cisco.dnac.security_service_insertions module – Resource module for Security Service Insertions
Note
This module is part of the cisco.dnac collection (version 6.39.0).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install cisco.dnac
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: cisco.dnac.security_service_insertions
.
New in cisco.dnac 6.18.0
Synopsis
Manage operation create of the resource Security Service Insertions. - > Enables Security Service Insertion SSI on a fabric site within a network. Security Service Insertion allows the integration of security services, such as firewalls, into the fabric network, ensuring that traffic within Virtual Networks VNs is routed through these security devices.
Note
This module has a corresponding action plugin.
Requirements
The below requirements are needed on the host that executes this module.
dnacentersdk >= 2.10.1
python >= 3.5
Parameters
Parameter |
Comments |
---|---|
Flag for Cisco DNA Center SDK to enable debugging. Choices:
|
|
The Cisco DNA Center hostname. |
|
The Cisco DNA Center password to authenticate. |
|
The Cisco DNA Center port. Default: |
|
The Cisco DNA Center username to authenticate. Default: |
|
Flag to enable or disable SSL certificate verification. Choices:
|
|
Informs the SDK which version of Cisco DNA Center to use. Default: |
|
The ID of the fabric site where the service insertion is configured. |
|
Flag for Cisco DNA Center SDK to enable the validation of request bodies against a JSON schema. Choices:
|
|
Security Service Insertions’s virtualNetworks. |
|
Security Service Insertions’s devices. |
|
The unique identifier of the network device. |
|
Security Service Insertions’s layer3Handoffs. |
|
The IPv4 address and subnet mask of the firewall. |
|
Name of the virtual network associated with the fabric site. |
Notes
Note
SDK Method used are sda.Sda.create_security_service_insertion_on_a_specific_fabric_site,
Paths used are post /dna/intent/api/v1/securityServiceInsertions,
Does not support
check_mode
The plugin runs on the control node and does not use any ansible connection plugins, but instead the embedded connection manager from Cisco DNAC SDK
The parameters starting with dnac_ are used by the Cisco DNAC Python SDK to establish the connection
See Also
See also
- Cisco DNA Center documentation for SDA CreateSecurityServiceInsertionOnASpecificFabricSite
Complete reference of the CreateSecurityServiceInsertionOnASpecificFabricSite API.
Examples
---
- name: Create
cisco.dnac.security_service_insertions:
dnac_host: "{{dnac_host}}"
dnac_username: "{{dnac_username}}"
dnac_password: "{{dnac_password}}"
dnac_verify: "{{dnac_verify}}"
dnac_port: "{{dnac_port}}"
dnac_version: "{{dnac_version}}"
dnac_debug: "{{dnac_debug}}"
state: present
siteId: string
virtualNetworks:
- devices:
- id: string
layer3Handoffs:
- firewallIpV4AddressWithMask: string
name: string
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
A dictionary or list with the response returned by the Cisco DNAC Python SDK Returned: always Sample: |