fortios_system_global – Configure global attributes in Fortinet’s FortiOS and FortiGate¶
New in version 2.8.
Synopsis¶
This module is able to configure a FortiGate or FortiOS by allowing the user to set and modify system feature and global category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.2
Requirements¶
The below requirements are needed on the host that executes this module.
fortiosapi>=0.9.8
Parameters¶
Parameter | Choices/Defaults | Comments | |
---|---|---|---|
host
-
/ required
|
FortiOS or FortiGate ip address.
|
||
https
boolean
|
|
Indicates if the requests towards FortiGate must use HTTPS protocol
|
|
password
-
|
Default: ""
|
FortiOS or FortiGate password.
|
|
system_global
-
|
Default: null
|
Configure global attributes.
|
|
admin-concurrent
-
|
|
Enable/disable concurrent administrator logins. (Use policy-auth-concurrent for firewall authenticated users.)
|
|
admin-console-timeout
-
|
Console login timeout that overrides the admintimeout value. (15 - 300 seconds) (15 seconds to 5 minutes). 0 the default, disables this timeout.
|
||
admin-https-pki-required
-
|
|
Enable/disable admin login method. Enable to force administrators to provide a valid certificate to log in if PKI is enabled. Disable to allow administrators to log in with a certificate or password.
|
|
admin-https-ssl-versions
-
|
|
Allowed TLS versions for web administration.
|
|
admin-lockout-duration
-
|
Amount of time in seconds that an administrator account is locked out after reaching the admin-lockout-threshold for repeated failed login attempts.
|
||
admin-lockout-threshold
-
|
Number of failed login attempts before an administrator account is locked out for the admin-lockout-duration.
|
||
admin-login-max
-
|
Maximum number of administrators who can be logged in at the same time (1 - 100, default = 100)
|
||
admin-maintainer
-
|
|
Enable/disable maintainer administrator login. When enabled, the maintainer account can be used to log in from the console after a hard reboot. The password is "bcpb" followed by the FortiGate unit serial number. You have limited time to complete this login.
|
|
admin-port
-
|
Administrative access port for HTTP. (1 - 65535, default = 80).
|
||
admin-restrict-local
-
|
|
Enable/disable local admin authentication restriction when remote authenticator is up and running. (default = disable)
|
|
admin-scp
-
|
|
Enable/disable using SCP to download the system configuration. You can use SCP as an alternative method for backing up the configuration.
|
|
admin-server-cert
-
|
Server certificate that the FortiGate uses for HTTPS administrative connections. Source certificate.local.name.
|
||
admin-sport
-
|
Administrative access port for HTTPS. (1 - 65535, default = 443).
|
||
admin-ssh-grace-time
-
|
Maximum time in seconds permitted between making an SSH connection to the FortiGate unit and authenticating (10 - 3600 sec (1 hour), default 120).
|
||
admin-ssh-password
-
|
|
Enable/disable password authentication for SSH admin access.
|
|
admin-ssh-port
-
|
Administrative access port for SSH. (1 - 65535, default = 22).
|
||
admin-ssh-v1
-
|
|
Enable/disable SSH v1 compatibility.
|
|
admin-telnet-port
-
|
Administrative access port for TELNET. (1 - 65535, default = 23).
|
||
admintimeout
-
|
Number of minutes before an idle administrator session times out (5 - 480 minutes (8 hours), default = 5). A shorter idle timeout is more secure.
|
||
alias
-
|
Alias for your FortiGate unit.
|
||
allow-traffic-redirect
-
|
|
Disable to allow traffic to be routed back on a different interface.
|
|
anti-replay
-
|
|
Level of checking for packet replay and TCP sequence checking.
|
|
arp-max-entry
-
|
Maximum number of dynamically learned MAC addresses that can be added to the ARP table (131072 - 2147483647, default = 131072).
|
||
asymroute
-
|
|
Enable/disable asymmetric route.
|
|
auth-cert
-
|
Server certificate that the FortiGate uses for HTTPS firewall authentication connections. Source certificate.local.name.
|
||
auth-http-port
-
|
User authentication HTTP port. (1 - 65535, default = 80).
|
||
auth-https-port
-
|
User authentication HTTPS port. (1 - 65535, default = 443).
|
||
auth-keepalive
-
|
|
Enable to prevent user authentication sessions from timing out when idle.
