fortinet.fortios.fortios_firewall_policy64 – Configure IPv6 to IPv4 policies in Fortinet’s FortiOS and FortiGate.
This plugin is part of the fortinet.fortios collection (version 2.1.3).
You might already have this collection installed if you are using the
It is not included in
To check whether it is installed, run
ansible-galaxy collection list.
To install it, use:
ansible-galaxy collection install fortinet.fortios.
To use it in a playbook, specify:
New in version 2.10: of fortinet.fortios
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify firewall feature and policy64 category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
The below requirements are needed on the host that executes this module.
- collections: - fortinet.fortios connection: httpapi hosts: fortigate01 vars: ansible_httpapi_port: 443 ansible_httpapi_use_ssl: true ansible_httpapi_validate_certs: false vdom: root tasks: - name: fortios_firewall_policy64 fortios_firewall_policy64: vdom: root state: present firewall_policy64: action: accept dstaddr: - name: all dstintf: port4 fixedport: disable ippool: disable logtraffic: disable logtraffic_start: disable permit_any_host: disable policyid: 1 schedule: always service: - name: ALL srcaddr: - name: all srcintf: port3 status: enable tcp_mss_receiver: 0 tcp_mss_sender: 0
Common return values are documented here, the following are the fields unique to this module: