New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NXOS Object Groups support to be implemented #21507
Comments
@IDQDD Thanks for the suggestion, this sounds like something that would make sense and be useful. Marking as Milestone 2.4, so we track this, though this isn't a commitment that it will be included. |
This isn't something the Network Team will implement, we look to the community for a PR for this. |
Thank you very much for your interest in Ansible. Ansible has migrated much of the content into separate repositories to allow for more rapid, independent development. We are closing this issue/PR because this content has been moved to one or more collection repositories.
For further information, please see: |
ISSUE TYPE
COMPONENT NAME
nxos_acl
ANSIBLE VERSION
CONFIGURATION
OS / ENVIRONMENT
SUMMARY
Some of Nexus gears (at least 7K and 9K) support policy-based ACLs (PBACLs), which allow you to apply access control policies across object groups (OG). An OG is a group of IP addresses or a group of TCP or UDP ports. When you create a rule, you specify the object groups rather than specifying IP addresses or ports.
Nexuses support that feature from the very beginning
It would be nice to have this feature to be implemented in Ansible.
STEPS TO REPRODUCE
Along with OG support be implemented in the nxos_acl module it is probably needed to create a separate module to manage Object-Groups.
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus7000/sw/security/config/cisco_nexus7000_security_config_guide_8x/configuring_ip_acls.html#con_1480905
EXPECTED RESULTS
ACTUAL RESULTS
The text was updated successfully, but these errors were encountered: