aci_intf_policy_port_security - Manage port security on Cisco ACI fabrics (l2:PortSecurityPol)
New in version 2.4.
Synopsis
- Manage port security on Cisco ACI fabrics.
- More information from the internal APIC class l2:PortSecurityPol at https://developer.cisco.com/media/mim-ref/MO-l2PortSecurityPol.html.
Requirements (on host that executes module)
- ACI Fabric 1.0(3f)+
Options
parameter | required | default | choices | comments |
---|---|---|---|---|
description | no | The description for the contract. aliases: descr | ||
hostname | yes | IP Address or hostname of APIC resolvable by Ansible control host. aliases: host | ||
max_end_points | no | Maximum number of end points (range 0-12000). The APIC defaults new port-security policies to 0 . | ||
password | yes | The password to use for authentication. | ||
port_security | yes | The name of the port security. aliases: name | ||
state | no | present |
| Use present or absent for adding or removing.Use query for listing an object or multiple objects. |
timeout | no | 30 | The socket level timeout in seconds. | |
use_proxy | no | yes |
| If no , it will not use a proxy, even if one is defined in an environment variable on the target hosts. |
use_ssl | no | yes |
| If no , an HTTP connection will be used instead of the default HTTPS connection. |
username | yes | admin | The username to use for authentication. aliases: user | |
validate_certs | no | yes |
| If no , SSL certificates will not be validated.This should only set to no used on personally controlled sites using self-signed certificates. |
Examples
- aci_intf_policy_port_security: hostname: '{{ inventory_hostname }}' username: '{{ username }}' password: '{{ password }}' port_security: '{{ port_security }}' description: '{{ descr }}' max_end_points: '{{ max_end_points }}'
Notes
Note
- By default, if an environment variable
<protocol>_proxy
is set on the target host, requests will be sent through that proxy. This behaviour can be overridden by setting a variable for this task (see setting the environment), or by using theuse_proxy
option. - HTTP redirects can redirect from HTTP to HTTPS so you should be sure that your proxy environment for both protocols is correct.
Status
This module is flagged as preview which means that it is not guaranteed to have a backwards compatible interface.
For help in developing on modules, should you be so inclined, please read Community Information & Contributing, Testing Ansible and Developing Modules.
© 2012–2018 Michael DeHaan
© 2018–2019 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/2.4/aci_intf_policy_port_security_module.html