|
|
auth-session-limit
-
|
|
Action to take when the number of allowed user authenticated sessions is reached.
|
|
auto-auth-extension-device
-
|
|
Enable/disable automatic authorization of dedicated Fortinet extension devices.
|
|
av-affinity
-
|
Affinity setting for AV scanning (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx).
|
||
av-failopen
-
|
|
Set the action to take if the FortiGate is running low on memory or the proxy connection limit has been reached.
|
|
av-failopen-session
-
|
|
When enabled and a proxy for a protocol runs out of room in its session table, that protocol goes into failopen mode and enacts the action specified by av-failopen.
|
|
batch-cmdb
-
|
|
Enable/disable batch mode, allowing you to enter a series of CLI commands that will execute as a group once they are loaded.
|
|
block-session-timer
-
|
Duration in seconds for blocked sessions (1 - 300 sec (5 minutes), default = 30).
|
||
br-fdb-max-entry
-
|
Maximum number of bridge forwarding database (FDB) entries.
|
||
cert-chain-max
-
|
Maximum number of certificates that can be traversed in a certificate chain.
|
||
cfg-revert-timeout
-
|
Time-out for reverting to the last saved configuration.
|
||
cfg-save
-
|
|
Configuration file save mode for CLI changes.
|
|
check-protocol-header
-
|
|
Level of checking performed on protocol headers. Strict checking is more thorough but may affect performance. Loose checking is ok in most cases.
|
|
check-reset-range
-
|
|
Configure ICMP error message verification. You can either apply strict RST range checking or disable it.
|
|
cli-audit-log
-
|
|
Enable/disable CLI audit log.
|
|
clt-cert-req
-
|
|
Enable/disable requiring administrators to have a client certificate to log into the GUI using HTTPS.
|
|
compliance-check
-
|
|
Enable/disable global PCI DSS compliance check.
|
|
compliance-check-time
-
|
Time of day to run scheduled PCI DSS compliance checks.
|
||
cpu-use-threshold
-
|
Threshold at which CPU usage is reported. (% of total CPU, default = 90).
|
||
csr-ca-attribute
-
|
|
Enable/disable the CA attribute in certificates. Some CA servers reject CSRs that have the CA attribute.
|
|
daily-restart
-
|
|
Enable/disable daily restart of FortiGate unit. Use the restart-time option to set the time of day for the restart.
|
|
device-identification-active-scan-delay
-
|
Number of seconds to passively scan a device before performing an active scan. (20 - 3600 sec, (20 sec to 1 hour), default = 90).
|
||
device-idle-timeout
-
|
Time in seconds that a device must be idle to automatically log the device user out. (30 - 31536000 sec (30 sec to 1 year), default = 300).
|
||
dh-params
-
|
|
Number of bits to use in the Diffie-Hellman exchange for HTTPS/SSH protocols.
|
|
dst
-
|
|
Enable/disable daylight saving time.
|
|
endpoint-control-fds-access
-
|
|
Enable/disable access to the FortiGuard network for non-compliant endpoints.
|
|
endpoint-control-portal-port
-
|
Endpoint control portal port (1 - 65535).
|
||
failtime
-
|
Fail-time for server lost.
|
||
fds-statistics
-
|
|
Enable/disable sending IPS, Application Control, and AntiVirus data to FortiGuard. This data is used to improve FortiGuard services and is not shared with external parties and is protected by Fortinet's privacy policy.
|
|
fds-statistics-period
-
|
FortiGuard statistics collection period in minutes. (1 - 1440 min (1 min to 24 hours), default = 60).
|
||
fgd-alert-subscription
-
|
|
Type of alert to retrieve from FortiGuard.
|
|
fortiextender
-
|
|
Enable/disable FortiExtender.
|
|
fortiextender-data-port
-
|
FortiExtender data port (1024 - 49150, default = 25246).
|
||
fortiextender-vlan-mode
-
|
|
Enable/disable FortiExtender VLAN mode.
|
|
fortiservice-port
-
|
FortiService port (1 - 65535, default = 8013). Used by FortiClient endpoint compliance. Older versions of FortiClient used a different port.
|
||
gui-certificates
-
|
|
Enable/disable the System > Certificate GUI page, allowing you to add and configure certificates from the GUI.
|
|
gui-custom-language
-
|
|
Enable/disable custom languages in GUI.
|
|
gui-date-format
-
|
|
Default date format used throughout GUI.
|
|
gui-device-latitude
-
|
Add the latitude of the location of this FortiGate to position it on the Threat Map.
|
||
gui-device-longitude
-
|
Add the longitude of the location of this FortiGate to position it on the Threat Map.
|
||
gui-display-hostname
-
|
|
Enable/disable displaying the FortiGate's hostname on the GUI login page.
|
|
gui-ipv6
-
|
|
Enable/disable IPv6 settings on the GUI.
|
|
gui-lines-per-page
-
|
Number of lines to display per page for web administration.
|
||
gui-theme
-
|
|
Color scheme for the administration GUI.
|
|
gui-wireless-opensecurity
-
|
|
Enable/disable wireless open security option on the GUI.
|
|
honor-df
-
|
|
Enable/disable honoring of Don't-Fragment (DF) flag.
|
|
hostname
-
|
FortiGate unit's hostname. Most models will truncate names longer than 24 characters. Some models support hostnames up to 35 characters.
|
||
igmp-state-limit
-
|
Maximum number of IGMP memberships (96 - 64000, default = 3200).
|
||
interval
-
|
Dead gateway detection interval.
|
||
ip-src-port-range
-
|
IP source port range used for traffic originating from the FortiGate unit.
|
||
ips-affinity
-
|
Affinity setting for IPS (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx; allowed CPUs must be less than total number of IPS engine daemons).
|
||
ipsec-asic-offload
-
|
|
Enable/disable ASIC offloading (hardware acceleration) for IPsec VPN traffic. Hardware acceleration can offload IPsec VPN sessions and accelerate encryption and decryption.
|
|
ipsec-hmac-offload
-
|
|
Enable/disable offloading (hardware acceleration) of HMAC processing for IPsec VPN.
|
|
ipsec-soft-dec-async
-
|
|
Enable/disable software decryption asynchronization (using multiple CPUs to do decryption) for IPsec VPN traffic.
|
|
ipv6-accept-dad
-
|
Enable/disable acceptance of IPv6 Duplicate Address Detection (DAD).
|
||
ipv6-allow-anycast-probe
-
|
|
Enable/disable IPv6 address probe through Anycast.
|
|
language
-
|
|
GUI display language.
|
|
ldapconntimeout
-
|
Global timeout for connections with remote LDAP servers in milliseconds (0 - 4294967295, default 500).
|
||
lldp-transmission
-
|
|
Enable/disable Link Layer Discovery Protocol (LLDP) transmission.
|
|
log-ssl-connection
-
|
|
Enable/disable logging of SSL connection events.
|
|
log-uuid
-
|
|
Whether UUIDs are added to traffic logs. You can disable UUIDs, add firewall policy UUIDs to traffic logs, or add all UUIDs to traffic logs.
|
|
login-timestamp
-
|
|
Enable/disable login time recording.
|
|
long-vdom-name
-
|
|
Enable/disable long VDOM name support.
|
|
management-vdom
-
|
Management virtual domain name. Source system.vdom.name.
|
||
max-dlpstat-memory
-
|
Maximum DLP stat memory (0 - 4294967295).
|
||
max-route-cache-size
-
|
Maximum number of IP route cache entries (0 - 2147483647).
|
||
mc-ttl-notchange
-
|
|
Enable/disable no modification of multicast TTL.
|
|
memory-use-threshold-extreme
-
|
Threshold at which memory usage is considered extreme (new sessions are dropped) (% of total RAM, default = 95).
|
||
memory-use-threshold-green
-
|
Threshold at which memory usage forces the FortiGate to exit conserve mode (% of total RAM, default = 82).
|
||
memory-use-threshold-red
-
|
Threshold at which memory usage forces the FortiGate to enter conserve mode (% of total RAM, default = 88).
|
||
miglog-affinity
-
|
Affinity setting for logging (64-bit hexadecimal value in the format of xxxxxxxxxxxxxxxx).
|
||
miglogd-children
-
|
Number of logging (miglogd) processes to be allowed to run. Higher number can reduce performance; lower number can slow log processing time. No logs will be dropped or lost if the number is changed.
|
||
multi-factor-authentication
-
|
|
Enforce all login methods to require an additional authentication factor (default = optional).
|
|
multicast-forward
-
|
|
Enable/disable multicast forwarding.
|
|
ndp-max-entry
-
|
Maximum number of NDP table entries (set to 65,536 or higher; if set to 0, kernel holds 65,536 entries).
|
||
per-user-bwl
-
|
|
Enable/disable per-user black/white list filter.
|
|
policy-auth-concurrent
-
|
Number of concurrent firewall use logins from the same user (1 - 100, default = 0 means no limit).
|
||
post-login-banner
-
|
|
Enable/disable displaying the administrator access disclaimer message after an administrator successfully logs in.
|
|
pre-login-banner
-
|
|
Enable/disable displaying the administrator access disclaimer message on the login page before an administrator logs in.
|
|
private-data-encryption
-
|
|
Enable/disable private data encryption using an AES 128-bit key.
|
|
proxy-auth-lifetime
-
|
|
Enable/disable authenticated users lifetime control. This is a cap on the total time a proxy user can be authenticated for after which re-authentication will take place.
|
|
proxy-auth-lifetime-timeout
-
|
Lifetime timeout in minutes for authenticated users (5 - 65535 min, default=480 (8 hours)).
|
||
proxy-auth-timeout
-
|
Authentication timeout in minutes for authenticated users (1 - 3600 sec, default = 300).
|
||
proxy-cipher-hardware-acceleration
-
|
|
Enable/disable using content processor (CP8 or CP9) hardware acceleration to encrypt and decrypt IPsec and SSL traffic.
|
|
proxy-kxp-hardware-acceleration
-
|
|
Enable/disable using the content processor to accelerate KXP traffic.
|
|
proxy-re-authentication-mode
-
|
|
Control if users must re-authenticate after a session is closed, traffic has been idle, or from the point at which the user was first created.
|
|
proxy-worker-count
-
|
Proxy worker count.
|
||
radius-port
-
|
RADIUS service port number.
|
||
reboot-upon-config-restore
-
|
|
Enable/disable reboot of system upon restoring configuration.
|
|
refresh
-
|
Statistics refresh interval in GUI.
|
||
remoteauthtimeout
-
|
Number of seconds that the FortiGate waits for responses from remote RADIUS, LDAP, or TACACS+ authentication servers. (0-300 sec, default = 5, 0 means no timeout).
|
||
reset-sessionless-tcp
-
|
|
Action to perform if the FortiGate receives a TCP packet but cannot find a corresponding session in its session table. NAT/Route mode only.
|
|
restart-time
-
|
Daily restart time (hh:mm).
|
||
revision-backup-on-logout
-
|
|
Enable/disable back-up of the latest configuration revision when an administrator logs out of the CLI or GUI.
|
|
revision-image-auto-backup
-
|
|
Enable/disable back-up of the latest configuration revision after the firmware is upgraded.
|
|
scanunit-count
-
|
Number of scanunits. The range and the default depend on the number of CPUs. Only available on FortiGate units with multiple CPUs.
|
||
security-rating-result-submission
-
|
|
Enable/disable the submission of Security Rating results to FortiGuard.
|
|
security-rating-run-on-schedule
-
|
|
Enable/disable scheduled runs of Security Rating.
|
|
send-pmtu-icmp
-
|
|
Enable/disable sending of path maximum transmission unit (PMTU) - ICMP destination unreachable packet and to support PMTUD protocol on your network to reduce fragmentation of packets.
|
|
snat-route-change
-
|
|
Enable/disable the ability to change the static NAT route.
|
|
special-file-23-support
-
|
|
Enable/disable IPS detection of HIBUN format files when using Data Leak Protection.
|
|
ssh-cbc-cipher
-
|
|
Enable/disable CBC cipher for SSH access.
|
|
ssh-hmac-md5
-
|
|
Enable/disable HMAC-MD5 for SSH access.
|
|
ssh-kex-sha1
-
|
|
Enable/disable SHA1 key exchange for SSH access.
|
|
ssl-min-proto-version
-
|
|
Minimum supported protocol version for SSL/TLS connections (default = TLSv1.2).
|
|
ssl-static-key-ciphers
-
|
|
Enable/disable static key ciphers in SSL/TLS connections (e.g. AES128-SHA, AES256-SHA, AES128-SHA256, AES256-SHA256).
|
|
sslvpn-cipher-hardware-acceleration
-
|
|
Enable/disable SSL VPN hardware acceleration.
|
|
sslvpn-kxp-hardware-acceleration
-
|
|
Enable/disable SSL VPN KXP hardware acceleration.
