cisco.meraki.meraki_ms_access_list module – Manage access lists for Meraki switches in the Meraki cloud
Note
This module is part of the cisco.meraki collection (version 2.8.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install cisco.meraki
.
To use it in a playbook, specify: cisco.meraki.meraki_ms_access_list
.
New in version 0.1.0: of cisco.meraki
Synopsis
Configure and query information about access lists on Meraki switches within the Meraki cloud.
Parameters
Parameter |
Comments |
---|---|
Authentication key provided by the dashboard. Required if environmental variable |
|
Hostname for Meraki dashboard. Can be used to access regional Meraki environments, such as China. Default: “api.meraki.com” |
|
Number of seconds to retry if server returns an internal server error. Default: 60 |
|
ID of network which configuration is applied to. |
|
Name of network which configuration is applied to. |
|
ID of organization. |
|
Name of organization. |
|
Instructs module whether response keys should be snake case (ex. Choices:
|
|
Set amount of debug output during module execution. Choices:
|
|
Number of seconds to retry if rate limiter is triggered. Default: 165 |
|
List of access control rules. |
|
Description of the rule. |
|
CIDR notation of source IP address to match. |
|
Port number of destination port to match. May be a port number or ‘any’. |
|
Type of IP packets to match. Choices:
|
|
Action to take on matching traffic. Choices:
|
|
Type of protocol to match. Choices:
|
|
CIDR notation of source IP address to match. |
|
Port number of source port to match. May be a port number or ‘any’. |
|
Incoming traffic VLAN. May be any port between 1-4095 or ‘any’. |
|
Specifies whether object should be queried, created/modified, or removed. Choices:
|
|
Time to timeout for HTTP requests. Default: 30 |
|
If Only useful for internal Meraki developers. Choices:
|
|
If Choices:
|
|
Whether to validate HTTP certificates. Choices:
|
Notes
Note
Some of the options are likely only used for developers within Meraki.
More information about the Meraki API can be found at https://dashboard.meraki.com/api_docs.
Some of the options are likely only used for developers within Meraki.
As of Ansible 2.9, Meraki modules output keys as snake case. To use camel case, set the
ANSIBLE_MERAKI_FORMAT
environment variable tocamelcase
.Ansible’s Meraki modules will stop supporting camel case output in Ansible 2.13. Please update your playbooks.
Check Mode downloads the current configuration from the dashboard, then compares changes against this download. Check Mode will report changed if there are differences in the configurations, but does not submit changes to the API for validation of change.
Examples
- name: Set access list
meraki_switch_access_list:
auth_key: abc123
state: present
org_name: YourOrg
net_name: YourNet
rules:
- comment: Fake rule
policy: allow
ip_version: ipv4
protocol: udp
src_cidr: 192.0.1.0/24
src_port: "4242"
dst_cidr: 1.2.3.4/32
dst_port: "80"
vlan: "100"
delegate_to: localhost
- name: Query access lists
meraki_switch_access_list:
auth_key: abc123
state: query
org_name: YourOrg
net_name: YourNet
delegate_to: localhost
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
List of administrators. Returned: success |
|
List of access control rules. Returned: success |
|
Description of the rule. Returned: success Sample: “User rule” |
|
CIDR notation of source IP address to match. Returned: success Sample: “1.2.3.4/32” |
|
Port number of destination port to match. Returned: success Sample: 80 |
|
Type of IP packets to match. Returned: success Sample: “ipv4” |
|
Action to take on matching traffic. Returned: success Sample: “allow” |
|
Type of protocol to match. Returned: success Sample: “udp” |
|
CIDR notation of source IP address to match. Returned: success Sample: “192.0.1.0/24” |
|
Port number of source port to match. Returned: success Sample: 1234 |
|
Incoming traffic VLAN. Returned: success Sample: 100 |
Authors
Kevin Breit (@kbreit)