* enable
| no description |
| | **mac-called-station-delimiter** string | **Choices:*** hyphen
* single-hyphen
* colon
* none
| MAC called station delimiter (default = hyphen). |
| | **mac-calling-station-delimiter** string | **Choices:*** hyphen
* single-hyphen
* colon
* none
| MAC calling station delimiter (default = hyphen). |
| | **mac-case** string | **Choices:*** uppercase
* lowercase
| MAC case (default = uppercase). |
| | **mac-filter** string | **Choices:*** disable
* enable
| no description |
| | **mac-filter-policy-other** string | **Choices:*** deny
* allow
| no description |
| | **mac-password-delimiter** string | **Choices:*** hyphen
* single-hyphen
* colon
* none
| MAC authentication password delimiter (default = hyphen). |
| | **mac-username-delimiter** string | **Choices:*** hyphen
* single-hyphen
* colon
* none
| MAC authentication username delimiter (default = hyphen). |
| | **max-clients** integer | | no description |
| | **max-clients-ap** integer | | no description |
| | **mbo** string | **Choices:*** disable
* enable
| Enable/disable Multiband Operation (default = disable). |
| | **mbo-cell-data-conn-pref** string | **Choices:*** excluded
* prefer-not
* prefer-use
| MBO cell data connection preference (0, 1, or 255, default = 1). |
| | **me-disable-thresh** integer | | no description |
| | **mesh-backhaul** string | **Choices:*** disable
* enable
| no description |
| | **mpsk** string | **Choices:*** disable
* enable
| no description |
| | **mpsk-concurrent-clients** integer | | no description |
| | **mpsk-profile** string | | no description |
| | **mu-mimo** string | **Choices:*** disable
* enable
| no description |
| | **multicast-enhance** string | **Choices:*** disable
* enable
| no description |
| | **multicast-rate** string | **Choices:*** 0
* 6000
* 12000
* 24000
| no description |
| | **nac** string | **Choices:*** disable
* enable
| Enable/disable network access control. |
| | **nac-profile** string | | NAC profile name. |
| | **neighbor-report-dual-band** string | **Choices:*** disable
* enable
| Enable/disable dual-band neighbor report (default = disable). |
| | **okc** string | **Choices:*** disable
* enable
| no description |
| | **owe-groups** list / elements=string | **Choices:*** 19
* 20
* 21
| no description |
| | **owe-transition** string | **Choices:*** disable
* enable
| no description |
| | **owe-transition-ssid** string | | no description |
| | **passphrase** string | | no description |
| | **pmf** string | **Choices:*** disable
* enable
* optional
| no description |
| | **pmf-assoc-comeback-timeout** integer | | no description |
| | **pmf-sa-query-retry-timeout** integer | | no description |
| | **port-macauth** string | **Choices:*** disable
* radius
* address-group
| Enable/disable LAN port MAC authentication (default = disable). |
| | **port-macauth-reauth-timeout** integer | | LAN port MAC authentication re-authentication timeout value (default = 7200 sec). |
| | **port-macauth-timeout** integer | | LAN port MAC authentication idle timeout value (default = 600 sec). |
| | **portal-message-override-group** string | | no description |
| | **portal-type** string | **Choices:*** auth
* auth+disclaimer
* disclaimer
* email-collect
* cmcc
* cmcc-macauth
* auth-mac
* external-auth
* external-macauth
| no description |
| | **primary-wag-profile** string | | no description |
| | **probe-resp-suppression** string | **Choices:*** disable
* enable
| no description |
| | **probe-resp-threshold** string | | no description |
| | **ptk-rekey** string | **Choices:*** disable
* enable
| no description |
| | **ptk-rekey-intv** integer | | no description |
| | **qos-profile** string | | no description |
| | **quarantine** string | **Choices:*** disable
* enable
| no description |
| | **radio-2g-threshold** string | | no description |
| | **radio-5g-threshold** string | | no description |
| | **radio-sensitivity** string | **Choices:*** disable
* enable
| no description |
| | **radius-mac-auth** string | **Choices:*** disable
* enable
| no description |
| | **radius-mac-auth-server** string | | no description |
| | **radius-mac-auth-usergroups** string | | no description |
| | **radius-server** string | | no description |
| | **rates-11a** list / elements=string | **Choices:*** 1
* 1-basic
* 2
* 2-basic
* 5.5
* 5.5-basic
* 6
* 6-basic
* 9
* 9-basic
* 12
* 12-basic
* 18
* 18-basic
* 24
* 24-basic
* 36
* 36-basic
* 48
* 48-basic
* 54
* 54-basic
* 11
* 11-basic
| no description |
| | **rates-11ac-ss12** list / elements=string | **Choices:*** mcs0/1
* mcs1/1
* mcs2/1
* mcs3/1
* mcs4/1
* mcs5/1
* mcs6/1
* mcs7/1
* mcs8/1
* mcs9/1
* mcs0/2
* mcs1/2
* mcs2/2
* mcs3/2
* mcs4/2
* mcs5/2
* mcs6/2
* mcs7/2
* mcs8/2
* mcs9/2
* mcs10/1
* mcs11/1
* mcs10/2
* mcs11/2
| no description |
| | **rates-11ac-ss34** list / elements=string | **Choices:*** mcs0/3
* mcs1/3
* mcs2/3
* mcs3/3
* mcs4/3
* mcs5/3
* mcs6/3
* mcs7/3
* mcs8/3
* mcs9/3
* mcs0/4
* mcs1/4
* mcs2/4
* mcs3/4
* mcs4/4
* mcs5/4
* mcs6/4
* mcs7/4
* mcs8/4
* mcs9/4
* mcs10/3
* mcs11/3
* mcs10/4
* mcs11/4
| no description |
| | **rates-11bg** list / elements=string | **Choices:*** 1
* 1-basic
* 2
* 2-basic
* 5.5
* 5.5-basic
* 6
* 6-basic
* 9
* 9-basic
* 12
* 12-basic
* 18
* 18-basic
* 24
* 24-basic
* 36
* 36-basic
* 48
* 48-basic
* 54
* 54-basic
* 11
* 11-basic
| no description |
| | **rates-11n-ss12** list / elements=string | **Choices:*** mcs0/1
* mcs1/1
* mcs2/1
* mcs3/1
* mcs4/1
* mcs5/1
* mcs6/1
* mcs7/1
* mcs8/2
* mcs9/2
* mcs10/2
* mcs11/2
* mcs12/2
* mcs13/2
* mcs14/2
* mcs15/2
| no description |
| | **rates-11n-ss34** list / elements=string | **Choices:*** mcs16/3
* mcs17/3
* mcs18/3
* mcs19/3
* mcs20/3
* mcs21/3
* mcs22/3
* mcs23/3
* mcs24/4
* mcs25/4
* mcs26/4
* mcs27/4
* mcs28/4
* mcs29/4
* mcs30/4
* mcs31/4
| no description |
| | **sae-groups** list / elements=string | **Choices:*** 1
* 2
* 5
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 27
* 28
* 29
* 30
* 31
| no description |
| | **sae-password** string | | no description |
| | **schedule** string | | no description |
| | **secondary-wag-profile** string | | no description |
| | **security** string | **Choices:*** None
* WEP64
* wep64
* WEP128
* wep128
* WPA\_PSK
* WPA\_RADIUS
* WPA
* WPA2
* WPA2\_AUTO
* open
* wpa-personal
* wpa-enterprise
* captive-portal
* wpa-only-personal
* wpa-only-enterprise
* wpa2-only-personal
* wpa2-only-enterprise
* wpa-personal+captive-portal
* wpa-only-personal+captive-portal
* wpa2-only-personal+captive-portal
* osen
* wpa3-enterprise
* sae
* sae-transition
* owe
* wpa3-sae
* wpa3-sae-transition
* wpa3-only-enterprise
* wpa3-enterprise-transition
| no description |
| | **security-exempt-list** string | | no description |
| | **security-obsolete-option** string | **Choices:*** disable
* enable
| no description |
| | **security-redirect-url** string | | no description |
| | **selected-usergroups** string | | no description |
| | **split-tunneling** string | **Choices:*** disable
* enable
| no description |
| | **ssid** string | | no description |
| | **sticky-client-remove** string | **Choices:*** disable
* enable
| no description |
| | **sticky-client-threshold-2g** string | | no description |
| | **sticky-client-threshold-5g** string | | no description |
| | **target-wake-time** string | **Choices:*** disable
* enable
| no description |
| | **tkip-counter-measure** string | **Choices:*** disable
* enable
| no description |
| | **tunnel-echo-interval** integer | | no description |
| | **tunnel-fallback-interval** integer | | no description |
| | **usergroup** string | | no description |
| | **utm-profile** string | | no description |
| | **vdom** string | | no description |
| | **vlan-auto** string | **Choices:*** disable
* enable
| no description |
| | **vlan-pooling** string | **Choices:*** wtp-group
* round-robin
* hash
* disable
| no description |
| | **vlanid** integer | | no description |
| | **voice-enterprise** string | **Choices:*** disable
* enable
| no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Virtual Access Points
fmgr_vap_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vap: <your own value>
state: <value in [present, absent]>
vap_dynamicmapping:
_centmgmt: <value in [disable, enable]>
_dhcp_svr_id: <value of string>
_intf_allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- fgfm
- auto-ipsec
- radius-acct
- probe-response
- capwap
_intf_device-identification: <value in [disable, enable]>
_intf_device-netscan: <value in [disable, enable]>
_intf_dhcp-relay-ip: <value of string>
_intf_dhcp-relay-service: <value in [disable, enable]>
_intf_dhcp-relay-type: <value in [regular, ipsec]>
_intf_dhcp6-relay-ip: <value of string>
_intf_dhcp6-relay-service: <value in [disable, enable]>
_intf_dhcp6-relay-type: <value in [regular]>
_intf_ip: <value of string>
_intf_ip6-address: <value of string>
_intf_ip6-allowaccess:
- https
- ping
- ssh
- snmp
- http
- telnet
- any
- fgfm
- capwap
_intf_listen-forticlient-connection: <value in [disable, enable]>
_scope:
-
name: <value of string>
vdom: <value of string>
acct-interim-interval: <value of integer>
address-group: <value of string>
alias: <value of string>
atf-weight: <value of integer>
auth: <value in [PSK, psk, RADIUS, ...]>
broadcast-ssid: <value in [disable, enable]>
broadcast-suppression:
- dhcp
- arp
- dhcp2
- arp2
- netbios-ns
- netbios-ds
- arp3
- dhcp-up
- dhcp-down
- arp-known
- arp-unknown
- arp-reply
- ipv6
- dhcp-starvation
- arp-poison
- all-other-mc
- all-other-bc
- arp-proxy
- dhcp-ucast
captive-portal-ac-name: <value of string>
captive-portal-macauth-radius-secret: <value of string>
captive-portal-macauth-radius-server: <value of string>
captive-portal-radius-secret: <value of string>
captive-portal-radius-server: <value of string>
captive-portal-session-timeout-interval: <value of integer>
client-count: <value of integer>
dhcp-lease-time: <value of integer>
dhcp-option82-circuit-id-insertion: <value in [disable, style-1, style-2, ...]>
dhcp-option82-insertion: <value in [disable, enable]>
dhcp-option82-remote-id-insertion: <value in [disable, style-1]>
dynamic-vlan: <value in [disable, enable]>
eap-reauth: <value in [disable, enable]>
eap-reauth-intv: <value of integer>
eapol-key-retries: <value in [disable, enable]>
encrypt: <value in [TKIP, AES, TKIP-AES]>
external-fast-roaming: <value in [disable, enable]>
external-logout: <value of string>
external-web: <value of string>
fast-bss-transition: <value in [disable, enable]>
fast-roaming: <value in [disable, enable]>
ft-mobility-domain: <value of integer>
ft-over-ds: <value in [disable, enable]>
ft-r0-key-lifetime: <value of integer>
gtk-rekey: <value in [disable, enable]>
gtk-rekey-intv: <value of integer>
hotspot20-profile: <value of string>
intra-vap-privacy: <value in [disable, enable]>
ip: <value of string>
key: <value of string>
keyindex: <value of integer>
ldpc: <value in [disable, tx, rx, ...]>
local-authentication: <value in [disable, enable]>
local-bridging: <value in [disable, enable]>
local-lan: <value in [deny, allow]>
local-standalone: <value in [disable, enable]>
local-standalone-nat: <value in [disable, enable]>
local-switching: <value in [disable, enable]>
mac-auth-bypass: <value in [disable, enable]>
mac-filter: <value in [disable, enable]>
mac-filter-policy-other: <value in [deny, allow]>
max-clients: <value of integer>
max-clients-ap: <value of integer>
me-disable-thresh: <value of integer>
mesh-backhaul: <value in [disable, enable]>
mpsk: <value in [disable, enable]>
mpsk-concurrent-clients: <value of integer>
multicast-enhance: <value in [disable, enable]>
multicast-rate: <value in [0, 6000, 12000, ...]>
okc: <value in [disable, enable]>
owe-groups:
- 19
- 20
- 21
owe-transition: <value in [disable, enable]>
owe-transition-ssid: <value of string>
passphrase: <value of string>
pmf: <value in [disable, enable, optional]>
pmf-assoc-comeback-timeout: <value of integer>
pmf-sa-query-retry-timeout: <value of integer>
portal-message-override-group: <value of string>
portal-type: <value in [auth, auth+disclaimer, disclaimer, ...]>
probe-resp-suppression: <value in [disable, enable]>
probe-resp-threshold: <value of string>
ptk-rekey: <value in [disable, enable]>
ptk-rekey-intv: <value of integer>
qos-profile: <value of string>
quarantine: <value in [disable, enable]>
radio-2g-threshold: <value of string>
radio-5g-threshold: <value of string>
radio-sensitivity: <value in [disable, enable]>
radius-mac-auth: <value in [disable, enable]>
radius-mac-auth-server: <value of string>
radius-mac-auth-usergroups: <value of string>
radius-server: <value of string>
rates-11a:
- 1
- 1-basic
- 2
- 2-basic
- 5.5
- 5.5-basic
- 6
- 6-basic
- 9
- 9-basic
- 12
- 12-basic
- 18
- 18-basic
- 24
- 24-basic
- 36
- 36-basic
- 48
- 48-basic
- 54
- 54-basic
- 11
- 11-basic
rates-11ac-ss12:
- mcs0/1
- mcs1/1
- mcs2/1
- mcs3/1
- mcs4/1
- mcs5/1
- mcs6/1
- mcs7/1
- mcs8/1
- mcs9/1
- mcs0/2
- mcs1/2
- mcs2/2
- mcs3/2
- mcs4/2
- mcs5/2
- mcs6/2
- mcs7/2
- mcs8/2
- mcs9/2
- mcs10/1
- mcs11/1
- mcs10/2
- mcs11/2
rates-11ac-ss34:
- mcs0/3
- mcs1/3
- mcs2/3
- mcs3/3
- mcs4/3
- mcs5/3
- mcs6/3
- mcs7/3
- mcs8/3
- mcs9/3
- mcs0/4
- mcs1/4
- mcs2/4
- mcs3/4
- mcs4/4
- mcs5/4
- mcs6/4
- mcs7/4
- mcs8/4
- mcs9/4
- mcs10/3
- mcs11/3
- mcs10/4
- mcs11/4
rates-11bg:
- 1
- 1-basic
- 2
- 2-basic
- 5.5
- 5.5-basic
- 6
- 6-basic
- 9
- 9-basic
- 12
- 12-basic
- 18
- 18-basic
- 24
- 24-basic
- 36
- 36-basic
- 48
- 48-basic
- 54
- 54-basic
- 11
- 11-basic
rates-11n-ss12:
- mcs0/1
- mcs1/1
- mcs2/1
- mcs3/1
- mcs4/1
- mcs5/1
- mcs6/1
- mcs7/1
- mcs8/2
- mcs9/2
- mcs10/2
- mcs11/2
- mcs12/2
- mcs13/2
- mcs14/2
- mcs15/2
rates-11n-ss34:
- mcs16/3
- mcs17/3
- mcs18/3
- mcs19/3
- mcs20/3
- mcs21/3
- mcs22/3
- mcs23/3
- mcs24/4
- mcs25/4
- mcs26/4
- mcs27/4
- mcs28/4
- mcs29/4
- mcs30/4
- mcs31/4
sae-groups:
- 1
- 2
- 5
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 27
- 28
- 29
- 30
- 31
sae-password: <value of string>
schedule: <value of string>
security: <value in [None, WEP64, wep64, ...]>
security-exempt-list: <value of string>
security-obsolete-option: <value in [disable, enable]>
security-redirect-url: <value of string>
selected-usergroups: <value of string>
split-tunneling: <value in [disable, enable]>
ssid: <value of string>
tkip-counter-measure: <value in [disable, enable]>
usergroup: <value of string>
utm-profile: <value of string>
vdom: <value of string>
vlan-auto: <value in [disable, enable]>
vlan-pooling: <value in [wtp-group, round-robin, hash, ...]>
vlanid: <value of integer>
voice-enterprise: <value in [disable, enable]>
mu-mimo: <value in [disable, enable]>
_intf_device-access-list: <value of string>
external-web-format: <value in [auto-detect, no-query-string, partial-query-string]>
high-efficiency: <value in [disable, enable]>
primary-wag-profile: <value of string>
secondary-wag-profile: <value of string>
target-wake-time: <value in [disable, enable]>
tunnel-echo-interval: <value of integer>
tunnel-fallback-interval: <value of integer>
access-control-list: <value of string>
captive-portal-auth-timeout: <value of integer>
ipv6-rules:
- drop-icmp6ra
- drop-icmp6rs
- drop-llmnr6
- drop-icmp6mld2
- drop-dhcp6s
- drop-dhcp6c
- ndp-proxy
- drop-ns-dad
- drop-ns-nondad
sticky-client-remove: <value in [disable, enable]>
sticky-client-threshold-2g: <value of string>
sticky-client-threshold-5g: <value of string>
bss-color-partial: <value in [disable, enable]>
dhcp-option43-insertion: <value in [disable, enable]>
mpsk-profile: <value of string>
igmp-snooping: <value in [disable, enable]>
port-macauth: <value in [disable, radius, address-group]>
port-macauth-reauth-timeout: <value of integer>
port-macauth-timeout: <value of integer>
additional-akms:
- akm6
bstm-disassociation-imminent: <value in [disable, enable]>
bstm-load-balancing-disassoc-timer: <value of integer>
bstm-rssi-disassoc-timer: <value of integer>
dhcp-address-enforcement: <value in [disable, enable]>
gas-comeback-delay: <value of integer>
gas-fragmentation-limit: <value of integer>
mac-called-station-delimiter: <value in [hyphen, single-hyphen, colon, ...]>
mac-calling-station-delimiter: <value in [hyphen, single-hyphen, colon, ...]>
mac-case: <value in [uppercase, lowercase]>
mac-password-delimiter: <value in [hyphen, single-hyphen, colon, ...]>
mac-username-delimiter: <value in [hyphen, single-hyphen, colon, ...]>
mbo: <value in [disable, enable]>
mbo-cell-data-conn-pref: <value in [excluded, prefer-not, prefer-use]>
nac: <value in [disable, enable]>
nac-profile: <value of string>
neighbor-report-dual-band: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_sql_tsindexfield β List of SQL text search index fields. fortinet.fortimanager.fmgr\_system\_sql\_tsindexfield β List of SQL text search index fields.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sql_tsindexfield`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sql\_tsindexfield** dictionary | | the top level parameters set |
| | **category** string | | Category of text search index fields. |
| | **value** string | | Fields of text search index. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: List of SQL text search index fields.
fmgr_system_sql_tsindexfield:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_sql_tsindexfield:
category: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_package_cancel_install β Cancel policy install and clear preview cache. fortinet.fortimanager.fmgr\_securityconsole\_package\_cancel\_install β Cancel policy install and clear preview cache.
======================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_package_cancel_install`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_package\_cancel\_install** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Cancel policy install and clear preview cache.
fmgr_securityconsole_package_cancel_install:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_package_cancel_install:
adom: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_mirror β Configuration method to edit FortiSwitch packet mirror. fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_mirror β Configuration method to edit FortiSwitch packet mirror.
=============================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_mirror`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device** string / required | | the parameter (device) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vdom** string / required | | the parameter (vdom) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit FortiSwitch packet mirror.
fmgr_switchcontroller_managedswitch_mirror:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
device: <your own value>
vdom: <your own value>
managed-switch: <your own value>
state: <value in [present, absent]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_proxyaddress β Web proxy address configuration. fortinet.fortimanager.fmgr\_firewall\_proxyaddress β Web proxy address configuration.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_proxyaddress`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_proxyaddress** dictionary | | the top level parameters set |
| | **\_image-base64** string | | no description |
| | **case-sensitivity** string | **Choices:*** disable
* enable
| Enable to make the pattern case sensitive. |
| | **category** string | | FortiGuard category ID. |
| | **color** integer | | Integer value to determine the color of the icon in the GUI (1 - 32, default = 0, which sets value to 1). |
| | **comment** string | | Optional comments. |
| | **header** string | | HTTP header name as a regular expression. |
| | **header-group** list / elements=string | | no description |
| | | **case-sensitivity** string | **Choices:*** disable
* enable
| Case sensitivity in pattern. |
| | | **header** string | | HTTP header regular expression. |
| | | **header-name** string | | HTTP header. |
| | | **id** integer | | ID. |
| | **header-name** string | | Name of HTTP header. |
| | **host** string | | Address object for the host. |
| | **host-regex** string | | Host name as a regular expression. |
| | **method** list / elements=string | **Choices:*** delete
* get
* head
* options
* post
* put
* trace
* connect
| no description |
| | **name** string | | Address name. |
| | **path** string | | URL path as a regular expression. |
| | **query** string | | Match the query part of the URL as a regular expression. |
| | **referrer** string | **Choices:*** disable
* enable
| Enable/disable use of referrer field in the HTTP header to match the address. |
| | **tagging** list / elements=string | | no description |
| | | **category** string | | Tag category. |
| | | **name** string | | Tagging entry name. |
| | | **tags** string | | no description |
| | **type** string | **Choices:*** host-regex
* url
* category
* method
* ua
* header
* src-advanced
* dst-advanced
| Proxy address type. |
| | **ua** list / elements=string | **Choices:*** chrome
* ms
* firefox
* safari
* other
| no description |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **visibility** string | **Choices:*** disable
* enable
| Enable/disable visibility of the object in the GUI. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Web proxy address configuration.
fmgr_firewall_proxyaddress:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_proxyaddress:
case-sensitivity: <value in [disable, enable]>
category: <value of string>
color: <value of integer>
comment: <value of string>
header: <value of string>
header-group:
-
case-sensitivity: <value in [disable, enable]>
header: <value of string>
header-name: <value of string>
id: <value of integer>
header-name: <value of string>
host: <value of string>
host-regex: <value of string>
method:
- delete
- get
- head
- options
- post
- put
- trace
- connect
name: <value of string>
path: <value of string>
query: <value of string>
referrer: <value in [disable, enable]>
tagging:
-
category: <value of string>
name: <value of string>
tags: <value of string>
type: <value in [host-regex, url, category, ...]>
ua:
- chrome
- ms
- firefox
- safari
- other
uuid: <value of string>
visibility: <value in [disable, enable]>
_image-base64: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_dhcp_server_reservedaddress β Options for the DHCP server to assign IP settings to specific MAC addresses. fortinet.fortimanager.fmgr\_system\_dhcp\_server\_reservedaddress β Options for the DHCP server to assign IP settings to specific MAC addresses.
================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_dhcp_server_reservedaddress`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **server** string / required | | the parameter (server) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_dhcp\_server\_reservedaddress** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** assign
* block
* reserved
| Options for the DHCP server to configure the client with the reserved MAC address. |
| | **circuit-id** string | | Option 82 circuit-ID of the client that will get the reserved IP address. |
| | **circuit-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | **description** string | | Description. |
| | **id** integer | | ID. |
| | **ip** string | | IP address to be reserved for the MAC address. |
| | **mac** string | | MAC address of the client that will get the reserved IP address. |
| | **remote-id** string | | Option 82 remote-ID of the client that will get the reserved IP address. |
| | **remote-id-type** string | **Choices:*** hex
* string
| DHCP option type. |
| | **type** string | **Choices:*** mac
* option82
| DHCP reserved-address type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Options for the DHCP server to assign IP settings to specific MAC addresses.
fmgr_system_dhcp_server_reservedaddress:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
server: <your own value>
state: <value in [present, absent]>
system_dhcp_server_reservedaddress:
action: <value in [assign, block, reserved]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_vip6_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority. fortinet.fortimanager.fmgr\_firewall\_vip6\_sslciphersuites β SSL/TLS cipher suites acceptable from a client, ordered by priority.
==================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip6_sslciphersuites`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip6\_sslciphersuites** dictionary | | the top level parameters set |
| | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | **priority** integer | | SSL/TLS cipher suites priority. |
| | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip6** string / required | | the parameter (vip6) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL/TLS cipher suites acceptable from a client, ordered by priority.
fmgr_firewall_vip6_sslciphersuites:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip6: <your own value>
state: <value in [present, absent]>
firewall_vip6_sslciphersuites:
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
priority: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_application_custom β Configure custom application signatures. fortinet.fortimanager.fmgr\_application\_custom β Configure custom application signatures.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_application_custom`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **application\_custom** dictionary | | the top level parameters set |
| | **behavior** string | | Custom application signature behavior. |
| | **category** string | | Custom application category ID (use ? to view available options). |
| | **comment** string | | Comment. |
| | **id** integer | | no description |
| | **name** string | | no description |
| | **protocol** string | | Custom application signature protocol. |
| | **signature** string | | The text that makes up the actual custom application signature. |
| | **tag** string | | Signature tag. |
| | **technology** string | | Custom application signature technology. |
| | **vendor** string | | Custom application signature vendor. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure custom application signatures.
fmgr_application_custom:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
application_custom:
behavior: <value of string>
category: <value of string>
comment: <value of string>
id: <value of integer>
name: <value of string>
protocol: <value of string>
signature: <value of string>
tag: <value of string>
technology: <value of string>
vendor: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_snmp_user β SNMP user configuration. fortinet.fortimanager.fmgr\_devprof\_system\_snmp\_user β SNMP user configuration.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_snmp_user`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_snmp\_user** dictionary | | the top level parameters set |
| | **auth-proto** string | **Choices:*** md5
* sha
* sha224
* sha256
* sha384
* sha512
| Authentication protocol. |
| | **auth-pwd** string | | no description |
| | **events** list / elements=string | **Choices:*** cpu-high
* mem-low
* log-full
* intf-ip
* vpn-tun-up
* vpn-tun-down
* ha-switch
* fm-conf-change
* ips-signature
* ips-anomaly
* temperature-high
* voltage-alert
* av-virus
* av-oversize
* av-pattern
* av-fragmented
* ha-hb-failure
* fan-failure
* ha-member-up
* ha-member-down
* ent-conf-change
* av-conserve
* av-bypass
* av-oversize-passed
* av-oversize-blocked
* ips-pkg-update
* fm-if-change
* power-supply-failure
* amc-bypass
* faz-disconnect
* bgp-established
* bgp-backward-transition
* wc-ap-up
* wc-ap-down
* fswctl-session-up
* fswctl-session-down
* ips-fail-open
* load-balance-real-server-down
* device-new
* enter-intf-bypass
* exit-intf-bypass
* per-cpu-high
* power-blade-down
* confsync\_failure
* dhcp
* pool-usage
* power-redundancy-degrade
* power-redundancy-failure
* ospf-nbr-state-change
* ospf-virtnbr-state-change
| no description |
| | **ha-direct** string | **Choices:*** disable
* enable
| Enable/disable direct management of HA cluster members. |
| | **name** string | | SNMP user name. |
| | **notify-hosts** string | | no description |
| | **notify-hosts6** string | | IPv6 SNMP managers to send notifications (traps) to. |
| | **priv-proto** string | **Choices:*** aes
* des
* aes256
* aes256cisco
| Privacy (encryption) protocol. |
| | **priv-pwd** string | | no description |
| | **queries** string | **Choices:*** disable
* enable
| Enable/disable SNMP queries for this user. |
| | **query-port** integer | | SNMPv3 query port (default = 161). |
| | **security-level** string | **Choices:*** no-auth-no-priv
* auth-no-priv
* auth-priv
| Security level for message authentication and encryption. |
| | **source-ip** string | | Source IP for SNMP trap. |
| | **source-ipv6** string | | Source IPv6 for SNMP trap. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable this SNMP user. |
| | **trap-lport** integer | | SNMPv3 local trap port (default = 162). |
| | **trap-rport** integer | | SNMPv3 trap remote port (default = 162). |
| | **trap-status** string | **Choices:*** disable
* enable
| Enable/disable traps for this SNMP user. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SNMP user configuration.
fmgr_devprof_system_snmp_user:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
state: <value in [present, absent]>
devprof_system_snmp_user:
auth-proto: <value in [md5, sha, sha224, ...]>
auth-pwd: <value of string>
events:
- cpu-high
- mem-low
- log-full
- intf-ip
- vpn-tun-up
- vpn-tun-down
- ha-switch
- fm-conf-change
- ips-signature
- ips-anomaly
- temperature-high
- voltage-alert
- av-virus
- av-oversize
- av-pattern
- av-fragmented
- ha-hb-failure
- fan-failure
- ha-member-up
- ha-member-down
- ent-conf-change
- av-conserve
- av-bypass
- av-oversize-passed
- av-oversize-blocked
- ips-pkg-update
- fm-if-change
- power-supply-failure
- amc-bypass
- faz-disconnect
- bgp-established
- bgp-backward-transition
- wc-ap-up
- wc-ap-down
- fswctl-session-up
- fswctl-session-down
- ips-fail-open
- load-balance-real-server-down
- device-new
- enter-intf-bypass
- exit-intf-bypass
- per-cpu-high
- power-blade-down
- confsync_failure
- dhcp
- pool-usage
- power-redundancy-degrade
- power-redundancy-failure
- ospf-nbr-state-change
- ospf-virtnbr-state-change
ha-direct: <value in [disable, enable]>
name: <value of string>
notify-hosts: <value of string>
notify-hosts6: <value of string>
priv-proto: <value in [aes, des, aes256, ...]>
priv-pwd: <value of string>
queries: <value in [disable, enable]>
query-port: <value of integer>
security-level: <value in [no-auth-no-priv, auth-no-priv, auth-priv]>
source-ip: <value of string>
source-ipv6: <value of string>
status: <value in [disable, enable]>
trap-lport: <value of integer>
trap-rport: <value of integer>
trap-status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping β Configure virtual IP for IPv4. fortinet.fortimanager.fmgr\_firewall\_vip\_dynamicmapping β Configure virtual IP for IPv4.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_vip_dynamicmapping`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_vip\_dynamicmapping** dictionary | | the top level parameters set |
| | **\_scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **arp-reply** string | **Choices:*** disable
* enable
| no description |
| | **color** integer | | no description |
| | **comment** string | | no description |
| | **dns-mapping-ttl** integer | | no description |
| | **extaddr** string | | no description |
| | **extintf** string | | no description |
| | **extip** string | | no description |
| | **extport** string | | no description |
| | **gratuitous-arp-interval** integer | | no description |
| | **http-cookie-age** integer | | no description |
| | **http-cookie-domain** string | | no description |
| | **http-cookie-domain-from-host** string | **Choices:*** disable
* enable
| no description |
| | **http-cookie-generation** integer | | no description |
| | **http-cookie-path** string | | no description |
| | **http-cookie-share** string | **Choices:*** disable
* same-ip
| no description |
| | **http-ip-header** string | **Choices:*** disable
* enable
| no description |
| | **http-ip-header-name** string | | no description |
| | **http-multiplex** string | **Choices:*** disable
* enable
| no description |
| | **http-redirect** string | **Choices:*** disable
* enable
| no description |
| | **https-cookie-secure** string | **Choices:*** disable
* enable
| no description |
| | **id** integer | | no description |
| | **ldb-method** string | **Choices:*** static
* round-robin
* weighted
* least-session
* least-rtt
* first-alive
* http-host
| no description |
| | **mapped-addr** string | | no description |
| | **mappedip** string | | no description |
| | **mappedport** string | | no description |
| | **max-embryonic-connections** integer | | no description |
| | **monitor** string | | no description |
| | **nat-source-vip** string | **Choices:*** disable
* enable
| no description |
| | **outlook-web-access** string | **Choices:*** disable
* enable
| no description |
| | **persistence** string | **Choices:*** none
* http-cookie
* ssl-session-id
| no description |
| | **portforward** string | **Choices:*** disable
* enable
| no description |
| | **portmapping-type** string | **Choices:*** 1-to-1
* m-to-n
| no description |
| | **protocol** string | **Choices:*** tcp
* udp
* sctp
* icmp
| no description |
| | **realservers** list / elements=string | | no description |
| | | **address** string | | no description |
| | | **client-ip** string | | no description |
| | | **healthcheck** string | **Choices:*** disable
* enable
* vip
| no description |
| | | **holddown-interval** integer | | no description |
| | | **http-host** string | | no description |
| | | **id** integer | | no description |
| | | **ip** string | | no description |
| | | **max-connections** integer | | no description |
| | | **monitor** string | | no description |
| | | **port** integer | | no description |
| | | **seq** integer | | no description |
| | | **status** string | **Choices:*** active
* standby
* disable
| no description |
| | | **type** string | **Choices:*** ip
* address
| no description |
| | | **weight** integer | | no description |
| | **server-type** string | **Choices:*** http
* https
* ssl
* tcp
* udp
* ip
* imaps
* pop3s
* smtps
* ssh
| no description |
| | **service** string | | no description |
| | **src-filter** string | | no description |
| | **srcintf-filter** string | | no description |
| | **ssl-algorithm** string | **Choices:*** high
* medium
* low
* custom
| no description |
| | **ssl-certificate** string | | no description |
| | **ssl-cipher-suites** list / elements=string | | no description |
| | | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| no description |
| | | **id** integer | | no description |
| | | **priority** integer | | no description |
| | | **versions** list / elements=string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | **ssl-client-fallback** string | **Choices:*** disable
* enable
| no description |
| | **ssl-client-rekey-count** integer | | no description |
| | **ssl-client-renegotiation** string | **Choices:*** deny
* allow
* secure
| no description |
| | **ssl-client-session-state-max** integer | | no description |
| | **ssl-client-session-state-timeout** integer | | no description |
| | **ssl-client-session-state-type** string | **Choices:*** disable
* time
* count
* both
| no description |
| | **ssl-dh-bits** string | **Choices:*** 768
* 1024
* 1536
* 2048
* 3072
* 4096
| no description |
| | **ssl-hpkp** string | **Choices:*** disable
* enable
* report-only
| no description |
| | **ssl-hpkp-age** integer | | no description |
| | **ssl-hpkp-backup** string | | no description |
| | **ssl-hpkp-include-subdomains** string | **Choices:*** disable
* enable
| no description |
| | **ssl-hpkp-primary** string | | no description |
| | **ssl-hpkp-report-uri** string | | no description |
| | **ssl-hsts** string | **Choices:*** disable
* enable
| no description |
| | **ssl-hsts-age** integer | | no description |
| | **ssl-hsts-include-subdomains** string | **Choices:*** disable
* enable
| no description |
| | **ssl-http-location-conversion** string | **Choices:*** disable
* enable
| no description |
| | **ssl-http-match-host** string | **Choices:*** disable
* enable
| no description |
| | **ssl-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | **ssl-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| | **ssl-mode** string | **Choices:*** half
* full
| no description |
| | **ssl-pfs** string | **Choices:*** require
* deny
* allow
| no description |
| | **ssl-send-empty-frags** string | **Choices:*** disable
* enable
| no description |
| | **ssl-server-algorithm** string | **Choices:*** high
* low
* medium
* custom
* client
| no description |
| | **ssl-server-max-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| no description |
| | **ssl-server-min-version** string | **Choices:*** ssl-3.0
* tls-1.0
* tls-1.1
* tls-1.2
* client
* tls-1.3
| no description |
| | **ssl-server-session-state-max** integer | | no description |
| | **ssl-server-session-state-timeout** integer | | no description |
| | **ssl-server-session-state-type** string | **Choices:*** disable
* time
* count
* both
| no description |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable VIP. |
| | **type** string | **Choices:*** static-nat
* load-balance
* server-load-balance
* dns-translation
* fqdn
* access-proxy
| no description |
| | **uuid** string | | no description |
| | **weblogic-server** string | **Choices:*** disable
* enable
| no description |
| | **websphere-server** string | **Choices:*** disable
* enable
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vip** string / required | | the parameter (vip) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure virtual IP for IPv4.
fmgr_firewall_vip_dynamicmapping:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vip: <your own value>
state: <value in [present, absent]>
firewall_vip_dynamicmapping:
_scope:
-
name: <value of string>
vdom: <value of string>
arp-reply: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
dns-mapping-ttl: <value of integer>
extaddr: <value of string>
extintf: <value of string>
extip: <value of string>
extport: <value of string>
gratuitous-arp-interval: <value of integer>
http-cookie-age: <value of integer>
http-cookie-domain: <value of string>
http-cookie-domain-from-host: <value in [disable, enable]>
http-cookie-generation: <value of integer>
http-cookie-path: <value of string>
http-cookie-share: <value in [disable, same-ip]>
http-ip-header: <value in [disable, enable]>
http-ip-header-name: <value of string>
http-multiplex: <value in [disable, enable]>
https-cookie-secure: <value in [disable, enable]>
id: <value of integer>
ldb-method: <value in [static, round-robin, weighted, ...]>
mapped-addr: <value of string>
mappedip: <value of string>
mappedport: <value of string>
max-embryonic-connections: <value of integer>
monitor: <value of string>
nat-source-vip: <value in [disable, enable]>
outlook-web-access: <value in [disable, enable]>
persistence: <value in [none, http-cookie, ssl-session-id]>
portforward: <value in [disable, enable]>
portmapping-type: <value in [1-to-1, m-to-n]>
protocol: <value in [tcp, udp, sctp, ...]>
realservers:
-
client-ip: <value of string>
healthcheck: <value in [disable, enable, vip]>
holddown-interval: <value of integer>
http-host: <value of string>
ip: <value of string>
max-connections: <value of integer>
monitor: <value of string>
port: <value of integer>
seq: <value of integer>
status: <value in [active, standby, disable]>
weight: <value of integer>
address: <value of string>
id: <value of integer>
type: <value in [ip, address]>
server-type: <value in [http, https, ssl, ...]>
service: <value of string>
src-filter: <value of string>
srcintf-filter: <value of string>
ssl-algorithm: <value in [high, medium, low, ...]>
ssl-certificate: <value of string>
ssl-cipher-suites:
-
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
id: <value of integer>
versions:
- ssl-3.0
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
priority: <value of integer>
ssl-client-fallback: <value in [disable, enable]>
ssl-client-renegotiation: <value in [deny, allow, secure]>
ssl-client-session-state-max: <value of integer>
ssl-client-session-state-timeout: <value of integer>
ssl-client-session-state-type: <value in [disable, time, count, ...]>
ssl-dh-bits: <value in [768, 1024, 1536, ...]>
ssl-hpkp: <value in [disable, enable, report-only]>
ssl-hpkp-age: <value of integer>
ssl-hpkp-backup: <value of string>
ssl-hpkp-include-subdomains: <value in [disable, enable]>
ssl-hpkp-primary: <value of string>
ssl-hpkp-report-uri: <value of string>
ssl-hsts: <value in [disable, enable]>
ssl-hsts-age: <value of integer>
ssl-hsts-include-subdomains: <value in [disable, enable]>
ssl-http-location-conversion: <value in [disable, enable]>
ssl-http-match-host: <value in [disable, enable]>
ssl-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-mode: <value in [half, full]>
ssl-pfs: <value in [require, deny, allow]>
ssl-send-empty-frags: <value in [disable, enable]>
ssl-server-algorithm: <value in [high, low, medium, ...]>
ssl-server-max-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-min-version: <value in [ssl-3.0, tls-1.0, tls-1.1, ...]>
ssl-server-session-state-max: <value of integer>
ssl-server-session-state-timeout: <value of integer>
ssl-server-session-state-type: <value in [disable, time, count, ...]>
type: <value in [static-nat, load-balance, server-load-balance, ...]>
uuid: <value of string>
weblogic-server: <value in [disable, enable]>
websphere-server: <value in [disable, enable]>
http-redirect: <value in [disable, enable]>
ssl-client-rekey-count: <value of integer>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dlp_sensitivity β Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source. fortinet.fortimanager.fmgr\_dlp\_sensitivity β Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
=============================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dlp_sensitivity`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dlp\_sensitivity** dictionary | | the top level parameters set |
| | **name** string | | DLP Sensitivity Levels. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Create self-explanatory DLP sensitivity levels to be used when setting sensitivity under config fp-doc-source.
fmgr_dlp_sensitivity:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dlp_sensitivity:
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_addrgrp_tagging β Config object tagging. fortinet.fortimanager.fmgr\_firewall\_addrgrp\_tagging β Config object tagging.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_addrgrp_tagging`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **addrgrp** string / required | | the parameter (addrgrp) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_addrgrp\_tagging** dictionary | | the top level parameters set |
| | **category** string | | Tag category. |
| | **name** string | | Tagging entry name. |
| | **tags** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Config object tagging.
fmgr_firewall_addrgrp_tagging:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
addrgrp: <your own value>
state: <value in [present, absent]>
firewall_addrgrp_tagging:
category: <value of string>
name: <value of string>
tags: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvm_cmd_del_device β Delete a device. fortinet.fortimanager.fmgr\_dvm\_cmd\_del\_device β Delete a device.
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvm_cmd_del_device`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvm\_cmd\_del\_device** dictionary | | the top level parameters set |
| | **adom** string | | Name or ID of the ADOM where the command is to be executed on. |
| | **device** string | | Name or ID of the target device. |
| | **flags** list / elements=string | **Choices:*** none
* create\_task
* nonblocking
* log\_dev
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Delete a device.
fmgr_dvm_cmd_del_device:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
dvm_cmd_del_device:
adom: <value of string>
device: <value of string>
flags:
- none
- create_task
- nonblocking
- log_dev
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_syslog β Syslog servers. fortinet.fortimanager.fmgr\_system\_syslog β Syslog servers.
============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_syslog`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_syslog** dictionary | | the top level parameters set |
| | **ip** string | | Syslog server IP address or hostname. |
| | **name** string | | Syslog server name. |
| | **port** integer | **Default:**514 | Syslog server port. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Syslog servers.
fmgr_system_syslog:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_syslog:
ip: <value of string>
name: <value of string>
port: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_8021xsettings β Configuration method to edit FortiSwitch 802. fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_8021xsettings β Configuration method to edit FortiSwitch 802.
==========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_8021xsettings`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device** string / required | | the parameter (device) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vdom** string / required | | the parameter (vdom) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration method to edit FortiSwitch 802.
fmgr_switchcontroller_managedswitch_8021xsettings:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
device: <your own value>
vdom: <your own value>
managed-switch: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_fsso β Configure Fortinet Single Sign On fortinet.fortimanager.fmgr\_user\_fsso β Configure Fortinet Single Sign On
==========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_fsso`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_fsso** dictionary | | the top level parameters set |
| | **\_gui\_meta** string | | no description |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_gui\_meta** string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **group-poll-interval** integer | | no description |
| | | **interface** string | | no description |
| | | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| no description |
| | | **ldap-poll** string | **Choices:*** disable
* enable
| no description |
| | | **ldap-poll-filter** string | | no description |
| | | **ldap-poll-interval** integer | | no description |
| | | **ldap-server** string | | no description |
| | | **password** string | | no description |
| | | **password2** string | | no description |
| | | **password3** string | | no description |
| | | **password4** string | | no description |
| | | **password5** string | | no description |
| | | **port** integer | | no description |
| | | **port2** integer | | no description |
| | | **port3** integer | | no description |
| | | **port4** integer | | no description |
| | | **port5** integer | | no description |
| | | **server** string | | no description |
| | | **server2** string | | no description |
| | | **server3** string | | no description |
| | | **server4** string | | no description |
| | | **server5** string | | no description |
| | | **source-ip** string | | no description |
| | | **source-ip6** string | | no description |
| | | **ssl** string | **Choices:*** disable
* enable
| no description |
| | | **ssl-trusted-cert** string | | no description |
| | | **type** string | **Choices:*** default
* fortiems
* fortinac
* fortiems-cloud
| no description |
| | | **user-info-server** string | | no description |
| | **group-poll-interval** integer | | Interval in minutes within to fetch groups from FSSO server, or unset to disable. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **ldap-poll** string | **Choices:*** disable
* enable
| Enable/disable automatic fetching of groups from LDAP server. |
| | **ldap-poll-filter** string | | Filter used to fetch groups. |
| | **ldap-poll-interval** integer | | Interval in minutes within to fetch groups from LDAP server. |
| | **ldap-server** string | | LDAP server to get group information. |
| | **name** string | | Name. |
| | **password** string | | no description |
| | **password2** string | | no description |
| | **password3** string | | no description |
| | **password4** string | | no description |
| | **password5** string | | no description |
| | **port** integer | | Port of the first FSSO collector agent. |
| | **port2** integer | | Port of the second FSSO collector agent. |
| | **port3** integer | | Port of the third FSSO collector agent. |
| | **port4** integer | | Port of the fourth FSSO collector agent. |
| | **port5** integer | | Port of the fifth FSSO collector agent. |
| | **server** string | | Domain name or IP address of the first FSSO collector agent. |
| | **server2** string | | Domain name or IP address of the second FSSO collector agent. |
| | **server3** string | | Domain name or IP address of the third FSSO collector agent. |
| | **server4** string | | Domain name or IP address of the fourth FSSO collector agent. |
| | **server5** string | | Domain name or IP address of the fifth FSSO collector agent. |
| | **source-ip** string | | Source IP for communications to FSSO agent. |
| | **source-ip6** string | | IPv6 source for communications to FSSO agent. |
| | **ssl** string | **Choices:*** disable
* enable
| Enable/disable use of SSL. |
| | **ssl-trusted-cert** string | | Trusted server certificate or CA certificate. |
| | **type** string | **Choices:*** default
* fortiems
* fortinac
* fortiems-cloud
| Server type. |
| | **user-info-server** string | | LDAP server to get user information. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Fortinet Single Sign On
fmgr_user_fsso:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_fsso:
_gui_meta: <value of string>
dynamic_mapping:
-
_gui_meta: <value of string>
_scope:
-
name: <value of string>
vdom: <value of string>
ldap-server: <value of string>
password: <value of string>
password2: <value of string>
password3: <value of string>
password4: <value of string>
password5: <value of string>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
port4: <value of integer>
port5: <value of integer>
server: <value of string>
server2: <value of string>
server3: <value of string>
server4: <value of string>
server5: <value of string>
source-ip: <value of string>
source-ip6: <value of string>
ssl: <value in [disable, enable]>
ssl-trusted-cert: <value of string>
type: <value in [default, fortiems, fortinac, ...]>
user-info-server: <value of string>
ldap-poll: <value in [disable, enable]>
ldap-poll-filter: <value of string>
ldap-poll-interval: <value of integer>
group-poll-interval: <value of integer>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
ldap-server: <value of string>
name: <value of string>
password: <value of string>
password2: <value of string>
password3: <value of string>
password4: <value of string>
password5: <value of string>
port: <value of integer>
port2: <value of integer>
port3: <value of integer>
port4: <value of integer>
port5: <value of integer>
server: <value of string>
server2: <value of string>
server3: <value of string>
server4: <value of string>
server5: <value of string>
source-ip: <value of string>
source-ip6: <value of string>
ldap-poll: <value in [disable, enable]>
ldap-poll-filter: <value of string>
ldap-poll-interval: <value of integer>
ssl: <value in [disable, enable]>
ssl-trusted-cert: <value of string>
type: <value in [default, fortiems, fortinac, ...]>
user-info-server: <value of string>
group-poll-interval: <value of integer>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_dot β Configure DNS over TLS options. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_dot β Configure DNS over TLS options.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_dot`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_dot** dictionary | | the top level parameters set |
| | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | **sni-server-cert-check** string | **Choices:*** enable
* strict
* disable
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | **unsupported-ssl-cipher** string | **Choices:*** block
* allow
| Action based on the SSL cipher used being unsupported. |
| | **unsupported-ssl-negotiation** string | **Choices:*** block
* allow
| Action based on the SSL negotiation used being unsupported. |
| | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is not issued by a trusted CA. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure DNS over TLS options.
fmgr_firewall_sslsshprofile_dot:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
firewall_sslsshprofile_dot:
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
sni-server-cert-check: <value in [enable, strict, disable]>
status: <value in [disable, deep-inspection]>
unsupported-ssl-cipher: <value in [block, allow]>
unsupported-ssl-negotiation: <value in [block, allow]>
untrusted-server-cert: <value in [allow, block, ignore]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_mmsprofile_flood β Flood configuration. fortinet.fortimanager.fmgr\_firewall\_mmsprofile\_flood β Flood configuration.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_mmsprofile_flood`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_mmsprofile\_flood** dictionary | | the top level parameters set |
| | **action1** list / elements=string | **Choices:*** log
* archive
* intercept
* block
* archive-first
* alert-notif
| no description |
| | **action2** list / elements=string | **Choices:*** log
* archive
* intercept
* block
* archive-first
* alert-notif
| no description |
| | **action3** list / elements=string | **Choices:*** log
* archive
* intercept
* block
* archive-first
* alert-notif
| no description |
| | **block-time1** integer | | Duration for which action takes effect (0 - 35791 min). |
| | **block-time2** integer | | Duration for which action takes effect (0 - 35791 min). |
| | **block-time3** integer | | Duration action takes effect (0 - 35791 min). |
| | **limit1** integer | | Maximum number of messages allowed. |
| | **limit2** integer | | Maximum number of messages allowed. |
| | **limit3** integer | | Maximum number of messages allowed. |
| | **protocol** string | | Protocol. |
| | **status1** string | **Choices:*** disable
* enable
| Enable/disable status1 detection. |
| | **status2** string | **Choices:*** disable
* enable
| Enable/disable status2 detection. |
| | **status3** string | **Choices:*** disable
* enable
| Enable/disable status3 detection. |
| | **window1** integer | | Window to count messages over (1 - 2880 min). |
| | **window2** integer | | Window to count messages over (1 - 2880 min). |
| | **window3** integer | | Window to count messages over (1 - 2880 min). |
| **mms-profile** string / required | | the parameter (mms-profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Flood configuration.
fmgr_firewall_mmsprofile_flood:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mms-profile: <your own value>
firewall_mmsprofile_flood:
action1:
- log
- archive
- intercept
- block
- archive-first
- alert-notif
action2:
- log
- archive
- intercept
- block
- archive-first
- alert-notif
action3:
- log
- archive
- intercept
- block
- archive-first
- alert-notif
block-time1: <value of integer>
block-time2: <value of integer>
block-time3: <value of integer>
limit1: <value of integer>
limit2: <value of integer>
limit3: <value of integer>
protocol: <value of string>
status1: <value in [disable, enable]>
status2: <value in [disable, enable]>
status3: <value in [disable, enable]>
window1: <value of integer>
window2: <value of integer>
window3: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_imap β Configure IMAP protocol options. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_imap β Configure IMAP protocol options.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_imap`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_imap** dictionary | | the top level parameters set |
| | **inspect-all** string | **Choices:*** disable
* enable
| Enable/disable the inspection of all ports for the protocol. |
| | **options** list / elements=string | **Choices:*** oversize
* fragmail
* no-content-summary
| no description |
| | **oversize-limit** integer | | Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10). |
| | **ports** integer | | no description |
| | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | **scan-bzip2** string | **Choices:*** disable
* enable
| Enable/disable scanning of BZip2 compressed files. |
| | **ssl-offloaded** string | **Choices:*** no
* yes
| SSL decryption and encryption performed by an external device. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of scanning for this protocol. |
| | **uncompressed-nest-limit** integer | | Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12). |
| | **uncompressed-oversize-limit** integer | | Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10). |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IMAP protocol options.
fmgr_firewall_profileprotocoloptions_imap:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_imap:
inspect-all: <value in [disable, enable]>
options:
- oversize
- fragmail
- no-content-summary
oversize-limit: <value of integer>
ports: <value of integer>
scan-bzip2: <value in [disable, enable]>
status: <value in [disable, enable]>
uncompressed-nest-limit: <value of integer>
uncompressed-oversize-limit: <value of integer>
ssl-offloaded: <value in [no, yes]>
proxy-after-tcp-handshake: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_multicastaddress β Configure multicast addresses. fortinet.fortimanager.fmgr\_firewall\_multicastaddress β Configure multicast addresses.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_multicastaddress`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_multicastaddress** dictionary | | the top level parameters set |
| | **associated-interface** string | | Interface associated with the address object. When setting up a policy, only addresses associated with this interface are avai... |
| | **color** integer | | Integer value to determine the color of the icon in the GUI (1 - 32, default = 0, which sets value to 1). |
| | **comment** string | | Comment. |
| | **end-ip** string | | Final IPv4 address (inclusive) in the range for the address. |
| | **name** string | | Multicast address name. |
| | **start-ip** string | | First IPv4 address (inclusive) in the range for the address. |
| | **subnet** string | | Broadcast address and subnet. |
| | **tagging** list / elements=string | | no description |
| | | **category** string | | Tag category. |
| | | **name** string | | Tagging entry name. |
| | | **tags** string | | no description |
| | **type** string | **Choices:*** multicastrange
* broadcastmask
| Type of address object: multicast IP address range or broadcast IP/mask to be treated as a multicast address. |
| | **visibility** string | **Choices:*** disable
* enable
| Enable/disable visibility of the multicast address on the GUI. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure multicast addresses.
fmgr_firewall_multicastaddress:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_multicastaddress:
associated-interface: <value of string>
color: <value of integer>
comment: <value of string>
end-ip: <value of string>
name: <value of string>
start-ip: <value of string>
subnet: <value of string>
tagging:
-
category: <value of string>
name: <value of string>
tags: <value of string>
type: <value in [multicastrange, broadcastmask]>
visibility: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_gtp_iewhitelist_entries β Entries of white list fortinet.fortimanager.fmgr\_gtp\_iewhitelist\_entries β Entries of white list
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_gtp_iewhitelist_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **gtp\_iewhitelist\_entries** dictionary | | the top level parameters set |
| | **id** integer | | Entry ID. |
| | **ie** integer | | IE ID (1 - 255). |
| | **message** integer | | Message ID (1 - 255). |
| **ie-white-list** string / required | | the parameter (ie-white-list) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Entries of white list
fmgr_gtp_iewhitelist_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ie-white-list: <your own value>
state: <value in [present, absent]>
gtp_iewhitelist_entries:
id: <value of integer>
ie: <value of integer>
message: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_config_metafields_firewall_policy β no description fortinet.fortimanager.fmgr\_pm\_config\_metafields\_firewall\_policy β no description
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_metafields_firewall_policy`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pm\_config\_metafields\_firewall\_policy** dictionary | | the top level parameters set |
| | **importance** string | **Choices:*** optional
* required
| no description |
| | **length** integer | | no description |
| | **name** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pm_config_metafields_firewall_policy:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pm_config_metafields_firewall_policy:
importance: <value in [optional, required]>
length: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_waf_subclass β Hidden table for datasource. fortinet.fortimanager.fmgr\_waf\_subclass β Hidden table for datasource.
========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_subclass`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_subclass** dictionary | | the top level parameters set |
| | **id** integer | | Signature subclass ID. |
| | **name** string | | Signature subclass name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Hidden table for datasource.
fmgr_waf_subclass:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
waf_subclass:
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_script β Script table. fortinet.fortimanager.fmgr\_dvmdb\_script β Script table.
=========================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_script`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_script** dictionary | | the top level parameters set |
| | **content** string | | The full content of the script result log. |
| | **desc** string | | no description |
| | **filter\_build** integer | | The value will be ignored in add/set/update requests if filter\_ostype is not set. It has no effect if target is "adom\_database". |
| | **filter\_device** integer | | Name or id of an existing device in the database. It has no effect if target is "adom\_database". |
| | **filter\_hostname** string | | The value has no effect if target is "adom\_database". |
| | **filter\_ostype** string | **Choices:*** **unknown** β
* fos
| The value has no effect if target is "adom\_database". |
| | **filter\_osver** string | **Choices:*** **unknown** β
* 4.00
* 5.00
* 6.00
| The value will be ignored in add/set/update requests if filter\_ostype is not set. It has no effect if target is "adom\_database". |
| | **filter\_platform** string | | The value will be ignored in add/set/update requests if filter\_ostype is not set. It has no effect if target is "adom\_database". |
| | **filter\_serial** string | | The value has no effect if target is "adom\_database". |
| | **modification\_time** string | | It is a read-only attribute indicating the time when the script was created or modified. The value will be ignored in add/set/... |
| | **name** string | | no description |
| | **script\_schedule** list / elements=string | | no description |
| | | **datetime** string | | Indicates the date and time of the schedule. It should follow the following format for each scheduling type: onetime: "YYYY-MM-DD hh:mm:ss" daily: "hh:mm" weekly: "hh:mm" monthly: "DD hh:mm" |
| | | **day\_of\_week** string | **Choices:*** unknown
* **sun** β
* mon
* tue
* wed
* thu
* fri
* sat
| no description |
| | | **device** integer | | Name or id of an existing device in the database. |
| | | **name** string | | no description |
| | | **run\_on\_db** string | **Choices:*** **disable** β
* enable
| Indicates if the scheduled script should be executed on device database. It should always be disable for tcl scripts. |
| | | **type** string | **Choices:*** auto
* onetime
* daily
* weekly
* monthly
| no description |
| | **target** string | **Choices:*** **device\_database** β
* remote\_device
* adom\_database
| no description |
| | **type** string | **Choices:*** cli
* tcl
* cligrp
| no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Script table.
fmgr_dvmdb_script:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dvmdb_script:
content: <value of string>
desc: <value of string>
filter_build: <value of integer>
filter_device: <value of integer>
filter_hostname: <value of string>
filter_ostype: <value in [unknown, fos]>
filter_osver: <value in [unknown, 4.00, 5.00, ...]>
filter_platform: <value of string>
filter_serial: <value of string>
modification_time: <value of string>
name: <value of string>
script_schedule:
-
datetime: <value of string>
day_of_week: <value in [unknown, sun, mon, ...]>
device: <value of integer>
name: <value of string>
run_on_db: <value in [disable, enable]>
type: <value in [auto, onetime, daily, ...]>
target: <value in [device_database, remote_device, adom_database]>
type: <value in [cli, tcl, cligrp]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_emailfilter_bword_entries β Spam filter banned word. fortinet.fortimanager.fmgr\_emailfilter\_bword\_entries β Spam filter banned word.
==================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_bword_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bword** string / required | | the parameter (bword) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_bword\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** spam
* clear
| Mark spam or good. |
| | **id** integer | | Banned word entry ID. |
| | **language** string | **Choices:*** western
* simch
* trach
* japanese
* korean
* french
* thai
* spanish
| Language for the banned word. |
| | **pattern** string | | Pattern for the banned word. |
| | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | **score** integer | | Score value. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **where** string | **Choices:*** all
* subject
* body
| Component of the email to be scanned. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Spam filter banned word.
fmgr_emailfilter_bword_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
bword: <your own value>
state: <value in [present, absent]>
emailfilter_bword_entries:
action: <value in [spam, clear]>
id: <value of integer>
language: <value in [western, simch, trach, ...]>
pattern: <value of string>
pattern-type: <value in [wildcard, regexp]>
score: <value of integer>
status: <value in [disable, enable]>
where: <value in [all, subject, body]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_bwl β Configure anti-spam black/white list. fortinet.fortimanager.fmgr\_spamfilter\_bwl β Configure anti-spam black/white list.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_bwl`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_bwl** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** spam
* clear
* reject
| Reject, mark as spam or good email. |
| | | **addr-type** string | **Choices:*** ipv4
* ipv6
| IP address type. |
| | | **email-pattern** string | | Email address pattern. |
| | | **id** integer | | Entry ID. |
| | | **ip4-subnet** string | | IPv4 network address/subnet mask bits. |
| | | **ip6-subnet** string | | IPv6 network address/subnet mask bits. |
| | | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | | **type** string | **Choices:*** ip
* email
| Entry type. |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure anti-spam black/white list.
fmgr_spamfilter_bwl:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
spamfilter_bwl:
comment: <value of string>
entries:
-
action: <value in [spam, clear, reject]>
addr-type: <value in [ipv4, ipv6]>
email-pattern: <value of string>
id: <value of integer>
ip4-subnet: <value of string>
ip6-subnet: <value of string>
pattern-type: <value in [wildcard, regexp]>
status: <value in [disable, enable]>
type: <value in [ip, email]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_cifs β Configure CIFS protocol options. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_cifs β Configure CIFS protocol options.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_cifs`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_cifs** dictionary | | the top level parameters set |
| | **domain-controller** string | | Domain for which to decrypt CIFS traffic. |
| | **file-filter** dictionary | | no description |
| | | **entries** list / elements=string | | no description |
| | | | **action** string | **Choices:*** log
* block
| Action taken for matched file. |
| | | | **comment** string | | Comment. |
| | | | **direction** string | **Choices:*** any
* incoming
* outgoing
| Match files transmitted in the sessions originating or reply direction. |
| | | | **file-type** string | | no description |
| | | | **filter** string | | Add a file filter. |
| | | | **protocol** list / elements=string | **Choices:*** cifs
| no description |
| | | **log** string | **Choices:*** disable
* enable
| Enable/disable file filter logging. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable file filter. |
| | **options** list / elements=string | **Choices:*** oversize
| no description |
| | **oversize-limit** integer | | Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10). |
| | **ports** integer | | no description |
| | **scan-bzip2** string | **Choices:*** disable
* enable
| Enable/disable scanning of BZip2 compressed files. |
| | **server-credential-type** string | **Choices:*** none
* credential-replication
* credential-keytab
| CIFS server credential type. |
| | **server-keytab** list / elements=string | | no description |
| | | **keytab** string | | Base64 encoded keytab file containing credential of the server. |
| | | **password** string | | no description |
| | | **principal** string | | Service principal. For example, "host/[email protected]". |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of scanning for this protocol. |
| | **tcp-window-maximum** integer | | Maximum dynamic TCP window size (default = 8MB). |
| | **tcp-window-minimum** integer | | Minimum dynamic TCP window size (default = 128KB). |
| | **tcp-window-size** integer | | Set TCP static window size (default = 256KB). |
| | **tcp-window-type** string | **Choices:*** system
* static
* dynamic
| Specify type of TCP window to use for this protocol. |
| | **uncompressed-nest-limit** integer | | Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12). |
| | **uncompressed-oversize-limit** integer | | Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10). |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure CIFS protocol options.
fmgr_firewall_profileprotocoloptions_cifs:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_cifs:
ports: <value of integer>
status: <value in [disable, enable]>
options:
- oversize
oversize-limit: <value of integer>
scan-bzip2: <value in [disable, enable]>
tcp-window-maximum: <value of integer>
tcp-window-minimum: <value of integer>
tcp-window-size: <value of integer>
tcp-window-type: <value in [system, static, dynamic]>
uncompressed-nest-limit: <value of integer>
uncompressed-oversize-limit: <value of integer>
domain-controller: <value of string>
file-filter:
entries:
-
action: <value in [log, block]>
comment: <value of string>
direction: <value in [any, incoming, outgoing]>
file-type: <value of string>
filter: <value of string>
protocol:
- cifs
log: <value in [disable, enable]>
status: <value in [disable, enable]>
server-credential-type: <value in [none, credential-replication, credential-keytab]>
server-keytab:
-
keytab: <value of string>
password: <value of string>
principal: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_accessproxy_serverpubkeyauthsettings_certextension β Configure certificate extension for user certificate. fortinet.fortimanager.fmgr\_firewall\_accessproxy\_serverpubkeyauthsettings\_certextension β Configure certificate extension for user certificate.
==================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_accessproxy_serverpubkeyauthsettings_certextension`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **access-proxy** string / required | | the parameter (access-proxy) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_accessproxy\_serverpubkeyauthsettings\_certextension** dictionary | | the top level parameters set |
| | **critical** string | **Choices:*** no
* yes
| Critical option. |
| | **data** string | | Name of certificate extension. |
| | **name** string | | Name of certificate extension. |
| | **type** string | **Choices:*** fixed
* user
| Type of certificate extension. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure certificate extension for user certificate.
fmgr_firewall_accessproxy_serverpubkeyauthsettings_certextension:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
access-proxy: <your own value>
state: <value in [present, absent]>
firewall_accessproxy_serverpubkeyauthsettings_certextension:
critical: <value in [no, yes]>
data: <value of string>
name: <value of string>
type: <value in [fixed, user]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_spamfilter_iptrust β Configure AntiSpam IP trust. fortinet.fortimanager.fmgr\_spamfilter\_iptrust β Configure AntiSpam IP trust.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_iptrust`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_iptrust** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **addr-type** string | **Choices:*** ipv4
* ipv6
| Type of address. |
| | | **id** integer | | Trusted IP entry ID. |
| | | **ip4-subnet** string | | IPv4 network address or network address/subnet mask bits. |
| | | **ip6-subnet** string | | IPv6 network address/subnet mask bits. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure AntiSpam IP trust.
fmgr_spamfilter_iptrust:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
spamfilter_iptrust:
comment: <value of string>
entries:
-
addr-type: <value in [ipv4, ipv6]>
id: <value of integer>
ip4-subnet: <value of string>
ip6-subnet: <value of string>
status: <value in [disable, enable]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_group_objectmember β Device group table. fortinet.fortimanager.fmgr\_dvmdb\_group\_objectmember β Device group table.
============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_group_objectmember`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_group\_objectmember** dictionary | | the top level parameters set |
| | **name** string | | no description |
| | **vdom** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **group** string / required | | the parameter (group) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Device group table.
fmgr_dvmdb_group_objectmember:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
group: <your own value>
state: <value in [present, absent]>
dvmdb_group_objectmember:
name: <value of string>
vdom: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_peergrp β Configure peer groups. fortinet.fortimanager.fmgr\_user\_peergrp β Configure peer groups.
==================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_peergrp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_peergrp** dictionary | | the top level parameters set |
| | **member** string | | Peer group members. |
| | **name** string | | Peer group name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure peer groups.
fmgr_user_peergrp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
user_peergrp:
member: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_abort β Abort and cancel a security console task. fortinet.fortimanager.fmgr\_securityconsole\_abort β Abort and cancel a security console task.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_abort`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_abort** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Abort and cancel a security console task.
fmgr_securityconsole_abort:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_abort:
adom: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_antivirus_mmschecksum_entries β modify this MMS content checksum list fortinet.fortimanager.fmgr\_antivirus\_mmschecksum\_entries β modify this MMS content checksum list
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_mmschecksum_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_mmschecksum\_entries** dictionary | | the top level parameters set |
| | **checksum** string | | MMS attachment checksum value (CRC32) |
| | **name** string | | entry name, for administrator reference |
| | **status** string | **Choices:*** disable
* enable
| apply this entry during attachment inspection |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **mms-checksum** string / required | | the parameter (mms-checksum) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: modify this MMS content checksum list
fmgr_antivirus_mmschecksum_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mms-checksum: <your own value>
state: <value in [present, absent]>
antivirus_mmschecksum_entries:
checksum: <value of string>
name: <value of string>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_securityconsole_sign_certificate_template β Generate and sign certificate on the target device. fortinet.fortimanager.fmgr\_securityconsole\_sign\_certificate\_template β Generate and sign certificate on the target device.
==============================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_sign_certificate_template`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_sign\_certificate\_template** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| | **scope** list / elements=string | | no description |
| | | **name** string | | no description |
| | | **vdom** string | | no description |
| | **template** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Generate and sign certificate on the target device.
fmgr_securityconsole_sign_certificate_template:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_sign_certificate_template:
adom: <value of string>
scope:
-
name: <value of string>
vdom: <value of string>
template: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_workspace_commit_obj β Commit change fortinet.fortimanager.fmgr\_dvmdb\_workspace\_commit\_obj β Commit change
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workspace_commit_obj`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **object\_url\_name** string / required | | the parameter (object\_url\_name) in requested url |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Commit change
fmgr_dvmdb_workspace_commit_obj:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
object_url_name: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vapgroup β Configure virtual Access Point fortinet.fortimanager.fmgr\_vapgroup β Configure virtual Access Point
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vapgroup`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vapgroup** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **name** string | | Group Name |
| | **vaps** string | | List of SSIDs to be included in the VAP group. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure virtual Access Point
fmgr_vapgroup:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vapgroup:
comment: <value of string>
name: <value of string>
vaps: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_report_group_chartalternative β Chart alternatives. fortinet.fortimanager.fmgr\_system\_report\_group\_chartalternative β Chart alternatives.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_report_group_chartalternative`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **group** string / required | | the parameter (group) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_report\_group\_chartalternative** dictionary | | the top level parameters set |
| | **chart-name** string | | Chart name. |
| | **chart-replace** string | | Chart replacement. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Chart alternatives.
fmgr_system_report_group_chartalternative:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
group: <your own value>
state: <value in [present, absent]>
system_report_group_chartalternative:
chart-name: <value of string>
chart-replace: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_fortishield β Configure FortiGuard - AntiSpam. fortinet.fortimanager.fmgr\_emailfilter\_fortishield β Configure FortiGuard - AntiSpam.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_fortishield`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_fortishield** dictionary | | the top level parameters set |
| | **spam-submit-force** string | **Choices:*** disable
* enable
| Enable/disable force insertion of a new mime entity for the submission text. |
| | **spam-submit-srv** string | | Hostname of the spam submission server. |
| | **spam-submit-txt2htm** string | **Choices:*** disable
* enable
| Enable/disable conversion of text email to HTML email. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiGuard - AntiSpam.
fmgr_emailfilter_fortishield:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
emailfilter_fortishield:
spam-submit-force: <value in [disable, enable]>
spam-submit-srv: <value of string>
spam-submit-txt2htm: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_address6template_subnetsegment_values β Subnet segment values. fortinet.fortimanager.fmgr\_firewall\_address6template\_subnetsegment\_values β Subnet segment values.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_address6template_subnetsegment_values`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **address6-template** string / required | | the parameter (address6-template) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_address6template\_subnetsegment\_values** dictionary | | the top level parameters set |
| | **name** string | | Subnet segment value name. |
| | **value** string | | Subnet segment value. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **subnet-segment** string / required | | the parameter (subnet-segment) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Subnet segment values.
fmgr_firewall_address6template_subnetsegment_values:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
address6-template: <your own value>
subnet-segment: <your own value>
state: <value in [present, absent]>
firewall_address6template_subnetsegment_values:
name: <value of string>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_spam β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_spam β Replacement message table entries.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_spam`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_spam** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_spam:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_spam:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_spamfilter_bword β Configure AntiSpam banned word list. fortinet.fortimanager.fmgr\_spamfilter\_bword β Configure AntiSpam banned word list.
====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_spamfilter_bword`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **spamfilter\_bword** dictionary | | the top level parameters set |
| | **comment** string | | Optional comments. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** spam
* clear
| Mark spam or good. |
| | | **id** integer | | Banned word entry ID. |
| | | **language** string | **Choices:*** western
* simch
* trach
* japanese
* korean
* french
* thai
* spanish
| Language for the banned word. |
| | | **pattern** string | | Pattern for the banned word. |
| | | **pattern-type** string | **Choices:*** wildcard
* regexp
| Wildcard pattern or regular expression. |
| | | **score** integer | | Score value. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable status. |
| | | **where** string | **Choices:*** subject
* body
* all
| Component of the email to be scanned. |
| | **id** integer | | ID. |
| | **name** string | | Name of table. |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure AntiSpam banned word list.
fmgr_spamfilter_bword:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
spamfilter_bword:
comment: <value of string>
entries:
-
action: <value in [spam, clear]>
id: <value of integer>
language: <value in [western, simch, trach, ...]>
pattern: <value of string>
pattern-type: <value in [wildcard, regexp]>
score: <value of integer>
status: <value in [disable, enable]>
where: <value in [subject, body, all]>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_addrgrp β Configure IPv4 address groups. fortinet.fortimanager.fmgr\_firewall\_addrgrp β Configure IPv4 address groups.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_addrgrp`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_addrgrp** dictionary | | the top level parameters set |
| | **\_image-base64** string | | no description |
| | **allow-routing** string | **Choices:*** disable
* enable
| Enable/disable use of this group in the static route configuration. |
| | **category** string | **Choices:*** default
* ztna-ems-tag
* ztna-geo-tag
| Address group category. |
| | **color** integer | | Color of icon on the GUI. |
| | **comment** string | | no description |
| | **dynamic\_mapping** list / elements=string | | no description |
| | | **\_image-base64** string | | no description |
| | | **\_scope** list / elements=string | | no description |
| | | | **name** string | | no description |
| | | | **vdom** string | | no description |
| | | **allow-routing** string | **Choices:*** disable
* enable
| no description |
| | | **category** string | **Choices:*** default
* ztna-ems-tag
* ztna-geo-tag
| Address group category. |
| | | **color** integer | | no description |
| | | **comment** string | | no description |
| | | **exclude** string | **Choices:*** disable
* enable
| no description |
| | | **exclude-member** string | | no description |
| | | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | | **global-object** integer | | no description |
| | | **member** list / elements=string | | no description |
| | | **tags** string | | no description |
| | | **type** string | **Choices:*** default
* array
* folder
| no description |
| | | **uuid** string | | no description |
| | | **visibility** string | **Choices:*** disable
* enable
| no description |
| | **exclude** string | **Choices:*** disable
* enable
| Enable/disable address exclusion. |
| | **exclude-member** string | | Address exclusion member. |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **global-object** integer | | Global Object. |
| | **member** list / elements=string | | no description |
| | **name** string | | Address group name. |
| | **tagging** list / elements=string | | no description |
| | | **category** string | | Tag category. |
| | | **name** string | | Tagging entry name. |
| | | **tags** string | | no description |
| | **type** string | **Choices:*** default
* array
* folder
| Address group type. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **visibility** string | **Choices:*** disable
* enable
| Enable/disable address visibility in the GUI. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv4 address groups.
fmgr_firewall_addrgrp:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_addrgrp:
allow-routing: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
dynamic_mapping:
-
_scope:
-
name: <value of string>
vdom: <value of string>
allow-routing: <value in [disable, enable]>
color: <value of integer>
comment: <value of string>
exclude: <value in [disable, enable]>
exclude-member: <value of string>
member: <value of list>
tags: <value of string>
uuid: <value of string>
visibility: <value in [disable, enable]>
_image-base64: <value of string>
global-object: <value of integer>
type: <value in [default, array, folder]>
fabric-object: <value in [disable, enable]>
category: <value in [default, ztna-ems-tag, ztna-geo-tag]>
member: <value of list>
name: <value of string>
tagging:
-
category: <value of string>
name: <value of string>
tags: <value of string>
uuid: <value of string>
visibility: <value in [disable, enable]>
exclude: <value in [disable, enable]>
exclude-member: <value of string>
_image-base64: <value of string>
global-object: <value of integer>
type: <value in [default, array, folder]>
fabric-object: <value in [disable, enable]>
category: <value in [default, ztna-ems-tag, ztna-geo-tag]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_pkg_firewall_dospolicy6_anomaly β Anomaly name. fortinet.fortimanager.fmgr\_pkg\_firewall\_dospolicy6\_anomaly β Anomaly name.
==============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_dospolicy6_anomaly`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **DoS-policy6** string / required | | the parameter (DoS-policy6) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_dospolicy6\_anomaly** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* block
* proxy
| Action taken when the threshold is reached. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging for this anomaly. |
| | **name** string | | Anomaly name. |
| | **quarantine** string | **Choices:*** none
* attacker
* both
* interface
| Quarantine method. |
| | **quarantine-expiry** string | | Duration of quarantine, from 1 minute to 364 days, 23 hours, and 59 minutes from now. (format: ###d##h##m, default = 5m). Requ... |
| | **quarantine-log** string | **Choices:*** disable
* enable
| Enable/disable quarantine logging. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of this anomaly sensor. |
| | **threshold** integer | | Number of detected instances per minute which triggers action (1 - 2147483647, default = 1000). Note that each anomaly has a d... |
| | **threshold(default)** integer | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Anomaly name.
fmgr_pkg_firewall_dospolicy6_anomaly:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
DoS-policy6: <your own value>
state: <value in [present, absent]>
pkg_firewall_dospolicy6_anomaly:
action: <value in [pass, block, proxy]>
log: <value in [disable, enable]>
name: <value of string>
quarantine: <value in [none, attacker, both, ...]>
quarantine-expiry: <value of string>
quarantine-log: <value in [disable, enable]>
status: <value in [disable, enable]>
threshold: <value of integer>
threshold(default): <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_customurllist β Configure the URL database for rating and filtering. fortinet.fortimanager.fmgr\_fmupdate\_customurllist β Configure the URL database for rating and filtering.
==========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_customurllist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_customurllist** dictionary | | the top level parameters set |
| | **db\_selection** list / elements=string | **Choices:*** both
* custom-url
* fortiguard-db
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure the URL database for rating and filtering.
fmgr_fmupdate_customurllist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_customurllist:
db_selection:
- both
- custom-url
- fortiguard-db
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_mmsprofile_notification β Notification configuration. fortinet.fortimanager.fmgr\_firewall\_mmsprofile\_notification β Notification configuration.
============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_mmsprofile_notification`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_mmsprofile\_notification** dictionary | | the top level parameters set |
| | **alert-int** integer | | Alert notification send interval. |
| | **alert-int-mode** string | **Choices:*** hours
* minutes
| Alert notification interval mode. |
| | **alert-src-msisdn** string | | Specify from address for alert messages. |
| | **alert-status** string | **Choices:*** disable
* enable
| Alert notification status. |
| | **bword-int** integer | | Banned word notification send interval. |
| | **bword-int-mode** string | **Choices:*** hours
* minutes
| Banned word notification interval mode. |
| | **bword-status** string | **Choices:*** disable
* enable
| Banned word notification status. |
| | **carrier-endpoint-bwl-int** integer | | Carrier end point black/white list notification send interval. |
| | **carrier-endpoint-bwl-int-mode** string | **Choices:*** hours
* minutes
| Carrier end point black/white list notification interval mode. |
| | **carrier-endpoint-bwl-status** string | **Choices:*** disable
* enable
| Carrier end point black/white list notification status. |
| | **days-allowed** list / elements=string | **Choices:*** sunday
* monday
* tuesday
* wednesday
* thursday
* friday
* saturday
| no description |
| | **detect-server** string | **Choices:*** disable
* enable
| Enable/disable automatic server address determination. |
| | **dupe-int** integer | | Duplicate notification send interval. |
| | **dupe-int-mode** string | **Choices:*** hours
* minutes
| Duplicate notification interval mode. |
| | **dupe-status** string | **Choices:*** disable
* enable
| Duplicate notification status. |
| | **file-block-int** integer | | File block notification send interval. |
| | **file-block-int-mode** string | **Choices:*** hours
* minutes
| File block notification interval mode. |
| | **file-block-status** string | **Choices:*** disable
* enable
| File block notification status. |
| | **flood-int** integer | | Flood notification send interval. |
| | **flood-int-mode** string | **Choices:*** hours
* minutes
| Flood notification interval mode. |
| | **flood-status** string | **Choices:*** disable
* enable
| Flood notification status. |
| | **from-in-header** string | **Choices:*** disable
* enable
| Enable/disable insertion of from address in HTTP header. |
| | **mms-checksum-int** integer | | MMS checksum notification send interval. |
| | **mms-checksum-int-mode** string | **Choices:*** hours
* minutes
| MMS checksum notification interval mode. |
| | **mms-checksum-status** string | **Choices:*** disable
* enable
| MMS checksum notification status. |
| | **mmsc-hostname** string | | Host name or IP address of the MMSC. |
| | **mmsc-password** string | | no description |
| | **mmsc-port** integer | | Port used on the MMSC for sending MMS messages (1 - 65535). |
| | **mmsc-url** string | | URL used on the MMSC for sending MMS messages. |
| | **mmsc-username** string | | User name required for authentication with the MMSC. |
| | **msg-protocol** string | **Choices:*** mm1
* mm3
* mm4
* mm7
| Protocol to use for sending notification messages. |
| | **msg-type** string | **Choices:*** submit-req
* deliver-req
| MM7 message type. |
| | **protocol** string | | Protocol. |
| | **rate-limit** integer | | Rate limit for sending notification messages (0 - 250). |
| | **tod-window-duration** string | | Time of day window duration. |
| | **tod-window-end** string | | Obsolete. |
| | **tod-window-start** string | | Time of day window start. |
| | **user-domain** string | | Domain name to which the user addresses belong. |
| | **vas-id** string | | VAS identifier. |
| | **vasp-id** string | | VASP identifier. |
| | **virus-int** integer | | Virus notification send interval. |
| | **virus-int-mode** string | **Choices:*** hours
* minutes
| Virus notification interval mode. |
| | **virus-status** string | **Choices:*** disable
* enable
| Virus notification status. |
| **mms-profile** string / required | | the parameter (mms-profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Notification configuration.
fmgr_firewall_mmsprofile_notification:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
mms-profile: <your own value>
firewall_mmsprofile_notification:
alert-int: <value of integer>
alert-int-mode: <value in [hours, minutes]>
alert-src-msisdn: <value of string>
alert-status: <value in [disable, enable]>
bword-int: <value of integer>
bword-int-mode: <value in [hours, minutes]>
bword-status: <value in [disable, enable]>
carrier-endpoint-bwl-int: <value of integer>
carrier-endpoint-bwl-int-mode: <value in [hours, minutes]>
carrier-endpoint-bwl-status: <value in [disable, enable]>
days-allowed:
- sunday
- monday
- tuesday
- wednesday
- thursday
- friday
- saturday
detect-server: <value in [disable, enable]>
dupe-int: <value of integer>
dupe-int-mode: <value in [hours, minutes]>
dupe-status: <value in [disable, enable]>
file-block-int: <value of integer>
file-block-int-mode: <value in [hours, minutes]>
file-block-status: <value in [disable, enable]>
flood-int: <value of integer>
flood-int-mode: <value in [hours, minutes]>
flood-status: <value in [disable, enable]>
from-in-header: <value in [disable, enable]>
mms-checksum-int: <value of integer>
mms-checksum-int-mode: <value in [hours, minutes]>
mms-checksum-status: <value in [disable, enable]>
mmsc-hostname: <value of string>
mmsc-password: <value of string>
mmsc-port: <value of integer>
mmsc-url: <value of string>
mmsc-username: <value of string>
msg-protocol: <value in [mm1, mm3, mm4, ...]>
msg-type: <value in [submit-req, deliver-req]>
protocol: <value of string>
rate-limit: <value of integer>
tod-window-duration: <value of string>
tod-window-end: <value of string>
tod-window-start: <value of string>
user-domain: <value of string>
vas-id: <value of string>
vasp-id: <value of string>
virus-int: <value of integer>
virus-int-mode: <value in [hours, minutes]>
virus-status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_webfilter_profile_antiphish_custompatterns β Custom username and password regex patterns. fortinet.fortimanager.fmgr\_webfilter\_profile\_antiphish\_custompatterns β Custom username and password regex patterns.
========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_profile_antiphish_custompatterns`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_profile\_antiphish\_custompatterns** dictionary | | the top level parameters set |
| | **category** string | **Choices:*** username
* password
| Category that the pattern matches. |
| | **pattern** string | | Target pattern. |
| | **type** string | **Choices:*** regex
* literal
| Pattern will be treated either as a regex pattern or literal string. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Custom username and password regex patterns.
fmgr_webfilter_profile_antiphish_custompatterns:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
webfilter_profile_antiphish_custompatterns:
category: <value in [username, password]>
pattern: <value of string>
type: <value in [regex, literal]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqp3gppcellular β Configure 3GPP public land mobile network fortinet.fortimanager.fmgr\_hotspot20\_anqp3gppcellular β Configure 3GPP public land mobile network
===================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqp3gppcellular`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqp3gppcellular** dictionary | | the top level parameters set |
| | **mcc-mnc-list** list / elements=string | | no description |
| | | **id** integer | | ID. |
| | | **mcc** string | | Mobile country code. |
| | | **mnc** string | | Mobile network code. |
| | **name** string | | 3GPP PLMN name. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure 3GPP public land mobile network
fmgr_hotspot20_anqp3gppcellular:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
hotspot20_anqp3gppcellular:
mcc-mnc-list:
-
id: <value of integer>
mcc: <value of string>
mnc: <value of string>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_template β no description fortinet.fortimanager.fmgr\_template β no description
=====================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_template`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **template** dictionary | | the top level parameters set |
| | **description** string | | no description |
| | **modification-time** string | | no description |
| | **name** string | | no description |
| | **script** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_template:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
template:
description: <value of string>
modification-time: <value of string>
name: <value of string>
script: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_disk_filter β Filter for disk logging. fortinet.fortimanager.fmgr\_system\_locallog\_disk\_filter β Filter for disk logging.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_disk_filter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_disk\_filter** dictionary | | the top level parameters set |
| | **aid** string | **Choices:*** disable
* **enable** β
| Log aid messages. disable - Disable setting. enable - Enable setting. |
| | **devcfg** string | **Choices:*** disable
* **enable** β
| Log device configuration message. disable - Disable setting. enable - Enable setting. |
| | **devops** string | **Choices:*** disable
* **enable** β
| Managered devices operations messages. disable - Disable setting. enable - Enable setting. |
| | **diskquota** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer disk quota messages. disable - Disable setting. enable - Enable setting. |
| | **dm** string | **Choices:*** disable
* **enable** β
| Log deployment manager message. disable - Disable setting. enable - Enable setting. |
| | **docker** string | **Choices:*** disable
* **enable** β
| Docker application generic messages. disable - Disable setting. enable - Enable setting. |
| | **dvm** string | **Choices:*** disable
* **enable** β
| Log device manager messages. disable - Disable setting. enable - Enable setting. |
| | **ediscovery** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer ediscovery messages. disable - Disable setting. enable - Enable setting. |
| | **epmgr** string | **Choices:*** disable
* **enable** β
| Log endpoint manager message. disable - Disable setting. enable - Enable setting. |
| | **event** string | **Choices:*** disable
* **enable** β
| Log event messages. disable - Disable setting. enable - Enable setting. |
| | **eventmgmt** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer event handler messages. disable - Disable setting. enable - Enable setting. |
| | **faz** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer messages. disable - Disable setting. enable - Enable setting. |
| | **fazha** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer HA messages. disable - Disable setting. enable - Enable setting. |
| | **fazsys** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer system messages. disable - Disable setting. enable - Enable setting. |
| | **fgd** string | **Choices:*** disable
* **enable** β
| Log FortiGuard service message. disable - Disable setting. enable - Enable setting. |
| | **fgfm** string | **Choices:*** disable
* **enable** β
| Log FGFM protocol message. disable - Disable setting. enable - Enable setting. |
| | **fips** string | **Choices:*** disable
* **enable** β
| Whether to log fips messages. disable - Disable setting. enable - Enable setting. |
| | **fmgws** string | **Choices:*** disable
* **enable** β
| Log web service messages. disable - Disable setting. enable - Enable setting. |
| | **fmlmgr** string | **Choices:*** disable
* **enable** β
| Log FortiMail manager message. disable - Disable setting. enable - Enable setting. |
| | **fmwmgr** string | **Choices:*** disable
* **enable** β
| Log firmware manager message. disable - Disable setting. enable - Enable setting. |
| | **fortiview** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer FortiView messages. disable - Disable setting. enable - Enable setting. |
| | **glbcfg** string | **Choices:*** disable
* **enable** β
| Log global database message. disable - Disable setting. enable - Enable setting. |
| | **ha** string | **Choices:*** disable
* **enable** β
| Log HA message. disable - Disable setting. enable - Enable setting. |
| | **hcache** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer hcache messages. disable - Disable setting. enable - Enable setting. |
| | **incident** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer incident messages. disable - Disable setting. enable - Enable setting. |
| | **iolog** string | **Choices:*** disable
* **enable** β
| Log debug IO log message. disable - Disable setting. enable - Enable setting. |
| | **logd** string | **Choices:*** disable
* **enable** β
| Log the status of log daemon. disable - Disable setting. enable - Enable setting. |
| | **logdb** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log DB messages. disable - Disable setting. enable - Enable setting. |
| | **logdev** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log device messages. disable - Disable setting. enable - Enable setting. |
| | **logfile** string | **Choices:*** enable
* disable
| Log Fortianalyzer log file messages. enable - Enable setting. disable - Disable setting. |
| | **logging** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer logging messages. disable - Disable setting. enable - Enable setting. |
| | **lrmgr** string | **Choices:*** disable
* **enable** β
| Log log and report manager message. disable - Disable setting. enable - Enable setting. |
| | **objcfg** string | **Choices:*** disable
* **enable** β
| Log object configuration change message. disable - Disable setting. enable - Enable setting. |
| | **report** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer report messages. disable - Disable setting. enable - Enable setting. |
| | **rev** string | **Choices:*** disable
* **enable** β
| Log revision history message. disable - Disable setting. enable - Enable setting. |
| | **rtmon** string | **Choices:*** disable
* **enable** β
| Log real-time monitor message. disable - Disable setting. enable - Enable setting. |
| | **scfw** string | **Choices:*** disable
* **enable** β
| Log firewall objects message. disable - Disable setting. enable - Enable setting. |
| | **scply** string | **Choices:*** disable
* **enable** β
| Log policy console message. disable - Disable setting. enable - Enable setting. |
| | **scrmgr** string | **Choices:*** disable
* **enable** β
| Log script manager message. disable - Disable setting. enable - Enable setting. |
| | **scvpn** string | **Choices:*** disable
* **enable** β
| Log VPN console message. disable - Disable setting. enable - Enable setting. |
| | **system** string | **Choices:*** disable
* **enable** β
| Log system manager message. disable - Disable setting. enable - Enable setting. |
| | **webport** string | **Choices:*** disable
* **enable** β
| Log web portal message. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Filter for disk logging.
fmgr_system_locallog_disk_filter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_disk_filter:
devcfg: <value in [disable, enable]>
devops: <value in [disable, enable]>
diskquota: <value in [disable, enable]>
dm: <value in [disable, enable]>
dvm: <value in [disable, enable]>
ediscovery: <value in [disable, enable]>
epmgr: <value in [disable, enable]>
event: <value in [disable, enable]>
eventmgmt: <value in [disable, enable]>
faz: <value in [disable, enable]>
fazha: <value in [disable, enable]>
fazsys: <value in [disable, enable]>
fgd: <value in [disable, enable]>
fgfm: <value in [disable, enable]>
fips: <value in [disable, enable]>
fmgws: <value in [disable, enable]>
fmlmgr: <value in [disable, enable]>
fmwmgr: <value in [disable, enable]>
fortiview: <value in [disable, enable]>
glbcfg: <value in [disable, enable]>
ha: <value in [disable, enable]>
hcache: <value in [disable, enable]>
iolog: <value in [disable, enable]>
logd: <value in [disable, enable]>
logdb: <value in [disable, enable]>
logdev: <value in [disable, enable]>
logfile: <value in [enable, disable]>
logging: <value in [disable, enable]>
lrmgr: <value in [disable, enable]>
objcfg: <value in [disable, enable]>
report: <value in [disable, enable]>
rev: <value in [disable, enable]>
rtmon: <value in [disable, enable]>
scfw: <value in [disable, enable]>
scply: <value in [disable, enable]>
scrmgr: <value in [disable, enable]>
scvpn: <value in [disable, enable]>
system: <value in [disable, enable]>
webport: <value in [disable, enable]>
incident: <value in [disable, enable]>
aid: <value in [disable, enable]>
docker: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_vpn_ssl_settings_authenticationrule β Authentication rule for SSL VPN. fortinet.fortimanager.fmgr\_vpn\_ssl\_settings\_authenticationrule β Authentication rule for SSL VPN.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpn_ssl_settings_authenticationrule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **device** string / required | | the parameter (device) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vdom** string / required | | the parameter (vdom) in requested url |
| **vpn\_ssl\_settings\_authenticationrule** dictionary | | the top level parameters set |
| | **auth** string | **Choices:*** any
* local
* radius
* ldap
* tacacs+
| SSL VPN authentication method restriction. |
| | **cipher** string | **Choices:*** any
* high
* medium
| SSL VPN cipher strength. |
| | **client-cert** string | **Choices:*** disable
* enable
| Enable/disable SSL VPN client certificate restrictive. |
| | **groups** string | | User groups. |
| | **id** integer | | ID (0 - 4294967295). |
| | **portal** string | | SSL VPN portal. |
| | **realm** string | | SSL VPN realm. |
| | **source-address** string | | Source address of incoming traffic. |
| | **source-address-negate** string | **Choices:*** disable
* enable
| Enable/disable negated source address match. |
| | **source-address6** string | | IPv6 source address of incoming traffic. |
| | **source-address6-negate** string | **Choices:*** disable
* enable
| Enable/disable negated source IPv6 address match. |
| | **source-interface** string | | SSL VPN source interface of incoming traffic. |
| | **user-peer** string | | Name of user peer. |
| | **users** string | | User name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Authentication rule for SSL VPN.
fmgr_vpn_ssl_settings_authenticationrule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
device: <your own value>
vdom: <your own value>
state: <value in [present, absent]>
vpn_ssl_settings_authenticationrule:
auth: <value in [any, local, radius, ...]>
cipher: <value in [any, high, medium]>
client-cert: <value in [disable, enable]>
groups: <value of string>
id: <value of integer>
portal: <value of string>
realm: <value of string>
source-address: <value of string>
source-address-negate: <value in [disable, enable]>
source-address6: <value of string>
source-address6-negate: <value in [disable, enable]>
source-interface: <value of string>
user-peer: <value of string>
users: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_videofilter_youtubechannelfilter β Configure YouTube channel filter. fortinet.fortimanager.fmgr\_videofilter\_youtubechannelfilter β Configure YouTube channel filter.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_videofilter_youtubechannelfilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **videofilter\_youtubechannelfilter** dictionary | | the top level parameters set |
| | **comment** string | | Comment. |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** block
* bypass
* monitor
| YouTube channel filter action. |
| | | **channel-id** string | | Channel ID. |
| | | **comment** string | | Comment. |
| | | **id** integer | | ID. |
| | **id** integer | | ID. |
| | **name** string | | Name. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure YouTube channel filter.
fmgr_videofilter_youtubechannelfilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
videofilter_youtubechannelfilter:
comment: <value of string>
entries:
-
action: <value in [block, bypass, monitor]>
channel-id: <value of string>
comment: <value of string>
id: <value of integer>
id: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_locallog_fortianalyzer3_filter β Filter for FortiAnalyzer3 logging. fortinet.fortimanager.fmgr\_system\_locallog\_fortianalyzer3\_filter β Filter for FortiAnalyzer3 logging.
=========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_locallog_fortianalyzer3_filter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_locallog\_fortianalyzer3\_filter** dictionary | | the top level parameters set |
| | **aid** string | **Choices:*** disable
* **enable** β
| Log aid messages. disable - Disable setting. enable - Enable setting. |
| | **devcfg** string | **Choices:*** disable
* **enable** β
| Log device configuration message. disable - Disable setting. enable - Enable setting. |
| | **devops** string | **Choices:*** disable
* **enable** β
| Managered devices operations messages. disable - Disable setting. enable - Enable setting. |
| | **diskquota** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer disk quota messages. disable - Disable setting. enable - Enable setting. |
| | **dm** string | **Choices:*** disable
* **enable** β
| Log deployment manager message. disable - Disable setting. enable - Enable setting. |
| | **docker** string | **Choices:*** disable
* **enable** β
| Docker application generic messages. disable - Disable setting. enable - Enable setting. |
| | **dvm** string | **Choices:*** disable
* **enable** β
| Log device manager messages. disable - Disable setting. enable - Enable setting. |
| | **ediscovery** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer ediscovery messages. disable - Disable setting. enable - Enable setting. |
| | **epmgr** string | **Choices:*** disable
* **enable** β
| Log endpoint manager message. disable - Disable setting. enable - Enable setting. |
| | **event** string | **Choices:*** disable
* **enable** β
| Log event messages. disable - Disable setting. enable - Enable setting. |
| | **eventmgmt** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer event handler messages. disable - Disable setting. enable - Enable setting. |
| | **faz** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer messages. disable - Disable setting. enable - Enable setting. |
| | **fazha** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer HA messages. disable - Disable setting. enable - Enable setting. |
| | **fazsys** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer system messages. disable - Disable setting. enable - Enable setting. |
| | **fgd** string | **Choices:*** disable
* **enable** β
| Log FortiGuard service message. disable - Disable setting. enable - Enable setting. |
| | **fgfm** string | **Choices:*** disable
* **enable** β
| Log FGFM protocol message. disable - Disable setting. enable - Enable setting. |
| | **fips** string | **Choices:*** disable
* **enable** β
| Whether to log fips messages. disable - Disable setting. enable - Enable setting. |
| | **fmgws** string | **Choices:*** disable
* **enable** β
| Log web service messages. disable - Disable setting. enable - Enable setting. |
| | **fmlmgr** string | **Choices:*** disable
* **enable** β
| Log FortiMail manager message. disable - Disable setting. enable - Enable setting. |
| | **fmwmgr** string | **Choices:*** disable
* **enable** β
| Log firmware manager message. disable - Disable setting. enable - Enable setting. |
| | **fortiview** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer FortiView messages. disable - Disable setting. enable - Enable setting. |
| | **glbcfg** string | **Choices:*** disable
* **enable** β
| Log global database message. disable - Disable setting. enable - Enable setting. |
| | **ha** string | **Choices:*** disable
* **enable** β
| Log HA message. disable - Disable setting. enable - Enable setting. |
| | **hcache** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer hcache messages. disable - Disable setting. enable - Enable setting. |
| | **incident** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer incident messages. disable - Disable setting. enable - Enable setting. |
| | **iolog** string | **Choices:*** disable
* **enable** β
| Log debug IO log message. disable - Disable setting. enable - Enable setting. |
| | **logd** string | **Choices:*** disable
* **enable** β
| Log the status of log daemon. disable - Disable setting. enable - Enable setting. |
| | **logdb** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log DB messages. disable - Disable setting. enable - Enable setting. |
| | **logdev** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer log device messages. disable - Disable setting. enable - Enable setting. |
| | **logfile** string | **Choices:*** enable
* disable
| Log Fortianalyzer log file messages. enable - Enable setting. disable - Disable setting. |
| | **logging** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer logging messages. disable - Disable setting. enable - Enable setting. |
| | **lrmgr** string | **Choices:*** disable
* **enable** β
| Log log and report manager message. disable - Disable setting. enable - Enable setting. |
| | **objcfg** string | **Choices:*** disable
* **enable** β
| Log object configuration change message. disable - Disable setting. enable - Enable setting. |
| | **report** string | **Choices:*** disable
* **enable** β
| Log Fortianalyzer report messages. disable - Disable setting. enable - Enable setting. |
| | **rev** string | **Choices:*** disable
* **enable** β
| Log revision history message. disable - Disable setting. enable - Enable setting. |
| | **rtmon** string | **Choices:*** disable
* **enable** β
| Log real-time monitor message. disable - Disable setting. enable - Enable setting. |
| | **scfw** string | **Choices:*** disable
* **enable** β
| Log firewall objects message. disable - Disable setting. enable - Enable setting. |
| | **scply** string | **Choices:*** disable
* **enable** β
| Log policy console message. disable - Disable setting. enable - Enable setting. |
| | **scrmgr** string | **Choices:*** disable
* **enable** β
| Log script manager message. disable - Disable setting. enable - Enable setting. |
| | **scvpn** string | **Choices:*** disable
* **enable** β
| Log VPN console message. disable - Disable setting. enable - Enable setting. |
| | **system** string | **Choices:*** disable
* **enable** β
| Log system manager message. disable - Disable setting. enable - Enable setting. |
| | **webport** string | **Choices:*** disable
* **enable** β
| Log web portal message. disable - Disable setting. enable - Enable setting. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Filter for FortiAnalyzer3 logging.
fmgr_system_locallog_fortianalyzer3_filter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_locallog_fortianalyzer3_filter:
devcfg: <value in [disable, enable]>
devops: <value in [disable, enable]>
diskquota: <value in [disable, enable]>
dm: <value in [disable, enable]>
dvm: <value in [disable, enable]>
ediscovery: <value in [disable, enable]>
epmgr: <value in [disable, enable]>
event: <value in [disable, enable]>
eventmgmt: <value in [disable, enable]>
faz: <value in [disable, enable]>
fazha: <value in [disable, enable]>
fazsys: <value in [disable, enable]>
fgd: <value in [disable, enable]>
fgfm: <value in [disable, enable]>
fips: <value in [disable, enable]>
fmgws: <value in [disable, enable]>
fmlmgr: <value in [disable, enable]>
fmwmgr: <value in [disable, enable]>
fortiview: <value in [disable, enable]>
glbcfg: <value in [disable, enable]>
ha: <value in [disable, enable]>
hcache: <value in [disable, enable]>
iolog: <value in [disable, enable]>
logd: <value in [disable, enable]>
logdb: <value in [disable, enable]>
logdev: <value in [disable, enable]>
logfile: <value in [enable, disable]>
logging: <value in [disable, enable]>
lrmgr: <value in [disable, enable]>
objcfg: <value in [disable, enable]>
report: <value in [disable, enable]>
rev: <value in [disable, enable]>
rtmon: <value in [disable, enable]>
scfw: <value in [disable, enable]>
scply: <value in [disable, enable]>
scrmgr: <value in [disable, enable]>
scvpn: <value in [disable, enable]>
system: <value in [disable, enable]>
webport: <value in [disable, enable]>
incident: <value in [disable, enable]>
aid: <value in [disable, enable]>
docker: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_imaps β Configure IMAPS options. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_imaps β Configure IMAPS options.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_imaps`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_imaps** dictionary | | the top level parameters set |
| | **allow-invalid-server-cert** string | **Choices:*** disable
* enable
| When enabled, allows SSL sessions whose server certificate validation failed. |
| | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | **client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request. |
| | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | **invalid-server-cert** string | **Choices:*** allow
* block
| Allow or block the invalid SSL session server certificate. |
| | **ports** integer | | no description |
| | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | **unsupported-ssl** string | **Choices:*** bypass
* inspect
* block
| Action based on the SSL encryption used being unsupported. |
| | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | **untrusted-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IMAPS options.
fmgr_firewall_sslsshprofile_imaps:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
firewall_sslsshprofile_imaps:
allow-invalid-server-cert: <value in [disable, enable]>
client-cert-request: <value in [bypass, inspect, block]>
ports: <value of integer>
status: <value in [disable, deep-inspection]>
unsupported-ssl: <value in [bypass, inspect, block]>
untrusted-cert: <value in [allow, block, ignore]>
invalid-server-cert: <value in [allow, block]>
sni-server-cert-check: <value in [disable, enable, strict]>
untrusted-server-cert: <value in [allow, block, ignore]>
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_schedule_recurring β Recurring schedule configuration. fortinet.fortimanager.fmgr\_firewall\_schedule\_recurring β Recurring schedule configuration.