|
|
sslvpn-max-worker-count
-
|
Maximum number of SSL VPN processes. Upper limit for this value is the number of CPUs and depends on the model.
|
||
sslvpn-plugin-version-check
-
|
|
Enable/disable checking browser's plugin version by SSL VPN.
|
|
strict-dirty-session-check
-
|
|
Enable to check the session against the original policy when revalidating. This can prevent dropping of redirected sessions when web-filtering and authentication are enabled together. If this option is enabled, the FortiGate unit deletes a session if a routing or policy change causes the session to no longer match the policy that originally allowed the session.
|
|
strong-crypto
-
|
|
Enable to use strong encryption and only allow strong ciphers (AES, 3DES) and digest (SHA1) for HTTPS/SSH/TLS/SSL functions.
|
|
switch-controller
-
|
|
Enable/disable switch controller feature. Switch controller allows you to manage FortiSwitch from the FortiGate itself.
|
|
switch-controller-reserved-network
-
|
Enable reserved network subnet for controlled switches. This is available when the switch controller is enabled.
|
||
sys-perf-log-interval
-
|
Time in minutes between updates of performance statistics logging. (1 - 15 min, default = 5, 0 = disabled).
|
||
tcp-halfclose-timer
-
|
Number of seconds the FortiGate unit should wait to close a session after one peer has sent a FIN packet but the other has not responded (1 - 86400 sec (1 day), default = 120).
|
||
tcp-halfopen-timer
-
|
Number of seconds the FortiGate unit should wait to close a session after one peer has sent an open session packet but the other has not responded (1 - 86400 sec (1 day), default = 10).
|
||
tcp-option
-
|
|
Enable SACK, timestamp and MSS TCP options.
|
|
tcp-timewait-timer
-
|
Length of the TCP TIME-WAIT state in seconds.
|
||
tftp
-
|
|
Enable/disable TFTP.
|
|
timezone
-
|
|
Number corresponding to your time zone from 00 to 86. Enter set timezone ? to view the list of time zones and the numbers that represent them.
|
|
tp-mc-skip-policy
-
|
|
Enable/disable skip policy check and allow multicast through.
|
|
traffic-priority
-
|
|
Choose Type of Service (ToS) or Differentiated Services Code Point (DSCP) for traffic prioritization in traffic shaping.
|
|
traffic-priority-level
-
|
|
Default system-wide level of priority for traffic prioritization.
|
|
two-factor-email-expiry
-
|
Email-based two-factor authentication session timeout (30 - 300 seconds (5 minutes), default = 60).
|
||
two-factor-fac-expiry
-
|
FortiAuthenticator token authentication session timeout (10 - 3600 seconds (1 hour), default = 60).
|
||
two-factor-ftk-expiry
-
|
FortiToken authentication session timeout (60 - 600 sec (10 minutes), default = 60).
|
||
two-factor-ftm-expiry
-
|
FortiToken Mobile session timeout (1 - 168 hours (7 days), default = 72).
|
||
two-factor-sms-expiry
-
|
SMS-based two-factor authentication session timeout (30 - 300 sec, default = 60).
|
||
udp-idle-timer
-
|
UDP connection session timeout. This command can be useful in managing CPU and memory resources (1 - 86400 seconds (1 day), default = 60).
|
||
user-server-cert
-
|
Certificate to use for https user authentication. Source certificate.local.name.
|
||
vdom-admin
-
|
|
Enable/disable support for multiple virtual domains (VDOMs).
|
|
vip-arp-range
-
|
|
Controls the number of ARPs that the FortiGate sends for a Virtual IP (VIP) address range.
|
|
virtual-server-count
-
|
Maximum number of virtual server processes to create. The maximum is the number of CPU cores. This is not available on single-core CPUs.
|
||
virtual-server-hardware-acceleration
-
|
|
Enable/disable virtual server hardware acceleration.
|
|
wad-affinity
-
|
Affinity setting for wad (hexadecimal value up to 256 bits in the format of xxxxxxxxxxxxxxxx).
|
||
wad-csvc-cs-count
-
|
Number of concurrent WAD-cache-service object-cache processes.
|
||
wad-csvc-db-count
-
|
Number of concurrent WAD-cache-service byte-cache processes.
|
||
wad-source-affinity
-
|
|
Enable/disable dispatching traffic to WAD workers based on source affinity.
