Repository URL to install this package:
|
Version:
6.0.0 ▾
|
#!/usr/bin/python
# -*- coding: utf-8 -*-
# Copyright: (c) 2019 Kevin Breit (@kbreit) <kevin.breit@kevinbreit.net>
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
from __future__ import absolute_import, division, print_function
__metaclass__ = type
ANSIBLE_METADATA = {
'metadata_version': '1.1',
'status': ['preview'],
'supported_by': 'community'
}
DOCUMENTATION = r'''
---
module: meraki_mx_intrusion_prevention
short_description: Manage intrustion prevention in the Meraki cloud
description:
- Allows for management of intrusion prevention rules networks within Meraki MX networks.
options:
state:
description:
- Create or modify an organization.
choices: [ absent, present, query ]
default: present
type: str
net_name:
description:
- Name of a network.
aliases: [ name, network ]
type: str
net_id:
description:
- ID number of a network.
type: str
mode:
description:
- Operational mode of Intrusion Prevention system.
choices: [ detection, disabled, prevention ]
type: str
ids_rulesets:
description:
- Ruleset complexity setting.
choices: [ connectivity, balanced, security ]
type: str
allowed_rules:
description:
- List of IDs related to rules which are allowed for the organization.
type: list
elements: dict
suboptions:
rule_id:
description:
- ID of rule as defined by Snort.
type: str
rule_message:
description:
- Description of rule.
- This is overwritten by the API.
- Formerly C(message) which was deprecated but still maintained as an alias.
type: str
aliases: [ message ]
version_added: "2.3.0"
protected_networks:
description:
- Set included/excluded networks for Intrusion Prevention.
type: dict
suboptions:
use_default:
description:
- Whether to use special IPv4 addresses per RFC 5735.
type: bool
included_cidr:
description:
- List of network IP ranges to include in scanning.
type: list
elements: str
excluded_cidr:
description:
- List of network IP ranges to exclude from scanning.
type: list
elements: str
author:
- Kevin Breit (@kbreit)
extends_documentation_fragment: cisco.meraki.meraki
'''
EXAMPLES = r'''
- name: Set whitelist for organization
meraki_intrusion_prevention:
auth_key: '{{auth_key}}'
state: present
org_id: '{{test_org_id}}'
allowed_rules:
- rule_id: "meraki:intrusion/snort/GID/01/SID/5805"
rule_message: Test rule
delegate_to: localhost
- name: Query IPS info for organization
meraki_intrusion_prevention:
auth_key: '{{auth_key}}'
state: query
org_name: '{{test_org_name}}'
delegate_to: localhost
register: query_org
- name: Set full ruleset with check mode
meraki_intrusion_prevention:
auth_key: '{{auth_key}}'
state: present
org_name: '{{test_org_name}}'
net_name: '{{test_net_name}} - IPS'
mode: prevention
ids_rulesets: security
protected_networks:
use_default: true
included_cidr:
- 192.0.1.0/24
excluded_cidr:
- 10.0.1.0/24
delegate_to: localhost
- name: Clear rules from organization
meraki_intrusion_prevention:
auth_key: '{{auth_key}}'
state: absent
org_name: '{{test_org_name}}'
allowed_rules: []
delegate_to: localhost
'''
RETURN = r'''
data:
description: Information about the Threat Protection settings.
returned: success
type: complex
contains:
whitelistedRules:
description: List of whitelisted IPS rules.
returned: success, when organization is queried or modified
type: complex
contains:
ruleId:
description: A rule identifier for an IPS rule.
returned: success, when organization is queried or modified
type: str
sample: "meraki:intrusion/snort/GID/01/SID/5805"
rule_message:
description: Description of rule.
returned: success, when organization is queried or modified
type: str
sample: "MALWARE-OTHER Trackware myway speedbar runtime detection - switch engines"
mode:
description: Enabled setting of intrusion prevention.
returned: success, when network is queried or modified
type: str
sample: enabled
idsRulesets:
description: Setting of selected ruleset.
returned: success, when network is queried or modified
type: str
sample: balanced
protectedNetworks:
description: Networks protected by IPS.