=============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_schedule_recurring`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_schedule\_recurring** dictionary | | the top level parameters set |
| | **color** integer | | Color of icon on the GUI. |
| | **day** list / elements=string | **Choices:*** sunday
* monday
* tuesday
* wednesday
* thursday
* friday
* saturday
* none
| no description |
| | **end** string | | Time of day to end the schedule, format hh:mm. |
| | **fabric-object** string | **Choices:*** disable
* enable
| Security Fabric global object setting. |
| | **global-object** integer | | Global Object. |
| | **name** string | | Recurring schedule name. |
| | **start** string | | Time of day to start the schedule, format hh:mm. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Recurring schedule configuration.
fmgr_firewall_schedule_recurring:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_schedule_recurring:
color: <value of integer>
day:
- sunday
- monday
- tuesday
- wednesday
- thursday
- friday
- saturday
- none
end: <value of string>
name: <value of string>
start: <value of string>
global-object: <value of integer>
fabric-object: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_wildcardfqdn_custom β Config global/VDOM Wildcard FQDN address. fortinet.fortimanager.fmgr\_firewall\_wildcardfqdn\_custom β Config global/VDOM Wildcard FQDN address.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_wildcardfqdn_custom`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_wildcardfqdn\_custom** dictionary | | the top level parameters set |
| | **color** integer | | GUI icon color. |
| | **comment** string | | Comment. |
| | **name** string | | Address name. |
| | **uuid** string | | Universally Unique Identifier (UUID; automatically assigned but can be manually reset). |
| | **visibility** string | **Choices:*** disable
* enable
| Enable/disable address visibility. |
| | **wildcard-fqdn** string | | Wildcard FQDN. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Config global/VDOM Wildcard FQDN address.
fmgr_firewall_wildcardfqdn_custom:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_wildcardfqdn_custom:
color: <value of integer>
comment: <value of string>
name: <value of string>
uuid: <value of string>
visibility: <value in [disable, enable]>
wildcard-fqdn: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_ips_sensor_entries β IPS sensor filter. fortinet.fortimanager.fmgr\_ips\_sensor\_entries β IPS sensor filter.
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_ips_sensor_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **ips\_sensor\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** pass
* block
* reset
* default
| Action taken with traffic in which signatures are detected. |
| | **application** string | | no description |
| | **cve** string | | no description |
| | **exempt-ip** list / elements=string | | no description |
| | | **dst-ip** string | | Destination IP address and netmask. |
| | | **id** integer | | Exempt IP ID. |
| | | **src-ip** string | | Source IP address and netmask. |
| | **id** integer | | Rule ID in IPS database (0 - 4294967295). |
| | **location** string | | no description |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging of signatures included in filter. |
| | **log-attack-context** string | **Choices:*** disable
* enable
| Enable/disable logging of attack context: URL buffer, header buffer, body buffer, packet buffer. |
| | **log-packet** string | **Choices:*** disable
* enable
| Enable/disable packet logging. Enable to save the packet that triggers the filter. You can download the packets in pcap format... |
| | **os** string | | no description |
| | **protocol** string | | no description |
| | **quarantine** string | **Choices:*** none
* attacker
* both
* interface
| Quarantine method. |
| | **quarantine-expiry** string | | Duration of quarantine. (Format ###d##h##m, minimum 1m, maximum 364d23h59m, default = 5m). Requires quarantine set to attacker. |
| | **quarantine-log** string | **Choices:*** disable
* enable
| Enable/disable quarantine logging. |
| | **rate-count** integer | | Count of the rate. |
| | **rate-duration** integer | | Duration (sec) of the rate. |
| | **rate-mode** string | **Choices:*** periodical
* continuous
| Rate limit mode. |
| | **rate-track** string | **Choices:*** none
* src-ip
* dest-ip
* dhcp-client-mac
* dns-domain
| Track the packet protocol field. |
| | **rule** string | | Identifies the predefined or custom IPS signatures to add to the sensor. |
| | **severity** string | | no description |
| | **status** string | **Choices:*** disable
* enable
* default
| Status of the signatures included in filter. default enables the filter and only use filters with default status of enable. Fi... |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sensor** string / required | | the parameter (sensor) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IPS sensor filter.
fmgr_ips_sensor_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
sensor: <your own value>
state: <value in [present, absent]>
ips_sensor_entries:
action: <value in [pass, block, reset, ...]>
application: <value of string>
exempt-ip:
-
dst-ip: <value of string>
id: <value of integer>
src-ip: <value of string>
id: <value of integer>
location: <value of string>
log: <value in [disable, enable]>
log-attack-context: <value in [disable, enable]>
log-packet: <value in [disable, enable]>
os: <value of string>
protocol: <value of string>
quarantine: <value in [none, attacker, both, ...]>
quarantine-expiry: <value of string>
quarantine-log: <value in [disable, enable]>
rate-count: <value of integer>
rate-duration: <value of integer>
rate-mode: <value in [periodical, continuous]>
rate-track: <value in [none, src-ip, dest-ip, ...]>
rule: <value of string>
severity: <value of string>
status: <value in [disable, enable, default]>
cve: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_sslexempt β Servers to exempt from SSL inspection. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_sslexempt β Servers to exempt from SSL inspection.
=======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_sslexempt`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_sslexempt** dictionary | | the top level parameters set |
| | **address** string | | IPv4 address object. |
| | **address6** string | | IPv6 address object. |
| | **fortiguard-category** string | | FortiGuard category ID. |
| | **id** integer | | ID number. |
| | **regex** string | | Exempt servers by regular expression. |
| | **type** string | **Choices:*** fortiguard-category
* address
* address6
* wildcard-fqdn
* regex
| Type of address object (IPv4 or IPv6) or FortiGuard category. |
| | **wildcard-fqdn** string | | Exempt servers by wildcard FQDN. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Servers to exempt from SSL inspection.
fmgr_firewall_sslsshprofile_sslexempt:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
state: <value in [present, absent]>
firewall_sslsshprofile_sslexempt:
address: <value of string>
address6: <value of string>
fortiguard-category: <value of string>
id: <value of integer>
regex: <value of string>
type: <value in [fortiguard-category, address, address6, ...]>
wildcard-fqdn: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vap_macfilterlist β Create a list of MAC addresses for MAC address filtering. fortinet.fortimanager.fmgr\_vap\_macfilterlist β Create a list of MAC addresses for MAC address filtering.
==========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vap_macfilterlist`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vap** string / required | | the parameter (vap) in requested url |
| **vap\_macfilterlist** dictionary | | the top level parameters set |
| | **id** integer | | ID. |
| | **mac** string | | MAC address. |
| | **mac-filter-policy** string | **Choices:*** deny
* allow
| Deny or allow the client with this MAC address. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Create a list of MAC addresses for MAC address filtering.
fmgr_vap_macfilterlist:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vap: <your own value>
state: <value in [present, absent]>
vap_macfilterlist:
id: <value of integer>
mac: <value of string>
mac-filter-policy: <value in [deny, allow]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_snmp_community_hosts6 β Configure IPv6 SNMP managers. fortinet.fortimanager.fmgr\_devprof\_system\_snmp\_community\_hosts6 β Configure IPv6 SNMP managers.
====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_snmp_community_hosts6`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **community** string / required | | the parameter (community) in requested url |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_snmp\_community\_hosts6** dictionary | | the top level parameters set |
| | **ha-direct** string | **Choices:*** disable
* enable
| Enable/disable direct management of HA cluster members. |
| | **host-type** string | **Choices:*** any
* query
* trap
| Control whether the SNMP manager sends SNMP queries, receives SNMP traps, or both. |
| | **id** integer | | Host6 entry ID. |
| | **ipv6** string | | SNMP manager IPv6 address prefix. |
| | **source-ipv6** string | | Source IPv6 address for SNMP traps. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 SNMP managers.
fmgr_devprof_system_snmp_community_hosts6:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
community: <your own value>
state: <value in [present, absent]>
devprof_system_snmp_community_hosts6:
ha-direct: <value in [disable, enable]>
host-type: <value in [any, query, trap]>
id: <value of integer>
ipv6: <value of string>
source-ipv6: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_mapi β Configure MAPI protocol options. fortinet.fortimanager.fmgr\_firewall\_profileprotocoloptions\_mapi β Configure MAPI protocol options.
=====================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_profileprotocoloptions_mapi`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_profileprotocoloptions\_mapi** dictionary | | the top level parameters set |
| | **options** list / elements=string | **Choices:*** fragmail
* oversize
* no-content-summary
| no description |
| | **oversize-limit** integer | | Maximum in-memory file size that can be scanned (1 - 383 MB, default = 10). |
| | **ports** integer | | no description |
| | **scan-bzip2** string | **Choices:*** disable
* enable
| Enable/disable scanning of BZip2 compressed files. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable the active status of scanning for this protocol. |
| | **uncompressed-nest-limit** integer | | Maximum nested levels of compression that can be uncompressed and scanned (2 - 100, default = 12). |
| | **uncompressed-oversize-limit** integer | | Maximum in-memory uncompressed file size that can be scanned (0 - 383 MB, 0 = unlimited, default = 10). |
| **profile-protocol-options** string / required | | the parameter (profile-protocol-options) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure MAPI protocol options.
fmgr_firewall_profileprotocoloptions_mapi:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile-protocol-options: <your own value>
firewall_profileprotocoloptions_mapi:
options:
- fragmail
- oversize
- no-content-summary
oversize-limit: <value of integer>
ports: <value of integer>
scan-bzip2: <value in [disable, enable]>
status: <value in [disable, enable]>
uncompressed-nest-limit: <value of integer>
uncompressed-oversize-limit: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_fortiguard β Configure FortiGuard services. fortinet.fortimanager.fmgr\_system\_fortiguard β Configure FortiGuard services.
===============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_fortiguard`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_fortiguard** dictionary | | the top level parameters set |
| | **antispam-cache** string | **Choices:*** disable
* enable
| Enable/disable FortiGuard antispam request caching. Uses a small amount of memory but improves performance. |
| | **antispam-cache-mpercent** integer | | Maximum percent of FortiGate memory the antispam cache is allowed to use (1 - 15%). |
| | **antispam-cache-ttl** integer | | Time-to-live for antispam cache entries in seconds (300 - 86400). Lower times reduce the cache size. Higher times may improve ... |
| | **antispam-expiration** integer | | no description |
| | **antispam-force-off** string | **Choices:*** disable
* enable
| Enable/disable turning off the FortiGuard antispam service. |
| | **antispam-license** integer | | no description |
| | **antispam-timeout** integer | | Antispam query time out (1 - 30 sec, default = 7). |
| | **anycast-sdns-server-ip** string | | IP address of the FortiGuard anycast DNS rating server. |
| | **anycast-sdns-server-port** integer | | Port to connect to on the FortiGuard anycast DNS rating server. |
| | **auto-join-forticloud** string | **Choices:*** disable
* enable
| Automatically connect to and login to FortiCloud. |
| | **ddns-server-ip** string | | IP address of the FortiDDNS server. |
| | **ddns-server-port** integer | | Port used to communicate with FortiDDNS servers. |
| | **fortiguard-anycast** string | **Choices:*** disable
* enable
| Enable/disable use of FortiGuards anycast network. |
| | **fortiguard-anycast-source** string | **Choices:*** fortinet
* aws
* debug
| Configure which of Fortinets servers to provide FortiGuard services in FortiGuards anycast network. Default is Fortinet. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **load-balance-servers** integer | | Number of servers to alternate between as first FortiGuard option. |
| | **outbreak-prevention-cache** string | **Choices:*** disable
* enable
| Enable/disable FortiGuard Virus Outbreak Prevention cache. |
| | **outbreak-prevention-cache-mpercent** integer | | Maximum percent of memory FortiGuard Virus Outbreak Prevention cache can use (1 - 15%, default = 2). |
| | **outbreak-prevention-cache-ttl** integer | | Time-to-live for FortiGuard Virus Outbreak Prevention cache entries (300 - 86400 sec, default = 300). |
| | **outbreak-prevention-expiration** integer | | no description |
| | **outbreak-prevention-force-off** string | **Choices:*** disable
* enable
| Turn off FortiGuard Virus Outbreak Prevention service. |
| | **outbreak-prevention-license** integer | | no description |
| | **outbreak-prevention-timeout** integer | | FortiGuard Virus Outbreak Prevention time out (1 - 30 sec, default = 7). |
| | **persistent-connection** string | **Choices:*** disable
* enable
| Enable/disable use of persistent connection to receive update notification from FortiGuard. |
| | **port** string | **Choices:*** 53
* 80
* 8888
* 443
| Port used to communicate with the FortiGuard servers. |
| | **protocol** string | **Choices:*** udp
* http
* https
| Protocol used to communicate with the FortiGuard servers. |
| | **proxy-password** string | | no description |
| | **proxy-server-ip** string | | IP address of the proxy server. |
| | **proxy-server-port** integer | | Port used to communicate with the proxy server. |
| | **proxy-username** string | | Proxy user name. |
| | **sandbox-region** string | | Cloud sandbox region. |
| | **sdns-options** list / elements=string | **Choices:*** include-question-section
| no description |
| | **sdns-server-ip** string | | no description |
| | **sdns-server-port** integer | | Port used to communicate with FortiDNS servers. |
| | **service-account-id** string | | Service account ID. |
| | **source-ip** string | | Source IPv4 address used to communicate with FortiGuard. |
| | **source-ip6** string | | Source IPv6 address used to communicate with FortiGuard. |
| | **update-build-proxy** string | **Choices:*** disable
* enable
| Enable/disable proxy dictionary rebuild. |
| | **update-extdb** string | **Choices:*** disable
* enable
| Enable/disable external resource update. |
| | **update-ffdb** string | **Choices:*** disable
* enable
| Enable/disable Internet Service Database update. |
| | **update-server-location** string | **Choices:*** any
* usa
| Signature update server location. |
| | **update-uwdb** string | **Choices:*** disable
* enable
| Enable/disable allowlist update. |
| | **videofilter-expiration** integer | | no description |
| | **videofilter-license** integer | | no description |
| | **webfilter-cache** string | **Choices:*** disable
* enable
| Enable/disable FortiGuard web filter caching. |
| | **webfilter-cache-ttl** integer | | Time-to-live for web filter cache entries in seconds (300 - 86400). |
| | **webfilter-expiration** integer | | no description |
| | **webfilter-force-off** string | **Choices:*** disable
* enable
| Enable/disable turning off the FortiGuard web filtering service. |
| | **webfilter-license** integer | | no description |
| | **webfilter-timeout** integer | | Web filter query time out (1 - 30 sec, default = 7). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiGuard services.
fmgr_system_fortiguard:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
system_fortiguard:
antispam-cache: <value in [disable, enable]>
antispam-cache-mpercent: <value of integer>
antispam-cache-ttl: <value of integer>
antispam-expiration: <value of integer>
antispam-force-off: <value in [disable, enable]>
antispam-license: <value of integer>
antispam-timeout: <value of integer>
auto-join-forticloud: <value in [disable, enable]>
ddns-server-ip: <value of string>
ddns-server-port: <value of integer>
load-balance-servers: <value of integer>
outbreak-prevention-cache: <value in [disable, enable]>
outbreak-prevention-cache-mpercent: <value of integer>
outbreak-prevention-cache-ttl: <value of integer>
outbreak-prevention-expiration: <value of integer>
outbreak-prevention-force-off: <value in [disable, enable]>
outbreak-prevention-license: <value of integer>
outbreak-prevention-timeout: <value of integer>
port: <value in [53, 80, 8888, ...]>
sdns-server-ip: <value of string>
sdns-server-port: <value of integer>
service-account-id: <value of string>
source-ip: <value of string>
source-ip6: <value of string>
update-server-location: <value in [any, usa]>
webfilter-cache: <value in [disable, enable]>
webfilter-cache-ttl: <value of integer>
webfilter-expiration: <value of integer>
webfilter-force-off: <value in [disable, enable]>
webfilter-license: <value of integer>
webfilter-timeout: <value of integer>
protocol: <value in [udp, http, https]>
proxy-password: <value of string>
proxy-server-ip: <value of string>
proxy-server-port: <value of integer>
proxy-username: <value of string>
sandbox-region: <value of string>
fortiguard-anycast: <value in [disable, enable]>
fortiguard-anycast-source: <value in [fortinet, aws, debug]>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
sdns-options:
- include-question-section
anycast-sdns-server-ip: <value of string>
anycast-sdns-server-port: <value of integer>
persistent-connection: <value in [disable, enable]>
update-build-proxy: <value in [disable, enable]>
update-extdb: <value in [disable, enable]>
update-ffdb: <value in [disable, enable]>
update-uwdb: <value in [disable, enable]>
videofilter-expiration: <value of integer>
videofilter-license: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_wtpprofile_radio2 β Configuration options for radio 2. fortinet.fortimanager.fmgr\_wtpprofile\_radio2 β Configuration options for radio 2.
===================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wtpprofile_radio2`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
| **wtp-profile** string / required | | the parameter (wtp-profile) in requested url |
| **wtpprofile\_radio2** dictionary | | the top level parameters set |
| | **airtime-fairness** string | **Choices:*** disable
* enable
| Enable/disable airtime fairness (default = disable). |
| | **amsdu** string | **Choices:*** disable
* enable
| Enable/disable 802.11n AMSDU support. AMSDU can improve performance if supported by your WiFi clients (default = enable). |
| | **ap-handoff** string | **Choices:*** disable
* enable
| Enable/disable AP handoff of clients to other APs (default = disable). |
| | **ap-sniffer-addr** string | | MAC address to monitor. |
| | **ap-sniffer-bufsize** integer | | Sniffer buffer size (1 - 32 MB, default = 16). |
| | **ap-sniffer-chan** integer | | Channel on which to operate the sniffer (default = 6). |
| | **ap-sniffer-ctl** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi control frame (default = enable). |
| | **ap-sniffer-data** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi data frame (default = enable). |
| | **ap-sniffer-mgmt-beacon** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management Beacon frames (default = enable). |
| | **ap-sniffer-mgmt-other** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management other frames (default = enable). |
| | **ap-sniffer-mgmt-probe** string | **Choices:*** disable
* enable
| Enable/disable sniffer on WiFi management probe frames (default = enable). |
| | **auto-power-high** integer | | Automatic transmit power high limit in dBm (the actual range of transmit power depends on the AP platform type). |
| | **auto-power-level** string | **Choices:*** disable
* enable
| Enable/disable automatic power-level adjustment to prevent co-channel interference (default = disable). |
| | **auto-power-low** integer | | Automatic transmission power low limit in dBm (the actual range of transmit power depends on the AP platform type). |
| | **auto-power-target** string | | The target of automatic transmit power adjustment in dBm. (-95 to -20, default = -70). |
| | **band** string | **Choices:*** 802.11b
* 802.11a
* 802.11g
* 802.11n
* 802.11ac
* 802.11n-5G
* 802.11g-only
* 802.11n-only
* 802.11n,g-only
* 802.11ac-only
* 802.11ac,n-only
* 802.11n-5G-only
* 802.11ax-5G
* 802.11ax
* 802.11ax-5G-only
* 802.11ax,ac-only
* 802.11ax,ac,n-only
* 802.11ax-only
* 802.11ax,n-only
* 802.11ax,n,g-only
* 802.11ac-2G
| WiFi band that Radio 2 operates on. |
| | **band-5g-type** string | **Choices:*** 5g-full
* 5g-high
* 5g-low
| WiFi 5G band type. |
| | **bandwidth-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WiFi multimedia (WMM) bandwidth admission control to optimize WiFi bandwidth use. A request to join the wireles... |
| | **bandwidth-capacity** integer | | Maximum bandwidth capacity allowed (1 - 600000 Kbps, default = 2000). |
| | **beacon-interval** integer | | Beacon interval. The time between beacon frames in msec (the actual range of beacon interval depends on the AP platform type, ... |
| | **bss-color** integer | | BSS color value for this 11ax radio (0 - 63, 0 means disable. default = 0). |
| | **call-admission-control** string | **Choices:*** disable
* enable
| Enable/disable WiFi multimedia (WMM) call admission control to optimize WiFi bandwidth use for VoIP calls. New VoIP calls are ... |
| | **call-capacity** integer | | Maximum number of Voice over WLAN (VoWLAN) phones supported by the radio (0 - 60, default = 10). |
| | **channel** string | | no description |
| | **channel-bonding** string | **Choices:*** disable
* enable
* 80MHz
* 40MHz
* 20MHz
* 160MHz
| Channel bandwidth: 80, 40, or 20MHz. Channels may use both 20 and 40 by enabling coexistence. |
| | **channel-utilization** string | **Choices:*** disable
* enable
| Enable/disable measuring channel utilization. |
| | **coexistence** string | **Choices:*** disable
* enable
| Enable/disable allowing both HT20 and HT40 on the same radio (default = enable). |
| | **darrp** string | **Choices:*** disable
* enable
| Enable/disable Distributed Automatic Radio Resource Provisioning (DARRP) to make sure the radio is always using the most optim... |
| | **drma** string | **Choices:*** disable
* enable
| Enable/disable dynamic radio mode assignment (DRMA) (default = disable). |
| | **drma-sensitivity** string | **Choices:*** low
* medium
* high
| Network Coverage Factor (NCF) percentage required to consider a radio as redundant (default = low). |
| | **dtim** integer | | DTIM interval. The frequency to transmit Delivery Traffic Indication Message (or Map) (DTIM) messages (1 - 255, default = 1). ... |
| | **frag-threshold** integer | | Maximum packet size that can be sent without fragmentation (800 - 2346 bytes, default = 2346). |
| | **frequency-handoff** string | **Choices:*** disable
* enable
| Enable/disable frequency handoff of clients to other channels (default = disable). |
| | **iperf-protocol** string | **Choices:*** udp
* tcp
| Iperf test protocol (default = "UDP"). |
| | **iperf-server-port** integer | | Iperf service port number. |
| | **max-clients** integer | | Maximum number of stations (STAs) or WiFi clients supported by the radio. Range depends on the hardware. |
| | **max-distance** integer | | Maximum expected distance between the AP and clients (0 - 54000 m, default = 0). |
| | **mode** string | **Choices:*** disabled
* ap
* monitor
* sniffer
* sam
| Mode of radio 2. Radio 2 can be disabled, configured as an access point, a rogue AP monitor, or a sniffer. |
| | **power-level** integer | | Radio power level as a percentage of the maximum transmit power (0 - 100, default = 100). |
| | **power-mode** string | **Choices:*** dBm
* percentage
| Set radio effective isotropic radiated power (EIRP) in dBm or by a percentage of the maximum EIRP (default = percentage). This... |
| | **power-value** integer | | Radio EIRP power in dBm (1 - 33, default = 27). |
| | **powersave-optimize** list / elements=string | **Choices:*** tim
* ac-vo
* no-obss-scan
* no-11b-rate
* client-rate-follow
| no description |
| | **protection-mode** string | **Choices:*** rtscts
* ctsonly
* disable
| Enable/disable 802.11g protection modes to support backwards compatibility with older clients (rtscts, ctsonly, disable). |
| | **radio-id** integer | | no description |
| | **rts-threshold** integer | | Maximum packet size for RTS transmissions, specifying the maximum size of a data packet before RTS/CTS (256 - 2346 bytes, defa... |
| | **sam-bssid** string | | BSSID for WiFi network. |
| | **sam-captive-portal** string | **Choices:*** disable
* enable
| Enable/disable Captive Portal Authentication (default = disable). |
| | **sam-password** string | | no description |
| | **sam-report-intv** integer | | SAM report interval (sec), 0 for a one-time report. |
| | **sam-security-type** string | **Choices:*** open
* wpa-personal
* wpa-enterprise
| Select WiFi network security type (default = "wpa-personal"). |
| | **sam-server** string | | SAM test server IP address or domain name. |
| | **sam-ssid** string | | SSID for WiFi network. |
| | **sam-test** string | **Choices:*** ping
* iperf
| Select SAM test type (default = "PING"). |
| | **sam-username** string | | Username for WiFi network connection. |
| | **short-guard-interval** string | **Choices:*** disable
* enable
| Use either the short guard interval (Short GI) of 400 ns or the long guard interval (Long GI) of 800 ns. |
| | **spectrum-analysis** string | **Choices:*** disable
* enable
* scan-only
| Enable/disable spectrum analysis to find interference that would negatively impact wireless performance. |
| | **transmit-optimize** list / elements=string | **Choices:*** disable
* power-save
* aggr-limit
* retry-limit
* send-bar
| no description |
| | **vap-all** string | **Choices:*** disable
* enable
* tunnel
* bridge
* manual
| Enable/disable the automatic inheritance of all Virtual Access Points (VAPs) (default = enable). |
| | **vap1** string | | Virtual Access Point (VAP) for wlan ID 1 |
| | **vap2** string | | Virtual Access Point (VAP) for wlan ID 2 |
| | **vap3** string | | Virtual Access Point (VAP) for wlan ID 3 |
| | **vap4** string | | Virtual Access Point (VAP) for wlan ID 4 |
| | **vap5** string | | Virtual Access Point (VAP) for wlan ID 5 |
| | **vap6** string | | Virtual Access Point (VAP) for wlan ID 6 |
| | **vap7** string | | Virtual Access Point (VAP) for wlan ID 7 |
| | **vap8** string | | Virtual Access Point (VAP) for wlan ID 8 |
| | **vaps** string | | Manually selected list of Virtual Access Points (VAPs). |
| | **wids-profile** string | | Wireless Intrusion Detection System (WIDS) profile name to assign to the radio. |
| | **zero-wait-dfs** string | **Choices:*** disable
* enable
| Enable/disable zero wait DFS on radio (default = enable). |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configuration options for radio 2.
fmgr_wtpprofile_radio2:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wtp-profile: <your own value>
wtpprofile_radio2:
amsdu: <value in [disable, enable]>
ap-handoff: <value in [disable, enable]>
ap-sniffer-addr: <value of string>
ap-sniffer-bufsize: <value of integer>
ap-sniffer-chan: <value of integer>
ap-sniffer-ctl: <value in [disable, enable]>
ap-sniffer-data: <value in [disable, enable]>
ap-sniffer-mgmt-beacon: <value in [disable, enable]>
ap-sniffer-mgmt-other: <value in [disable, enable]>
ap-sniffer-mgmt-probe: <value in [disable, enable]>
auto-power-high: <value of integer>
auto-power-level: <value in [disable, enable]>
auto-power-low: <value of integer>
band: <value in [802.11b, 802.11a, 802.11g, ...]>
bandwidth-admission-control: <value in [disable, enable]>
bandwidth-capacity: <value of integer>
beacon-interval: <value of integer>
call-admission-control: <value in [disable, enable]>
call-capacity: <value of integer>
channel: <value of string>
channel-bonding: <value in [disable, enable, 80MHz, ...]>
channel-utilization: <value in [disable, enable]>
coexistence: <value in [disable, enable]>
darrp: <value in [disable, enable]>
dtim: <value of integer>
frag-threshold: <value of integer>
frequency-handoff: <value in [disable, enable]>
max-clients: <value of integer>
max-distance: <value of integer>
mode: <value in [disabled, ap, monitor, ...]>
power-level: <value of integer>
powersave-optimize:
- tim
- ac-vo
- no-obss-scan
- no-11b-rate
- client-rate-follow
protection-mode: <value in [rtscts, ctsonly, disable]>
radio-id: <value of integer>
rts-threshold: <value of integer>
short-guard-interval: <value in [disable, enable]>
spectrum-analysis: <value in [disable, enable, scan-only]>
transmit-optimize:
- disable
- power-save
- aggr-limit
- retry-limit
- send-bar
vap-all: <value in [disable, enable, tunnel, ...]>
vaps: <value of string>
wids-profile: <value of string>
airtime-fairness: <value in [disable, enable]>
band-5g-type: <value in [5g-full, 5g-high, 5g-low]>
zero-wait-dfs: <value in [disable, enable]>
vap1: <value of string>
vap2: <value of string>
vap3: <value of string>
vap4: <value of string>
vap5: <value of string>
vap6: <value of string>
vap7: <value of string>
vap8: <value of string>
bss-color: <value of integer>
auto-power-target: <value of string>
drma: <value in [disable, enable]>
drma-sensitivity: <value in [low, medium, high]>
iperf-protocol: <value in [udp, tcp]>
iperf-server-port: <value of integer>
power-mode: <value in [dBm, percentage]>
power-value: <value of integer>
sam-bssid: <value of string>
sam-captive-portal: <value in [disable, enable]>
sam-password: <value of string>
sam-report-intv: <value of integer>
sam-security-type: <value in [open, wpa-personal, wpa-enterprise]>
sam-server: <value of string>
sam-ssid: <value of string>
sam-test: <value in [ping, iperf]>
sam-username: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_sslvpn β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_sslvpn β Replacement messages.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_sslvpn`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_sslvpn** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_sslvpn:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_sslvpn:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_admin_user β Admin user. fortinet.fortimanager.fmgr\_system\_admin\_user β Admin user.
