checkpoint_access_rule – Manages access rules on Check Point over Web Services API¶
New in version 2.8.
Synopsis¶
- Manages access rules on Check Point devices including creating, updating, removing access rules objects, All operations are performed over Web Services API.
Parameters¶
Examples¶
- name: Create access rule
checkpoint_access_rule:
layer: Network
name: "Drop attacker"
position: top
source: attacker
destination: Any
action: Drop
- name: Delete access rule
checkpoint_access_rule:
layer: Network
name: "Drop attacker"
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
checkpoint_access_rules
list
|
always, except when deleting the access rule. |
The checkpoint access rule object created or updated.
|
Status¶
- This module is not guaranteed to have a backwards compatible interface. [preview]
- This module is maintained by the Ansible Network Team. [network]
Red Hat Support¶
More information about Red Hat’s support of this module is available from this Red Hat Knowledge Base article.
Authors¶
- Ansible by Red Hat (@rcarrillocruz)
Hint
If you notice any issues in this documentation, you can edit this document to improve it.