returned: success, when network is queried or modified
type: complex
contains:
useDefault:
description: Whether to use special IPv4 addresses.
returned: success, when network is queried or modified
type: bool
sample: true
includedCidr:
description: List of CIDR notiation networks to protect.
returned: success, when network is queried or modified
type: str
sample: 192.0.1.0/24
excludedCidr:
description: List of CIDR notiation networks to exclude from protection.
returned: success, when network is queried or modified
type: str
sample: 192.0.1.0/24
'''
from ansible.module_utils.basic import AnsibleModule, json
from ansible_collections.cisco.meraki.plugins.module_utils.network.meraki.meraki import MerakiModule, meraki_argument_spec
param_map = {'allowed_rules': 'allowedrules',
'rule_id': 'ruleId',
'rule_message': 'message',
'mode': 'mode',
'protected_networks': 'protectedNetworks',
'use_default': 'useDefault',
'included_cidr': 'includedCidr',
}
def main():
# define the available arguments/parameters that a user can pass to
# the module
allowedrules_arg_spec = dict(rule_id=dict(type='str'),
rule_message=dict(type='str',
aliases=['message'],
deprecated_aliases=[dict(name='message', version='3.0.0', collection_name='cisco.meraki')]),
)
protected_nets_arg_spec = dict(use_default=dict(type='bool'),
included_cidr=dict(type='list', elements='str'),
excluded_cidr=dict(type='list', elements='str'),
)
argument_spec = meraki_argument_spec()
argument_spec.update(
net_id=dict(type='str'),
net_name=dict(type='str', aliases=['name', 'network']),
state=dict(type='str', choices=['absent', 'present', 'query'], default='present'),
allowed_rules=dict(type='list', default=None, elements='dict', options=allowedrules_arg_spec),
mode=dict(type='str', choices=['detection', 'disabled', 'prevention']),
ids_rulesets=dict(type='str', choices=['connectivity', 'balanced', 'security']),
protected_networks=dict(type='dict', default=None, options=protected_nets_arg_spec),
)
# the AnsibleModule object will be our abstraction working with Ansible
# this includes instantiation, a couple of common attr would be the
# args/params passed to the execution, as well as if the module
# supports check mode
module = AnsibleModule(argument_spec=argument_spec,
supports_check_mode=True,
)
meraki = MerakiModule(module, function='intrusion_prevention')
module.params['follow_redirects'] = 'all'
payload = None
query_org_urls = {'intrusion_prevention': '/organizations/{org_id}/appliance/security/intrusion'}
query_net_urls = {'intrusion_prevention': '/networks/{net_id}/appliance/security/intrusion'}
set_org_urls = {'intrusion_prevention': '/organizations/{org_id}/appliance/security/intrusion'}
set_net_urls = {'intrusion_prevention': '/networks/{net_id}/appliance/security/intrusion'}
meraki.url_catalog['query_org'] = query_org_urls
meraki.url_catalog['query_net'] = query_net_urls
meraki.url_catalog['set_org'] = set_org_urls
meraki.url_catalog['set_net'] = set_net_urls
if not meraki.params['org_name'] and not meraki.params['org_id']:
meraki.fail_json(msg='org_name or org_id parameters are required')
if meraki.params['net_name'] and meraki.params['net_id']:
meraki.fail_json(msg='net_name and net_id are mutually exclusive')
if meraki.params['net_name'] is None and meraki.params['net_id'] is None: # Organization param check
if meraki.params['state'] == 'present':
if meraki.params['allowed_rules'] is None:
meraki.fail_json(msg='allowed_rules is required when state is present and no network is specified.')
if meraki.params['net_name'] or meraki.params['net_id']: # Network param check
if meraki.params['state'] == 'present':
if meraki.params['protected_networks'] is not None:
if meraki.params['protected_networks']['use_default'] is False and meraki.params['protected_networks']['included_cidr'] is None:
meraki.fail_json(msg="included_cidr is required when use_default is False.")
if meraki.params['protected_networks']['use_default'] is False and meraki.params['protected_networks']['excluded_cidr'] is None:
meraki.fail_json(msg="excluded_cidr is required when use_default is False.")
