Skip to content

CiscoDevNet/FMCAnsible

Cisco Secure Firewall Management Center (FMC) Ansible Collection

An Ansible Collection that automates configuration management and execution of operational tasks on Cisco Secure Firewall Management Centre (FMC) devices using FMC REST API.

Supports both traditional FMC and Cisco Defense FMC (cdFMC) deployments with Bearer token authentication.

This module has been tested against the following ansible versions: 2.9.17, 2.10.5 This module has been tested against the following cisco Secure Firewall Management Center versions up to 7.6

Included Content

The collection contains the following Ansible modules:

  • fmc_configuration.py - manages device configuration via REST API. The module configures virtual and physical devices by sending HTTPS calls formatted according to the REST API specification.

  • fmc_facts.py - gathers facts from FMC devices and enables gather_facts: true functionality. Collects domains, devices, access policies, and other configuration elements via REST API.

Installing this collection

You can install the Cisco DCNM collection with the Ansible Galaxy CLI:

ansible-galaxy collection install cisco.fmcansible

Usage Instruction

The collection supports two authentication modes:

  • Traditional FMC: Username/password authentication
  • Cisco Defense FMC (cdFMC): Bearer token authentication

Traditional FMC Configuration

Create the inventory file. Ansible inventory contains information about systems where the playbooks should be run. You should create an inventory file with information about the FMC that will be used for configuration.

The default location for inventory is /etc/ansible/hosts, but you can specify a different path by adding the -i <path> argument to the ansible-playbook command.

For traditional FMC deployments, the inventory file requires:

  •   Hostname or IP Address of the FMC
    
  •   Username for FMC
    
  •   Password for the given user
    
[all:vars]
ansible_network_os=cisco.fmcansible.fmc
network_type=HOST
ansible_facts_modules=cisco.fmcansible.fmc_facts

[vfmc]
<FMC IP> ansible_user=<username> ansible_password=<password> ansible_httpapi_port=443 ansible_httpapi_use_ssl=True ansible_httpapi_validate_certs=True

Traditional FMC Playbook Example

Then create a playbook referencing the module and the desired operation. This example network.yml demonstrates how to create a simple network object. The task creates a new object representing the subnet.

Option 1: Using automatic fact gathering (recommended for basic facts)

- hosts: all
  connection: httpapi
  gather_facts: true  # Automatically gathers minimal FMC facts (domains, devices, access_policies)
  tasks:
    - name: Create a network object for Cisco FTD 1
      cisco.fmcansible.fmc_configuration:
        operation: createMultipleNetworkObject
        data:
          name: net15
          value: 10.10.30.0/24
          type: Network
        path_params:
          domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'

Option 2: Using manual fact gathering (for custom fact subsets)

- hosts: all
  connection: httpapi
  gather_facts: false
  tasks:
    - name: Gather comprehensive FMC facts
      cisco.fmcansible.fmc_facts:
        gather_subset: ['all']  # or ['domains', 'devices', 'network_objects']
        
    - name: Create a network object for Cisco FTD 1
      cisco.fmcansible.fmc_configuration:
        operation: createMultipleNetworkObject
        data:
          name: net15
          value: 10.10.30.0/24
          type: Network
        path_params:
          domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'

Option 3: Traditional domain lookup

- hosts: all
  connection: httpapi
  tasks:
    - name: Get Domain UUID
      cisco.fmcansible.fmc_configuration:
        operation: getAllDomain
        register_as: domain

    - name: Create a network object for Cisco FTD 1
      cisco.fmcansible.fmc_configuration:
        operation: createMultipleNetworkObject
        data:
          name: net15
          value: 10.10.30.0/24
          type: Network
        path_params:
          domainUUID: '{{ domain[0].uuid }}'

Then run the playbook

ansible-playbook -i hosts network.yml

Cisco Defense FMC (cdFMC) Support

The collection now supports Cisco Defense FMC (cdFMC) environments that use Bearer token authentication instead of traditional username/password authentication.

cdFMC Configuration

For cdFMC connections, your inventory file should be configured as follows:

[all:vars]
ansible_network_os=cisco.fmcansible.fmc
network_type=HOST
ansible_facts_modules=cisco.fmcansible.fmc_facts

[cdfmc]
<cdFMC_HOST> ansible_httpapi_cdfmc=True ansible_httpapi_token=<your_bearer_token> ansible_httpapi_port=443 ansible_httpapi_use_ssl=True ansible_httpapi_validate_certs=True

cdFMC Inventory Parameters

  • ansible_httpapi_cdfmc=True - Enables cdFMC mode
  • ansible_httpapi_token=<token> - Your Bearer authentication token
  • No ansible_user or ansible_password required for cdFMC

Example cdFMC Playbook

With automatic fact gathering:

- hosts: cdfmc
  connection: httpapi
  gather_facts: true  # Automatically gathers FMC facts including domains
  tasks:
    - name: Create a network object on cdFMC
      cisco.fmcansible.fmc_configuration:
        operation: createMultipleNetworkObject
        data:
          name: cdnet01
          value: 192.168.100.0/24
          type: Network
        path_params:
          domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'

Traditional approach:

- hosts: cdfmc
  connection: httpapi
  tasks:
    - name: Get Domain UUID from cdFMC
      cisco.fmcansible.fmc_configuration:
        operation: getAllDomain
        register_as: domain

    - name: Create a network object on cdFMC
      cisco.fmcansible.fmc_configuration:
        operation: createMultipleNetworkObject
        data:
          name: cdnet01
          value: 192.168.100.0/24
          type: Network
        path_params:
          domainUUID: '{{ domain[0].uuid }}'

Getting Your cdFMC Bearer Token

  1. Log into your Security Cloud Control (SCC) portal
  2. Navigate to Administration > API User Management
  3. Generate or retrieve your API token from the appropriate section
  4. Use this token as the ansible_httpapi_token value

Security Note: Bearer tokens are sensitive credentials. Store them securely and avoid committing them to version control. Consider using Ansible Vault or environment variables for token management.

Detailed Usage Instructions can be found here

Sample playbooks are located here.

Contributing to this collection

We welcome community contributions to this collection. If you find problems, please open an issue or create a PR against the Cisco FMCAnsible repository