checkpoint_access_rule – Manages access rules on Check Point over Web Services API¶
New in version 2.8.
Synopsis¶
Manages access rules on Check Point devices including creating, updating, removing access rules objects, All operations are performed over Web Services API.
Parameters¶
Examples¶
- name: Create access rule
checkpoint_access_rule:
layer: Network
name: "Drop attacker"
position: top
source: attacker
destination: Any
action: Drop
- name: Delete access rule
checkpoint_access_rule:
layer: Network
name: "Drop attacker"
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
checkpoint_access_rules
list
|
always, except when deleting the access rule. |
The checkpoint access rule object created or updated.
|
Status¶
This module is not guaranteed to have a backwards compatible interface. [preview]
This module is maintained by the Ansible Network Team. [network]
Red Hat Support¶
More information about Red Hat’s support of this module is available from this Red Hat Knowledge Base article.
Authors¶
Ansible by Red Hat (@rcarrillocruz)
Hint
If you notice any issues in this documentation, you can edit this document to improve it.