checkpoint_access_rule – Manages access rules on Check Point over Web Services API¶
New in version 2.8.
Synopsis¶
- Manages access rules on Check Point devices including creating, updating, removing access rules objects, All operations are performed over Web Services API.
Parameters¶
Examples¶
- name: Create access rule
  checkpoint_access_rule:
    layer: Network
    name: "Drop attacker"
    position: top
    source: attacker
    destination: Any
    action: Drop
- name: Delete access rule
  checkpoint_access_rule:
    layer: Network
    name: "Drop attacker"
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
| Key | Returned | Description | 
|---|---|---|
| checkpoint_access_rules 
                  list
                                       | always, except when deleting the access rule. | The checkpoint access rule object created or updated. | 
Status¶
- This module is not guaranteed to have a backwards compatible interface. [preview]
- This module is maintained by the Ansible Network Team. [network]
Red Hat Support¶
More information about Red Hat’s support of this module is available from this Red Hat Knowledge Base article.
Authors¶
- Ansible by Red Hat (@rcarrillocruz)
Hint
If you notice any issues in this documentation, you can edit this document to improve it.
