Creating an IP protection policy
Example: create an IP protection policy
---
- name: Execute cloud api
hosts:
gather_facts: no
collections:
-
connection: httpapi
vars:
ansible_httpapi_validate_certs: False
ansible_httpapi_use_ssl: true
ansible_httpapi_port: 443
application_name: "YOUR_APP_NAME"
tasks:
- name: Configure IP Protection.
cloudwaf_ip_protection_method:
api_token: "You must specify a token"
app_name: "{{application_name}}"
template_status: disable
status: enable
IPProtection:
ip-reputation: enable
geo-ip-block:
members:
- Antigua And Barbuda
- Aland Islands
- Afghanistan
ip-list:
members:
- type: trust-ip
ip: '1.1.1.1,2.2.2.21-2.2.2.27'
- type: block-ip
ip: '3.1.1.1,3.1.1.11-3.1.1.17'
- type: allow-only-ip
ip: '4.1.1.1-4.1.1.17,4.1.1.19'
ansible_httpapi_validate_certs |
Whether to validate certificates for the connections between your Ansible host and FortiWeb Cloud's API gateway. Specify |
ansible_httpapi_use_ssl |
Whether to use SSL protocol for the connections between your Ansible host and FortiWeb Cloud's API gateway. Specify |
ansible_httpapi_port |
The port number used for the SSL connection. Specify
|
template_status |
Specify whether to |
status |
Specify whether to |
ip-reputation | Specify whether to enable or disable blocking client access based on up-to-date threat intelligence |
geo-ip-block members: |
Specify one or more geographical regions that you want to block. All requests from the specified regions will be blocked. |
ip-list type: trust-ip |
Specify the trust IPs. |
ip-list type: block-ip |
Specify the block IPs. |
ip-list type: allow-only-ip |
Specify the allow only IPs. For more information about the trust IP, block IP, and allow only IP, see IP Protection. |