paloaltonetworks.panos.panos_zone module – Manage security zone
Note
This module is part of the paloaltonetworks.panos collection (version 2.21.2).
To install it, use: ansible-galaxy collection install paloaltonetworks.panos
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: paloaltonetworks.panos.panos_zone
.
New in paloaltonetworks.panos 1.0.0
Synopsis
Manage security zones on PAN-OS firewall or in Panorama template.
Requirements
The below requirements are needed on the host that executes this module.
pan-python can be obtained from PyPI https://pypi.python.org/pypi/pan-python
pandevice can be obtained from PyPI https://pypi.python.org/pypi/pandevice
pandevice >= 0.8.0
Parameters
Parameter |
Comments |
---|---|
Deprecated Use provider to specify PAN-OS connectivity instead. The API key to use instead of generating it using username / password. |
|
Enable user identification. Choices: |
|
User identification ACL exclude list. |
|
When state=gathered. An advanced filtering option to filter results returned from PAN-OS. Refer to the guide discussing gathered_filter for more information. |
|
User identification ACL include list. |
|
List of member interfaces. |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The IP address or hostname of the PAN-OS device being configured. |
|
Log forwarding setting. |
|
The mode of the security zone. Must match the mode of the interface. Choices: |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The password to use for authentication. This is ignored if api_key is specified. |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The port number to connect to the PAN-OS device on. Default: :ansible-option-default:`443` |
|
A dict object containing connection details. |
|
The API key to use instead of generating it using username / password. |
|
The IP address or hostname of the PAN-OS device being configured. |
|
The password to use for authentication. This is ignored if api_key is specified. |
|
The port number to connect to the PAN-OS device on. Default: :ansible-option-default:`443` |
|
The serial number of a firewall to use for targeted commands. If ip_address is not a Panorama PAN-OS device, then this param is ignored. |
|
The username to use for authentication. This is ignored if api_key is specified. Default: :ansible-option-default:`"admin"` |
|
(Panorama only) The template this operation should target. Mutually exclusive with template_stack. |
|
(Panorama only) The template stack this operation should target. Mutually exclusive with template. |
|
Deprecated Use provider to specify PAN-OS connectivity instead. The username to use for authentication. This is ignored if api_key is specified. Default: :ansible-option-default:`"admin"` |
|
The vsys this object belongs to. Default: :ansible-option-default:`"vsys1"` |
|
Name of the security zone to configure. |
|
Zone protection profile. |
Notes
Note
Panorama is supported.
Check mode is supported.
PAN-OS connectivity should be specified using provider or the classic PAN-OS connectivity params (ip_address, username, password, api_key, and port). If both are present, then the classic params are ignored.
If the PAN-OS to be configured is Panorama, either template or template_stack must be specified.
Examples
# Create an L3 zone.
- name: create DMZ zone on a firewall
paloaltonetworks.panos.panos_zone:
provider: '{{ provider }}'
zone: 'dmz'
mode: 'layer3'
zone_profile: 'strict'
# Add an interface to the zone.
- name: add ethernet1/2 to zone dmz
paloaltonetworks.panos.panos_interface:
provider: '{{ provider }}'
zone: 'dmz'
mode: 'layer3'
interface: ['ethernet1/2']
zone_profile: 'strict'
# Delete the zone.
- name: delete the DMZ zone
paloaltonetworks.panos.panos_interface:
provider: '{{ provider }}'
zone: 'dmz'
state: 'absent'
# Add a zone to a multi-VSYS Panorama template
- name: add Cloud zone to template
paloaltonetworks.panos.panos_interface:
provider: '{{ provider }}'
template: 'Datacenter Template'
vsys: 'vsys4'
zone: 'datacenter'
mode: 'layer3'
enable_userid: true
exclude_acl: ['10.0.200.0/24']