org_id = meraki.params['org_id']
if not org_id:
org_id = meraki.get_org_id(meraki.params['org_name'])
net_id = meraki.params['net_id']
if net_id is None and meraki.params['net_name']:
nets = meraki.get_nets(org_id=org_id)
net_id = meraki.get_net_id(net_name=meraki.params['net_name'], data=nets)
# Assemble payload
if meraki.params['state'] == 'present':
if net_id is None: # Create payload for organization
rules = []
for rule in meraki.params['allowed_rules']:
rules.append({'ruleId': rule['rule_id'],
'message': rule['rule_message'],
})
payload = {'allowedRules': rules}
else: # Create payload for network
payload = dict()
if meraki.params['mode']:
payload['mode'] = meraki.params['mode']
if meraki.params['ids_rulesets']:
payload['idsRulesets'] = meraki.params['ids_rulesets']
if meraki.params['protected_networks']:
payload['protectedNetworks'] = {}
if meraki.params['protected_networks']['use_default']:
payload['protectedNetworks'].update({'useDefault': meraki.params['protected_networks']['use_default']})
if meraki.params['protected_networks']['included_cidr']:
payload['protectedNetworks'].update({'includedCidr': meraki.params['protected_networks']['included_cidr']})
if meraki.params['protected_networks']['excluded_cidr']:
payload['protectedNetworks'].update({'excludedCidr': meraki.params['protected_networks']['excluded_cidr']})
elif meraki.params['state'] == 'absent':
if net_id is None: # Create payload for organization
payload = {'allowedRules': []}
if meraki.params['state'] == 'query':
if net_id is None: # Query settings for organization
path = meraki.construct_path('query_org', org_id=org_id)
data = meraki.request(path, method='GET')
if meraki.status == 200:
meraki.result['data'] = data
else: # Query settings for network
path = meraki.construct_path('query_net', net_id=net_id)
data = meraki.request(path, method='GET')
elif meraki.params['state'] == 'present':
path = meraki.construct_path('query_org', org_id=org_id)
original = meraki.request(path, method='GET')
if net_id is None: # Set configuration for organization
if meraki.is_update_required(original, payload, optional_ignore=['message']):
if meraki.module.check_mode is True:
original.update(payload)
meraki.result['data'] = original
meraki.result['changed'] = True
meraki.exit_json(**meraki.result)
path = meraki.construct_path('set_org', org_id=org_id)
data = meraki.request(path, method='PUT', payload=json.dumps(payload))
if meraki.status == 200:
meraki.result['data'] = data
meraki.result['changed'] = True
else:
meraki.result['data'] = original
meraki.result['changed'] = False
else: # Set configuration for network
path = meraki.construct_path('query_net', net_id=net_id)
original = meraki.request(path, method='GET')
if meraki.is_update_required(original, payload):
if meraki.module.check_mode is True:
payload.update(original)
meraki.result['data'] = payload
meraki.result['changed'] = True
meraki.exit_json(**meraki.result)
path = meraki.construct_path('set_net', net_id=net_id)
data = meraki.request(path, method='PUT', payload=json.dumps(payload))
if meraki.status == 200:
meraki.result['data'] = data
meraki.result['changed'] = True
else:
meraki.result['data'] = original
meraki.result['changed'] = False
elif meraki.params['state'] == 'absent':
if net_id is None:
path = meraki.construct_path('query_org', org_id=org_id)
original = meraki.request(path, method='GET')
if meraki.is_update_required(original, payload):
if meraki.module.check_mode is True:
payload.update(original)
meraki.result['data'] = payload
meraki.result['changed'] = True
meraki.exit_json(**meraki.result)
path = meraki.construct_path('set_org', org_id=org_id)
data = meraki.request(path, method='PUT', payload=json.dumps(payload))
if meraki.status == 200:
meraki.result['data'] = data
meraki.result['changed'] = True
else:
meraki.result['data'] = original
meraki.result['changed'] = False
# in the event of a successful module execution, you will want to
# simple AnsibleModule.exit_json(), passing the key/value results
meraki.exit_json(**meraki.result)
if __name__ == '__main__':
main()