|
24 | 24 | module: panos_security_rule
|
25 | 25 | short_description: Manage security rule policy on PAN-OS devices or Panorama management console.
|
26 | 26 | description: >
|
27 |
| - - Security policies allow you to enforce rules and take action, and can be as |
28 |
| - general or specific as needed. |
29 |
| - - The policy rules are compared against the incoming traffic in sequence, and |
30 |
| - because the first rule that matches the traffic is applied, the more specific |
31 |
| - rules must precede the more general ones. |
32 |
| - - Defaults in spec descriptions apply when I(state=present)/I(state=replaced), |
33 |
| - or when creating a new resource with I(state=merged). |
| 27 | + Following rules apply for security policies: |
| 28 | +
|
| 29 | + - Security policies allow you to enforce rules and take action, and can be as |
| 30 | + general or specific as needed. |
| 31 | +
|
| 32 | + - The policy rules are compared against the incoming traffic in sequence, and |
| 33 | + because the first rule that matches the traffic is applied, the more specific |
| 34 | + rules must precede the more general ones. |
| 35 | +
|
| 36 | + - Defaults in spec descriptions apply when I(state=present)/I(state=replaced), |
| 37 | + or when creating a new resource with I(state=merged). |
34 | 38 | author:
|
35 | 39 | - Ivan Bojer (@ivanbojer)
|
36 | 40 | - Robert Hagen (@stealthllama)
|
|
78 | 82 | type: list
|
79 | 83 | elements: str
|
80 | 84 | source_user:
|
81 |
| - description: > |
| 85 | + description: |
82 | 86 | - Use users to enforce policy for individual users or a group of users.
|
83 |
| - Defaults to I(["any"]). |
| 87 | + Defaults to I(["any"]). |
84 | 88 | type: list
|
85 | 89 | elements: str
|
86 | 90 | hip_profiles:
|
87 |
| - description: > |
| 91 | + description: |
88 | 92 | - If you are using GlobalProtect with host information profile (HIP)
|
89 | 93 | enabled, you can also base the policy on information collected by
|
90 | 94 | GlobalProtect. For example, the user access level can be determined
|
91 | 95 | HIP that notifies the firewall about the user's local configuration.
|
92 |
| - - NOTE: If I(state=present) or I(state=replaced), and you're running |
| 96 | + - NOTE If I(state=present) or I(state=replaced), and you're running |
93 | 97 | PAN-OS < 10.0.0, then this will have a default of I(["any"]).
|
94 | 98 | - If you are using PAN-OS >= 10.0.0, please do not use this
|
95 | 99 | parameter as it was removed from PAN-OS in 10.0.0.
|
|
114 | 118 | type: list
|
115 | 119 | elements: str
|
116 | 120 | application:
|
117 |
| - description: > |
| 121 | + description: |
118 | 122 | - List of applications, application groups, and/or application filters.
|
119 |
| - Defaults to I(["any"]). |
| 123 | + Defaults to I(["any"]). |
120 | 124 | type: list
|
121 | 125 | elements: str
|
122 | 126 | service:
|
|
194 | 198 | - Send 'ICMP Unreachable'. Used with 'deny', 'drop', and 'reset' actions.
|
195 | 199 | type: bool
|
196 | 200 | disable_server_response_inspection:
|
197 |
| - description: > |
| 201 | + description: |
198 | 202 | - Disables packet inspection from the server to the client. Useful under heavy server load conditions.
|
199 |
| - Defaults to I(false). |
| 203 | + Defaults to I(false). |
200 | 204 | type: bool
|
201 | 205 | group_profile:
|
202 |
| - description: > |
| 206 | + description: |
203 | 207 | - Security profile group that is already defined in the system. This property supersedes antivirus,
|
204 |
| - vulnerability, spyware, url_filtering, file_blocking, data_filtering, and wildfire_analysis properties. |
| 208 | + vulnerability, spyware, url_filtering, file_blocking, data_filtering, and wildfire_analysis properties. |
205 | 209 | type: str
|
206 | 210 | antivirus:
|
207 | 211 | description:
|
|
0 commit comments