zscaler.ziacloud.zia_ssl_inspection_rules module – Creates a new SSL inspection rule
Note
This module is part of the zscaler.ziacloud collection (version 2.0.3).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install zscaler.ziacloud
.
You need further requirements to be able to use this module,
see Requirements for details.
To use it in a playbook, specify: zscaler.ziacloud.zia_ssl_inspection_rules
.
New in zscaler.ziacloud 2.0.0
Synopsis
Creates a new SSL inspection rule
Requirements
The below requirements are needed on the host that executes this module.
Zscaler SDK Python can be obtained from PyPI https://pypi.org/project/zscaler-sdk-python/
Parameters
Parameter |
Comments |
---|---|
Action block that defines what happens when SSL traffic matches the rule. This includes whether to decrypt, block, or bypass SSL inspection. |
|
Additional sub-actions that can be configured when decrypting SSL traffic. |
|
Whether to block SSL traffic that does not have Server Name Indication (SNI). Choices:
|
|
Whether to block SSL traffic that cannot be decrypted. Choices:
|
|
Whether HTTP/2 inspection is enabled. Choices:
|
|
Minimum TLS version allowed for client-side connections. Choices:
|
|
Minimum TLS version allowed for server-side connections. Choices:
|
|
Whether to perform OCSP checks on server certificates. Choices:
|
|
Specifies the server certificate behavior during SSL inspection. |
|
Additional sub-actions that can be configured when bypassing SSL decryption. |
|
Whether to block SSL traffic without Server Name Indication (SNI). Choices:
|
|
Whether to bypass additional policies for non-decrypted traffic. Choices:
|
|
Minimum TLS version required for bypassed SSL traffic. Choices:
|
|
Whether to perform OCSP checks on server certificates even if traffic is not decrypted. Choices:
|
|
Specifies the server certificate behavior when not decrypting. |
|
Whether to override the default SSL inspection certificate for this rule. Choices:
|
|
Whether to show End User Notification (EUN) on blocked traffic. Choices:
|
|
Whether to show Advanced Threat Protection (ATP) notification on blocked traffic. Choices:
|
|
SSL interception certificate to be used when overriding the default certificate. |
|
ID of the SSL interception certificate. |
|
The primary action taken on matched traffic. Choices:
|
|
A string that contains the obfuscated API key. |
|
The client ID for OAuth2 authentication. |
|
The client secret for OAuth2 authentication. |
|
The Zscaler cloud name provisioned for your organization. Choices:
|
|
The list of cloud applications to which the File Type Control policy rule must be applied Use the info resource zia_cloud_applications_info to retrieve the list of supported app_policy and ssl_policy applications |
|
The departments to which the SSL Inspection Rule applies |
|
Additional information about the rule |
|
User-defined destination IP address groups on which the rule is applied. If not set, the rule is not restricted to a specific destination IP address group. |
|
Name-ID pairs of device groups for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation. |
|
List of device trust levels for which the rule must be applied. This field is applicable for devices that are managed using Zscaler Client Connector. The trust levels are assigned to the devices based on your posture configurations. If no value is set, this field is ignored during the policy evaluation. Choices:
|
|
Name-ID pairs of devices for which rule must be applied. Specifies devices that are managed using Zscaler Client Connector. If no value is set, this field is ignored during the policy evaluation. |
|
Determines whether the SSL Inspection Rule is enabled or disabled Choices:
|
|
The groups to which the SSL Inspection Rule applies |
|
Unique identifier for the SSL Inspection Rule |
|
Labels that are applicable to the rule. |
|
The location groups to which the SSL Inspection Rule applies |
|
The locations to which the SSL Inspection Rule applies |
|
Name of the SSL Inspection Rule |
|
Rule order number of the SSL Inspection Rule |
|
A string that contains the password for the API admin. |
|
Zscaler Client Connector device platforms for which the rule must be applied. If not set, rule is applied to all device platforms Choices:
|
|
The private key for JWT-based OAuth2 authentication. |
|
A dict containing authentication credentials. |
|
Obfuscated API key. |
|
OAuth2 client ID. |
|
OAuth2 client secret. |
|
Zscaler cloud name. Choices:
|
|
Password for the API admin. |
|
Private key for OAuth2 JWT. |
|
Sandbox Cloud environment. |
|
Sandbox API Key. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Email ID of the API admin. |
|
Vanity domain for OAuth2. |
|
The proxy chaining gateway for which this rule is applicable. Ignore if the forwarding method is not Proxy Chaining. |
|
Admin rank of the SSL Inspection Rule Default: |
|
When set to true, the rule is applied to remote users that use PAC with Kerberos authentication. Otherwise, it is a don’t care. Choices:
|
|
The Sandbox cloud environment for API access. |
|
A string that contains the Sandbox API Key. |
|
User-defined destination IP address groups on which the rule is applied. If not set, the rule is not restricted to a specific destination IP address group. |
|
Specifies the desired state of the resource. Choices:
|
|
The time interval in which the SSL Inspection Rule applies |
|
The URL categories to which the rule applies Use the info resource zia_url_categories_info to retrieve the category names. |
|
Whether to use the legacy Zscaler API client. Choices:
|
|
Any number of user agents to which the rule applies. Choices:
|
|
A string that contains the email ID of the API admin. |
|
The users to which the SSL Inspection Rule applies |
|
The vanity domain provisioned by Zscaler for OAuth2 flows. |
|
The list of preconfigured workload groups to which the policy must be applied. |
|
The list of ZPA Application Segments for which this rule is applicable. This field is applicable only for the ZPA forwarding method. |
|
Indicates the external ID. Applicable only when this reference is of an external entity. |
|
The name of the Application Segment |
Notes
Note
Check mode is supported.
Examples
- name: Create/update firewall filtering rule
zscaler.ziacloud.zia_cloud_firewall_filtering_rule:
provider: '{{ provider }}'
state: present
name: "Ansible_Example_Rule"
description: "TT#1965232865"
action: "ALLOW"
enabled: true
order: 1
enable_full_logging: true
exclude_src_countries: true
source_countries:
- BR
- CA
- US
dest_countries:
- BR
- CA
- US
device_trust_levels:
- "UNKNOWN_DEVICETRUSTLEVEL"
- "LOW_TRUST"
- "MEDIUM_TRUST"
- "HIGH_TRUST"