fortinet.fortios.fortios_vpn_ssl_web_portal module – Portal in Fortinet’s FortiOS and FortiGate.
Note
This module is part of the fortinet.fortios collection (version 2.3.8).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortios
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: fortinet.fortios.fortios_vpn_ssl_web_portal
.
New in fortinet.fortios 2.0.0
Synopsis
This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify vpn_ssl_web feature and portal category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
Requirements
The below requirements are needed on the host that executes this module.
ansible>=2.15
Parameters
Parameter |
Comments |
---|---|
Token-based authentication. Generated from GUI of Fortigate. |
|
Enable/Disable logging for task. Choices:
|
|
Member attribute path to operate on. Delimited by a slash character if there are more than one attribute. Parameter marked with member_path is legitimate for doing member operation. |
|
Add or delete a member under specified attribute path. When member_state is specified, the state option is ignored. Choices:
|
|
Indicates whether to create or remove the object. Choices:
|
|
Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit. Default: |
|
Portal. |
|
Allow user access to SSL-VPN applications. Choices:
|
|
Enable/disable automatic connect by client when system is up. Choices:
|
|
Portal bookmark group. |
|
Bookmark table. |
|
Additional parameters. |
|
Application type. Choices:
|
|
Color depth per pixel. Choices:
|
|
Description. |
|
Login domain. |
|
Network shared file folder parameter. |
|
Form data. |
|
Name. |
|
Value. |
|
Screen height (range from 0 - 65535). |
|
Host name/IP parameter. |
|
Keyboard layout. Choices:
|
|
Listening port (0 - 65535). |
|
The load balancing information or cookie which should be provided to the connection broker. |
|
Logon password. |
|
Logon user. |
|
Bookmark name. |
|
Remote port. |
|
An arbitrary string which identifies the RDP source. |
|
The numeric ID of the RDP source (0-4294967295). |
|
Remote port (0 - 65535). |
|
Enable/disable restricted admin mode for RDP. Choices:
|
|
Security mode for RDP connection . Choices:
|
|
Enable/disable sending of preconnection ID. Choices:
|
|
Server side keyboard layout. Choices:
|
|
Enable/disable showing of status window. Choices:
|
|
Single sign-on. Choices:
|
|
Single sign-on credentials. Choices:
|
|
Single sign-on credentials are only sent once to remote server. Choices:
|
|
SSO password. |
|
SSO user name. |
|
URL parameter. |
|
Keyboard layout. Choices:
|
|
Screen width (range from 0 - 65535). |
|
Bookmark group name. |
|
Allow client to add source range for the tunnel traffic. Choices:
|
|
Enable to support RDP/VPC clipboard functionality. Choices:
|
|
Change the web portal display language. Overrides config system global set language. You can use config system custom-language and execute system custom-language to add custom language files. Source system.custom-language.name. |
|
Enable support of customized download URL for FortiClient. Choices:
|
|
Application type that is set by default. Choices:
|
|
Screen height (range from 0 - 65535). |
|
Screen width (range from 0 - 65535). |
|
Relay agent IPv6 link address to use in DHCP6 requests. |
|
Configure overlapping DHCP IP allocation assignment. Choices:
|
|
Relay agent gateway IP address to use in the giaddr field of DHCP requests. |
|
Enable/disable dhcp reservation. Choices:
|
|
Enable to display the web portal bookmark widget. Choices:
|
|
Enable to display the web portal connection tools widget. Choices:
|
|
Enable to display the web portal user login history widget. Choices:
|
|
Enable to display the web portal status widget. Choices:
|
|
IPv4 DNS server 1. |
|
IPv4 DNS server 2. |
|
DNS suffix. |
|
Enable/disable all traffic go through tunnel only. Choices:
|
|
Enable to prioritize the placement of the bookmark section over the quick-connection section in the SSL-VPN application. Choices:
|
|
Enable/disable download option for FortiClient. Choices:
|
|
FortiClient download method. Choices:
|
|
Web portal heading message. |
|
Enable to prevent SSO credential being sent to client. Choices:
|
|
Type of host checking performed on endpoints. Choices:
|
|
Periodic host check interval. Value of 0 means disabled and host checking only happens when the endpoint connects. |
|
One or more policies to require the endpoint to have specific security software. |
|
Host check software list name. Source vpn.ssl.web.host-check-software.name. |
|
Method by which users of this SSL-VPN tunnel obtain IP addresses. Choices:
|
|
IPv4 firewall source address objects reserved for SSL-VPN tunnel mode clients. |
|
Address name. Source firewall.address.name firewall.addrgrp.name. |
|
IPv6 DNS server 1. |
|
IPv6 DNS server 2. |
|
Enable/disable all IPv6 traffic go through tunnel only. Choices:
|
|
IPv6 firewall source address objects reserved for SSL-VPN tunnel mode clients. |
|
Address name. Source firewall.address6.name firewall.addrgrp6.name. |
|
Enable/disable IPv6 tunnel service restriction. Choices:
|
|
Enable/disable IPv6 split tunneling. Choices:
|
|
IPv6 SSL-VPN tunnel mode firewall address objects that override firewall policy destination addresses to control split-tunneling access. |
|
Address name. Source firewall.address6.name firewall.addrgrp6.name. |
|
Enable to negate IPv6 split tunneling routing address. Choices:
|
|
Enable/disable IPv6 SSL-VPN tunnel mode. Choices:
|
|
IPv6 WINS server 1. |
|
IPv6 WINS server 2. |
|
Enable/disable automatic reconnect for FortiClient connections. Choices:
|
|
Landing page options. |
|
Form data. |
|
Name. |
|
Value. |
|
Landing page log out URL. |
|
Single sign-on. Choices:
|
|
Single sign-on credentials. Choices:
|
|
SSO password. |
|
SSO user name. |
|
Landing page URL. |
|
Enable/disable SSL-VPN landing page mode. Choices:
|
|
Enable to limit each user to one SSL-VPN session at a time. Choices:
|
|
Client MAC address action. Choices:
|
|
Enable/disable MAC address host checking. Choices:
|
|
Client MAC address check rule. |
|
Client MAC address list. |
|
Client MAC address. |
|
Client MAC address mask. |
|
Client MAC address check rule name. |
|
Download URL for Mac FortiClient. |
|
Portal name. |
|
Enable to let the FortiGate decide action based on client OS. Choices:
|
|
SSL-VPN OS checks. |
|
OS check options. Choices:
|
|
Latest OS patch level. |
|
Name. |
|
OS patch level tolerance. |
|
Prefer to query IPv6 DNS server first if enabled. Choices:
|
|
Client login redirect URL. |
|
Rewrite contents for URI contains IP and /ui/ . Choices:
|
|
Enable/disable FortiClient saving the user”s password. Choices:
|
|
Enable/disable tunnel service restriction. Choices:
|
|
Enable to skip host check for browser support. Choices:
|
|
Enable to skip host check if browser does not support it. Choices:
|
|
Enable to skip host check if client OS does not support it. Choices:
|
|
SMB maximum client protocol version. Choices:
|
|
SMB minimum client protocol version. Choices:
|
|
Enable support of NTLMv1 for Samba authentication. Choices:
|
|
SMB version 1. Choices:
|
|
Split DNS for SSL-VPN. |
|
DNS server 1. |
|
DNS server 2. |
|
Split DNS domains used for SSL-VPN clients separated by comma. |
|
ID. see <a href=’#notes’>Notes</a>. |
|
IPv6 DNS server 1. |
|
IPv6 DNS server 2. |
|
Enable/disable IPv4 split tunneling. Choices:
|
|
IPv4 SSL-VPN tunnel mode firewall address objects that override firewall policy destination addresses to control split-tunneling access. |
|
Address name. Source firewall.address.name firewall.addrgrp.name. |
|
Enable to negate split tunneling routing address. Choices:
|
|
Web portal color scheme. Choices:
|
|
Transform backward slashes to forward slashes in URLs. Choices:
|
|
Enable/disable IPv4 SSL-VPN tunnel mode. Choices:
|
|
Use SD-WAN rules to get output interface. Choices:
|
|
Enable to allow web portal users to create their own bookmarks. Choices:
|
|
Enable to allow web portal users to create bookmarks for all users in the same user group. Choices:
|
|
Enable/disable SSL-VPN web mode. Choices:
|
|
Download URL for Windows FortiClient. |
|
IPv4 WINS server 1. |
|
IPv4 WINS server 1. |
Notes
Note
Legacy fortiosapi has been deprecated, httpapi is the preferred way to run playbooks
The module supports check_mode.
Examples
- name: Portal.
