netscaler.adc.nsacl6 module – Configuration for ACL6 entry resource.
Note
This module is part of the netscaler.adc collection (version 2.6.2).
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install netscaler.adc
.
To use it in a playbook, specify: netscaler.adc.nsacl6
.
New in netscaler.adc 2.0.0
Synopsis
Configuration for ACL6 entry resource.
Parameters
Parameter |
Comments |
---|---|
Action to perform on the incoming IPv6 packets that match the ACL6 rule. Available settings function as follows: * * * Choices:
|
|
Name for the ACL6 rule. Must begin with an ASCII alphabetic or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters. |
|
Action associated with the ACL6. Choices:
|
|
Base NITRO API path. Define only in case of an ADM service proxy call Default: |
|
Either the equals (=) or does not equal (!=) logical operator. Choices:
|
|
IP address or range of IP addresses to match against the destination IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. Choices:
|
|
Destination IPv6 address (range). |
|
Port number or range of port numbers to match against the destination port number of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. For example: 40-90. Note: The destination port can be specified only for TCP and UDP protocols. Choices:
|
|
Either the equals (=) or does not equal (!=) logical operator. Choices:
|
|
Destination port (range). |
|
Specifies the type of hashmethod to be applied, to steer the packet to the FP of the packet. Choices:
|
|
hashprefix to be applied to SIP/DIP to generate rsshash FP.eg 128 => hash calculated on the complete IP |
|
Allow only incoming TCP packets that have the ACK or RST bit set if the action set for the ACL6 rule is ALLOW and these packets match the other conditions in the ACL6 rule. Choices:
|
|
Code of a particular ICMP message type to match against the ICMP code of an incoming IPv6 ICMP packet. For example, to block DESTINATION HOST UNREACHABLE messages, specify 3 as the ICMP type and 1 as the ICMP code. If you set this parameter, you must set the ICMP Type parameter. |
|
ICMP Message type to match against the message type of an incoming IPv6 ICMP packet. For example, to block DESTINATION UNREACHABLE messages, you must specify 3 as the ICMP type. Note: This parameter can be specified only for the ICMP protocol. |
|
ID of an interface. The Citrix ADC applies the ACL6 rule only to the incoming packets from the specified interface. If you do not specify any value, the appliance applies the ACL6 rule to the incoming packets from all interfaces. |
|
Enable or disable logging of events related to the ACL6 rule. The log messages are stored in the configured syslog or auditlog server. Choices:
|
|
The ID of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The IP of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The name of the managed NetScaler instance to which NetScaler Console has to configure as a proxy server. Define only in case of an ADM service proxy call |
|
The password of the managed NetScaler instance. Define only in case of an ADM service proxy call In Settings > Administration > System Configurations > Basic Settings, if you select Prompt Credentials for Instance Login, ensure to configure username and password of a managed instance. |
|
The username of the managed NetScaler instance. Define only in case of an ADM service proxy call In Settings > Administration > System Configurations > Basic Settings, if you select Prompt Credentials for Instance Login, ensure to configure username and password of a managed instance. |
|
The IP address of the NetScaler ADC appliance acting as a proxy server. Define only in case of an ADM service proxy call Choices:
|
|
New name for the ACL6 rule. Must begin with an ASCII alphabetic or underscore \(_\) character, and must contain only ASCII alphanumeric, underscore, hash \(\#\), period \(.\), space, colon \(:\), at \(@\), equals \(=\), and hyphen \(-\) characters. |
|
The authentication token provided by a login operation. |
|
The password with which to authenticate to the NetScaler ADC node. |
|
Which protocol to use when accessing the nitro API objects. Choices:
|
|
The username with which to authenticate to the NetScaler ADC node. |
|
The ip address of the NetScaler ADC appliance where the nitro API calls will be made. The port can be specified with the colon (:). E.g. 192.168.1.1:555. |
|
Priority for the ACL6 rule, which determines the order in which it is evaluated relative to the other ACL6 rules. If you do not specify priorities while creating ACL6 rules, the ACL6 rules are evaluated in the order in which they are created. |
|
Protocol, identified by protocol name, to match against the protocol of an incoming Choices:
|
|
Protocol, identified by protocol number, to match against the protocol of an incoming IPv6 packet. |
|
Maximum number of log messages to be generated per second. If you set this parameter, you must enable the Log State parameter. |
|
If The module will not save the configuration on the NetScaler ADC node if it made no changes. Choices:
|
|
Either the equals (=) or does not equal (!=) logical operator. Choices:
|
|
IP address or range of IP addresses to match against the source IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. Choices:
|
|
Source IPv6 address (range). |
|
MAC address to match against the source MAC address of an incoming IPv6 packet. |
|
Used to define range of Source MAC address. It takes string of 0 and 1, 0s are for exact match and 1s for wildcard. For matching first 3 bytes of MAC address, srcMacMask value “000000111111”. |
|
Port number or range of port numbers to match against the source port number of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. For example: 40-90. Note: The destination port can be specified only for TCP and UDP protocols. Choices:
|
|
Either the equals (=) or does not equal (!=) logical operator. Choices:
|
|
Source port (range). |
|
The state of the resource being configured by the module on the NetScaler ADC node. When When When When When Choices:
|
|
If stateful option is enabled, transparent sessions are created for the traffic hitting this ACL6 and not hitting any other features like LB, INAT etc. Choices:
|
|
Integer value that uniquely identifies the traffic domain in which you want to configure the entity. If you do not specify an ID, the entity becomes part of the default traffic domain, which has an ID of 0. |
|
Time to expire this ACL6 (in seconds). |
|
Type of the acl6 ,default will be Available options as follows: * * Choices:
|
|
If Choices:
|
|
ID of the VLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VLAN. If you do not specify a VLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VLANs. |
|
ID of the VXLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VXLAN. If you do not specify a VXLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VXLANs. |
Notes
Note
For more information on using Ansible to manage NetScaler ADC Network devices see https://www.ansible.com/integrations/networks/citrixadc.
Examples
---
- name: Sample nsacl6 playbook
hosts: demo_netscalers
gather_facts: false
tasks:
- name: Configure nsacl6
delegate_to: localhost
netscaler.adc.nsacl6:
state: present
acl6name: net_acl6
acl6action: ALLOW
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
Indicates if any change is made by the module Returned: always Sample: |
|
Dictionary of before and after changes Returned: always Sample: |
|
List of differences between the actual configured object and the configuration specified in the module Returned: when changed Sample: |
|
Indicates if the module failed or not Returned: always Sample: |
|
list of logged messages by the module Returned: always Sample: |