cisco.meraki.meraki_mr_l3_firewall module – Manage MR access point layer 3 firewalls in the Meraki cloud
Note
This module is part of the cisco.meraki collection (version 2.21.8).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.meraki.
To use it in a playbook, specify: cisco.meraki.meraki_mr_l3_firewall.
DEPRECATED
- Removed in:
- version 3.0.0 
- Why:
- Updated modules released with increased functionality 
- Alternative:
- cisco.meraki.networks_appliance_firewall_l3_firewall_rules 
Synopsis
- Allows for creation, management, and visibility into layer 3 firewalls implemented on Meraki MR access points. 
- Module is not idempotent as of current release. 
Parameters
| Parameter | Comments | 
|---|---|
| Sets whether devices can talk to other devices on the same LAN. Choices: 
 | |
| Authentication key provided by the dashboard. Required if environmental variable  | |
| Hostname for Meraki dashboard. Can be used to access regional Meraki environments, such as China. Default:  | |
| Number of seconds to retry if server returns an internal server error. Default:  | |
| ID of network containing access points. | |
| Name of network containing access points. | |
| Number of SSID to apply firewall rule to. | |
| ID of organization. | |
| Name of organization. | |
| Instructs module whether response keys should be snake case (ex.  Choices: 
 | |
| Set amount of debug output during module execution. Choices: 
 | |
| Number of seconds to retry if rate limiter is triggered. Default:  | |
| List of firewall rules. | |
| Optional comment describing the firewall rule. | |
| Comma-separated list of CIDR notation networks to match. | |
| Comma-seperated list of destination ports to match. | |
| Specifies the action that should be taken when rule is hit. Choices: 
 | |
| Specifies protocol to match against. Choices: 
 | |
| Name of SSID to apply firewall rule to. | |
| Create or modify an organization. Choices: 
 | |
| Time to timeout for HTTP requests. Default:  | |
| If  Only useful for internal Meraki developers. Choices: 
 | |
| If  Choices: 
 | |
| Whether to validate HTTP certificates. Choices: 
 | 
Notes
Note
- More information about the Meraki API can be found at https://dashboard.meraki.com/api_docs. 
- Some of the options are likely only used for developers within Meraki. 
- As of Ansible 2.9, Meraki modules output keys as snake case. To use camel case, set the - ANSIBLE_MERAKI_FORMATenvironment variable to- camelcase.
- Ansible’s Meraki modules will stop supporting camel case output in Ansible 2.13. Please update your playbooks. 
- Check Mode downloads the current configuration from the dashboard, then compares changes against this download. Check Mode will report changed if there are differences in the configurations, but does not submit changes to the API for validation of change. 
Examples
- name: Create single firewall rule
  meraki_mr_l3_firewall:
    auth_key: abc123
    state: present
    org_name: YourOrg
    net_id: 12345
    number: 1
    rules:
      - comment: Integration test rule
        policy: allow
        protocol: tcp
        dest_port: 80
        dest_cidr: 192.0.2.0/24
    allow_lan_access: false
  delegate_to: localhost
- name: Enable local LAN access
  meraki_mr_l3_firewall:
    auth_key: abc123
    state: present
    org_name: YourOrg
    net_id: 123
    number: 1
    rules:
    allow_lan_access: true
  delegate_to: localhost
- name: Query firewall rules
  meraki_mr_l3_firewall:
    auth_key: abc123
    state: query
    org_name: YourOrg
    net_name: YourNet
    number: 1
  delegate_to: localhost
Status
- This module will be removed in version 3.0.0. [deprecated] 
- For more information see DEPRECATED. 
