cisco.dnac.security_threats_rogue_allowed_list module – Resource module for Security Threats Rogue Allowed-List
Note
This module is part of the cisco.dnac collection (version 6.41.0).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install cisco.dnac.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.dnac.security_threats_rogue_allowed_list.
New in cisco.dnac 6.16.0
Synopsis
- Manage operations create and delete of the resource Security Threats Rogue Allowed-List. 
- Intent API to add the threat mac address to allowed list. 
- Intent API to remove the threat mac address from allowed list. 
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
- dnacentersdk >= 2.10.1 
- python >= 3.5 
Parameters
| Parameter | Comments | 
|---|---|
| Flag for Cisco DNA Center SDK to enable debugging. Choices: 
 | |
| The Cisco DNA Center hostname. | |
| The Cisco DNA Center password to authenticate. | |
| The Cisco DNA Center port. Default:  | |
| The Cisco DNA Center username to authenticate. Default:  | |
| Flag to enable or disable SSL certificate verification. Choices: 
 | |
| Informs the SDK which version of Cisco DNA Center to use. Default:  | |
| MacAddress path parameter. Threat mac address which needs to be removed from the allowed list. Multiple mac addresses will be removed if provided as comma separated values (example 00 2A 10 51 22 43,00 2A 10 51 22 44). Note In one request, maximum 100 mac addresses can be removed. | |
| Security Threats Rogue Allowed List’s payload. | |
| Category. | |
| Mac Address. | |
| Flag for Cisco DNA Center SDK to enable the validation of request bodies against a JSON schema. Choices: 
 | 
Notes
Note
- SDK Method used are devices.Devices.add_allowed_mac_address, devices.Devices.remove_allowed_mac_address, 
- Paths used are post /dna/intent/api/v1/security/threats/rogue/allowed-list, delete /dna/intent/api/v1/security/threats/rogue/allowed-list/{macAddress}, 
- Does not support - check_mode
- The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco DNAC SDK 
- The parameters starting with dnac_ are used by the Cisco DNAC Python SDK to establish the connection 
See Also
See also
- Cisco DNA Center documentation for Devices AddAllowedMacAddress
- Complete reference of the AddAllowedMacAddress API. 
- Cisco DNA Center documentation for Devices RemoveAllowedMacAddress
- Complete reference of the RemoveAllowedMacAddress API. 
Examples
---
- name: Create
  cisco.dnac.security_threats_rogue_allowed-list:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    state: present
    payload:
      - category: 0
        macAddress: string
- name: Delete by id
  cisco.dnac.security_threats_rogue_allowed-list:
    dnac_host: "{{dnac_host}}"
    dnac_username: "{{dnac_username}}"
    dnac_password: "{{dnac_password}}"
    dnac_verify: "{{dnac_verify}}"
    dnac_port: "{{dnac_port}}"
    dnac_version: "{{dnac_version}}"
    dnac_debug: "{{dnac_debug}}"
    state: absent
    macAddress: string
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Description | 
|---|---|
| A dictionary or list with the response returned by the Cisco DNAC Python SDK Returned: always Sample:  | 
