An Ansible Collection that automates configuration management and execution of operational tasks on Cisco Secure Firewall Management Centre (FMC) devices using FMC REST API.
Supports both traditional FMC and Cisco Defense FMC (cdFMC) deployments with Bearer token authentication.
This module has been tested against the following ansible versions: 2.9.17, 2.10.5 This module has been tested against the following cisco Secure Firewall Management Center versions up to 7.6
The collection contains the following Ansible modules:
-
fmc_configuration.py
- manages device configuration via REST API. The module configures virtual and physical devices by sending HTTPS calls formatted according to the REST API specification. -
fmc_facts.py
- gathers facts from FMC devices and enablesgather_facts: true
functionality. Collects domains, devices, access policies, and other configuration elements via REST API.
You can install the Cisco DCNM collection with the Ansible Galaxy CLI:
ansible-galaxy collection install cisco.fmcansible
The collection supports two authentication modes:
- Traditional FMC: Username/password authentication
- Cisco Defense FMC (cdFMC): Bearer token authentication
Create the inventory file. Ansible inventory contains information about systems where the playbooks should be run. You should create an inventory file with information about the FMC that will be used for configuration.
The default location for inventory is /etc/ansible/hosts, but you can specify a different path by adding the -i <path>
argument to the ansible-playbook command.
For traditional FMC deployments, the inventory file requires:
-
Hostname or IP Address of the FMC
-
Username for FMC
-
Password for the given user
[all:vars]
ansible_network_os=cisco.fmcansible.fmc
network_type=HOST
ansible_facts_modules=cisco.fmcansible.fmc_facts
[vfmc]
<FMC IP> ansible_user=<username> ansible_password=<password> ansible_httpapi_port=443 ansible_httpapi_use_ssl=True ansible_httpapi_validate_certs=True
Then create a playbook referencing the module and the desired operation. This example network.yml
demonstrates how to create a simple network object. The task creates a new object representing the subnet.
Option 1: Using automatic fact gathering (recommended for basic facts)
- hosts: all
connection: httpapi
gather_facts: true # Automatically gathers minimal FMC facts (domains, devices, access_policies)
tasks:
- name: Create a network object for Cisco FTD 1
cisco.fmcansible.fmc_configuration:
operation: createMultipleNetworkObject
data:
name: net15
value: 10.10.30.0/24
type: Network
path_params:
domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'
Option 2: Using manual fact gathering (for custom fact subsets)
- hosts: all
connection: httpapi
gather_facts: false
tasks:
- name: Gather comprehensive FMC facts
cisco.fmcansible.fmc_facts:
gather_subset: ['all'] # or ['domains', 'devices', 'network_objects']
- name: Create a network object for Cisco FTD 1
cisco.fmcansible.fmc_configuration:
operation: createMultipleNetworkObject
data:
name: net15
value: 10.10.30.0/24
type: Network
path_params:
domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'
Option 3: Traditional domain lookup
- hosts: all
connection: httpapi
tasks:
- name: Get Domain UUID
cisco.fmcansible.fmc_configuration:
operation: getAllDomain
register_as: domain
- name: Create a network object for Cisco FTD 1
cisco.fmcansible.fmc_configuration:
operation: createMultipleNetworkObject
data:
name: net15
value: 10.10.30.0/24
type: Network
path_params:
domainUUID: '{{ domain[0].uuid }}'
Then run the playbook
ansible-playbook -i hosts network.yml
The collection now supports Cisco Defense FMC (cdFMC) environments that use Bearer token authentication instead of traditional username/password authentication.
For cdFMC connections, your inventory file should be configured as follows:
[all:vars]
ansible_network_os=cisco.fmcansible.fmc
network_type=HOST
ansible_facts_modules=cisco.fmcansible.fmc_facts
[cdfmc]
<cdFMC_HOST> ansible_httpapi_cdfmc=True ansible_httpapi_token=<your_bearer_token> ansible_httpapi_port=443 ansible_httpapi_use_ssl=True ansible_httpapi_validate_certs=True
ansible_httpapi_cdfmc=True
- Enables cdFMC modeansible_httpapi_token=<token>
- Your Bearer authentication token- No
ansible_user
oransible_password
required for cdFMC
With automatic fact gathering:
- hosts: cdfmc
connection: httpapi
gather_facts: true # Automatically gathers FMC facts including domains
tasks:
- name: Create a network object on cdFMC
cisco.fmcansible.fmc_configuration:
operation: createMultipleNetworkObject
data:
name: cdnet01
value: 192.168.100.0/24
type: Network
path_params:
domainUUID: '{{ ansible_facts.fmc.domains[0].uuid }}'
Traditional approach:
- hosts: cdfmc
connection: httpapi
tasks:
- name: Get Domain UUID from cdFMC
cisco.fmcansible.fmc_configuration:
operation: getAllDomain
register_as: domain
- name: Create a network object on cdFMC
cisco.fmcansible.fmc_configuration:
operation: createMultipleNetworkObject
data:
name: cdnet01
value: 192.168.100.0/24
type: Network
path_params:
domainUUID: '{{ domain[0].uuid }}'
- Log into your Security Cloud Control (SCC) portal
- Navigate to Administration > API User Management
- Generate or retrieve your API token from the appropriate section
- Use this token as the
ansible_httpapi_token
value
Security Note: Bearer tokens are sensitive credentials. Store them securely and avoid committing them to version control. Consider using Ansible Vault or environment variables for token management.
Detailed Usage Instructions can be found here
Sample playbooks are located here
.
We welcome community contributions to this collection. If you find problems, please open an issue or create a PR against the Cisco FMCAnsible repository