netapp.ontap.na_ontap_security_ipsec_policy module – NetApp ONTAP module to create, modify or delete security IPsec policy.
Note
This module is part of the netapp.ontap collection (version 22.13.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install netapp.ontap
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: netapp.ontap.na_ontap_security_ipsec_policy
.
New in netapp.ontap 22.1.0
Synopsis
Create, modify or delete security IPsec policy.
Requirements
The below requirements are needed on the host that executes this module.
Ansible 2.9 or later - 2.12 or later is recommended.
Python3 - 3.9 or later is recommended.
When using ZAPI, netapp-lib 2018.11.13 or later (install using ‘pip install netapp-lib’), netapp-lib 2020.3.12 is strongly recommended as it provides better error reporting for connection issues.
A physical or virtual clustered Data ONTAP system, the modules support Data ONTAP 9.1 and onward, REST support requires ONTAP 9.6 or later.
Parameters
Parameter |
Comments |
---|---|
Action for the IPsec policy. Cannot modify after create. Choices:
|
|
Authentication method for the IPsec policy. Supported from 9.10.1 or later. Cannot modify after create. Choices:
|
|
path to SSL client cert file (.pem). not supported with python 2.6. |
|
Certificate for the IPsec policy. Supported from 9.10.1 or later. Required when |
|
Indicates whether or not the policy is enabled. Choices:
|
|
Enable or disable a new feature. This can be used to enable an experimental feature or disable a new feature that breaks backward compatibility. Supported keys and values are subject to change without notice. Unknown keys are ignored. |
|
Override the cluster ONTAP version when using REST. The behavior is undefined if the version does not match the target cluster. This is provided as a work-around when the cluster version cannot be read because of permission issues. See https://github.com/ansible-collections/netapp.ontap/wiki/Known-issues. This should be in the form 9.10 or 9.10.1 with each element being an integer number. |
|
The hostname or IP address of the ONTAP instance. |
|
Override the default port (80 or 443) with this port |
|
Enable and disable https. Ignored when using REST as only https is supported. Ignored when using SSL certificate authentication as it requires SSL. Choices:
|
|
IPspace name where |
|
path to SSL client key file. |
|
Local endpoint for the IPsec policy. |
|
IPv4 or IPv6 address. |
|
Input as netmask length (16) or IPv4 mask (255.255.0.0). For IPv6, the default value is 64 with a valid range of 1 to 127. |
|
Application port to be covered by the IPsec policy, example 23. |
|
local IKE endpoint’s identity for authentication purpose. |
|
Name of the security IPsec policy |
|
Password for the specified user. |
|
protocol to be protected by by this policy. example ‘any’ or ‘0’, ‘tcp’, ‘udp’ or protocol number. |
|
remote endpoint for the IPsec policy. |
|
IPv4 or IPv6 address. |
|
Input as netmask length (16) or IPv4 mask (255.255.0.0). For IPv6, the default value is 64 with a valid range of 1 to 127. |
|
Application port to be covered by the IPsec policy, example 23 or 23-23. |
|
remote IKE endpoint’s identity for authentication purpose. |
|
Pre-shared key for IKE negotiation. Required when Cannot modify after create. |
|
Create or delete security IPsec policy. Choices:
|
|
The name of the SVM. Required when creating security IPsec policy. |
|
This module only supports REST. always – will always use the REST API. A warning is issued if the module does not support REST. Default: |
|
This can be a Cluster-scoped or SVM-scoped account, depending on whether a Cluster-level or SVM-level API is required. For more information, please read the documentation https://mysupport.netapp.com/NOW/download/software/nmsdk/9.4/. Two authentication methods are supported
To use a certificate, the certificate must have been installed in the ONTAP cluster, and cert authentication must have been enabled. |
|
If set to This should only set to Choices:
|
Notes
Note
Supports check_mode.
Only supported with REST and requires ONTAP 9.8 or later.
The modules prefixed with na_ontap are built to support the ONTAP storage platform.
https is enabled by default and recommended. To enable http on the cluster you must run the following commands ‘set -privilege advanced;’ ‘system services web modify -http-enabled true;’
Examples
- name: Create security IPsec policy with pre-shared Keys.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_psk
ipspace: Default
svm: ansibleSVM
authentication_method: psk
secret_key: "{{ secret_key }}"
action: esp_transport
local_endpoint:
address: 10.23.43.23
netmask: 24
port: 201
remote_endpoint:
address: 10.23.43.30
netmask: 24
port: 205
protocol: tcp
enabled: true
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"
- name: Create security IPsec policy with certificates.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_pki
ipspace: Default
svm: ansibleSVM
authentication_method: pki
certificate: "{{ cert_name }}"
action: esp_transport
local_endpoint:
address: 10.23.43.23
netmask: 24
port: 201
remote_endpoint:
address: 10.23.43.30
netmask: 24
port: 205
protocol: tcp
enabled: true
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"
- name: Create security IPsec policy without psk or certificates.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_none
ipspace: Default
svm: ansibleSVM
action: bypass
local_endpoint:
address: 10.23.43.23
netmask: 24
port: 201
remote_endpoint:
address: 10.23.43.30
netmask: 24
port: 205
protocol: tcp
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"
- name: Modify security IPsec policy local, remote end_point.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_pki
ipspace: Default
svm: ansibleSVM
authentication_method: pki
certificate: "{{ cert_name }}"
action: esp_transport
local_endpoint:
address: 10.23.43.50
netmask: 24
port: 201
remote_endpoint:
address: 10.23.43.60
netmask: 24
port: 205
protocol: tcp
enabled: true
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"
- name: Modify security IPsec protocol, enable options.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_pki
ipspace: Default
svm: ansibleSVM
authentication_method: pki
certificate: "{{ cert_name }}"
action: esp_transport
local_endpoint:
address: 10.23.43.50
netmask: 24
port: 201
remote_endpoint:
address: 10.23.43.60
netmask: 24
port: 205
protocol: udp
enabled: false
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"
- name: Delete security IPsec policy.
netapp.ontap.na_ontap_security_ipsec_policy:
name: ipsec_policy_pki
svm: ansibleSVM
hostname: "{{ netapp_hostname }}"
username: "{{ netapp_username }}"
password: "{{ netapp_password }}"
https: true
validate_certs: "{{ validate_certs }}"