fortinet.fortios.fortios_vpn_ssl_web_portal:
vdom: "{{ vdom }}"
state: "present"
access_token: "<your_own_value>"
vpn_ssl_web_portal:
allow_user_access: "web"
auto_connect: "enable"
bookmark_group:
-
bookmarks:
-
additional_params: "<your_own_value>"
apptype: "ftp"
color_depth: "32"
description: "<your_own_value>"
domain: "<your_own_value>"
folder: "<your_own_value>"
form_data:
-
name: "default_name_14"
value: "<your_own_value>"
height: "768"
host: "myhostname"
keyboard_layout: "ar-101"
listening_port: "0"
load_balancing_info: "<your_own_value>"
logon_password: "<your_own_value>"
logon_user: "<your_own_value>"
name: "default_name_23"
port: "0"
preconnection_blob: "<your_own_value>"
preconnection_id: "2147483648"
remote_port: "0"
restricted_admin: "enable"
security: "any"
send_preconnection_id: "enable"
server_layout: "de-de-qwertz"
show_status_window: "enable"
sso: "disable"
sso_credential: "sslvpn-login"
sso_credential_sent_once: "enable"
sso_password: "<your_own_value>"
sso_username: "<your_own_value>"
url: "myurl.com"
vnc_keyboard_layout: "default"
width: "1024"
name: "default_name_41"
client_src_range: "enable"
clipboard: "enable"
custom_lang: "<your_own_value> (source system.custom-language.name)"
customize_forticlient_download_url: "enable"
default_protocol: "web"
default_window_height: "768"
default_window_width: "1024"
dhcp_ip_overlap: "use-new"
dhcp_ra_giaddr: "<your_own_value>"
dhcp_reservation: "enable"
dhcp6_ra_linkaddr: "<your_own_value>"
display_bookmark: "enable"
display_connection_tools: "enable"
display_history: "enable"
display_status: "enable"
dns_server1: "<your_own_value>"
dns_server2: "<your_own_value>"
dns_suffix: "<your_own_value>"
exclusive_routing: "enable"
focus_bookmark: "enable"
forticlient_download: "enable"
forticlient_download_method: "direct"
heading: "<your_own_value>"
hide_sso_credential: "enable"
host_check: "none"
host_check_interval: "0"
host_check_policy:
-
name: "default_name_69 (source vpn.ssl.web.host-check-software.name)"
ip_mode: "range"
ip_pools:
-
name: "default_name_72 (source firewall.address.name firewall.addrgrp.name)"
ipv6_dns_server1: "<your_own_value>"
ipv6_dns_server2: "<your_own_value>"
ipv6_exclusive_routing: "enable"
ipv6_pools:
-
name: "default_name_77 (source firewall.address6.name firewall.addrgrp6.name)"
ipv6_service_restriction: "enable"
ipv6_split_tunneling: "enable"
ipv6_split_tunneling_routing_address:
-
name: "default_name_81 (source firewall.address6.name firewall.addrgrp6.name)"
ipv6_split_tunneling_routing_negate: "enable"
ipv6_tunnel_mode: "enable"
ipv6_wins_server1: "<your_own_value>"
ipv6_wins_server2: "<your_own_value>"
keep_alive: "enable"
landing_page:
form_data:
-
name: "default_name_89"
value: "<your_own_value>"
logout_url: "<your_own_value>"
sso: "disable"
sso_credential: "sslvpn-login"
sso_password: "<your_own_value>"
sso_username: "<your_own_value>"
url: "myurl.com"
landing_page_mode: "enable"
limit_user_logins: "enable"
mac_addr_action: "allow"
mac_addr_check: "enable"
mac_addr_check_rule:
-
mac_addr_list:
-
addr: "<your_own_value>"
mac_addr_mask: "48"
name: "default_name_105"
macos_forticlient_download_url: "<your_own_value>"
name: "default_name_107"
os_check: "enable"
os_check_list:
-
action: "deny"
latest_patch_level: "<your_own_value>"
name: "default_name_112"
tolerance: "0"
prefer_ipv6_dns: "enable"
redir_url: "<your_own_value>"
rewrite_ip_uri_ui: "enable"
save_password: "enable"
service_restriction: "enable"
skip_check_for_browser: "enable"
skip_check_for_unsupported_browser: "enable"
skip_check_for_unsupported_os: "enable"
smb_max_version: "smbv1"
smb_min_version: "smbv1"
smb_ntlmv1_auth: "enable"
smbv1: "enable"
split_dns:
-
dns_server1: "<your_own_value>"
dns_server2: "<your_own_value>"
domains: "<your_own_value>"
id: "130"
ipv6_dns_server1: "<your_own_value>"
ipv6_dns_server2: "<your_own_value>"
split_tunneling: "enable"
split_tunneling_routing_address:
-
name: "default_name_135 (source firewall.address.name firewall.addrgrp.name)"
split_tunneling_routing_negate: "enable"
theme: "jade"
transform_backward_slashes: "enable"
tunnel_mode: "enable"
use_sdwan: "enable"
user_bookmark: "enable"
user_group_bookmark: "enable"
web_mode: "enable"
windows_forticlient_download_url: "<your_own_value>"
wins_server1: "<your_own_value>"
wins_server2: "<your_own_value>"
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Build number of the fortigate image Returned: always Sample: |
|
Last method used to provision the content into FortiGate Returned: always Sample: |
|
Last result given by FortiGate on last operation applied Returned: always Sample: |
|
Master key (id) used in the last call to FortiGate Returned: success Sample: |
|
Name of the table used to fulfill the request Returned: always Sample: |
|
Path of the table used to fulfill the request Returned: always Sample: |
|
Internal revision number Returned: always Sample: |
|
Serial number of the unit Returned: always Sample: |
|
Indication of the operation’s result Returned: always Sample: |
|
Virtual domain used Returned: always Sample: |
|
Version of the FortiGate Returned: always Sample: |