fortinet.fortios.fortios_system_virtual_wan_link – Configure redundant internet connections using SD-WAN (formerly virtual WAN link) in Fortinet’s FortiOS and FortiGate.¶
Note
This plugin is part of the fortinet.fortios collection (version 1.1.8).
To install it use: ansible-galaxy collection install fortinet.fortios
.
To use it in a playbook, specify: fortinet.fortios.fortios_system_virtual_wan_link
.
New in version 2.8: of fortinet.fortios
Synopsis¶
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify system feature and virtual_wan_link category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
Requirements¶
The below requirements are needed on the host that executes this module.
ansible>=2.9.0
Parameters¶
Examples¶
- hosts: fortigates
collections:
- fortinet.fortios
connection: httpapi
vars:
vdom: "root"
ansible_httpapi_use_ssl: yes
ansible_httpapi_validate_certs: no
ansible_httpapi_port: 443
tasks:
- name: Configure redundant internet connections using SD-WAN (formerly virtual WAN link).
fortios_system_virtual_wan_link:
vdom: "{{ vdom }}"
system_virtual_wan_link:
fail_alert_interfaces:
-
name: "default_name_4 (source system.interface.name)"
fail_detect: "enable"
health_check:
-
addr_mode: "ipv4"
failtime: "8"
http_get: "<your_own_value>"
http_match: "<your_own_value>"
interval: "11"
members:
-
seq_num: "13 (source system.virtual-wan-link.members.seq-num)"
name: "default_name_14"
packet_size: "15"
password: "<your_own_value>"
port: "17"
protocol: "ping"
recoverytime: "19"
security_mode: "none"
server: "192.168.100.40"
sla:
-
id: "23"
jitter_threshold: "24"
latency_threshold: "25"
link_cost_factor: "latency"
packetloss_threshold: "27"
threshold_alert_jitter: "28"
threshold_alert_latency: "29"
threshold_alert_packetloss: "30"
threshold_warning_jitter: "31"
threshold_warning_latency: "32"
threshold_warning_packetloss: "33"
update_cascade_interface: "enable"
update_static_route: "enable"
load_balance_mode: "source-ip-based"
members:
-
gateway: "<your_own_value>"
gateway6: "<your_own_value>"
ingress_spillover_threshold: "40"
interface: "<your_own_value> (source system.interface.name)"
priority: "42"
seq_num: "43"
source: "<your_own_value>"
source6: "<your_own_value>"
spillover_threshold: "46"
status: "disable"
volume_ratio: "48"
weight: "49"
service:
-
addr_mode: "ipv4"
bandwidth_weight: "52"
dscp_forward: "enable"
dscp_forward_tag: "<your_own_value>"
dscp_reverse: "enable"
dscp_reverse_tag: "<your_own_value>"
dst:
-
name: "default_name_58 (source firewall.address.name firewall.addrgrp.name)"
dst_negate: "enable"
dst6:
-
name: "default_name_61 (source firewall.address6.name firewall.addrgrp6.name)"
end_port: "62"
groups:
-
name: "default_name_64 (source user.group.name)"
health_check: "<your_own_value> (source system.virtual-wan-link.health-check.name)"
id: "66"
input_device:
-
name: "default_name_68 (source system.interface.name)"
internet_service: "enable"
internet_service_ctrl:
-
id: "71"
internet_service_ctrl_group:
-
name: "default_name_73 (source application.group.name)"
internet_service_custom:
-
name: "default_name_75 (source firewall.internet-service-custom.name)"
internet_service_custom_group:
-
name: "default_name_77 (source firewall.internet-service-custom-group.name)"
internet_service_group:
-
name: "default_name_79 (source firewall.internet-service-group.name)"
internet_service_id:
-
id: "81 (source firewall.internet-service.id)"
jitter_weight: "82"
latency_weight: "83"
link_cost_factor: "latency"
link_cost_threshold: "85"
member: "86"
mode: "auto"
name: "default_name_88"
packet_loss_weight: "89"
priority_members:
-
seq_num: "91 (source system.virtual-wan-link.members.seq-num)"
protocol: "92"
quality_link: "93"
route_tag: "94"
sla:
-
health_check: "<your_own_value> (source system.virtual-wan-link.health-check.name)"
id: "97"
src:
-
name: "default_name_99 (source firewall.address.name firewall.addrgrp.name)"
src_negate: "enable"
src6:
-
name: "default_name_102 (source firewall.address6.name firewall.addrgrp6.name)"
start_port: "103"
status: "enable"
tos: "<your_own_value>"
tos_mask: "<your_own_value>"
users:
-
name: "default_name_108 (source user.local.name)"
status: "disable"
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Authors¶
Link Zheng (@chillancezen)
Jie Xue (@JieX19)
Hongbin Lu (@fgtdev-hblu)
Frank Shen (@frankshen01)
Miguel Angel Munoz (@mamunozgonzalez)
Nicolas Thomas (@thomnico)