|
|
wad-worker-count
-
|
Number of explicit proxy WAN optimization daemon (WAD) processes. By default WAN optimization, explicit proxy, and web caching is handled by all of the CPU cores in a FortiGate unit.
|
||
wifi-ca-certificate
-
|
CA certificate that verifies the WiFi certificate. Source certificate.ca.name.
|
||
wifi-certificate
-
|
Certificate to use for WiFi authentication. Source certificate.local.name.
|
||
wimax-4g-usb
-
|
|
Enable/disable comparability with WiMAX 4G USB devices.
|
|
wireless-controller
-
|
|
Enable/disable the wireless controller feature to use the FortiGate unit to manage FortiAPs.
|
|
wireless-controller-port
-
|
Port used for the control channel in wireless controller mode (wireless-mode is ac). The data channel port is the control channel port number plus one (1024 - 49150, default = 5246).
|
||
username
-
/ required
|
FortiOS or FortiGate username.
|
||
vdom
-
|
Default: "root"
|
Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit.
|
Notes¶
Note
Requires fortiosapi library developed by Fortinet
Run as a local_action in your playbook
Examples¶
- hosts: localhost
vars:
host: "192.168.122.40"
username: "admin"
password: ""
vdom: "root"
tasks:
- name: Configure global attributes.
fortios_system_global:
host: "{{ host }}"
username: "{{ username }}"
password: "{{ password }}"
vdom: "{{ vdom }}"
https: "False"
system_global:
admin-concurrent: "enable"
admin-console-timeout: "4"
admin-https-pki-required: "enable"
admin-https-ssl-versions: "tlsv1-0"
admin-lockout-duration: "7"
admin-lockout-threshold: "8"
admin-login-max: "9"
admin-maintainer: "enable"
admin-port: "11"
admin-restrict-local: "enable"
admin-scp: "enable"
admin-server-cert: "<your_own_value> (source certificate.local.name)"
admin-sport: "15"
admin-ssh-grace-time: "16"
admin-ssh-password: "enable"
admin-ssh-port: "18"
admin-ssh-v1: "enable"
admin-telnet-port: "20"
admintimeout: "21"
alias: "<your_own_value>"
allow-traffic-redirect: "enable"
anti-replay: "disable"
arp-max-entry: "25"
asymroute: "enable"
auth-cert: "<your_own_value> (source certificate.local.name)"
auth-http-port: "28"
auth-https-port: "29"
auth-keepalive: "enable"
auth-session-limit: "block-new"
auto-auth-extension-device: "enable"
av-affinity: "<your_own_value>"
av-failopen: "pass"
av-failopen-session: "enable"
batch-cmdb: "enable"
block-session-timer: "37"
br-fdb-max-entry: "38"
cert-chain-max: "39"
cfg-revert-timeout: "40"
cfg-save: "automatic"
check-protocol-header: "loose"
check-reset-range: "strict"
cli-audit-log: "enable"
clt-cert-req: "enable"
compliance-check: "enable"
compliance-check-time: "<your_own_value>"
cpu-use-threshold: "48"
csr-ca-attribute: "enable"
daily-restart: "enable"
device-identification-active-scan-delay: "51"
device-idle-timeout: "52"
dh-params: "1024"
dst: "enable"
endpoint-control-fds-access: "enable"
endpoint-control-portal-port: "56"
failtime: "57"
fds-statistics: "enable"
fds-statistics-period: "59"
fgd-alert-subscription: "advisory"
fortiextender: "enable"
fortiextender-data-port: "62"
fortiextender-vlan-mode: "enable"
fortiservice-port: "64"
gui-certificates: "enable"
gui-custom-language: "enable"
gui-date-format: "yyyy/MM/dd"
gui-device-latitude: "<your_own_value>"
gui-device-longitude: "<your_own_value>"
gui-display-hostname: "enable"
gui-ipv6: "enable"
gui-lines-per-page: "72"
gui-theme: "green"
gui-wireless-opensecurity: "enable"
honor-df: "enable"
hostname: "myhostname"
igmp-state-limit: "77"
interval: "78"
ip-src-port-range: "<your_own_value>"
ips-affinity: "<your_own_value>"
ipsec-asic-offload: "enable"
ipsec-hmac-offload: "enable"
ipsec-soft-dec-async: "enable"
ipv6-accept-dad: "84"
ipv6-allow-anycast-probe: "enable"
language: "english"
ldapconntimeout: "87"
lldp-transmission: "enable"