=============================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_admin_user`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_admin\_user** dictionary | | the top level parameters set |
| | **adom** list / elements=string | | no description |
| | | **adom-name** string | | Admin domain names. |
| | **adom-exclude** list / elements=string | | no description |
| | | **adom-name** string | | Admin domain names. |
| | **app-filter** list / elements=string | | no description |
| | | **app-filter-name** string | | App filter name. |
| | **avatar** string | | Image file for avatar (maximum 4K base64 encoded). |
| | **ca** string | | PKI user certificate CA (CA name in local). |
| | **change-password** string | **Choices:*** **disable** β
* enable
| Enable/disable restricted user to change self password. disable - Disable setting. enable - Enable setting. |
| | **dashboard** list / elements=string | | no description |
| | | **column** integer | **Default:**0 | Widgets column ID. |
| | | **diskio-content-type** string | **Choices:*** **util** β
* iops
* blks
| Disk I/O Monitor widgets chart type. util - bandwidth utilization. iops - the number of I/O requests. blks - the amount of data of I/O requests. |
| | | **diskio-period** string | **Choices:*** **1hour** β
* 8hour
* 24hour
| Disk I/O Monitor widgets data period. 1hour - 1 hour. 8hour - 8 hour. 24hour - 24 hour. |
| | | **log-rate-period** string | **Choices:*** 2min
* 1hour
* 6hours
| Log receive monitor widgets data period. 2min - 2 minutes. 1hour - 1 hour. 6hours - 6 hours. |
| | | **log-rate-topn** string | **Choices:*** 1
* 2
* 3
* 4
* **5** β
| Log receive monitor widgets number of top items to display. 1 - Top 1. 2 - Top 2. 3 - Top 3. 4 - Top 4. 5 - Top 5. |
| | | **log-rate-type** string | **Choices:*** log
* **device** β
| Log receive monitor widgets statistics breakdown options. log - Show log rates for each log type. device - Show log rates for each device. |
| | | **moduleid** integer | **Default:**0 | Widget ID. |
| | | **name** string | | Widget name. |
| | | **num-entries** integer | **Default:**10 | Number of entries. |
| | | **refresh-interval** integer | **Default:**300 | Widgets refresh interval. |
| | | **res-cpu-display** string | **Choices:*** **average** β
* each
| Widgets CPU display type. average - Average usage of CPU. each - Each usage of CPU. |
| | | **res-period** string | **Choices:*** **10min** β
* hour
* day
| Widgets data period. 10min - Last 10 minutes. hour - Last hour. day - Last day. |
| | | **res-view-type** string | **Choices:*** real-time
* **history** β
| Widgets data view type. real-time - Real-time view. history - History view. |
| | | **status** string | **Choices:*** close
* **open** β
| Widgets opened/closed state. close - Widget closed. open - Widget opened. |
| | | **tabid** integer | **Default:**0 | ID of tab where widget is displayed. |
| | | **time-period** string | **Choices:*** **1hour** β
* 8hour
* 24hour
| Log Database Monitor widgets data period. 1hour - 1 hour. 8hour - 8 hour. 24hour - 24 hour. |
| | | **widget-type** string | **Choices:*** top-lograte
* sysres
* sysinfo
* licinfo
* jsconsole
* sysop
* alert
* statistics
* rpteng
* raid
* logrecv
* devsummary
* logdb-perf
* logdb-lag
* disk-io
* log-rcvd-fwd
| Widget type. top-lograte - Log Receive Monitor. sysres - System resources. sysinfo - System Information. licinfo - License Information. jsconsole - CLI Console. sysop - Unit Operation. alert - Alert Message Console. statistics - Statistics. rpteng - Report Engine. raid - Disk Monitor. logrecv - Logs/Data Received. devsummary - Device Summary. logdb-perf - Log Database Performance Monitor. logdb-lag - Log Database Lag Time. disk-io - Disk I/O. log-rcvd-fwd - Log receive and forwarding Monitor. |
| | **dashboard-tabs** list / elements=string | | no description |
| | | **name** string | | Tab name. |
| | | **tabid** integer | **Default:**0 | Tab ID. |
| | **description** string | | Description. |
| | **dev-group** string | | device group. |
| | **email-address** string | | Email address. |
| | **ext-auth-accprofile-override** string | **Choices:*** **disable** β
* enable
| Allow to use the access profile provided by the remote authentication server. disable - Disable access profile override. enable - Enable access profile override. |
| | **ext-auth-adom-override** string | **Choices:*** **disable** β
* enable
| Allow to use the ADOM provided by the remote authentication server. disable - Disable ADOM override. enable - Enable ADOM override. |
| | **ext-auth-group-match** string | | Only administrators belonging to this group can login. |
| | **first-name** string | | First name. |
| | **force-password-change** string | **Choices:*** **disable** β
* enable
| Enable/disable force password change on next login. disable - Disable setting. enable - Enable setting. |
| | **group** string | | Group name. |
| | **hidden** integer | **Default:**0 | Hidden administrator. |
| | **ips-filter** list / elements=string | | no description |
| | | **ips-filter-name** string | | IPS filter name. |
| | **ipv6\_trusthost1** string | **Default:**"::/0" | Admin user trusted host IPv6, default ::/0 for all. |
| | **ipv6\_trusthost10** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost2** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost3** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost4** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost5** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost6** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost7** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost8** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **ipv6\_trusthost9** string | **Default:**"ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128" | Admin user trusted host IPv6, default ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff/128 for none. |
| | **last-name** string | | Last name. |
| | **ldap-server** string | | LDAP server name. |
| | **login-max** integer | **Default:**32 | Max login session for this user. |
| | **meta-data** list / elements=string | | no description |
| | | **fieldlength** integer | **Default:**0 | Field length. |
| | | **fieldname** string | | Field name. |
| | | **fieldvalue** string | | Field value. |
| | | **importance** string | **Choices:*** **optional** β
* required
| Importance. optional - This field is optional. required - This field is required. |
| | | **status** string | **Choices:*** disabled
* **enabled** β
| Status. disabled - This field is disabled. enabled - This field is enabled. |
| | **mobile-number** string | | Mobile number. |
| | **pager-number** string | | Pager number. |
| | **password** string | | no description |
| | **password-expire** string | | no description |
| | **phone-number** string | | Phone number. |
| | **policy-package** list / elements=string | | no description |
| | | **policy-package-name** string | | Policy package names. |
| | **profileid** string | **Default:**"Restricted\_User" | Profile ID. |
| | **radius\_server** string | | RADIUS server name. |
| | **restrict-access** string | **Choices:*** **disable** β
* enable
| Enable/disable restricted access to development VDOM. disable - Disable setting. enable - Enable setting. |
| | **restrict-dev-vdom** list / elements=string | | no description |
| | | **dev-vdom** string | | Device or device VDOM. |
| | **rpc-permit** string | **Choices:*** read-write
* **none** β
* read
| set none/read/read-write rpc-permission. read-write - Read-write permission. none - No permission. read - Read-only permission. |
| | **ssh-public-key1** string | | no description |
| | **ssh-public-key2** string | | no description |
| | **ssh-public-key3** string | | no description |
| | **subject** string | | PKI user certificate name constraints. |
| | **tacacs-plus-server** string | | TACACS+ server name. |
| | **trusthost1** string | **Default:**"0.0.0.0 0.0.0.0" | Admin user trusted host IP, default 0.0.0.0 0.0.0.0 for all. |
| | **trusthost10** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost2** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost3** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost4** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost5** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost6** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost7** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost8** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **trusthost9** string | **Default:**"255.255.255.255 255.255.255.255" | Admin user trusted host IP, default 255.255.255.255 255.255.255.255 for none. |
| | **two-factor-auth** string | **Choices:*** **disable** β
* enable
| Enable 2-factor authentication (certificate + password). disable - Disable 2-factor authentication. enable - Enable 2-factor authentication. |
| | **use-global-theme** string | **Choices:*** disable
* **enable** β
| Enable/disble global theme for administration GUI. disable - Disable setting. enable - Enable setting. |
| | **user-theme** string | **Choices:*** **blue** β
* green
* red
* melongene
* spring
* summer
* autumn
* winter
* circuit-board
* calla-lily
* binary-tunnel
* mars
* blue-sea
* technology
* landscape
* twilight
* canyon
* northern-light
* astronomy
* fish
* penguin
* mountain
* panda
* parrot
* cave
* zebra
* contrast-dark
| Color scheme to use for the admin user GUI. blue - Blueberry green - Kiwi red - Cherry melongene - Plum spring - Spring summer - Summer autumn - Autumn winter - Winter circuit-board - Circuit Board calla-lily - Calla Lily binary-tunnel - Binary Tunnel mars - Mars blue-sea - Blue Sea technology - Technology landscape - Landscape twilight - Twilight canyon - Canyon northern-light - Northern Light astronomy - Astronomy fish - Fish penguin - Penguin mountain - Mountain panda - Panda parrot - Parrot cave - Cave zebra - Zebra contrast-dark - High Contrast Dark |
| | **user\_type** string | **Choices:*** **local** β
* radius
* ldap
* tacacs-plus
* pki-auth
* group
* sso
| User type. local - Local user. radius - RADIUS user. ldap - LDAP user. tacacs-plus - TACACS+ user. pki-auth - PKI user. group - Group user. |
| | **userid** string | | User name. |
| | **web-filter** list / elements=string | | no description |
| | | **web-filter-name** string | | Web filter name. |
| | **wildcard** string | **Choices:*** **disable** β
* enable
| Enable/disable wildcard remote authentication. disable - Disable username wildcard. enable - Enable username wildcard. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Admin user.
fmgr_system_admin_user:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_admin_user:
adom:
-
adom-name: <value of string>
adom-exclude:
-
adom-name: <value of string>
app-filter:
-
app-filter-name: <value of string>
avatar: <value of string>
ca: <value of string>
change-password: <value in [disable, enable]>
dashboard:
-
column: <value of integer>
diskio-content-type: <value in [util, iops, blks]>
diskio-period: <value in [1hour, 8hour, 24hour]>
log-rate-period: <value in [2min , 1hour, 6hours]>
log-rate-topn: <value in [1, 2, 3, ...]>
log-rate-type: <value in [log, device]>
moduleid: <value of integer>
name: <value of string>
num-entries: <value of integer>
refresh-interval: <value of integer>
res-cpu-display: <value in [average , each]>
res-period: <value in [10min , hour, day]>
res-view-type: <value in [real-time , history]>
status: <value in [close, open]>
tabid: <value of integer>
time-period: <value in [1hour, 8hour, 24hour]>
widget-type: <value in [top-lograte, sysres, sysinfo, ...]>
dashboard-tabs:
-
name: <value of string>
tabid: <value of integer>
description: <value of string>
dev-group: <value of string>
email-address: <value of string>
ext-auth-accprofile-override: <value in [disable, enable]>
ext-auth-adom-override: <value in [disable, enable]>
ext-auth-group-match: <value of string>
first-name: <value of string>
force-password-change: <value in [disable, enable]>
group: <value of string>
hidden: <value of integer>
ips-filter:
-
ips-filter-name: <value of string>
ipv6_trusthost1: <value of string>
ipv6_trusthost10: <value of string>
ipv6_trusthost2: <value of string>
ipv6_trusthost3: <value of string>
ipv6_trusthost4: <value of string>
ipv6_trusthost5: <value of string>
ipv6_trusthost6: <value of string>
ipv6_trusthost7: <value of string>
ipv6_trusthost8: <value of string>
ipv6_trusthost9: <value of string>
last-name: <value of string>
ldap-server: <value of string>
meta-data:
-
fieldlength: <value of integer>
fieldname: <value of string>
fieldvalue: <value of string>
importance: <value in [optional, required]>
status: <value in [disabled, enabled]>
mobile-number: <value of string>
pager-number: <value of string>
password: <value of string>
password-expire: <value of string>
phone-number: <value of string>
policy-package:
-
policy-package-name: <value of string>
profileid: <value of string>
radius_server: <value of string>
restrict-access: <value in [disable, enable]>
restrict-dev-vdom:
-
dev-vdom: <value of string>
rpc-permit: <value in [read-write, none, read]>
ssh-public-key1: <value of string>
ssh-public-key2: <value of string>
ssh-public-key3: <value of string>
subject: <value of string>
tacacs-plus-server: <value of string>
trusthost1: <value of string>
trusthost10: <value of string>
trusthost2: <value of string>
trusthost3: <value of string>
trusthost4: <value of string>
trusthost5: <value of string>
trusthost6: <value of string>
trusthost7: <value of string>
trusthost8: <value of string>
trusthost9: <value of string>
two-factor-auth: <value in [disable, enable]>
user_type: <value in [local, radius, ldap, ...]>
userid: <value of string>
web-filter:
-
web-filter-name: <value of string>
wildcard: <value in [disable, enable]>
login-max: <value of integer>
use-global-theme: <value in [disable, enable]>
user-theme: <value in [blue, green, red, ...]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_dhcpserver_iprange β DHCP IP range configuration. fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_dhcpserver\_iprange β DHCP IP range configuration.
=========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_dhcpserver_iprange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_dhcpserver\_iprange** dictionary | | the top level parameters set |
| | **end-ip** string | | no description |
| | **id** integer | | no description |
| | **start-ip** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: DHCP IP range configuration.
fmgr_fsp_vlan_dynamicmapping_dhcpserver_iprange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
fsp_vlan_dynamicmapping_dhcpserver_iprange:
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dnsfilter_profile_ftgddns_filters β FortiGuard DNS domain filters. fortinet.fortimanager.fmgr\_dnsfilter\_profile\_ftgddns\_filters β FortiGuard DNS domain filters.
=================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dnsfilter_profile_ftgddns_filters`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dnsfilter\_profile\_ftgddns\_filters** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** monitor
* block
| Action to take for DNS requests matching the category. |
| | **category** string | | Category number. |
| | **id** integer | | ID number. |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable DNS filter logging for this DNS profile. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiGuard DNS domain filters.
fmgr_dnsfilter_profile_ftgddns_filters:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
state: <value in [present, absent]>
dnsfilter_profile_ftgddns_filters:
action: <value in [monitor, block]>
category: <value of string>
id: <value of integer>
log: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_reservedaddress β Options for the DHCP server to assign IP settings to specific MAC addresses. fortinet.fortimanager.fmgr\_fsp\_vlan\_dhcpserver\_reservedaddress β Options for the DHCP server to assign IP settings to specific MAC addresses.
=================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_reservedaddress`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dhcpserver\_reservedaddress** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** assign
* block
* reserved
| no description |
| | **circuit-id** string | | no description |
| | **circuit-id-type** string | **Choices:*** hex
* string
| no description |
| | **description** string | | no description |
| | **id** integer | | no description |
| | **ip** string | | no description |
| | **mac** string | | no description |
| | **remote-id** string | | no description |
| | **remote-id-type** string | **Choices:*** hex
* string
| no description |
| | **type** string | **Choices:*** mac
* option82
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Options for the DHCP server to assign IP settings to specific MAC addresses.
fmgr_fsp_vlan_dhcpserver_reservedaddress:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
state: <value in [present, absent]>
fsp_vlan_dhcpserver_reservedaddress:
action: <value in [assign, block, reserved]>
circuit-id: <value of string>
circuit-id-type: <value in [hex, string]>
description: <value of string>
id: <value of integer>
ip: <value of string>
mac: <value of string>
remote-id: <value of string>
remote-id-type: <value in [hex, string]>
type: <value in [mac, option82]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_workflow_submit β no description fortinet.fortimanager.fmgr\_dvmdb\_workflow\_submit β no description
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_workflow_submit`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_workflow\_submit** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| | **fmgip** string | | no description |
| | **mail\_user** string | | no description |
| | **no\_diff** integer | | no description |
| | **no\_mail** integer | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **session\_id** string / required | | the parameter (session\_id) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_workflow_submit:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
session_id: <your own value>
dvmdb_workflow_submit:
desc: <value of string>
fmgip: <value of string>
mail_user: <value of string>
no_diff: <value of integer>
no_mail: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_dvmdb_folder β no description fortinet.fortimanager.fmgr\_dvmdb\_folder β no description
==========================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_folder`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_folder** dictionary | | the top level parameters set |
| | **desc** string | | no description |
| | **name** string | | no description |
| | **parent** integer | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_dvmdb_folder:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dvmdb_folder:
desc: <value of string>
name: <value of string>
parent: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_cifs_profile_filefilter β File filter. fortinet.fortimanager.fmgr\_cifs\_profile\_filefilter β File filter.
====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_cifs_profile_filefilter`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **cifs\_profile\_filefilter** dictionary | | the top level parameters set |
| | **entries** list / elements=string | | no description |
| | | **action** string | **Choices:*** block
* log
| Action taken for matched file. |
| | | **comment** string | | Comment. |
| | | **direction** string | **Choices:*** incoming
* outgoing
* any
| Match files transmitted in the sessions originating or reply direction. |
| | | **file-type** string | | no description |
| | | **filter** string | | Add a file filter. |
| | | **protocol** list / elements=string | **Choices:*** cifs
| no description |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable file filter logging. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable file filter. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: File filter.
fmgr_cifs_profile_filefilter:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
cifs_profile_filefilter:
entries:
-
action: <value in [block, log]>
comment: <value of string>
direction: <value in [incoming, outgoing, any]>
file-type: <value of string>
filter: <value of string>
protocol:
- cifs
log: <value in [disable, enable]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fmupdate_fctservices β Configure FortiGuard to provide services to FortiClient installations. fortinet.fortimanager.fmgr\_fmupdate\_fctservices β Configure FortiGuard to provide services to FortiClient installations.
==========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fmupdate_fctservices`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fmupdate\_fctservices** dictionary | | the top level parameters set |
| | **port** integer | **Default:**80 | Configure the port number on which the built-in FortiGuard should provide updates to FortiClient installations (1 - 65535, def... |
| | **status** string | **Choices:*** disable
* **enable** β
| Enable/disable built-in FortiGuard service to FortiClient installations (default = enable). disable - Disable setting. enable - Enable setting. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure FortiGuard to provide services to FortiClient installations.
fmgr_fmupdate_fctservices:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
fmupdate_fctservices:
port: <value of integer>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_install_preview β Generate install preview for a device. fortinet.fortimanager.fmgr\_securityconsole\_install\_preview β Generate install preview for a device.
======================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_install_preview`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_install\_preview** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| | **device** string | | no description |
| | **flags** list / elements=string | **Choices:*** none
* json
| no description |
| | **vdoms** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Generate install preview for a device.
fmgr_securityconsole_install_preview:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_install_preview:
adom: <value of string>
device: <value of string>
flags:
- none
- json
vdoms: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpnsslweb_portal β Portal. fortinet.fortimanager.fmgr\_vpnsslweb\_portal β Portal.
=======================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpnsslweb_portal`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpnsslweb\_portal** dictionary | | the top level parameters set |
| | **allow-user-access** list / elements=string | **Choices:*** web
* ftp
* telnet
* smb
* vnc
* rdp
* ssh
* ping
* citrix
* portforward
* sftp
| no description |
| | **auto-connect** string | **Choices:*** disable
* enable
| Enable/disable automatic connect by client when system is up. |
| | **bookmark-group** list / elements=string | | no description |
| | | **bookmarks** list / elements=string | | no description |
| | | | **additional-params** string | | Additional parameters. |
| | | | **apptype** string | **Choices:*** web
* telnet
* ssh
* ftp
* smb
* vnc
* rdp
* citrix
* rdpnative
* portforward
* sftp
| Application type. |
| | | | **description** string | | Description. |
| | | | **domain** string | | Login domain. |
| | | | **folder** string | | Network shared file folder parameter. |
| | | | **form-data** list / elements=string | | no description |
| | | | | **name** string | | Name. |
| | | | | **value** string | | Value. |
| | | | **host** string | | Host name/IP parameter. |
| | | | **listening-port** integer | | Listening port (0 - 65535). |
| | | | **load-balancing-info** string | | The load balancing information or cookie which should be provided to the connection broker. |
| | | | **logon-password** string | | no description |
| | | | **logon-user** string | | Logon user. |
| | | | **name** string | | Bookmark name. |
| | | | **port** integer | | Remote port. |
| | | | **preconnection-blob** string | | An arbitrary string which identifies the RDP source. |
| | | | **preconnection-id** integer | | The numeric ID of the RDP source (0-2147483648). |
| | | | **remote-port** integer | | Remote port (0 - 65535). |
| | | | **security** string | **Choices:*** rdp
* nla
* tls
* any
| Security mode for RDP connection. |
| | | | **server-layout** string | **Choices:*** en-us-qwerty
* de-de-qwertz
* fr-fr-azerty
* it-it-qwerty
* sv-se-qwerty
* failsafe
* en-gb-qwerty
* es-es-qwerty
* fr-ch-qwertz
* ja-jp-qwerty
* pt-br-qwerty
* tr-tr-qwerty
* fr-ca-qwerty
| Server side keyboard layout. |
| | | | **show-status-window** string | **Choices:*** disable
* enable
| Enable/disable showing of status window. |
| | | | **sso** string | **Choices:*** disable
* static
* auto
| Single Sign-On. |
| | | | **sso-credential** string | **Choices:*** sslvpn-login
* alternative
| Single sign-on credentials. |
| | | | **sso-credential-sent-once** string | **Choices:*** disable
* enable
| Single sign-on credentials are only sent once to remote server. |
| | | | **sso-password** string | | no description |
| | | | **sso-username** string | | SSO user name. |
| | | | **url** string | | URL parameter. |
| | | **name** string | | Bookmark group name. |
| | **custom-lang** string | | Change the web portal display language. Overrides config system global set language. You can use config system custom-language... |
| | **customize-forticlient-download-url** string | **Choices:*** disable
* enable
| Enable support of customized download URL for FortiClient. |
| | **display-bookmark** string | **Choices:*** disable
* enable
| Enable to display the web portal bookmark widget. |
| | **display-connection-tools** string | **Choices:*** disable
* enable
| Enable to display the web portal connection tools widget. |
| | **display-history** string | **Choices:*** disable
* enable
| Enable to display the web portal user login history widget. |
| | **display-status** string | **Choices:*** disable
* enable
| Enable to display the web portal status widget. |
| | **dns-server1** string | | IPv4 DNS server 1. |
| | **dns-server2** string | | IPv4 DNS server 2. |
| | **dns-suffix** string | | DNS suffix. |
| | **exclusive-routing** string | **Choices:*** disable
* enable
| Enable/disable all traffic go through tunnel only. |
| | **forticlient-download** string | **Choices:*** disable
* enable
| Enable/disable download option for FortiClient. |
| | **forticlient-download-method** string | **Choices:*** direct
* ssl-vpn
| FortiClient download method. |
| | **heading** string | | Web portal heading message. |
| | **hide-sso-credential** string | **Choices:*** disable
* enable
| Enable to prevent SSO credential being sent to client. |
| | **host-check** string | **Choices:*** none
* av
* fw
* av-fw
* custom
| Type of host checking performed on endpoints. |
| | **host-check-interval** integer | | Periodic host check interval. Value of 0 means disabled and host checking only happens when the endpoint connects. |
| | **host-check-policy** string | | One or more policies to require the endpoint to have specific security software. |
| | **ip-mode** string | **Choices:*** range
* user-group
| Method by which users of this SSL-VPN tunnel obtain IP addresses. |
| | **ip-pools** string | | IPv4 firewall source address objects reserved for SSL-VPN tunnel mode clients. |
| | **ipv6-dns-server1** string | | IPv6 DNS server 1. |
| | **ipv6-dns-server2** string | | IPv6 DNS server 2. |
| | **ipv6-exclusive-routing** string | **Choices:*** disable
* enable
| Enable/disable all IPv6 traffic go through tunnel only. |
| | **ipv6-pools** string | | IPv4 firewall source address objects reserved for SSL-VPN tunnel mode clients. |
| | **ipv6-service-restriction** string | **Choices:*** disable
* enable
| Enable/disable IPv6 tunnel service restriction. |
| | **ipv6-split-tunneling** string | **Choices:*** disable
* enable
| Enable/disable IPv6 split tunneling. |
| | **ipv6-split-tunneling-routing-address** string | | IPv6 SSL-VPN tunnel mode firewall address objects that override firewall policy destination addresses to control split-tunneli... |
| | **ipv6-split-tunneling-routing-negate** string | **Choices:*** disable
* enable
| Enable to negate IPv6 split tunneling routing address. |
| | **ipv6-tunnel-mode** string | **Choices:*** disable
* enable
| Enable/disable IPv6 SSL-VPN tunnel mode. |
| | **ipv6-wins-server1** string | | IPv6 WINS server 1. |
| | **ipv6-wins-server2** string | | IPv6 WINS server 2. |
| | **keep-alive** string | **Choices:*** disable
* enable
| Enable/disable automatic reconnect for FortiClient connections. |
| | **limit-user-logins** string | **Choices:*** disable
* enable
| Enable to limit each user to one SSL-VPN session at a time. |
| | **mac-addr-action** string | **Choices:*** deny
* allow
| Client MAC address action. |
| | **mac-addr-check** string | **Choices:*** disable
* enable
| Enable/disable MAC address host checking. |
| | **mac-addr-check-rule** list / elements=string | | no description |
| | | **mac-addr-list** string | | no description |
| | | **mac-addr-mask** integer | | Client MAC address mask. |
| | | **name** string | | Client MAC address check rule name. |
| | **macos-forticlient-download-url** string | | Download URL for Mac FortiClient. |
| | **name** string | | Portal name. |
| | **os-check** string | **Choices:*** disable
* enable
| Enable to let the FortiGate decide action based on client OS. |
| | **os-check-list** dictionary | | no description |
| | | **action** string | **Choices:*** allow
* check-up-to-date
* deny
| OS check options. |
| | | **latest-patch-level** string | | Latest OS patch level. |
| | | **name** string | | Name. |
| | | **tolerance** integer | | OS patch level tolerance. |
| | **prefer-ipv6-dns** string | **Choices:*** disable
* enable
| prefer to query IPv6 dns first if enabled. |
| | **redir-url** string | | Client login redirect URL. |
| | **rewrite-ip-uri-ui** string | **Choices:*** disable
* enable
| Rewrite contents for URI contains IP and "/ui/". (default = disable) |
| | **save-password** string | **Choices:*** disable
* enable
| Enable/disable FortiClient saving the users password. |
| | **service-restriction** string | **Choices:*** disable
* enable
| Enable/disable tunnel service restriction. |
| | **skip-check-for-browser** string | **Choices:*** disable
* enable
| Enable to skip host check for browser support. |
| | **skip-check-for-unsupported-browser** string | **Choices:*** disable
* enable
| Enable to skip host check if browser does not support it. |
| | **skip-check-for-unsupported-os** string | **Choices:*** disable
* enable
| Enable to skip host check if client OS does not support it. |
| | **smb-max-version** string | **Choices:*** smbv1
* smbv2
* smbv3
| SMB maximum client protocol version. |
| | **smb-min-version** string | **Choices:*** smbv1
* smbv2
* smbv3
| SMB minimum client protocol version. |
| | **smb-ntlmv1-auth** string | **Choices:*** disable
* enable
| Enable support of NTLMv1 for Samba authentication. |
| | **smbv1** string | **Choices:*** disable
* enable
| Enable/disable support of SMBv1 for Samba. |
| | **split-dns** list / elements=string | | no description |
| | | **dns-server1** string | | DNS server 1. |
| | | **dns-server2** string | | DNS server 2. |
| | | **domains** string | | Split DNS domains used for SSL-VPN clients separated by comma(,). |
| | | **id** integer | | ID. |
| | | **ipv6-dns-server1** string | | IPv6 DNS server 1. |
| | | **ipv6-dns-server2** string | | IPv6 DNS server 2. |
| | **split-tunneling** string | **Choices:*** disable
* enable
| Enable/disable IPv4 split tunneling. |
| | **split-tunneling-routing-address** string | | IPv4 SSL-VPN tunnel mode firewall address objects that override firewall policy destination addresses to control split-tunneli... |
| | **split-tunneling-routing-negate** string | **Choices:*** disable
* enable
| Enable to negate split tunneling routing address. |
| | **theme** string | **Choices:*** gray
* blue
* orange
* crimson
* steelblue
* darkgrey
* green
* melongene
* red
* mariner
* neutrino
* jade
* graphite
* dark-matter
* onyx
* eclipse
| Web portal color scheme. |
| | **transform-backward-slashes** string | **Choices:*** disable
* enable
| Transform backward slashes to forward slashes in URLs. |
| | **tunnel-mode** string | **Choices:*** disable
* enable
| Enable/disable IPv4 SSL-VPN tunnel mode. |
| | **use-sdwan** string | **Choices:*** disable
* enable
| Use SD-WAN rules to get output interface. |
| | **user-bookmark** string | **Choices:*** disable
* enable
| Enable to allow web portal users to create their own bookmarks. |
| | **user-group-bookmark** string | **Choices:*** disable
* enable
| Enable to allow web portal users to create bookmarks for all users in the same user group. |
| | **web-mode** string | **Choices:*** disable
* enable
| Enable/disable SSL VPN web mode. |
| | **windows-forticlient-download-url** string | | Download URL for Windows FortiClient. |
| | **wins-server1** string | | IPv4 WINS server 1. |
| | **wins-server2** string | | IPv4 WINS server 1. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Portal.
fmgr_vpnsslweb_portal:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vpnsslweb_portal:
allow-user-access:
- web
- ftp
- telnet
- smb
- vnc
- rdp
- ssh
- ping
- citrix
- portforward
- sftp
auto-connect: <value in [disable, enable]>
bookmark-group:
-
bookmarks:
-
additional-params: <value of string>
apptype: <value in [web, telnet, ssh, ...]>
description: <value of string>
folder: <value of string>
form-data:
-
name: <value of string>
value: <value of string>
host: <value of string>
listening-port: <value of integer>
load-balancing-info: <value of string>
logon-password: <value of string>
logon-user: <value of string>
name: <value of string>
port: <value of integer>
preconnection-blob: <value of string>
preconnection-id: <value of integer>
remote-port: <value of integer>
security: <value in [rdp, nla, tls, ...]>
server-layout: <value in [en-us-qwerty, de-de-qwertz, fr-fr-azerty, ...]>
show-status-window: <value in [disable, enable]>
sso: <value in [disable, static, auto]>
sso-credential: <value in [sslvpn-login, alternative]>
sso-credential-sent-once: <value in [disable, enable]>
sso-password: <value of string>
sso-username: <value of string>
url: <value of string>
domain: <value of string>
name: <value of string>
custom-lang: <value of string>
customize-forticlient-download-url: <value in [disable, enable]>
display-bookmark: <value in [disable, enable]>
display-connection-tools: <value in [disable, enable]>
display-history: <value in [disable, enable]>
display-status: <value in [disable, enable]>
dns-server1: <value of string>
dns-server2: <value of string>
dns-suffix: <value of string>
exclusive-routing: <value in [disable, enable]>
forticlient-download: <value in [disable, enable]>
forticlient-download-method: <value in [direct, ssl-vpn]>
heading: <value of string>
hide-sso-credential: <value in [disable, enable]>
host-check: <value in [none, av, fw, ...]>
host-check-interval: <value of integer>
host-check-policy: <value of string>
ip-mode: <value in [range, user-group]>
ip-pools: <value of string>
ipv6-dns-server1: <value of string>
ipv6-dns-server2: <value of string>
ipv6-exclusive-routing: <value in [disable, enable]>
ipv6-pools: <value of string>
ipv6-service-restriction: <value in [disable, enable]>
ipv6-split-tunneling: <value in [disable, enable]>
ipv6-split-tunneling-routing-address: <value of string>
ipv6-tunnel-mode: <value in [disable, enable]>
ipv6-wins-server1: <value of string>
ipv6-wins-server2: <value of string>
keep-alive: <value in [disable, enable]>
limit-user-logins: <value in [disable, enable]>
mac-addr-action: <value in [deny, allow]>
mac-addr-check: <value in [disable, enable]>
mac-addr-check-rule:
-
mac-addr-list: <value of string>
mac-addr-mask: <value of integer>
name: <value of string>
macos-forticlient-download-url: <value of string>
name: <value of string>
os-check: <value in [disable, enable]>
redir-url: <value of string>
save-password: <value in [disable, enable]>
service-restriction: <value in [disable, enable]>
skip-check-for-unsupported-browser: <value in [disable, enable]>
skip-check-for-unsupported-os: <value in [disable, enable]>
smb-ntlmv1-auth: <value in [disable, enable]>
smbv1: <value in [disable, enable]>
split-dns:
-
dns-server1: <value of string>
dns-server2: <value of string>
domains: <value of string>
id: <value of integer>
ipv6-dns-server1: <value of string>
ipv6-dns-server2: <value of string>
split-tunneling: <value in [disable, enable]>
split-tunneling-routing-address: <value of string>
theme: <value in [gray, blue, orange, ...]>
tunnel-mode: <value in [disable, enable]>
user-bookmark: <value in [disable, enable]>
user-group-bookmark: <value in [disable, enable]>
web-mode: <value in [disable, enable]>
windows-forticlient-download-url: <value of string>
wins-server1: <value of string>
wins-server2: <value of string>
skip-check-for-browser: <value in [disable, enable]>
smb-max-version: <value in [smbv1, smbv2, smbv3]>
smb-min-version: <value in [smbv1, smbv2, smbv3]>
transform-backward-slashes: <value in [disable, enable]>
ipv6-split-tunneling-routing-negate: <value in [disable, enable]>
split-tunneling-routing-negate: <value in [disable, enable]>
os-check-list:
action: <value in [allow, check-up-to-date, deny]>
latest-patch-level: <value of string>
name: <value of string>
tolerance: <value of integer>
use-sdwan: <value in [disable, enable]>
prefer-ipv6-dns: <value in [disable, enable]>
rewrite-ip-uri-ui: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_address6_subnetsegment β IPv6 subnet segments. fortinet.fortimanager.fmgr\_firewall\_address6\_subnetsegment β IPv6 subnet segments.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_address6_subnetsegment`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **address6** string / required | | the parameter (address6) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_address6\_subnetsegment** dictionary | | the top level parameters set |
| | **name** string | | Name. |
| | **type** string | **Choices:*** any
* specific
| Subnet segment type. |
| | **value** string | | Subnet segment value. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: IPv6 subnet segments.
fmgr_firewall_address6_subnetsegment:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
address6: <your own value>
state: <value in [present, absent]>
firewall_address6_subnetsegment:
name: <value of string>
type: <value in [any, specific]>
value: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_vcenter_rule β no description fortinet.fortimanager.fmgr\_user\_vcenter\_rule β no description
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_vcenter_rule`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_vcenter\_rule** dictionary | | the top level parameters set |
| | **name** string | | no description |
| | **rule** string | | no description |
| **vcenter** string / required | | the parameter (vcenter) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_user_vcenter_rule:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vcenter: <your own value>
state: <value in [present, absent]>
user_vcenter_rule:
name: <value of string>
rule: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6extraaddr β Extra IPv6 address prefixes of interface. fortinet.fortimanager.fmgr\_fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6extraaddr β Extra IPv6 address prefixes of interface.
================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6extraaddr`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dynamic\_mapping** string / required | | the parameter (dynamic\_mapping) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dynamicmapping\_interface\_ipv6\_ip6extraaddr** dictionary | | the top level parameters set |
| | **prefix** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Extra IPv6 address prefixes of interface.
fmgr_fsp_vlan_dynamicmapping_interface_ipv6_ip6extraaddr:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
dynamic_mapping: <your own value>
state: <value in [present, absent]>
fsp_vlan_dynamicmapping_interface_ipv6_ip6extraaddr:
prefix: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_iprange β DHCP IP range configuration. fortinet.fortimanager.fmgr\_fsp\_vlan\_dhcpserver\_iprange β DHCP IP range configuration.
=========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_fsp_vlan_dhcpserver_iprange`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **fsp\_vlan\_dhcpserver\_iprange** dictionary | | the top level parameters set |
| | **end-ip** string | | no description |
| | **id** integer | | no description |
| | **start-ip** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vlan** string / required | | the parameter (vlan) in requested url |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: DHCP IP range configuration.
fmgr_fsp_vlan_dhcpserver_iprange:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
vlan: <your own value>
state: <value in [present, absent]>
fsp_vlan_dhcpserver_iprange:
end-ip: <value of string>
id: <value of integer>
start-ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_dvmdb_adom_objectmember β ADOM table, most attributes are read-only and can only be changed internally. fortinet.fortimanager.fmgr\_dvmdb\_adom\_objectmember β ADOM table, most attributes are read-only and can only be changed internally.
=====================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_dvmdb_adom_objectmember`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **dvmdb\_adom\_objectmember** dictionary | | the top level parameters set |
| | **name** string | | no description |
| | **vdom** string | | no description |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: ADOM table, most attributes are read-only and can only be changed internally.
fmgr_dvmdb_adom_objectmember:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
dvmdb_adom_objectmember:
name: <value of string>
vdom: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_authentication_scheme β Configure Authentication Schemes. fortinet.fortimanager.fmgr\_authentication\_scheme β Configure Authentication Schemes.
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_authentication_scheme`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **authentication\_scheme** dictionary | | the top level parameters set |
| | **domain-controller** string | | Domain controller setting. |
| | **ems-device-owner** string | **Choices:*** disable
* enable
| Enable/disable SSH public-key authentication with device owner (default = disable). |
| | **fsso-agent-for-ntlm** string | | FSSO agent to use for NTLM authentication. |
| | **fsso-guest** string | **Choices:*** disable
* enable
| Enable/disable user fsso-guest authentication (default = disable). |
| | **kerberos-keytab** string | | Kerberos keytab setting. |
| | **method** list / elements=string | **Choices:*** ntlm
* basic
* digest
* form
* negotiate
* fsso
* rsso
* ssh-publickey
* saml
* cert
| no description |
| | **name** string | | Authentication scheme name. |
| | **negotiate-ntlm** string | **Choices:*** disable
* enable
| Enable/disable negotiate authentication for NTLM (default = disable). |
| | **require-tfa** string | **Choices:*** disable
* enable
| Enable/disable two-factor authentication (default = disable). |
| | **saml-server** string | | SAML configuration. |
| | **saml-timeout** integer | | SAML authentication timeout in seconds. |
| | **ssh-ca** string | | SSH CA name. |
| | **user-database** string | | Authentication server to contain user information; "local" (default) or "123" (for LDAP). |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure Authentication Schemes.
fmgr_authentication_scheme:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
authentication_scheme:
domain-controller: <value of string>
fsso-agent-for-ntlm: <value of string>
fsso-guest: <value in [disable, enable]>
kerberos-keytab: <value of string>
method:
- ntlm
- basic
- digest
- form
- negotiate
- fsso
- rsso
- ssh-publickey
- saml
- cert
name: <value of string>
negotiate-ntlm: <value in [disable, enable]>
require-tfa: <value in [disable, enable]>
ssh-ca: <value of string>
user-database: <value of string>
ems-device-owner: <value in [disable, enable]>
saml-server: <value of string>
saml-timeout: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_vpn_certificate_ocspserver β OCSP server configuration. fortinet.fortimanager.fmgr\_vpn\_certificate\_ocspserver β OCSP server configuration.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_vpn_certificate_ocspserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **vpn\_certificate\_ocspserver** dictionary | | the top level parameters set |
| | **cert** string | | OCSP server certificate. |
| | **name** string | | OCSP server entry name. |
| | **secondary-cert** string | | Secondary OCSP server certificate. |
| | **secondary-url** string | | Secondary OCSP server URL. |
| | **source-ip** string | | Source IP address for communications to the OCSP server. |
| | **unavail-action** string | **Choices:*** revoke
* ignore
| Action when server is unavailable (revoke the certificate or ignore the result of the check). |
| | **url** string | | OCSP server URL. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: OCSP server configuration.
fmgr_vpn_certificate_ocspserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
vpn_certificate_ocspserver:
cert: <value of string>
name: <value of string>
secondary-cert: <value of string>
secondary-url: <value of string>
source-ip: <value of string>
unavail-action: <value in [revoke, ignore]>
url: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_config_workspace_commit β Commit changes to an ADOM. fortinet.fortimanager.fmgr\_pm\_config\_workspace\_commit β Commit changes to an ADOM.
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_workspace_commit`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Commit changes to an ADOM.
fmgr_pm_config_workspace_commit:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_remotelog β Configure logging by FortiSwitch device to a remote syslog server. fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_remotelog β Configure logging by FortiSwitch device to a remote syslog server.
===========================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_remotelog`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_remotelog** dictionary | | the top level parameters set |
| | **csv** string | **Choices:*** disable
* enable
| Enable/disable comma-separated value (CSV) strings. |
| | **facility** string | **Choices:*** kernel
* user
* mail
* daemon
* auth
* syslog
* lpr
* news
* uucp
* cron
* authpriv
* ftp
* ntp
* audit
* alert
* clock
* local0
* local1
* local2
* local3
* local4
* local5
* local6
* local7
| Facility to log to remote syslog server. |
| | **name** string | | Remote log name. |
| | **port** integer | | Remote syslog server listening port. |
| | **server** string | | IPv4 address of the remote syslog server. |
| | **severity** string | **Choices:*** emergency
* alert
* critical
* error
* warning
* notification
* information
* debug
| Severity of logs to be transferred to remote log server. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable logging by FortiSwitch device to a remote syslog server. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure logging by FortiSwitch device to a remote syslog server.
fmgr_switchcontroller_managedswitch_remotelog:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
state: <value in [present, absent]>
switchcontroller_managedswitch_remotelog:
csv: <value in [disable, enable]>
facility: <value in [kernel, user, mail, ...]>
name: <value of string>
port: <value of integer>
server: <value of string>
severity: <value in [emergency, alert, critical, ...]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_devprof_system_emailserver β Configure the email server used by the FortiGate various things. fortinet.fortimanager.fmgr\_devprof\_system\_emailserver β Configure the email server used by the FortiGate various things.
===========================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_emailserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_emailserver** dictionary | | the top level parameters set |
| | **authenticate** string | **Choices:*** disable
* enable
| Enable/disable authentication. |
| | **interface** string | | Specify outgoing interface to reach server. |
| | **interface-select-method** string | **Choices:*** auto
* sdwan
* specify
| Specify how to select outgoing interface to reach server. |
| | **password** string | | no description |
| | **port** integer | | SMTP server port. |
| | **reply-to** string | | Reply-To email address. |
| | **security** string | **Choices:*** none
* starttls
* smtps
| Connection security used by the email server. |
| | **server** string | | SMTP server IP address or hostname. |
| | **source-ip** string | | SMTP server IPv4 source IP. |
| | **source-ip6** string | | SMTP server IPv6 source IP. |
| | **ssl-min-proto-version** string | **Choices:*** default
* TLSv1
* TLSv1-1
* TLSv1-2
* SSLv3
| Minimum supported protocol version for SSL/TLS connections (default is to follow system global setting). |
| | **type** string | **Choices:*** custom
| Use FortiGuard Message service or custom email server. |
| | **username** string | | SMTP server user name for authentication. |
| | **validate-server** string | **Choices:*** disable
* enable
| Enable/disable validation of server certificate. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure the email server used by the FortiGate various things.
fmgr_devprof_system_emailserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_emailserver:
authenticate: <value in [disable, enable]>
password: <value of string>
port: <value of integer>
reply-to: <value of string>
security: <value in [none, starttls, smtps]>
server: <value of string>
source-ip: <value of string>
source-ip6: <value of string>
ssl-min-proto-version: <value in [default, TLSv1, TLSv1-1, ...]>
type: <value in [custom]>
username: <value of string>
validate-server: <value in [disable, enable]>
interface: <value of string>
interface-select-method: <value in [auto, sdwan, specify]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_anqpipaddresstype β Configure IP address type availability. fortinet.fortimanager.fmgr\_hotspot20\_anqpipaddresstype β Configure IP address type availability.
==================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_anqpipaddresstype`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_anqpipaddresstype** dictionary | | the top level parameters set |
| | **ipv4-address-type** string | **Choices:*** not-available
* not-known
* public
* port-restricted
* single-NATed-private
* double-NATed-private
* port-restricted-and-single-NATed
* port-restricted-and-double-NATed
| IPv4 address type. |
| | **ipv6-address-type** string | **Choices:*** not-available
* available
* not-known
| IPv6 address type. |
| | **name** string | | IP type name. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IP address type availability.
fmgr_hotspot20_anqpipaddresstype:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
hotspot20_anqpipaddresstype:
ipv4-address-type: <value in [not-available, not-known, public, ...]>
ipv6-address-type: <value in [not-available, available, not-known]>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_logfetch_clientprofile β Log-fetch client profile settings. fortinet.fortimanager.fmgr\_system\_logfetch\_clientprofile β Log-fetch client profile settings.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_logfetch_clientprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_logfetch\_clientprofile** dictionary | | the top level parameters set |
| | **client-adom** string | | Log-fetch client sides adom name. |
| | **data-range** string | **Choices:*** **custom** β
| Data-range for fetched logs. custom - Specify some other date and time range. |
| | **data-range-value** integer | **Default:**10 | Last n days or hours. |
| | **device-filter** list / elements=string | | no description |
| | | **adom** string | **Default:**"\*" | Adom name. |
| | | **device** string | **Default:**"\*" | Device name or Serial number. |
| | | **id** integer | **Default:**0 | Add or edit a device filter. |
| | | **vdom** string | **Default:**"\*" | Vdom filters. |
| | **end-time** string | | no description |
| | **id** integer | **Default:**0 | Log-fetch client profile ID. |
| | **index-fetch-logs** string | **Choices:*** disable
* **enable** β
| Enable/Disable indexing logs automatically after fetching logs. disable - Disable attribute function. enable - Enable attribute function. |
| | **log-filter** list / elements=string | | no description |
| | | **field** string | | Field name. |
| | | **id** integer | **Default:**0 | Log filter ID. |
| | | **oper** string | **Choices:*** **=** β
* !=
* <
* >
* <=
* >=
* contain
* not-contain
* match
| Field filter operator. < - =Less than or equal to > - =Greater than or equal to contain - Contain not-contain - Not contain match - Match (expression) |
| | | **value** string | | Field filter operand or free-text matching expression. |
| | **log-filter-logic** string | **Choices:*** and
* **or** β
| And/Or logic for log-filters. and - Logic And. or - Logic Or. |
| | **log-filter-status** string | **Choices:*** **disable** β
* enable
| Enable/Disable log-filter. disable - Disable attribute function. enable - Enable attribute function. |
| | **name** string | | Name of log-fetch client profile. |
| | **password** string | | no description |
| | **secure-connection** string | **Choices:*** disable
* **enable** β
| Enable/Disable protecting log-fetch connection with TLS/SSL. disable - Disable attribute function. enable - Enable attribute function. |
| | **server-adom** string | | Log-fetch server sides adom name. |
| | **server-ip** string | **Default:**"0.0.0.0" | Log-fetch server IP address. |
| | **start-time** string | | no description |
| | **sync-adom-config** string | **Choices:*** **disable** β
* enable
| Enable/Disable sync adom related config. disable - Disable attribute function. enable - Enable attribute function. |
| | **user** string | | Log-fetch server login username. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log-fetch client profile settings.
fmgr_system_logfetch_clientprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_logfetch_clientprofile:
client-adom: <value of string>
data-range: <value in [custom]>
data-range-value: <value of integer>
device-filter:
-
adom: <value of string>
device: <value of string>
id: <value of integer>
vdom: <value of string>
end-time: <value of string>
id: <value of integer>
index-fetch-logs: <value in [disable, enable]>
log-filter:
-
field: <value of string>
id: <value of integer>
oper: <value in [=, !=, <, ...]>
value: <value of string>
log-filter-logic: <value in [and, or]>
log-filter-status: <value in [disable, enable]>
name: <value of string>
password: <value of string>
secure-connection: <value in [disable, enable]>
server-adom: <value of string>
server-ip: <value of string>
start-time: <value of string>
sync-adom-config: <value in [disable, enable]>
user: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_snmp_community_hosts β Allow hosts configuration. fortinet.fortimanager.fmgr\_system\_snmp\_community\_hosts β Allow hosts configuration.
=======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_snmp_community_hosts`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **community** string / required | | the parameter (community) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_snmp\_community\_hosts** dictionary | | the top level parameters set |
| | **id** integer | **Default:**0 | Host entry ID. |
| | **interface** string | | Allow interface name. |
| | **ip** string | **Default:**"0.0.0.0 0.0.0.0" | Allow host IP address. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Allow hosts configuration.
fmgr_system_snmp_community_hosts:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
community: <your own value>
state: <value in [present, absent]>
system_snmp_community_hosts:
id: <value of integer>
interface: <value of string>
ip: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_waf_profile_method β Method restriction. fortinet.fortimanager.fmgr\_waf\_profile\_method β Method restriction.
======================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_waf_profile_method`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **waf\_profile\_method** dictionary | | the top level parameters set |
| | **default-allowed-methods** list / elements=string | **Choices:*** delete
* get
* head
* options
* post
* put
* trace
* others
* connect
| no description |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **method-policy** list / elements=string | | no description |
| | | **address** string | | Host address. |
| | | **allowed-methods** list / elements=string | **Choices:*** delete
* get
* head
* options
* post
* put
* trace
* others
* connect
| no description |
| | | **id** integer | | HTTP method policy ID. |
| | | **pattern** string | | URL pattern. |
| | | **regex** string | **Choices:*** disable
* enable
| Enable/disable regular expression based pattern match. |
| | **severity** string | **Choices:*** low
* medium
* high
| Severity. |
| | **status** string | **Choices:*** disable
* enable
| Status. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Method restriction.
fmgr_waf_profile_method:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
waf_profile_method:
default-allowed-methods:
- delete
- get
- head
- options
- post
- put
- trace
- others
- connect
log: <value in [disable, enable]>
method-policy:
-
address: <value of string>
allowed-methods:
- delete
- get
- head
- options
- post
- put
- trace
- others
- connect
id: <value of integer>
pattern: <value of string>
regex: <value in [disable, enable]>
severity: <value in [low, medium, high]>
status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_snmp_user β SNMP user configuration. fortinet.fortimanager.fmgr\_system\_snmp\_user β SNMP user configuration.
=========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_snmp_user`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_snmp\_user** dictionary | | the top level parameters set |
| | **auth-proto** string | **Choices:*** md5
* **sha** β
| Authentication protocol. md5 - HMAC-MD5-96 authentication protocol. sha - HMAC-SHA-96 authentication protocol. |
| | **auth-pwd** string | | no description |
| | **events** list / elements=string | **Choices:*** disk\_low
* ha\_switch
* intf\_ip\_chg
* sys\_reboot
* cpu\_high
* mem\_low
* log-alert
* log-rate
* log-data-rate
* lic-gbday
* lic-dev-quota
* cpu-high-exclude-nice
| no description |
| | **name** string | | SNMP user name. |
| | **notify-hosts** string | | Hosts to send notifications (traps) to. |
| | **notify-hosts6** string | | IPv6 hosts to send notifications (traps) to. |
| | **priv-proto** string | **Choices:*** **aes** β
* des
| Privacy (encryption) protocol. aes - CFB128-AES-128 symmetric encryption protocol. des - CBC-DES symmetric encryption protocol. |
| | **priv-pwd** string | | no description |
| | **queries** string | **Choices:*** disable
* **enable** β
| Enable/disable queries for this user. disable - Disable setting. enable - Enable setting. |
| | **query-port** integer | **Default:**161 | SNMPv3 query port. |
| | **security-level** string | **Choices:*** **no-auth-no-priv** β
* auth-no-priv
* auth-priv
| Security level for message authentication and encryption. no-auth-no-priv - Message with no authentication and no privacy (encryption). auth-no-priv - Message with authentication but no privacy (encryption). auth-priv - Message with authentication and privacy (encryption). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SNMP user configuration.
fmgr_system_snmp_user:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_snmp_user:
auth-proto: <value in [md5, sha]>
auth-pwd: <value of string>
events:
- disk_low
- ha_switch
- intf_ip_chg
- sys_reboot
- cpu_high
- mem_low
- log-alert
- log-rate
- log-data-rate
- lic-gbday
- lic-dev-quota
- cpu-high-exclude-nice
name: <value of string>
notify-hosts: <value of string>
notify-hosts6: <value of string>
priv-proto: <value in [aes, des]>
priv-pwd: <value of string>
queries: <value in [disable, enable]>
query-port: <value of integer>
security-level: <value in [no-auth-no-priv, auth-no-priv, auth-priv]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_devprof_system_replacemsg_mail β Replacement messages. fortinet.fortimanager.fmgr\_devprof\_system\_replacemsg\_mail β Replacement messages.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_devprof_system_replacemsg_mail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **devprof** string / required | | the parameter (devprof) in requested url |
| **devprof\_system\_replacemsg\_mail** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement messages.
fmgr_devprof_system_replacemsg_mail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
devprof: <your own value>
devprof_system_replacemsg_mail:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_securityconsole_pblock_clone β no description fortinet.fortimanager.fmgr\_securityconsole\_pblock\_clone β no description
===========================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_securityconsole_pblock_clone`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **securityconsole\_pblock\_clone** dictionary | | the top level parameters set |
| | **adom** string | | Source ADOM name. |
| | **dst\_name** string | | no description |
| | **pblock** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_securityconsole_pblock_clone:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
securityconsole_pblock_clone:
adom: <value of string>
dst_name: <value of string>
pblock: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_sql β SQL settings. fortinet.fortimanager.fmgr\_system\_sql β SQL settings.
=======================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_sql`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_sql** dictionary | | the top level parameters set |
| | **background-rebuild** string | **Choices:*** disable
* **enable** β
| Disable/Enable rebuild SQL database in the background. disable - Rebuild SQL database not in the background. enable - Rebuild SQL database in the background. |
| | **compress-table-min-age** integer | **Default:**7 | Minimum age in days for SQL tables to be compressed. |
| | **custom-index** list / elements=string | | no description |
| | | **case-sensitive** string | **Choices:*** **disable** β
* enable
| Disable/Enable case sensitive index. disable - Build a case insensitive index. enable - Build a case sensitive index. |
| | | **device-type** string | **Choices:*** **FortiGate** β
* FortiManager
* FortiClient
* FortiMail
* FortiWeb
* FortiCache
* FortiSandbox
* FortiDDoS
* FortiAuthenticator
* FortiProxy
| Device type. FortiGate - Device type to FortiGate. FortiManager - Set device type to FortiManager FortiClient - Set device type to FortiClient FortiMail - Device type to FortiMail. FortiWeb - Device type to FortiWeb. FortiCache - Set device type to FortiCache FortiSandbox - Set device type to FortiSandbox FortiDDoS - Set device type to FortiDDoS FortiAuthenticator - Set device type to FortiAuthenticator FortiProxy - Set device type to FortiProxy |
| | | **id** integer | **Default:**0 | Add or Edit log index fields. |
| | | **index-field** string | | Log field name to be indexed. |
| | | **log-type** string | **Choices:*** none
* app-ctrl
* attack
* content
* dlp
* emailfilter
* event
* generic
* history
* **traffic** β
* virus
* voip
* webfilter
* netscan
* fct-event
* fct-traffic
* fct-netscan
* waf
* gtp
* dns
* ssh
* ssl
* file-filter
* asset
* protocol
* siem
| Log type. none - none app-ctrl attack content dlp emailfilter event generic history traffic virus voip webfilter netscan fct-event fct-traffic fct-netscan waf gtp dns ssh ssl |
| | **custom-skipidx** list / elements=string | | no description |
| | | **device-type** string | **Choices:*** **FortiGate** β
* FortiManager
* FortiClient
* FortiMail
* FortiWeb
* FortiSandbox
* FortiProxy
| Device type. FortiGate - Set device type to FortiGate. FortiManager - Set device type to FortiManager FortiClient - Set device type to FortiClient. FortiMail - Set device type to FortiMail. FortiWeb - Set device type to FortiWeb. FortiSandbox - Set device type to FortiSandbox FortiProxy - Set device type to FortiProxy |
| | | **id** integer | **Default:**0 | Add or Edit log index fields. |
| | | **index-field** string | | Field to be added to skip index. |
| | | **log-type** string | **Choices:*** **app-ctrl** β
* attack
* content
* dlp
* emailfilter
* event
* generic
* history
* traffic
* virus
* voip
* webfilter
* netscan
* fct-event
* fct-traffic
* fct-netscan
* waf
* gtp
* dns
* ssh
* ssl
* file-filter
* asset
* protocol
* siem
| Log type. app-ctrl attack content dlp emailfilter event generic history traffic virus voip webfilter netscan fct-event fct-traffic fct-netscan waf gtp dns ssh ssl file-filter asset |
| | **database-name** string | | Database name. |
| | **database-type** string | **Choices:*** mysql
* **postgres** β
| Database type. mysql - MySQL database. postgres - PostgreSQL local database. |
| | **device-count-high** string | **Choices:*** **disable** β
* enable
| Must set to enable if the count of registered devices is greater than 8000. disable - Set to disable if device count is less than 8000. enable - Set to enable if device count is equal to or greater than 8000. |
| | **event-table-partition-time** integer | **Default:**0 | Maximum SQL database table partitioning time range in minute (0 for unlimited) for event logs. |
| | **fct-table-partition-time** integer | **Default:**240 | Maximum SQL database table partitioning time range in minute (0 for unlimited) for FortiClient logs. |
| | **logtype** list / elements=string | **Choices:*** none
* app-ctrl
* attack
* content
* dlp
* emailfilter
* event
* generic
* history
* traffic
* virus
* voip
* webfilter
* netscan
* fct-event
* fct-traffic
* fct-netscan
* waf
* gtp
* dns
* ssh
* ssl
* file-filter
* asset
* protocol
* siem
| no description |
| | **password** string | | no description |
| | **prompt-sql-upgrade** string | **Choices:*** disable
* **enable** β
| Prompt to convert log database into SQL database at start time on GUI. disable - Do not prompt to upgrade log database to SQL database at start time on GUI. enable - Prompt to upgrade log database to SQL database at start time on GUI. |
| | **rebuild-event** string | **Choices:*** disable
* **enable** β
| Disable/Enable rebuild event during SQL database rebuilding. disable - Do not rebuild event during SQL database rebuilding. enable - Rebuild event during SQL database rebuilding. |
| | **rebuild-event-start-time** string | | no description |
| | **server** string | | Database IP or hostname. |
| | **start-time** string | | no description |
| | **status** string | **Choices:*** disable
* **local** β
| SQL database status. disable - Disable SQL database. local - Enable local database. |
| | **text-search-index** string | **Choices:*** **disable** β
* enable
| Disable/Enable text search index. disable - Do not create text search index. enable - Create text search index. |
| | **traffic-table-partition-time** integer | **Default:**0 | Maximum SQL database table partitioning time range in minute (0 for unlimited) for traffic logs. |
| | **ts-index-field** list / elements=string | | no description |
| | | **category** string | | Category of text search index fields. |
| | | **value** string | | Fields of text search index. |
| | **username** string | | User name for login remote database. |
| | **utm-table-partition-time** integer | **Default:**0 | Maximum SQL database table partitioning time range in minute (0 for unlimited) for UTM logs. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SQL settings.
fmgr_system_sql:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_sql:
background-rebuild: <value in [disable, enable]>
custom-index:
-
case-sensitive: <value in [disable, enable]>
device-type: <value in [FortiGate, FortiManager, FortiClient, ...]>
id: <value of integer>
index-field: <value of string>
log-type: <value in [none, app-ctrl, attack, ...]>
database-name: <value of string>
database-type: <value in [mysql, postgres]>
device-count-high: <value in [disable, enable]>
event-table-partition-time: <value of integer>
fct-table-partition-time: <value of integer>
logtype:
- none
- app-ctrl
- attack
- content
- dlp
- emailfilter
- event
- generic
- history
- traffic
- virus
- voip
- webfilter
- netscan
- fct-event
- fct-traffic
- fct-netscan
- waf
- gtp
- dns
- ssh
- ssl
- file-filter
- asset
- protocol
- siem
password: <value of string>
prompt-sql-upgrade: <value in [disable, enable]>
rebuild-event: <value in [disable, enable]>
rebuild-event-start-time: <value of string>
server: <value of string>
start-time: <value of string>
status: <value in [disable, local]>
text-search-index: <value in [disable, enable]>
traffic-table-partition-time: <value of integer>
ts-index-field:
-
category: <value of string>
value: <value of string>
username: <value of string>
utm-table-partition-time: <value of integer>
custom-skipidx:
-
device-type: <value in [FortiGate, FortiManager, FortiClient, ...]>
id: <value of integer>
index-field: <value of string>
log-type: <value in [app-ctrl, attack, content, ...]>
compress-table-min-age: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_user_domaincontroller_extraserver β extra servers. fortinet.fortimanager.fmgr\_user\_domaincontroller\_extraserver β extra servers.
================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_user_domaincontroller_extraserver`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **domain-controller** string / required | | the parameter (domain-controller) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **user\_domaincontroller\_extraserver** dictionary | | the top level parameters set |
| | **id** integer | | Server ID. |
| | **ip-address** string | | Domain controller IP address. |
| | **port** integer | | Port to be used for communication with the domain controller (default = 445). |
| | **source-ip-address** string | | FortiGate IPv4 address to be used for communication with the domain controller. |
| | **source-port** integer | | Source port to be used for communication with the domain controller. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: extra servers.
fmgr_user_domaincontroller_extraserver:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
domain-controller: <your own value>
state: <value in [present, absent]>
user_domaincontroller_extraserver:
id: <value of integer>
ip-address: <value of string>
port: <value of integer>
source-ip-address: <value of string>
source-port: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_antivirus_profile_http β Configure HTTP AntiVirus options. fortinet.fortimanager.fmgr\_antivirus\_profile\_http β Configure HTTP AntiVirus options.
========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_antivirus_profile_http`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **antivirus\_profile\_http** dictionary | | the top level parameters set |
| | **archive-block** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **archive-log** list / elements=string | **Choices:*** encrypted
* corrupted
* multipart
* nested
* mailbomb
* unhandled
* partiallycorrupted
* fileslimit
* timeout
| no description |
| | **av-optimize** string | **Choices:*** disable
* enable
| Enable/disable AV optimization for this protocol. |
| | **av-scan** string | **Choices:*** disable
* monitor
* block
| Enable AntiVirus scan service. |
| | **content-disarm** string | **Choices:*** disable
* enable
| Enable Content Disarm and Reconstruction for this protocol. |
| | **emulator** string | **Choices:*** disable
* enable
| Enable/disable the virus emulator. |
| | **external-blocklist** string | **Choices:*** disable
* monitor
* block
| Enable external-blocklist. |
| | **options** list / elements=string | **Choices:*** scan
* file-filter
* quarantine
* avquery
* avmonitor
* strict-file
| no description |
| | **outbreak-prevention** string | **Choices:*** disabled
* files
* full-archive
* disable
* block
* monitor
| Enable FortiGuard Virus Outbreak Prevention service. |
| | **quarantine** string | **Choices:*** disable
* enable
| Enable/disable quarantine for infected files. |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure HTTP AntiVirus options.
fmgr_antivirus_profile_http:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
antivirus_profile_http:
archive-block:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
archive-log:
- encrypted
- corrupted
- multipart
- nested
- mailbomb
- unhandled
- partiallycorrupted
- fileslimit
- timeout
content-disarm: <value in [disable, enable]>
emulator: <value in [disable, enable]>
options:
- scan
- file-filter
- quarantine
- avquery
- avmonitor
- strict-file
outbreak-prevention: <value in [disabled, files, full-archive, ...]>
av-optimize: <value in [disable, enable]>
av-scan: <value in [disable, monitor, block]>
external-blocklist: <value in [disable, monitor, block]>
quarantine: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_internetservicename β Define internet service names. fortinet.fortimanager.fmgr\_firewall\_internetservicename β Define internet service names.
==========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_internetservicename`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_internetservicename** dictionary | | the top level parameters set |
| | **city-id** integer | | City ID. |
| | **country-id** integer | | Country or Area ID. |
| | **internet-service-id** string | | Internet Service ID. |
| | **name** string | | Internet Service name. |
| | **region-id** integer | | Region ID. |
| | **type** string | **Choices:*** default
* location
| Internet Service name type. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Define internet service names.
fmgr_firewall_internetservicename:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
firewall_internetservicename:
city-id: <value of integer>
country-id: <value of integer>
internet-service-id: <value of string>
name: <value of string>
region-id: <value of integer>
type: <value in [default, location]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_smtps β Configure SMTPS options. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_smtps β Configure SMTPS options.
=====================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_smtps`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_smtps** dictionary | | the top level parameters set |
| | **allow-invalid-server-cert** string | **Choices:*** disable
* enable
| When enabled, allows SSL sessions whose server certificate validation failed. |
| | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | **client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request. |
| | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | **invalid-server-cert** string | **Choices:*** allow
* block
| Allow or block the invalid SSL session server certificate. |
| | **ports** integer | | no description |
| | **proxy-after-tcp-handshake** string | **Choices:*** disable
* enable
| Proxy traffic after the TCP 3-way handshake has been established (not before). |
| | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | **status** string | **Choices:*** disable
* deep-inspection
| Configure protocol inspection status. |
| | **unsupported-ssl** string | **Choices:*** bypass
* inspect
* block
| Action based on the SSL encryption used being unsupported. |
| | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | **untrusted-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SMTPS options.
fmgr_firewall_sslsshprofile_smtps:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
firewall_sslsshprofile_smtps:
allow-invalid-server-cert: <value in [disable, enable]>
client-cert-request: <value in [bypass, inspect, block]>
ports: <value of integer>
status: <value in [disable, deep-inspection]>
unsupported-ssl: <value in [bypass, inspect, block]>
untrusted-cert: <value in [allow, block, ignore]>
invalid-server-cert: <value in [allow, block]>
sni-server-cert-check: <value in [disable, enable, strict]>
untrusted-server-cert: <value in [allow, block, ignore]>
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
proxy-after-tcp-handshake: <value in [disable, enable]>
revoked-server-cert: <value in [allow, block, ignore]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_webfilter_contentheader_entries β Configure content types used by web filter. fortinet.fortimanager.fmgr\_webfilter\_contentheader\_entries β Configure content types used by web filter.
===========================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_webfilter_contentheader_entries`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **content-header** string / required | | the parameter (content-header) in requested url |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **webfilter\_contentheader\_entries** dictionary | | the top level parameters set |
| | **action** string | **Choices:*** exempt
* block
* allow
| Action to take for this content type. |
| | **category** string | | Categories that this content type applies to. |
| | **pattern** string | | Content type (regular expression). |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure content types used by web filter.
fmgr_webfilter_contentheader_entries:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
content-header: <your own value>
state: <value in [present, absent]>
webfilter_contentheader_entries:
action: <value in [exempt, block, allow]>
category: <value of string>
pattern: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_hotspot20_hsprofile β Configure hotspot profile. fortinet.fortimanager.fmgr\_hotspot20\_hsprofile β Configure hotspot profile.
=============================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_hotspot20_hsprofile`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **hotspot20\_hsprofile** dictionary | | the top level parameters set |
| | **3gpp-plmn** string | | 3GPP PLMN name. |
| | **access-network-asra** string | **Choices:*** disable
* enable
| Enable/disable additional step required for access (ASRA). |
| | **access-network-esr** string | **Choices:*** disable
* enable
| Enable/disable emergency services reachable (ESR). |
| | **access-network-internet** string | **Choices:*** disable
* enable
| Enable/disable connectivity to the Internet. |
| | **access-network-type** string | **Choices:*** private-network
* private-network-with-guest-access
* chargeable-public-network
* free-public-network
* personal-device-network
* emergency-services-only-network
* test-or-experimental
* wildcard
| Access network type. |
| | **access-network-uesa** string | **Choices:*** disable
* enable
| Enable/disable unauthenticated emergency service accessible (UESA). |
| | **anqp-domain-id** integer | | ANQP Domain ID (0-65535). |
| | **bss-transition** string | **Choices:*** disable
* enable
| Enable/disable basic service set (BSS) transition Support. |
| | **conn-cap** string | | Connection capability name. |
| | **deauth-request-timeout** integer | | Deauthentication request timeout (in seconds). |
| | **dgaf** string | **Choices:*** disable
* enable
| Enable/disable downstream group-addressed forwarding (DGAF). |
| | **domain-name** string | | Domain name. |
| | **gas-comeback-delay** integer | | GAS comeback delay (0 or 100 - 4000 milliseconds, default = 500). |
| | **gas-fragmentation-limit** integer | | GAS fragmentation limit (512 - 4096, default = 1024). |
| | **hessid** string | | Homogeneous extended service set identifier (HESSID). |
| | **ip-addr-type** string | | IP address type name. |
| | **l2tif** string | **Choices:*** disable
* enable
| Enable/disable Layer 2 traffic inspection and filtering. |
| | **nai-realm** string | | NAI realm list name. |
| | **name** string | | Hotspot profile name. |
| | **network-auth** string | | Network authentication name. |
| | **oper-friendly-name** string | | Operator friendly name. |
| | **osu-provider** string | | Manually selected list of OSU provider(s). |
| | **osu-ssid** string | | Online sign up (OSU) SSID. |
| | **pame-bi** string | **Choices:*** disable
* enable
| Enable/disable Pre-Association Message Exchange BSSID Independent (PAME-BI). |
| | **proxy-arp** string | **Choices:*** disable
* enable
| Enable/disable Proxy ARP. |
| | **qos-map** string | | QoS MAP set ID. |
| | **roaming-consortium** string | | Roaming consortium list name. |
| | **venue-group** string | **Choices:*** unspecified
* assembly
* business
* educational
* factory
* institutional
* mercantile
* residential
* storage
* utility
* vehicular
* outdoor
| Venue group. |
| | **venue-name** string | | Venue name. |
| | **venue-type** string | **Choices:*** unspecified
* arena
* stadium
* passenger-terminal
* amphitheater
* amusement-park
* place-of-worship
* convention-center
* library
* museum
* restaurant
* theater
* bar
* coffee-shop
* zoo-or-aquarium
* emergency-center
* doctor-office
* bank
* fire-station
* police-station
* post-office
* professional-office
* research-facility
* attorney-office
* primary-school
* secondary-school
* university-or-college
* factory
* hospital
* long-term-care-facility
* rehab-center
* group-home
* prison-or-jail
* retail-store
* grocery-market
* auto-service-station
* shopping-mall
* gas-station
* private
* hotel-or-motel
* dormitory
* boarding-house
* automobile
* airplane
* bus
* ferry
* ship-or-boat
* train
* motor-bike
* muni-mesh-network
* city-park
* rest-area
* traffic-control
* bus-stop
* kiosk
| Venue type. |
| | **wan-metrics** string | | WAN metric name. |
| | **wnm-sleep-mode** string | **Choices:*** disable
* enable
| Enable/disable wireless network management (WNM) sleep mode. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure hotspot profile.
fmgr_hotspot20_hsprofile:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
hotspot20_hsprofile:
3gpp-plmn: <value of string>
access-network-asra: <value in [disable, enable]>
access-network-esr: <value in [disable, enable]>
access-network-internet: <value in [disable, enable]>
access-network-type: <value in [private-network, private-network-with-guest-access, chargeable-public-network, ...]>
access-network-uesa: <value in [disable, enable]>
anqp-domain-id: <value of integer>
bss-transition: <value in [disable, enable]>
conn-cap: <value of string>
deauth-request-timeout: <value of integer>
dgaf: <value in [disable, enable]>
domain-name: <value of string>
gas-comeback-delay: <value of integer>
gas-fragmentation-limit: <value of integer>
hessid: <value of string>
ip-addr-type: <value of string>
l2tif: <value in [disable, enable]>
nai-realm: <value of string>
name: <value of string>
network-auth: <value of string>
oper-friendly-name: <value of string>
osu-provider: <value of string>
osu-ssid: <value of string>
pame-bi: <value in [disable, enable]>
proxy-arp: <value in [disable, enable]>
qos-map: <value of string>
roaming-consortium: <value of string>
venue-group: <value in [unspecified, assembly, business, ...]>
venue-name: <value of string>
venue-type: <value in [unspecified, arena, stadium, ...]>
wan-metrics: <value of string>
wnm-sleep-mode: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_extendercontroller_dataplan β FortiExtender dataplan configuration. fortinet.fortimanager.fmgr\_extendercontroller\_dataplan β FortiExtender dataplan configuration.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_extendercontroller_dataplan`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **extendercontroller\_dataplan** dictionary | | the top level parameters set |
| | **apn** string | | APN configuration. |
| | **auth-type** string | **Choices:*** none
* pap
* chap
| Authentication type. |
| | **billing-date** integer | | Billing day of the month (1 - 31). |
| | **capacity** integer | | Capacity in MB (0 - 102400000). |
| | **carrier** string | | Carrier configuration. |
| | **iccid** string | | ICCID configuration. |
| | **modem-id** string | **Choices:*** all
* modem1
* modem2
| Dataplans modem specifics, if any. |
| | **monthly-fee** integer | | Monthly fee of dataplan (0 - 100000, in local currency). |
| | **name** string | | FortiExtender dataplan name |
| | **overage** string | **Choices:*** disable
* enable
| Enable/disable dataplan overage detection. |
| | **password** string | | no description |
| | **pdn** string | **Choices:*** ipv4-only
* ipv6-only
* ipv4-ipv6
| PDN type. |
| | **preferred-subnet** integer | | Preferred subnet mask (8 - 32). |
| | **private-network** string | **Choices:*** disable
* enable
| Enable/disable dataplan private network support. |
| | **signal-period** integer | | Signal period (600 to 18000 seconds). |
| | **signal-threshold** integer | | Signal threshold. Specify the range between 50 - 100, where 50/100 means -50/-100 dBm. |
| | **slot** string | **Choices:*** sim1
* sim2
| SIM slot configuration. |
| | **status** string | **Choices:*** disable
* enable
| FortiExtender dataplan (enable or disable). |
| | **type** string | **Choices:*** carrier
* slot
* iccid
* generic
| Type preferences configuration. |
| | **username** string | | Username. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: FortiExtender dataplan configuration.
fmgr_extendercontroller_dataplan:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
state: <value in [present, absent]>
extendercontroller_dataplan:
apn: <value of string>
auth-type: <value in [none, pap, chap]>
billing-date: <value of integer>
capacity: <value of integer>
carrier: <value of string>
iccid: <value of string>
modem-id: <value in [all, modem1, modem2]>
monthly-fee: <value of integer>
name: <value of string>
overage: <value in [disable, enable]>
password: <value of string>
pdn: <value in [ipv4-only, ipv6-only, ipv4-ipv6]>
preferred-subnet: <value of integer>
private-network: <value in [disable, enable]>
signal-period: <value of integer>
signal-threshold: <value of integer>
slot: <value in [sim1, sim2]>
status: <value in [disable, enable]>
type: <value in [carrier, slot, iccid, ...]>
username: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_switchcontroller_managedswitch_ports β Managed-switch port list. fortinet.fortimanager.fmgr\_switchcontroller\_managedswitch\_ports β Managed-switch port list.
==============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_switchcontroller_managedswitch_ports`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **managed-switch** string / required | | the parameter (managed-switch) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **switchcontroller\_managedswitch\_ports** dictionary | | the top level parameters set |
| | **access-mode** string | **Choices:*** normal
* nac
* dynamic
* static
| Access mode of the port. |
| | **aggregator-mode** string | **Choices:*** bandwidth
* count
| LACP member select mode. |
| | **allowed-vlans** string | | Configure switch port tagged vlans |
| | **allowed-vlans-all** string | **Choices:*** disable
* enable
| Enable/disable all defined vlans on this port. |
| | **arp-inspection-trust** string | **Choices:*** untrusted
* trusted
| Trusted or untrusted dynamic ARP inspection. |
| | **bundle** string | **Choices:*** disable
* enable
| Enable/disable Link Aggregation Group (LAG) bundling for non-FortiLink interfaces. |
| | **description** string | | Description for port. |
| | **dhcp-snoop-option82-trust** string | **Choices:*** disable
* enable
| Enable/disable allowance of DHCP with option-82 on untrusted interface. |
| | **dhcp-snooping** string | **Choices:*** trusted
* untrusted
| Trusted or untrusted DHCP-snooping interface. |
| | **discard-mode** string | **Choices:*** none
* all-untagged
* all-tagged
| Configure discard mode for port. |
| | **edge-port** string | **Choices:*** disable
* enable
| Enable/disable this interface as an edge port, bridging connections between workstations and/or computers. |
| | **export-to-pool-flag** integer | | Switch controller export port to pool-list. |
| | **fec-capable** integer | | FEC capable. |
| | **fec-state** string | **Choices:*** disabled
* cl74
* cl91
| State of forward error correction. |
| | **flow-control** string | **Choices:*** disable
* tx
* rx
* both
| Flow control direction. |
| | **igmp-snooping** string | **Choices:*** disable
* enable
| Set IGMP snooping mode for the physical port interface. |
| | **igmps-flood-reports** string | **Choices:*** disable
* enable
| Enable/disable flooding of IGMP reports to this interface when igmp-snooping enabled. |
| | **igmps-flood-traffic** string | **Choices:*** disable
* enable
| Enable/disable flooding of IGMP snooping traffic to this interface. |
| | **ip-source-guard** string | **Choices:*** disable
* enable
| Enable/disable IP source guard. |
| | **lacp-speed** string | **Choices:*** slow
* fast
| end Link Aggregation Control Protocol (LACP) messages every 30 seconds (slow) or every second (fast). |
| | **learning-limit** integer | | Limit the number of dynamic MAC addresses on this Port (1 - 128, 0 = no limit, default). |
| | **lldp-profile** string | | LLDP port TLV profile. |
| | **lldp-status** string | **Choices:*** disable
* rx-only
* tx-only
* tx-rx
| LLDP transmit and receive status. |
| | **loop-guard** string | **Choices:*** disabled
* enabled
| Enable/disable loop-guard on this interface, an STP optimization used to prevent network loops. |
| | **loop-guard-timeout** integer | | Loop-guard timeout (0 - 120 min, default = 45). |
| | **mac-addr** string | | Port/Trunk MAC. |
| | **matched-dpp-intf-tags** string | | Matched interface tags in the dynamic port policy. |
| | **matched-dpp-policy** string | | Matched child policy in the dynamic port policy. |
| | **max-bundle** integer | | Maximum size of LAG bundle (1 - 24, default = 24) |
| | **mclag** string | **Choices:*** disable
* enable
| Enable/disable multi-chassis link aggregation (MCLAG). |
| | **mclag-icl-port** integer | | no description |
| | **media-type** string | | no description |
| | **member-withdrawal-behavior** string | **Choices:*** forward
* block
| Port behavior after it withdraws because of loss of control packets. |
| | **members** string | | no description |
| | **min-bundle** integer | | Minimum size of LAG bundle (1 - 24, default = 1) |
| | **mode** string | **Choices:*** static
* lacp-passive
* lacp-active
| LACP mode: ignore and do not send control messages, or negotiate 802.3ad aggregation passively or actively. |
| | **p2p-port** integer | | no description |
| | **packet-sample-rate** integer | | Packet sampling rate (0 - 99999 p/sec). |
| | **packet-sampler** string | **Choices:*** disabled
* enabled
| Enable/disable packet sampling on this interface. |
| | **pause-meter** integer | | Configure ingress pause metering rate, in kbps (default = 0, disabled). |
| | **pause-meter-resume** string | **Choices:*** 25%
* 50%
* 75%
| Resume threshold for resuming traffic on ingress port. |
| | **poe-pre-standard-detection** string | **Choices:*** disable
* enable
| Enable/disable PoE pre-standard detection. |
| | **poe-status** string | **Choices:*** disable
* enable
| Enable/disable PoE status. |
| | **port-name** string | | Switch port name. |
| | **port-owner** string | | Switch port name. |
| | **port-policy** string | | Switch controller dynamic port policy from available options. |
| | **port-security-policy** string | | Switch controller authentication policy to apply to this managed switch from available options. |
| | **port-selection-criteria** string | **Choices:*** src-mac
* dst-mac
* src-dst-mac
* src-ip
* dst-ip
* src-dst-ip
| Algorithm for aggregate port selection. |
| | **qos-policy** string | | Switch controller QoS policy from available options. |
| | **rpvst-port** string | **Choices:*** disabled
* enabled
| Enable/disable inter-operability with rapid PVST on this interface. |
| | **sample-direction** string | **Choices:*** rx
* tx
* both
| sFlow sample direction. |
| | **sflow-counter-interval** integer | | sFlow sampler counter polling interval (1 - 255 sec). |
| | **sflow-sample-rate** integer | | sFlow sampler sample rate (0 - 99999 p/sec). |
| | **sflow-sampler** string | **Choices:*** disabled
* enabled
| Enable/disable sFlow protocol on this interface. |
| | **status** string | **Choices:*** down
* up
| Switch port admin status: up or down. |
| | **sticky-mac** string | **Choices:*** disable
* enable
| Enable or disable sticky-mac on the interface. |
| | **storm-control-policy** string | | Switch controller storm control policy from available options. |
| | **stp-bpdu-guard** string | **Choices:*** disabled
* enabled
| Enable/disable STP BPDU guard on this interface. |
| | **stp-bpdu-guard-timeout** integer | | BPDU Guard disabling protection (0 - 120 min). |
| | **stp-root-guard** string | **Choices:*** disabled
* enabled
| Enable/disable STP root guard on this interface. |
| | **stp-state** string | **Choices:*** disabled
* enabled
| Enable/disable Spanning Tree Protocol (STP) on this interface. |
| | **trunk-member** integer | | Trunk member. |
| | **type** string | **Choices:*** physical
* trunk
| Interface type: physical or trunk port. |
| | **untagged-vlans** string | | Configure switch port untagged vlans |
| | **vlan** string | | Assign switch ports to a VLAN. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Managed-switch port list.
fmgr_switchcontroller_managedswitch_ports:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
managed-switch: <your own value>
state: <value in [present, absent]>
switchcontroller_managedswitch_ports:
allowed-vlans: <value of string>
allowed-vlans-all: <value in [disable, enable]>
arp-inspection-trust: <value in [untrusted, trusted]>
bundle: <value in [disable, enable]>
description: <value of string>
dhcp-snoop-option82-trust: <value in [disable, enable]>
dhcp-snooping: <value in [trusted, untrusted]>
discard-mode: <value in [none, all-untagged, all-tagged]>
edge-port: <value in [disable, enable]>
igmp-snooping: <value in [disable, enable]>
igmps-flood-reports: <value in [disable, enable]>
igmps-flood-traffic: <value in [disable, enable]>
lacp-speed: <value in [slow, fast]>
learning-limit: <value of integer>
lldp-profile: <value of string>
lldp-status: <value in [disable, rx-only, tx-only, ...]>
loop-guard: <value in [disabled, enabled]>
loop-guard-timeout: <value of integer>
max-bundle: <value of integer>
mclag: <value in [disable, enable]>
member-withdrawal-behavior: <value in [forward, block]>
members: <value of string>
min-bundle: <value of integer>
mode: <value in [static, lacp-passive, lacp-active]>
poe-pre-standard-detection: <value in [disable, enable]>
poe-status: <value in [disable, enable]>
port-name: <value of string>
port-owner: <value of string>
port-security-policy: <value of string>
port-selection-criteria: <value in [src-mac, dst-mac, src-dst-mac, ...]>
qos-policy: <value of string>
sample-direction: <value in [rx, tx, both]>
sflow-counter-interval: <value of integer>
sflow-sample-rate: <value of integer>
sflow-sampler: <value in [disabled, enabled]>
stp-bpdu-guard: <value in [disabled, enabled]>
stp-bpdu-guard-timeout: <value of integer>
stp-root-guard: <value in [disabled, enabled]>
stp-state: <value in [disabled, enabled]>
type: <value in [physical, trunk]>
untagged-vlans: <value of string>
vlan: <value of string>
export-to-pool-flag: <value of integer>
mac-addr: <value of string>
packet-sample-rate: <value of integer>
packet-sampler: <value in [disabled, enabled]>
sticky-mac: <value in [disable, enable]>
storm-control-policy: <value of string>
access-mode: <value in [normal, nac, dynamic, ...]>
ip-source-guard: <value in [disable, enable]>
mclag-icl-port: <value of integer>
p2p-port: <value of integer>
aggregator-mode: <value in [bandwidth, count]>
rpvst-port: <value in [disabled, enabled]>
flow-control: <value in [disable, tx, rx, ...]>
media-type: <value of string>
pause-meter: <value of integer>
pause-meter-resume: <value in [25%, 50%, 75%]>
trunk-member: <value of integer>
fec-capable: <value of integer>
fec-state: <value in [disabled, cl74, cl91]>
matched-dpp-intf-tags: <value of string>
matched-dpp-policy: <value of string>
port-policy: <value of string>
status: <value in [down, up]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_mail β Alert emails. fortinet.fortimanager.fmgr\_system\_mail β Alert emails.
========================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_mail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_mail** dictionary | | the top level parameters set |
| | **auth** string | **Choices:*** **disable** β
* enable
| Enable authentication. disable - Disable authentication. enable - Enable authentication. |
| | **auth-type** string | **Choices:*** **psk** β
* certificate
| SMTP authentication type. psk - Use username and password to authenticate. certificate - Use local certificate to authenticate. |
| | **id** string | | Mail Service ID. |
| | **local-cert** string | | SMTP local certificate. |
| | **passwd** string | | no description |
| | **port** integer | **Default:**25 | SMTP server port. |
| | **secure-option** string | **Choices:*** **default** β
* none
* smtps
* starttls
| Communication secure option. default - Try STARTTLS, proceed as plain text communication otherwise. none - Communication will be in plain text format. smtps - Communication will be protected by SMTPS. starttls - Communication will be protected by STARTTLS. |
| | **server** string | | SMTP server. |
| | **user** string | | SMTP account username. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Alert emails.
fmgr_system_mail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
state: <value in [present, absent]>
system_mail:
auth: <value in [disable, enable]>
id: <value of string>
passwd: <value of string>
port: <value of integer>
secure-option: <value in [default, none, smtps, ...]>
server: <value of string>
user: <value of string>
auth-type: <value in [psk, certificate]>
local-cert: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pkg_firewall_policy6_sectionvalue β Configure IPv6 policies. fortinet.fortimanager.fmgr\_pkg\_firewall\_policy6\_sectionvalue β Configure IPv6 policies.
===========================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pkg_firewall_policy6_sectionvalue`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pkg** string / required | | the parameter (pkg) in requested url |
| **pkg\_firewall\_policy6\_sectionvalue** dictionary | | the top level parameters set |
| | **attr** string | **Choices:*** label
* global-label
| no description |
| | **name** string | | no description |
| **policy6** string / required | | the parameter (policy6) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure IPv6 policies.
fmgr_pkg_firewall_policy6_sectionvalue:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
pkg: <your own value>
policy6: <your own value>
state: <value in [present, absent]>
pkg_firewall_policy6_sectionvalue:
attr: <value in [label, global-label]>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_sys_login_user β Log into the device with user name and password. fortinet.fortimanager.fmgr\_sys\_login\_user β Log into the device with user name and password.
===============================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_sys_login_user`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **sys\_login\_user** dictionary | | the top level parameters set |
| | **passwd** string | | no description |
| | **user** string | | no description |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Log into the device with user name and password.
fmgr_sys_login_user:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
sys_login_user:
passwd: <value of string>
user: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_firewall_accessproxy_apigateway_sslciphersuites β SSL/TLS cipher suites to offer to a server, ordered by priority. fortinet.fortimanager.fmgr\_firewall\_accessproxy\_apigateway\_sslciphersuites β SSL/TLS cipher suites to offer to a server, ordered by priority.
=================================================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_accessproxy_apigateway_sslciphersuites`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **access-proxy** string / required | | the parameter (access-proxy) in requested url |
| **adom** string / required | | the parameter (adom) in requested url |
| **api-gateway** string / required | | the parameter (api-gateway) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_accessproxy\_apigateway\_sslciphersuites** dictionary | | the top level parameters set |
| | **cipher** string | **Choices:*** TLS-RSA-WITH-RC4-128-MD5
* TLS-RSA-WITH-RC4-128-SHA
* TLS-RSA-WITH-DES-CBC-SHA
* TLS-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA
* TLS-RSA-WITH-AES-256-CBC-SHA
* TLS-RSA-WITH-AES-128-CBC-SHA256
* TLS-RSA-WITH-AES-256-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-RSA-WITH-SEED-CBC-SHA
* TLS-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-RSA-WITH-DES-CBC-SHA
* TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA
* TLS-DHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-DHE-RSA-WITH-AES-256-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-RSA-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-RSA-WITH-SEED-CBC-SHA
* TLS-DHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-RC4-128-SHA
* TLS-ECDHE-RSA-WITH-3DES-EDE-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
* TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-CHACHA20-POLY1305-SHA256
* TLS-DHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA
* TLS-DHE-DSS-WITH-AES-128-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-128-GCM-SHA256
* TLS-DHE-DSS-WITH-AES-256-CBC-SHA256
* TLS-DHE-DSS-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
* TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
* TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
* TLS-RSA-WITH-AES-128-GCM-SHA256
* TLS-RSA-WITH-AES-256-GCM-SHA384
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA
* TLS-DHE-DSS-WITH-CAMELLIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-CAMELLIA-256-CBC-SHA256
* TLS-DHE-DSS-WITH-SEED-CBC-SHA
* TLS-DHE-DSS-WITH-ARIA-128-CBC-SHA256
* TLS-DHE-DSS-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-RSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-RSA-WITH-ARIA-256-CBC-SHA384
* TLS-ECDHE-ECDSA-WITH-ARIA-128-CBC-SHA256
* TLS-ECDHE-ECDSA-WITH-ARIA-256-CBC-SHA384
* TLS-DHE-DSS-WITH-3DES-EDE-CBC-SHA
* TLS-DHE-DSS-WITH-DES-CBC-SHA
* TLS-AES-128-GCM-SHA256
* TLS-AES-256-GCM-SHA384
* TLS-CHACHA20-POLY1305-SHA256
| Cipher suite name. |
| | **priority** integer | | SSL/TLS cipher suites priority. |
| | **versions** list / elements=string | **Choices:*** tls-1.0
* tls-1.1
* tls-1.2
* tls-1.3
| no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: SSL/TLS cipher suites to offer to a server, ordered by priority.
fmgr_firewall_accessproxy_apigateway_sslciphersuites:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
access-proxy: <your own value>
api-gateway: <your own value>
state: <value in [present, absent]>
firewall_accessproxy_apigateway_sslciphersuites:
cipher: <value in [TLS-RSA-WITH-RC4-128-MD5, TLS-RSA-WITH-RC4-128-SHA, TLS-RSA-WITH-DES-CBC-SHA, ...]>
priority: <value of integer>
versions:
- tls-1.0
- tls-1.1
- tls-1.2
- tls-1.3
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_firewall_sslsshprofile_ssl β Configure SSL options. fortinet.fortimanager.fmgr\_firewall\_sslsshprofile\_ssl β Configure SSL options.
=================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_firewall_sslsshprofile_ssl`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **firewall\_sslsshprofile\_ssl** dictionary | | the top level parameters set |
| | **allow-invalid-server-cert** string | **Choices:*** disable
* enable
| When enabled, allows SSL sessions whose server certificate validation failed. |
| | **cert-validation-failure** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation failure. |
| | **cert-validation-timeout** string | **Choices:*** allow
* block
* ignore
| Action based on certificate validation timeout. |
| | **client-cert-request** string | **Choices:*** bypass
* inspect
* block
| Action based on client certificate request. |
| | **client-certificate** string | **Choices:*** bypass
* inspect
* block
| Action based on received client certificate. |
| | **expired-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is expired. |
| | **inspect-all** string | **Choices:*** disable
* certificate-inspection
* deep-inspection
| Level of SSL inspection. |
| | **invalid-server-cert** string | **Choices:*** allow
* block
| Allow or block the invalid SSL session server certificate. |
| | **revoked-server-cert** string | **Choices:*** allow
* block
* ignore
| Action based on server certificate is revoked. |
| | **sni-server-cert-check** string | **Choices:*** disable
* enable
* strict
| Check the SNI in the client hello message with the CN or SAN fields in the returned server certificate. |
| | **unsupported-ssl** string | **Choices:*** bypass
* inspect
* block
| Action based on the SSL encryption used being unsupported. |
| | **unsupported-ssl-cipher** string | **Choices:*** allow
* block
| Action based on the SSL cipher used being unsupported. |
| | **unsupported-ssl-negotiation** string | **Choices:*** allow
* block
| Action based on the SSL negotiation used being unsupported. |
| | **untrusted-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| | **untrusted-server-cert** string | **Choices:*** allow
* block
* ignore
| Allow, ignore, or block the untrusted SSL session server certificate. |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **ssl-ssh-profile** string / required | | the parameter (ssl-ssh-profile) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure SSL options.
fmgr_firewall_sslsshprofile_ssl:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
ssl-ssh-profile: <your own value>
firewall_sslsshprofile_ssl:
allow-invalid-server-cert: <value in [disable, enable]>
client-cert-request: <value in [bypass, inspect, block]>
inspect-all: <value in [disable, certificate-inspection, deep-inspection]>
unsupported-ssl: <value in [bypass, inspect, block]>
untrusted-cert: <value in [allow, block, ignore]>
invalid-server-cert: <value in [allow, block]>
sni-server-cert-check: <value in [disable, enable, strict]>
untrusted-server-cert: <value in [allow, block, ignore]>
cert-validation-failure: <value in [allow, block, ignore]>
cert-validation-timeout: <value in [allow, block, ignore]>
client-certificate: <value in [bypass, inspect, block]>
expired-server-cert: <value in [allow, block, ignore]>
revoked-server-cert: <value in [allow, block, ignore]>
unsupported-ssl-cipher: <value in [allow, block]>
unsupported-ssl-negotiation: <value in [allow, block]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_pm_config_metafields_firewall_address β no description fortinet.fortimanager.fmgr\_pm\_config\_metafields\_firewall\_address β no description
======================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_pm_config_metafields_firewall_address`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **pm\_config\_metafields\_firewall\_address** dictionary | | the top level parameters set |
| | **importance** string | **Choices:*** optional
* required
| no description |
| | **length** integer | | no description |
| | **name** string | | no description |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: no description
fmgr_pm_config_metafields_firewall_address:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
pm_config_metafields_firewall_address:
importance: <value in [optional, required]>
length: <value of integer>
name: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_emailfilter_profile_gmail β Gmail. fortinet.fortimanager.fmgr\_emailfilter\_profile\_gmail β Gmail.
================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_emailfilter_profile_gmail`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **emailfilter\_profile\_gmail** dictionary | | the top level parameters set |
| | **log** string | **Choices:*** disable
* enable
| Enable/disable logging. |
| | **log-all** string | **Choices:*** disable
* enable
| Enable/disable logging of all email traffic. |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **profile** string / required | | the parameter (profile) in requested url |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Gmail.
fmgr_emailfilter_profile_gmail:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
profile: <your own value>
emailfilter_profile_gmail:
log: <value in [disable, enable]>
log-all: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
ansible fortinet.fortimanager.fmgr_system_replacemsggroup_sslvpn β Replacement message table entries. fortinet.fortimanager.fmgr\_system\_replacemsggroup\_sslvpn β Replacement message table entries.
================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_replacemsggroup_sslvpn`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **replacemsg-group** string / required | | the parameter (replacemsg-group) in requested url |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_replacemsggroup\_sslvpn** dictionary | | the top level parameters set |
| | **buffer** string | | Message string. |
| | **format** string | **Choices:*** none
* text
* html
* wml
| Format flag. |
| | **header** string | **Choices:*** none
* http
* 8bit
| Header flag. |
| | **msg-type** string | | Message type. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Replacement message table entries.
fmgr_system_replacemsggroup_sslvpn:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
replacemsg-group: <your own value>
state: <value in [present, absent]>
system_replacemsggroup_sslvpn:
buffer: <value of string>
format: <value in [none, text, html, ...]>
header: <value in [none, http, 8bit]>
msg-type: <value of string>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_system_global β Global range attributes. fortinet.fortimanager.fmgr\_system\_global β Global range attributes.
=====================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_system_global`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **system\_global** dictionary | | the top level parameters set |
| | **admin-lockout-duration** integer | **Default:**60 | Lockout duration(sec) for administration. |
| | **admin-lockout-threshold** integer | **Default:**3 | Lockout threshold for administration. |
| | **adom-mode** string | **Choices:*** **normal** β
* advanced
| ADOM mode. normal - Normal ADOM mode. advanced - Advanced ADOM mode. |
| | **adom-rev-auto-delete** string | **Choices:*** disable
* **by-revisions** β
* by-days
| Auto delete features for old ADOM revisions. disable - Disable auto delete function for ADOM revision. by-revisions - Auto delete ADOM revisions by maximum number of revisions. by-days - Auto delete ADOM revisions by maximum days. |
| | **adom-rev-max-backup-revisions** integer | **Default:**5 | Maximum number of ADOM revisions to backup. |
| | **adom-rev-max-days** integer | **Default:**30 | Number of days to keep old ADOM revisions. |
| | **adom-rev-max-revisions** integer | **Default:**120 | Maximum number of ADOM revisions to keep. |
| | **adom-select** string | **Choices:*** disable
* **enable** β
| Enable/disable select ADOM after login. disable - Disable select ADOM after login. enable - Enable select ADOM after login. |
| | **adom-status** string | **Choices:*** **disable** β
* enable
| ADOM status. disable - Disable ADOM mode. enable - Enable ADOM mode. |
| | **clone-name-option** string | **Choices:*** **default** β
* keep
| set the clone object names option. default - Add a prefix of Clone of to the clone name. keep - Keep the original name for user to edit. |
| | **clt-cert-req** string | **Choices:*** **disable** β
* enable
* optional
| Require client certificate for GUI login. disable - Disable setting. enable - Require client certificate for GUI login. optional - Optional client certificate for GUI login. |
| | **console-output** string | **Choices:*** **standard** β
* more
| Console output mode. standard - Standard output. more - More page output. |
| | **country-flag** string | **Choices:*** disable
* **enable** β
| Country flag Status. disable - Disable country flag icon beside ip address. enable - Enable country flag icon beside ip address. |
| | **create-revision** string | **Choices:*** **disable** β
* enable
| Enable/disable create revision by default. disable - Disable create revision by default. enable - Enable create revision by default. |
| | **daylightsavetime** string | **Choices:*** disable
* **enable** β
| Enable/disable daylight saving time. disable - Disable setting. enable - Enable setting. |
| | **default-disk-quota** integer | **Default:**1000 | Default disk quota for registered device (MB). |
| | **detect-unregistered-log-device** string | **Choices:*** disable
* **enable** β
| Detect unregistered logging device from log message. disable - Disable attribute function. enable - Enable attribute function. |
| | **device-view-mode** string | **Choices:*** **regular** β
* tree
| Set devices/groups view mode. regular - Regular view mode. tree - Tree view mode. |
| | **dh-params** string | **Choices:*** 1024
* 1536
* **2048** β
* 3072
* 4096
* 6144
* 8192
| Minimum size of Diffie-Hellman prime for SSH/HTTPS (bits). 1024 - 1024 bits. 1536 - 1536 bits. 2048 - 2048 bits. 3072 - 3072 bits. 4096 - 4096 bits. 6144 - 6144 bits. 8192 - 8192 bits. |
| | **disable-module** list / elements=string | **Choices:*** fortiview-noc
* none
* fortirecorder
* siem
* soc
* ai
| no description |
| | **enc-algorithm** string | **Choices:*** low
* medium
* **high** β
| SSL communication encryption algorithms. low - SSL communication using all available encryption algorithms. medium - SSL communication using high and medium encryption algorithms. high - SSL communication using high encryption algorithms. |
| | **faz-status** string | **Choices:*** **disable** β
* enable
| FAZ status. disable - Disable FAZ feature. enable - Enable FAZ feature. |
| | **fgfm-ca-cert** string | | set the extra fgfm CA certificates. |
| | **fgfm-local-cert** string | | set the fgfm local certificate. |
| | **fgfm-ssl-protocol** string | **Choices:*** sslv3
* tlsv1.0
* tlsv1.1
* **tlsv1.2** β
* tlsv1.3
| set the lowest SSL protocols for fgfmsd. sslv3 - set SSLv3 as the lowest version. tlsv1.0 - set TLSv1.0 as the lowest version. tlsv1.1 - set TLSv1.1 as the lowest version. tlsv1.2 - set TLSv1.2 as the lowest version (default). |
| | **ha-member-auto-grouping** string | **Choices:*** disable
* **enable** β
| Enable/disable automatically group HA members feature disable - Disable automatically grouping HA members feature. enable - Enable automatically grouping HA members only when group name is unique in your network. |
| | **hitcount\_concurrent** integer | **Default:**100 | The number of FortiGates that FortiManager polls at one time (10 - 500, default = 100). |
| | **hitcount\_interval** integer | **Default:**300 | The interval for getting hit count from managed FortiGate devices, in seconds (60 - 86400, default = 300). |
| | **hostname** string | **Default:**"FMG-VM64" | System hostname. |
| | **import-ignore-addr-cmt** string | **Choices:*** **disable** β
* enable
| Enable/Disable import ignore of address comments. disable - Disable import ignore of address comments. enable - Enable import ignore of address comments. |
| | **language** string | **Choices:*** **english** β
* simch
* japanese
* korean
* spanish
* trach
| System global language. english - English simch - Simplified Chinese japanese - Japanese korean - Korean spanish - Spanish trach - Traditional Chinese |
| | **latitude** string | | fmg location latitude |
| | **ldap-cache-timeout** integer | **Default:**86400 | LDAP browser cache timeout (seconds). |
| | **ldapconntimeout** integer | **Default:**60000 | LDAP connection timeout (msec). |
| | **lock-preempt** string | **Choices:*** **disable** β
* enable
| Enable/disable ADOM lock override. disable - Disable lock preempt. enable - Enable lock preempt. |
| | **log-checksum** string | **Choices:*** **none** β
* md5
* md5-auth
| Record log file hash value, timestamp, and authentication code at transmission or rolling. none - No record log file checksum. md5 - Record log files MD5 hash value only. md5-auth - Record log files MD5 hash value and authentication code. |
| | **log-forward-cache-size** integer | **Default:**0 | Log forwarding disk cache size (GB). |
| | **longitude** string | | fmg location longitude |
| | **max-log-forward** integer | **Default:**5 | Maximum number of log-forward and aggregation settings. |
| | **max-running-reports** integer | **Default:**1 | Maximum number of reports generating at one time. |
| | **mc-policy-disabled-adoms** list / elements=string | | no description |
| | | **adom-name** string | | Adom names. |
| | **multiple-steps-upgrade-in-autolink** string | **Choices:*** **disable** β
* enable
| Enable/disable multiple steps upgade in autolink process disable - Disable setting. enable - Enable setting. |
| | **object-revision-db-max** integer | **Default:**100000 | Maximum revisions for a single database (10,000-1,000,000 default 100,000). |
| | **object-revision-mandatory-note** string | **Choices:*** disable
* **enable** β
| Enable/disable mandatory note when create revision. disable - Disable object revision. enable - Enable object revision. |
| | **object-revision-object-max** integer | **Default:**100 | Maximum revisions for a single object (10-1000 default 100). |
| | **object-revision-status** string | **Choices:*** disable
* **enable** β
| Enable/disable create revision when modify objects. disable - Disable object revision. enable - Enable object revision. |
| | **oftp-ssl-protocol** string | **Choices:*** sslv3
* tlsv1.0
* tlsv1.1
* **tlsv1.2** β
* tlsv1.3
| set the lowest SSL protocols for oftpd. sslv3 - set SSLv3 as the lowest version. tlsv1.0 - set TLSv1.0 as the lowest version. tlsv1.1 - set TLSv1.1 as the lowest version. tlsv1.2 - set TLSv1.2 as the lowest version (default). |
| | **partial-install** string | **Choices:*** **disable** β
* enable
| Enable/Disable partial install (install some objects). disable - Disable partial install function. enable - Enable partial install function. |
| | **partial-install-force** string | **Choices:*** **disable** β
* enable
| Enable/Disable partial install when devdb is modified. disable - Disable partial install when devdb is modified. enable - Enable partial install when devdb is modified. |
| | **partial-install-rev** string | **Choices:*** **disable** β
* enable
| Enable/Disable auto creating adom revision for partial install. disable - Disable partial install revision. enable - Enable partial install revision. |
| | **per-policy-lock** string | **Choices:*** **disable** β
* enable
| Enable/Disable per policy lock. disable - Disable per policy lock. enable - Enable per policy lock. |
| | **perform-improve-by-ha** string | **Choices:*** **disable** β
* enable
| Enable/Disable performance improvement by distributing tasks to HA slaves. disable - Disable performance improvement by HA. enable - Enable performance improvement by HA. |
| | **policy-hit-count** string | **Choices:*** **disable** β
* enable
| show policy hit count. disable - Disable policy hit count. enable - Enable policy hit count. |
| | **policy-object-icon** string | **Choices:*** **disable** β
* enable
| show icons of policy objects. disable - Disable icon of policy objects. enable - Enable icon of policy objects. |
| | **policy-object-in-dual-pane** string | **Choices:*** **disable** β
* enable
| show policies and objects in dual pane. disable - Disable polices and objects in dual pane. enable - Enable polices and objects in dual pane. |
| | **pre-login-banner** string | **Choices:*** **disable** β
* enable
| Enable/disable pre-login banner. disable - Disable pre-login banner. enable - Enable pre-login banner. |
| | **pre-login-banner-message** string | | Pre-login banner message. |
| | **private-data-encryption** string | **Choices:*** **disable** β
* enable
| Enable/disable private data encryption using an AES 128-bit key. disable - Disable private data encryption using an AES 128-bit key. enable - Enable private data encryption using an AES 128-bit key. |
| | **remoteauthtimeout** integer | **Default:**10 | Remote authentication (RADIUS/LDAP) timeout (sec). |
| | **search-all-adoms** string | **Choices:*** **disable** β
* enable
| Enable/Disable Search all ADOMs for where-used query. disable - Disable search all ADOMs for where-used queries. enable - Enable search all ADOMs for where-used queries. |
| | **ssl-low-encryption** string | **Choices:*** **disable** β
* enable
| SSL low-grade encryption. disable - Disable SSL low-grade encryption. enable - Enable SSL low-grade encryption. |
| | **ssl-protocol** list / elements=string | **Choices:*** tlsv1.2
* tlsv1.1
* tlsv1.0
* sslv3
* tlsv1.3
| no description |
| | **ssl-static-key-ciphers** string | **Choices:*** disable
* **enable** β
| Enable/disable SSL static key ciphers. disable - Disable setting. enable - Enable setting. |
| | **task-list-size** integer | **Default:**2000 | Maximum number of completed tasks to keep. |
| | **tftp** string | **Choices:*** **disable** β
* enable
| Enable/disable TFTP in `exec restore image` command (disabled by default in FIPS mode) disable - Disable TFTP enable - Enable TFTP |
| | **timezone** string | **Choices:*** 00
* 01
* 02
* 03
* **04** β
* 05
* 06
* 07
* 08
* 09
* 10
* 11
* 12
* 13
* 14
* 15
* 16
* 17
* 18
* 19
* 20
* 21
* 22
* 23
* 24
* 25
* 26
* 27
* 28
* 29
* 30
* 31
* 32
* 33
* 34
* 35
* 36
* 37
* 38
* 39
* 40
* 41
* 42
* 43
* 44
* 45
* 46
* 47
* 48
* 49
* 50
* 51
* 52
* 53
* 54
* 55
* 56
* 57
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 66
* 67
* 68
* 69
* 70
* 71
* 72
* 73
* 74
* 75
* 76
* 77
* 78
* 79
* 80
* 81
* 82
* 83
* 84
* 85
* 86
* 87
* 88
* 89
* 90
* 91
| Time zone. 00 - (GMT-12:00) Eniwetak, Kwajalein. 01 - (GMT-11:00) Midway Island, Samoa. 02 - (GMT-10:00) Hawaii. 03 - (GMT-9:00) Alaska. 04 - (GMT-8:00) Pacific Time (US & Canada). 05 - (GMT-7:00) Arizona. 06 - (GMT-7:00) Mountain Time (US & Canada). 07 - (GMT-6:00) Central America. 08 - (GMT-6:00) Central Time (US & Canada). 09 - (GMT-6:00) Mexico City. 10 - (GMT-6:00) Saskatchewan. 11 - (GMT-5:00) Bogota, Lima, Quito. 12 - (GMT-5:00) Eastern Time (US & Canada). 13 - (GMT-5:00) Indiana (East). 14 - (GMT-4:00) Atlantic Time (Canada). 15 - (GMT-4:00) La Paz. 16 - (GMT-4:00) Santiago. 17 - (GMT-3:30) Newfoundland. 18 - (GMT-3:00) Brasilia. 19 - (GMT-3:00) Buenos Aires, Georgetown. 20 - (GMT-3:00) Nuuk (Greenland). 21 - (GMT-2:00) Mid-Atlantic. 22 - (GMT-1:00) Azores. 23 - (GMT-1:00) Cape Verde Is. 24 - (GMT) Monrovia. 25 - (GMT) Greenwich Mean Time:Dublin, Edinburgh, Lisbon, London. 26 - (GMT+1:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna. 27 - (GMT+1:00) Belgrade, Bratislava, Budapest, Ljubljana, Prague. 28 - (GMT+1:00) Brussels, Copenhagen, Madrid, Paris. 29 - (GMT+1:00) Sarajevo, Skopje, Warsaw, Zagreb. 30 - (GMT+1:00) West Central Africa. 31 - (GMT+2:00) Athens, Sofia, Vilnius. 32 - (GMT+2:00) Bucharest. 33 - (GMT+2:00) Cairo. 34 - (GMT+2:00) Harare, Pretoria. 35 - (GMT+2:00) Helsinki, Riga,Tallinn. 36 - (GMT+2:00) Jerusalem. 37 - (GMT+3:00) Baghdad. 38 - (GMT+3:00) Kuwait, Riyadh. 39 - (GMT+3:00) St.Petersburg, Volgograd. 40 - (GMT+3:00) Nairobi. 41 - (GMT+3:30) Tehran. 42 - (GMT+4:00) Abu Dhabi, Muscat. 43 - (GMT+4:00) Baku. 44 - (GMT+4:30) Kabul. 45 - (GMT+5:00) Ekaterinburg. 46 - (GMT+5:00) Islamabad, Karachi,Tashkent. 47 - (GMT+5:30) Calcutta, Chennai, Mumbai, New Delhi. 48 - (GMT+5:45) Kathmandu. 49 - (GMT+6:00) Almaty, Novosibirsk. 50 - (GMT+6:00) Astana, Dhaka. 51 - (GMT+6:00) Sri Jayawardenapura. 52 - (GMT+6:30) Rangoon. 53 - (GMT+7:00) Bangkok, Hanoi, Jakarta. 54 - (GMT+7:00) Krasnoyarsk. 55 - (GMT+8:00) Beijing,ChongQing, HongKong,Urumqi. 56 - (GMT+8:00) Irkutsk, Ulaanbaatar. 57 - (GMT+8:00) Kuala Lumpur, Singapore. 58 - (GMT+8:00) Perth. 59 - (GMT+8:00) Taipei. 60 - (GMT+9:00) Osaka, Sapporo, Tokyo, Seoul. 61 - (GMT+9:00) Yakutsk. 62 - (GMT+9:30) Adelaide. 63 - (GMT+9:30) Darwin. 64 - (GMT+10:00) Brisbane. 65 - (GMT+10:00) Canberra, Melbourne, Sydney. 66 - (GMT+10:00) Guam, Port Moresby. 67 - (GMT+10:00) Hobart. 68 - (GMT+10:00) Vladivostok. 69 - (GMT+11:00) Magadan. 70 - (GMT+11:00) Solomon Is., New Caledonia. 71 - (GMT+12:00) Auckland, Wellington. 72 - (GMT+12:00) Fiji, Kamchatka, Marshall Is. 73 - (GMT+13:00) Nukualofa. 74 - (GMT-4:30) Caracas. 75 - (GMT+1:00) Namibia. 76 - (GMT-5:00) Brazil-Acre. 77 - (GMT-4:00) Brazil-West. 78 - (GMT-3:00) Brazil-East. 79 - (GMT-2:00) Brazil-DeNoronha. 80 - (GMT+14:00) Kiritimati. 81 - (GMT-7:00) Baja California Sur, Chihuahua. 82 - (GMT+12:45) Chatham Islands. 83 - (GMT+3:00) Minsk. 84 - (GMT+13:00) Samoa. 85 - (GMT+3:00) Istanbul. 86 - (GMT-4:00) Paraguay. 87 - (GMT) Casablanca. 88 - (GMT+3:00) Moscow. 89 - (GMT) Greenwich Mean Time. |
| | **tunnel-mtu** integer | **Default:**1500 | Maximum transportation unit(68 - 9000). |
| | **usg** string | **Choices:*** **disable** β
* enable
| Enable/disable Fortiguard server restriction. disable - Contact any Fortiguard server enable - Contact Fortiguard server in USA only |
| | **vdom-mirror** string | **Choices:*** **disable** β
* enable
| VDOM mirror. disable - Disable VDOM mirror function. enable - Enable VDOM mirror function. |
| | **webservice-proto** list / elements=string | **Choices:*** tlsv1.2
* tlsv1.1
* tlsv1.0
* sslv3
* sslv2
* tlsv1.3
| no description |
| | **workflow-max-sessions** integer | **Default:**500 | Maximum number of workflow sessions per ADOM (minimum 100). |
| | **workspace-mode** string | **Choices:*** **disabled** β
* normal
* workflow
* per-adom
| Set workspace mode (ADOM Locking). disabled - Workspace disabled. normal - Workspace lock mode. workflow - Workspace workflow mode. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Global range attributes.
fmgr_system_global:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
system_global:
admin-lockout-duration: <value of integer>
admin-lockout-threshold: <value of integer>
adom-mode: <value in [normal, advanced]>
adom-rev-auto-delete: <value in [disable, by-revisions, by-days]>
adom-rev-max-backup-revisions: <value of integer>
adom-rev-max-days: <value of integer>
adom-rev-max-revisions: <value of integer>
adom-select: <value in [disable, enable]>
adom-status: <value in [disable, enable]>
clt-cert-req: <value in [disable, enable, optional]>
console-output: <value in [standard, more]>
country-flag: <value in [disable, enable]>
create-revision: <value in [disable, enable]>
daylightsavetime: <value in [disable, enable]>
default-disk-quota: <value of integer>
detect-unregistered-log-device: <value in [disable, enable]>
device-view-mode: <value in [regular, tree]>
dh-params: <value in [1024, 1536, 2048, ...]>
disable-module:
- fortiview-noc
- none
- fortirecorder
- siem
- soc
- ai
enc-algorithm: <value in [low, medium, high]>
faz-status: <value in [disable, enable]>
fgfm-local-cert: <value of string>
fgfm-ssl-protocol: <value in [sslv3, tlsv1.0, tlsv1.1, ...]>
ha-member-auto-grouping: <value in [disable, enable]>
hitcount_concurrent: <value of integer>
hitcount_interval: <value of integer>
hostname: <value of string>
import-ignore-addr-cmt: <value in [disable, enable]>
language: <value in [english, simch, japanese, ...]>
latitude: <value of string>
ldap-cache-timeout: <value of integer>
ldapconntimeout: <value of integer>
lock-preempt: <value in [disable, enable]>
log-checksum: <value in [none, md5, md5-auth]>
log-forward-cache-size: <value of integer>
longitude: <value of string>
max-log-forward: <value of integer>
max-running-reports: <value of integer>
oftp-ssl-protocol: <value in [sslv3, tlsv1.0, tlsv1.1, ...]>
partial-install: <value in [disable, enable]>
partial-install-force: <value in [disable, enable]>
partial-install-rev: <value in [disable, enable]>
perform-improve-by-ha: <value in [disable, enable]>
policy-hit-count: <value in [disable, enable]>
policy-object-in-dual-pane: <value in [disable, enable]>
pre-login-banner: <value in [disable, enable]>
pre-login-banner-message: <value of string>
remoteauthtimeout: <value of integer>
search-all-adoms: <value in [disable, enable]>
ssl-low-encryption: <value in [disable, enable]>
ssl-protocol:
- tlsv1.2
- tlsv1.1
- tlsv1.0
- sslv3
- tlsv1.3
ssl-static-key-ciphers: <value in [disable, enable]>
task-list-size: <value of integer>
tftp: <value in [disable, enable]>
timezone: <value in [00, 01, 02, ...]>
tunnel-mtu: <value of integer>
usg: <value in [disable, enable]>
vdom-mirror: <value in [disable, enable]>
webservice-proto:
- tlsv1.2
- tlsv1.1
- tlsv1.0
- sslv3
- sslv2
- tlsv1.3
workflow-max-sessions: <value of integer>
workspace-mode: <value in [disabled, normal, workflow, ...]>
clone-name-option: <value in [default, keep]>
fgfm-ca-cert: <value of string>
mc-policy-disabled-adoms:
-
adom-name: <value of string>
policy-object-icon: <value in [disable, enable]>
private-data-encryption: <value in [disable, enable]>
per-policy-lock: <value in [disable, enable]>
multiple-steps-upgrade-in-autolink: <value in [disable, enable]>
object-revision-db-max: <value of integer>
object-revision-mandatory-note: <value in [disable, enable]>
object-revision-object-max: <value of integer>
object-revision-status: <value in [disable, enable]>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
ansible fortinet.fortimanager.fmgr_wanprof_system_virtualwanlink β Configure redundant internet connections using SD-WAN fortinet.fortimanager.fmgr\_wanprof\_system\_virtualwanlink β Configure redundant internet connections using SD-WAN
===================================================================================================================
Note
This plugin is part of the [fortinet.fortimanager collection](https://galaxy.ansible.com/fortinet/fortimanager) (version 2.1.3).
You might already have this collection installed if you are using the `ansible` package. It is not included in `ansible-core`. To check whether it is installed, run `ansible-galaxy collection list`.
To install it, use: `ansible-galaxy collection install fortinet.fortimanager`.
To use it in a playbook, specify: `fortinet.fortimanager.fmgr_wanprof_system_virtualwanlink`.
New in version 2.10: of fortinet.fortimanager
* [Synopsis](#synopsis)
* [Parameters](#parameters)
* [Notes](#notes)
* [Examples](#examples)
* [Return Values](#return-values)
Synopsis
--------
* This module is able to configure a FortiManager device.
* Examples include all parameters and values which need to be adjusted to data sources before usage.
Parameters
----------
| Parameter | Choices/Defaults | Comments |
| --- | --- | --- |
| **adom** string / required | | the parameter (adom) in requested url |
| **bypass\_validation** boolean | **Choices:*** **no** β
* yes
| only set to True when module schema diffs with FortiManager API structure, module continues to execute without validating parameters |
| **enable\_log** boolean | **Choices:*** **no** β
* yes
| Enable/Disable logging for task |
| **proposed\_method** string | **Choices:*** update
* set
* add
| The overridden method for the underlying Json RPC request |
| **rc\_failed** list / elements=string | | the rc codes list with which the conditions to fail will be overriden |
| **rc\_succeeded** list / elements=string | | the rc codes list with which the conditions to succeed will be overriden |
| **state** string / required | **Choices:*** present
* absent
| the directive to create, update or delete an object |
| **wanprof** string / required | | the parameter (wanprof) in requested url |
| **wanprof\_system\_virtualwanlink** dictionary | | the top level parameters set |
| | **fail-detect** string | **Choices:*** disable
* enable
| Enable/disable SD-WAN Internet connection status checking (failure detection). |
| | **health-check** list / elements=string | | no description |
| | | **\_dynamic-server** string | | no description |
| | | **addr-mode** string | **Choices:*** ipv4
* ipv6
| Address mode (IPv4 or IPv6). |
| | | **diffservcode** string | | Differentiated services code point (DSCP) in the IP header of the probe packet. |
| | | **dns-request-domain** string | | Fully qualified domain name to resolve for the DNS probe. |
| | | **failtime** integer | | Number of failures before server is considered lost (1 - 3600, default = 5). |
| | | **ha-priority** integer | | HA election priority (1 - 50). |
| | | **http-agent** string | | String in the http-agent field in the HTTP header. |
| | | **http-get** string | | URL used to communicate with the server if the protocol if the protocol is HTTP. |
| | | **http-match** string | | Response string expected from the server if the protocol is HTTP. |
| | | **internet-service-id** string | | Internet service ID. |
| | | **interval** integer | | Status check interval, or the time between attempting to connect to the server (1 - 3600 sec, default = 5). |
| | | **members** string | | Member sequence number list. |
| | | **name** string | | Status check or health check name. |
| | | **packet-size** integer | | Packet size of a twamp test session, |
| | | **password** string | | no description |
| | | **port** integer | | Port number used to communicate with the server over the selected protocol. |
| | | **probe-count** integer | | Number of most recent probes that should be used to calculate latency and jitter (5 - 30, default = 30). |
| | | **probe-packets** string | **Choices:*** disable
* enable
| Enable/disable transmission of probe packets. |
| | | **probe-timeout** integer | | Time to wait before a probe packet is considered lost (500 - 5000 msec, default = 500). |
| | | **protocol** string | **Choices:*** ping
* tcp-echo
* udp-echo
* http
* twamp
* ping6
* dns
| Protocol used to determine if the FortiGate can communicate with the server. |
| | | **recoverytime** integer | | Number of successful responses received before server is considered recovered (1 - 3600, default = 5). |
| | | **security-mode** string | **Choices:*** none
* authentication
| Twamp controller security mode. |
| | | **server** string | | no description |
| | | **sla** list / elements=string | | no description |
| | | | **id** integer | | SLA ID. |
| | | | **jitter-threshold** integer | | Jitter for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | | | **latency-threshold** integer | | Latency for SLA to make decision in milliseconds. (0 - 10000000, default = 5). |
| | | | **link-cost-factor** list / elements=string | **Choices:*** latency
* jitter
* packet-loss
| no description |
| | | | **packetloss-threshold** integer | | Packet loss for SLA to make decision in percentage. (0 - 100, default = 0). |
| | | **sla-fail-log-period** integer | | Time interval in seconds that SLA fail log messages will be generated (0 - 3600, default = 0). |
| | | **sla-pass-log-period** integer | | Time interval in seconds that SLA pass log messages will be generated (0 - 3600, default = 0). |
| | | **system-dns** string | **Choices:*** disable
* enable
| Enable/disable system DNS as the probe server. |
| | | **threshold-alert-jitter** integer | | Alert threshold for jitter (ms, default = 0). |
| | | **threshold-alert-latency** integer | | Alert threshold for latency (ms, default = 0). |
| | | **threshold-alert-packetloss** integer | | Alert threshold for packet loss (percentage, default = 0). |
| | | **threshold-warning-jitter** integer | | Warning threshold for jitter (ms, default = 0). |
| | | **threshold-warning-latency** integer | | Warning threshold for latency (ms, default = 0). |
| | | **threshold-warning-packetloss** integer | | Warning threshold for packet loss (percentage, default = 0). |
| | | **update-cascade-interface** string | **Choices:*** disable
* enable
| Enable/disable update cascade interface. |
| | | **update-static-route** string | **Choices:*** disable
* enable
| Enable/disable updating the static route. |
| | **load-balance-mode** string | **Choices:*** source-ip-based
* weight-based
* usage-based
* source-dest-ip-based
* measured-volume-based
| Algorithm or mode to use for load balancing Internet traffic to SD-WAN members. |
| | **members** list / elements=string | | no description |
| | | **\_dynamic-member** string | | no description |
| | | **comment** string | | Comments. |
| | | **cost** integer | | Cost of this interface for services in SLA mode (0 - 4294967295, default = 0). |
| | | **gateway** string | | The default gateway for this interface. Usually the default gateway of the Internet service provider that this interfa... |
| | | **gateway6** string | | IPv6 gateway. |
| | | **ingress-spillover-threshold** integer | | Ingress spillover threshold for this interface (0 - 16776000 kbit/s). When this traffic volume threshold is reached, n... |
| | | **interface** string | | Interface name. |
| | | **priority** integer | | Priority of the interface (0 - 4294967295). Used for SD-WAN rules or priority rules. |
| | | **seq-num** integer | | Sequence number(1-255). |
| | | **source** string | | Source IP address used in the health-check packet to the server. |
| | | **source6** string | | Source IPv6 address used in the health-check packet to the server. |
| | | **spillover-threshold** integer | | Egress spillover threshold for this interface (0 - 16776000 kbit/s). When this traffic volume threshold is reached, ne... |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable this interface in the SD-WAN. |
| | | **volume-ratio** integer | | Measured volume ratio (this value / sum of all values = percentage of link volume, 0 - 255). |
| | | **weight** integer | | Weight of this interface for weighted load balancing. (0 - 255) More traffic is directed to interfaces with higher wei... |
| | **neighbor** list / elements=string | | no description |
| | | **health-check** string | | SD-WAN health-check name. |
| | | **ip** string | | IP address of neighbor. |
| | | **member** string | | Member sequence number. |
| | | **role** string | **Choices:*** primary
* secondary
* standalone
| Role of neighbor. |
| | | **sla-id** integer | | SLA ID. |
| | **neighbor-hold-boot-time** integer | | Waiting period in seconds when switching from the primary neighbor to the secondary neighbor from the neighbor start. (0 - 100... |
| | **neighbor-hold-down** string | **Choices:*** disable
* enable
| Enable/disable hold switching from the secondary neighbor to the primary neighbor. |
| | **neighbor-hold-down-time** integer | | Waiting period in seconds when switching from the secondary neighbor to the primary neighbor when hold-down is disabled. (0 - ... |
| | **service** list / elements=string | | no description |
| | | **addr-mode** string | **Choices:*** ipv4
* ipv6
| Address mode (IPv4 or IPv6). |
| | | **bandwidth-weight** integer | | Coefficient of reciprocal of available bidirectional bandwidth in the formula of custom-profile-1. |
| | | **default** string | **Choices:*** disable
* enable
| Enable/disable use of SD-WAN as default service. |
| | | **dscp-forward** string | **Choices:*** disable
* enable
| Enable/disable forward traffic DSCP tag. |
| | | **dscp-forward-tag** string | | Forward traffic DSCP tag. |
| | | **dscp-reverse** string | **Choices:*** disable
* enable
| Enable/disable reverse traffic DSCP tag. |
| | | **dscp-reverse-tag** string | | Reverse traffic DSCP tag. |
| | | **dst** string | | Destination address name. |
| | | **dst-negate** string | **Choices:*** disable
* enable
| Enable/disable negation of destination address match. |
| | | **dst6** string | | Destination address6 name. |
| | | **end-port** integer | | End destination port number. |
| | | **gateway** string | **Choices:*** disable
* enable
| Enable/disable SD-WAN service gateway. |
| | | **groups** string | | User groups. |
| | | **health-check** string | | Health check. |
| | | **hold-down-time** integer | | Waiting period in seconds when switching from the back-up member to the primary member (0 - 10000000, default = 0). |
| | | **id** integer | | Priority rule ID (1 - 4000). |
| | | **input-device** string | | Source interface name. |
| | | **internet-service** string | **Choices:*** disable
* enable
| Enable/disable use of Internet service for application-based load balancing. |
| | | **internet-service-app-ctrl** integer | | no description |
| | | **internet-service-app-ctrl-group** string | | Application control based Internet Service group list. |
| | | **internet-service-ctrl** integer | | no description |
| | | **internet-service-ctrl-group** string | | Control-based Internet Service group list. |
| | | **internet-service-custom** string | | Custom Internet service name list. |
| | | **internet-service-custom-group** string | | Custom Internet Service group list. |
| | | **internet-service-group** string | | Internet Service group list. |
| | | **internet-service-id** string | | Internet service ID list. |
| | | **internet-service-name** string | | Internet service name list. |
| | | **jitter-weight** integer | | Coefficient of jitter in the formula of custom-profile-1. |
| | | **latency-weight** integer | | Coefficient of latency in the formula of custom-profile-1. |
| | | **link-cost-factor** string | **Choices:*** latency
* jitter
* packet-loss
* inbandwidth
* outbandwidth
* bibandwidth
* custom-profile-1
| Link cost factor. |
| | | **link-cost-threshold** integer | | Percentage threshold change of link cost values that will result in policy route regeneration (0 - 10000000, default =... |
| | | **member** string | | Member sequence number. |
| | | **mode** string | **Choices:*** auto
* manual
* priority
* sla
* load-balance
| Control how the priority rule sets the priority of interfaces in the SD-WAN. |
| | | **name** string | | Priority rule name. |
| | | **packet-loss-weight** integer | | Coefficient of packet-loss in the formula of custom-profile-1. |
| | | **priority-members** string | | Member sequence number list. |
| | | **protocol** integer | | Protocol number. |
| | | **quality-link** integer | | Quality grade. |
| | | **role** string | **Choices:*** primary
* secondary
* standalone
| Service role to work with neighbor. |
| | | **route-tag** integer | | IPv4 route map route-tag. |
| | | **sla** list / elements=string | | no description |
| | | | **health-check** string | | Virtual WAN Link health-check. |
| | | | **id** integer | | SLA ID. |
| | | **sla-compare-method** string | **Choices:*** order
* number
| Method to compare SLA value for sla and load balance mode. |
| | | **src** string | | Source address name. |
| | | **src-negate** string | **Choices:*** disable
* enable
| Enable/disable negation of source address match. |
| | | **src6** string | | Source address6 name. |
| | | **standalone-action** string | **Choices:*** disable
* enable
| Enable/disable service when selected neighbor role is standalone while service role is not standalone. |
| | | **start-port** integer | | Start destination port number. |
| | | **status** string | **Choices:*** disable
* enable
| Enable/disable SD-WAN service. |
| | | **tos** string | | Type of service bit pattern. |
| | | **tos-mask** string | | Type of service evaluated bits. |
| | | **users** string | | User name. |
| | **status** string | **Choices:*** disable
* enable
| Enable/disable SD-WAN. |
| **workspace\_locking\_adom** string | | the adom to lock for FortiManager running in workspace mode, the value can be global and others including root |
| **workspace\_locking\_timeout** integer | **Default:**300 | the maximum time in seconds to wait for other user to release the workspace lock |
Notes
-----
Note
* Running in workspace locking mode is supported in this FortiManager module, the top level parameters workspace\_locking\_adom and workspace\_locking\_timeout help do the work.
* To create or update an object, use state present directive.
* To delete an object, use state absent directive.
* Normally, running one module can fail when a non-zero rc is returned. you can also override the conditions to fail or succeed with parameters rc\_failed and rc\_succeeded
Examples
--------
```
- hosts: fortimanager-inventory
collections:
- fortinet.fortimanager
connection: httpapi
vars:
ansible_httpapi_use_ssl: True
ansible_httpapi_validate_certs: False
ansible_httpapi_port: 443
tasks:
- name: Configure redundant internet connections using SD-WAN
fmgr_wanprof_system_virtualwanlink:
bypass_validation: False
workspace_locking_adom: <value in [global, custom adom including root]>
workspace_locking_timeout: 300
rc_succeeded: [0, -2, -3, ...]
rc_failed: [-2, -3, ...]
adom: <your own value>
wanprof: <your own value>
wanprof_system_virtualwanlink:
fail-detect: <value in [disable, enable]>
health-check:
-
_dynamic-server: <value of string>
addr-mode: <value in [ipv4, ipv6]>
failtime: <value of integer>
http-agent: <value of string>
http-get: <value of string>
http-match: <value of string>
interval: <value of integer>
members: <value of string>
name: <value of string>
packet-size: <value of integer>
password: <value of string>
port: <value of integer>
protocol: <value in [ping, tcp-echo, udp-echo, ...]>
recoverytime: <value of integer>
security-mode: <value in [none, authentication]>
server: <value of string>
sla:
-
id: <value of integer>
jitter-threshold: <value of integer>
latency-threshold: <value of integer>
link-cost-factor:
- latency
- jitter
- packet-loss
packetloss-threshold: <value of integer>
threshold-alert-jitter: <value of integer>
threshold-alert-latency: <value of integer>
threshold-alert-packetloss: <value of integer>
threshold-warning-jitter: <value of integer>
threshold-warning-latency: <value of integer>
threshold-warning-packetloss: <value of integer>
update-cascade-interface: <value in [disable, enable]>
update-static-route: <value in [disable, enable]>
internet-service-id: <value of string>
probe-packets: <value in [disable, enable]>
sla-fail-log-period: <value of integer>
sla-pass-log-period: <value of integer>
ha-priority: <value of integer>
diffservcode: <value of string>
probe-timeout: <value of integer>
dns-request-domain: <value of string>
probe-count: <value of integer>
system-dns: <value in [disable, enable]>
load-balance-mode: <value in [source-ip-based, weight-based, usage-based, ...]>
members:
-
_dynamic-member: <value of string>
comment: <value of string>
gateway: <value of string>
gateway6: <value of string>
ingress-spillover-threshold: <value of integer>
interface: <value of string>
priority: <value of integer>
seq-num: <value of integer>
source: <value of string>
source6: <value of string>
spillover-threshold: <value of integer>
status: <value in [disable, enable]>
volume-ratio: <value of integer>
weight: <value of integer>
cost: <value of integer>
service:
-
addr-mode: <value in [ipv4, ipv6]>
bandwidth-weight: <value of integer>
default: <value in [disable, enable]>
dscp-forward: <value in [disable, enable]>
dscp-forward-tag: <value of string>
dscp-reverse: <value in [disable, enable]>
dscp-reverse-tag: <value of string>
dst: <value of string>
dst-negate: <value in [disable, enable]>
dst6: <value of string>
end-port: <value of integer>
gateway: <value in [disable, enable]>
groups: <value of string>
health-check: <value of string>
hold-down-time: <value of integer>
id: <value of integer>
internet-service: <value in [disable, enable]>
internet-service-ctrl: <value of integer>
internet-service-ctrl-group: <value of string>
internet-service-custom: <value of string>
internet-service-custom-group: <value of string>
internet-service-group: <value of string>
internet-service-id: <value of string>
jitter-weight: <value of integer>
latency-weight: <value of integer>
link-cost-factor: <value in [latency, jitter, packet-loss, ...]>
link-cost-threshold: <value of integer>
member: <value of string>
mode: <value in [auto, manual, priority, ...]>
name: <value of string>
packet-loss-weight: <value of integer>
priority-members: <value of string>
protocol: <value of integer>
quality-link: <value of integer>
route-tag: <value of integer>
sla:
-
health-check: <value of string>
id: <value of integer>
src: <value of string>
src-negate: <value in [disable, enable]>
src6: <value of string>
start-port: <value of integer>
status: <value in [disable, enable]>
tos: <value of string>
tos-mask: <value of string>
users: <value of string>
internet-service-app-ctrl: <value of integer>
internet-service-app-ctrl-group: <value of string>
role: <value in [primary, secondary, standalone]>
sla-compare-method: <value in [order, number]>
standalone-action: <value in [disable, enable]>
input-device: <value of string>
internet-service-name: <value of string>
status: <value in [disable, enable]>
neighbor:
-
health-check: <value of string>
ip: <value of string>
member: <value of string>
role: <value in [primary, secondary, standalone]>
sla-id: <value of integer>
neighbor-hold-boot-time: <value of integer>
neighbor-hold-down: <value in [disable, enable]>
neighbor-hold-down-time: <value of integer>
```
Return Values
-------------
Common return values are documented [here](../../../reference_appendices/common_return_values#common-return-values), the following are the fields unique to this module:
| Key | Returned | Description |
| --- | --- | --- |
| **request\_url** string | always | The full url requested **Sample:** /sys/login/user |
| **response\_code** integer | always | The status of api request |
| **response\_message** string | always | The descriptive message of the api response **Sample:** OK. |
### Authors
* Link Zheng (@chillancezen)
* Jie Xue (@JieX19)
* Frank Shen (@fshen01)
* Hongbin Lu (@fgtdev-hblu)
| programming_docs |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.