paloaltonetworks.panos.panos_decryption_rule module – Manage a decryption rule on PAN-OS.
Note
This module is part of the paloaltonetworks.panos collection (version 2.21.2).
To install it, use: ansible-galaxy collection install paloaltonetworks.panos
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: paloaltonetworks.panos.panos_decryption_rule
.
New in paloaltonetworks.panos 2.10.0
Synopsis
This module works for PAN-OS 7.0 and above.
Allows for the management of decryption rules on PAN-OS.
Requirements
The below requirements are needed on the host that executes this module.
pan-python >= 0.17
pan-os-python >= 1.7.3
Parameters
Parameter |
Comments |
---|---|
Deprecated Use provider to specify PAN-OS connectivity instead. The API key to use instead of generating it using username / password. |
|
Add an audit comment to the rule being defined. This is only applied if there was a change to the rule. |
|
The decryption profile. |
|
The rule description. |
|
List of destination addresses. This can be an IP address, an address object/group, etc. When referencing predefined EDLs, use config names of the EDLS not their full names. The config names can be found with the CLI… request system external-list show type predefined-ip name <tab> panw-bulletproof-ip-list panw-bulletproof-ip-list panw-highrisk-ip-list panw-highrisk-ip-list panw-known-ip-list panw-known-ip-list panw-torexit-ip-list panw-torexit-ip-list |
|
The source HIP info. |
|
List of destination zones. |
|
(Panorama only) The device group the operation should target. Default: :ansible-option-default:`"shared"` |
|
Rule is disabled or not. Choices: |
|
|
|
The forwarding profile. |
|
When state=gathered. An advanced filtering option to filter results returned from PAN-OS. Refer to the guide discussing gathered_filter for more information. |
|
PAN-OS 9.0 and above. The group tag. |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The IP address or hostname of the PAN-OS device being configured. |
|
Position to place the rule in. Choices: |
|
PAN-OS 10.0 and above. Log failed TLS handshakes. Choices: |
|
PAN-OS 10.0 and above. The log setting. |
|
PAN-OS 10.0 and above. Log successful TLS handshakes. Choices: |
|
Name of the rule. |
|
Negate the destination addresses. Choices: |
|
Negate the source addresses. Choices: |
|
Applicable for Panorama only. Negate the value for target. Choices: |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The password to use for authentication. This is ignored if api_key is specified. |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The port number to connect to the PAN-OS device on. Default: :ansible-option-default:`443` |
|
A dict object containing connection details. |
|
The API key to use instead of generating it using username / password. |
|
The IP address or hostname of the PAN-OS device being configured. |
|
The password to use for authentication. This is ignored if api_key is specified. |
|
The port number to connect to the PAN-OS device on. Default: :ansible-option-default:`443` |
|
The serial number of a firewall to use for targeted commands. If ip_address is not a Panorama PAN-OS device, then this param is ignored. |
|
The username to use for authentication. This is ignored if api_key is specified. Default: :ansible-option-default:`"admin"` |
|
The rulebase in which the rule is to exist. If left unspecified, this defaults to rulebase=pre-rulebase for Panorama. For NGFW, this is always set to be rulebase=rulebase. Choices: |
|
List of services. |
|
List of source addresses. This can be an IP address, an address object/group, etc. When referencing predefined EDLs, use config names of the EDLS not their full names. The config names can be found with the CLI… request system external-list show type predefined-ip name <tab> panw-bulletproof-ip-list panw-bulletproof-ip-list panw-highrisk-ip-list panw-highrisk-ip-list panw-known-ip-list panw-known-ip-list panw-torexit-ip-list panw-torexit-ip-list |
|
The source HIP info. |
|
The source users. |
|
List of source zones. |
|
The SSL certificate. |
|
The administrative tags. |
|
Applicable for Panorama only. Apply this rule exclusively to the listed firewall serial numbers. |
|
List of URL categories. When referencing predefined EDLs, use config names of the EDLS not their full names. The config names can be found with the CLI… request system external-list show type predefined-url name <tab> panw-auth-portal-exclude-list panw-auth-portal-exclude-list |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The username to use for authentication. This is ignored if api_key is specified. Default: :ansible-option-default:`"admin"` |
|
The rule UUID. Note that this is currently more of a read-only field. Usage of the UUID cannot currently take the place of using the rule name as the primary identifier. |
|
The vsys this object belongs to. Default: :ansible-option-default:`"vsys1"` |
Notes
Note
Checkmode is supported.
Panorama is supported.
PAN-OS connectivity should be specified using provider or the classic PAN-OS connectivity params (ip_address, username, password, api_key, and port). If both are present, then the classic params are ignored.
Examples
- name: add SSH inbound rule to Panorama device group
paloaltonetworks.panos.panos_decryption_rule:
provider: '{{ provider }}'
device_group: 'Cloud Edge'
name: 'sampleRule'
description: 'Made by Ansible'
source_zones: ['any']
source_addresses: ['192.168.10.15']
source_users: ['any']
source_hip: ['any']
destination_zones: ['any']
destination_addresses: ['10.20.30.40']
destination_hip: ['any']
negate_destination: true
services: ['application-default']
url_categories: ['adult', 'dating']
action: 'decrypt'
decryption_type: 'ssl-forward-proxy'
log_successful_tls_handshakes: true
log_failed_tls_handshakes: true
audit_comment: 'Initial config'