log-ssl-connection: "enable"
log-uuid: "disable"
login-timestamp: "enable"
long-vdom-name: "enable"
management-vdom: "<your_own_value> (source system.vdom.name)"
max-dlpstat-memory: "94"
max-route-cache-size: "95"
mc-ttl-notchange: "enable"
memory-use-threshold-extreme: "97"
memory-use-threshold-green: "98"
memory-use-threshold-red: "99"
miglog-affinity: "<your_own_value>"
miglogd-children: "101"
multi-factor-authentication: "optional"
multicast-forward: "enable"
ndp-max-entry: "104"
per-user-bwl: "enable"
policy-auth-concurrent: "106"
post-login-banner: "disable"
pre-login-banner: "enable"
private-data-encryption: "disable"
proxy-auth-lifetime: "enable"
proxy-auth-lifetime-timeout: "111"
proxy-auth-timeout: "112"
proxy-cipher-hardware-acceleration: "disable"
proxy-kxp-hardware-acceleration: "disable"
proxy-re-authentication-mode: "session"
proxy-worker-count: "116"
radius-port: "117"
reboot-upon-config-restore: "enable"
refresh: "119"
remoteauthtimeout: "120"
reset-sessionless-tcp: "enable"
restart-time: "<your_own_value>"
revision-backup-on-logout: "enable"
revision-image-auto-backup: "enable"
scanunit-count: "125"
security-rating-result-submission: "enable"
security-rating-run-on-schedule: "enable"
send-pmtu-icmp: "enable"
snat-route-change: "enable"
special-file-23-support: "disable"
ssh-cbc-cipher: "enable"
ssh-hmac-md5: "enable"
ssh-kex-sha1: "enable"
ssl-min-proto-version: "SSLv3"
ssl-static-key-ciphers: "enable"
sslvpn-cipher-hardware-acceleration: "enable"
sslvpn-kxp-hardware-acceleration: "enable"
sslvpn-max-worker-count: "138"
sslvpn-plugin-version-check: "enable"
strict-dirty-session-check: "enable"
strong-crypto: "enable"
switch-controller: "disable"
switch-controller-reserved-network: "<your_own_value>"
sys-perf-log-interval: "144"
tcp-halfclose-timer: "145"
tcp-halfopen-timer: "146"
tcp-option: "enable"
tcp-timewait-timer: "148"
tftp: "enable"
timezone: "01"
tp-mc-skip-policy: "enable"
traffic-priority: "tos"
traffic-priority-level: "low"
two-factor-email-expiry: "154"
two-factor-fac-expiry: "155"
two-factor-ftk-expiry: "156"
two-factor-ftm-expiry: "157"
two-factor-sms-expiry: "158"
udp-idle-timer: "159"
user-server-cert: "<your_own_value> (source certificate.local.name)"
vdom-admin: "enable"
vip-arp-range: "unlimited"
virtual-server-count: "163"
virtual-server-hardware-acceleration: "disable"
wad-affinity: "<your_own_value>"
wad-csvc-cs-count: "166"
wad-csvc-db-count: "167"
wad-source-affinity: "disable"
wad-worker-count: "169"
wifi-ca-certificate: "<your_own_value> (source certificate.ca.name)"
wifi-certificate: "<your_own_value> (source certificate.local.name)"
wimax-4g-usb: "enable"
wireless-controller: "enable"
wireless-controller-port: "174"
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
build
string
|
always |
Build number of the fortigate image
Sample:
1547
|
http_method
string
|
always |
Last method used to provision the content into FortiGate
Sample:
PUT
|
http_status
string
|
always |
Last result given by FortiGate on last operation applied
Sample:
200
|
mkey
string
|
success |
Master key (id) used in the last call to FortiGate
Sample:
id
|
name
string
|
always |
Name of the table used to fulfill the request
Sample:
urlfilter
|
path
string
|
always |
Path of the table used to fulfill the request
Sample:
webfilter
|
revision
string
|
always |
Internal revision number
Sample:
17.0.2.10658
|
serial
string
|
always |
Serial number of the unit
Sample:
FGVMEVYYQT3AB5352
|
status
string
|
always |
Indication of the operation's result
Sample:
success
|
vdom
string
|
always |
Virtual domain used
Sample:
root
|
version
string
|
always |
Version of the FortiGate
Sample:
v5.6.3
|
Status¶
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by the Ansible Community. [community]