zscaler.ziacloud.zia_forwarding_control_rule module – Forwarding Control policy rule
Note
This module is part of the zscaler.ziacloud collection (version 1.3.1).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_forwarding_control_rule
.
New in zscaler.ziacloud 0.1.0
Synopsis
Adds a new Forwarding Control policy rule
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
A string that contains the obfuscated API key. |
|
Application service groups on which this rule is applied |
|
The Zscaler cloud name was provisioned for your organization. Choices:
|
|
The departments to which the Forwarding Control policy rule applies |
|
Indicates whether the forwarding rule is enabled or disabled |
|
List of destination IP addresses to which this rule will be applied. CIDR notation can be used for destination IP addresses. |
|
Destination countries for which the rule is applicable. If not set, the rule is not restricted to specific destination countries. |
|
IP address categories of destination for which the DNAT rule is applicable. If not set, the rule is not restricted to specific destination IP categories. |
|
User-defined destination IP address groups on which the rule is applied. If not set, the rule is not restricted to a specific destination IP address group. |
|
Destination IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group. |
|
Name-ID pairs of the Zscaler Cloud Connector groups to which the forwarding rule applies |
|
Determines whether the Forwarding Control policy rule is enabled or disabled Choices:
|
|
The type of traffic forwarding method selected from the available options Choices:
|
|
The groups to which the Forwarding Control policy rule applies |
|
Unique identifier for the Forwarding Control policy rule |
|
Labels that are applicable to the rule. |
|
The location groups to which the Forwarding Control policy rule applies |
|
The locations to which the Forwarding Control policy rule applies |
|
Name of the Forwarding Control policy rule |
|
User-defined network service application group on which the rule is applied. If not set, the rule is not restricted to a specific network service application group. |
|
User-defined network service applications on which the rule is applied. If not set, the rule is not restricted to a specific network service application. |
|
User-defined network service group on which the rule is applied. If not set, the rule is not restricted to a specific network service group. |
|
User-defined network services on which the rule is applied. If not set, the rule is not restricted to a specific network service. |
|
Rule order number of the Forwarding Control policy rule |
|
A string that contains the password for the API admin. |
|
A dict object containing connection details. This is optional; credentials can also be provided directly at the top level. |
|
A string that contains the obfuscated API key. |
|
The Zscaler cloud name was provisioned for your organization. Choices:
|
|
A string that contains the password for the API admin. |
|
A string that contains the Sandbox API Key. |
|
A string that contains the email ID of the API admin. |
|
The proxy gateway for which the rule is applicable. This field is applicable only for the Proxy Chaining forwarding method. |
|
The Identifier that uniquely identifies Proxy Gateway entity |
|
The configured name of the Proxy Gateway entity |
|
Admin rank of the Forwarding Control policy rule Default: |
|
List of destination domain categories to which the rule applies |
|
A string that contains the Sandbox API Key. |
|
User-defined source IP address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address group. |
|
User-defined source IP addresses for which the rule is applicable. If not set, the rule is not restricted to a specific source IP address. |
|
Source IPv6 address groups for which the rule is applicable. If not set, the rule is not restricted to a specific source IPv6 address group. |
|
Specifies the desired state of the resource. Choices:
|
|
The rule type selected from the available options Choices:
|
|
A string that contains the email ID of the API admin. |
|
The users to which the Forwarding Control policy rule applies |
|
The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA forwarding method. |
|
Indicates the external ID. Applicable only when this reference is of an external entity. |
|
The name of the Application Segment |
|
List of ZPA Application Segment Groups for which this rule is applicable. This field is applicable only for the ECZPA forwarding method (used for Zscaler Cloud Connector). |
|
A unique identifier assigned to the Application Segment Group |
|
The name of the Application Segment Group |
|
List of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ECZPA forwarding method (used for Zscaler Cloud Connector). |
|
A unique identifier assigned to the Application Segment |
|
The name of the Application Segment |
|
The ZPA Server Group for which this rule is applicable. Only the Server Groups that are associated with the selected Application Segments are allowed. This field is applicable only for the ZPA forwarding method. |
|
The Identifier that uniquely identifies the ZPA Gateway entity |
|
The configured name of the ZPA Gateway entity |
Notes
Note
Check mode is supported.
Examples
- name: Create/Update Forwarding Control DIRECT Forward Method
zscaler.ziacloud.zia_forwarding_control_rule:
provider: '{{ provider }}'
name: 'Example'
description: 'TT#1965232865'
type: 'FORWARDING'
forward_method: 'DIRECT'
enabled: true
order: 1
zpa_gateway:
- id: 2590247
name: 'ZPA_GW01'
- name: Create/Update Forwarding Control ZPA Forward Method
zscaler.ziacloud.zia_forwarding_control_rule:
provider: '{{ provider }}'
name: 'Example'
description: 'TT#1965232865'
type: 'FORWARDING'
forward_method: 'ZPA'
enabled: true
order: 1
zpa_app_segments:
- external_id: "216199618143393478"
name: Example300
- external_id: "216199618143393479"
name: Example400
zpa_gateway:
- id: 2590247
name: 'ZPA_GW01'