checkpoint.ManagementCommandSetGlobalProperties
Explore with Pulumi AI
Create ManagementCommandSetGlobalProperties Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ManagementCommandSetGlobalProperties(name: string, args?: ManagementCommandSetGlobalPropertiesArgs, opts?: CustomResourceOptions);
@overload
def ManagementCommandSetGlobalProperties(resource_name: str,
args: Optional[ManagementCommandSetGlobalPropertiesArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def ManagementCommandSetGlobalProperties(resource_name: str,
opts: Optional[ResourceOptions] = None,
advanced_conf: Optional[Mapping[str, str]] = None,
allow_remote_registration_of_opsec_products: Optional[bool] = None,
authentication: Optional[Mapping[str, str]] = None,
carrier_security: Optional[Mapping[str, str]] = None,
connect_control: Optional[Mapping[str, str]] = None,
data_access_control: Optional[Mapping[str, str]] = None,
domains_to_processes: Optional[Sequence[str]] = None,
firewall: Optional[Mapping[str, str]] = None,
hit_count: Optional[Mapping[str, str]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
log_and_alert: Optional[Mapping[str, str]] = None,
management_command_set_global_properties_id: Optional[str] = None,
nat: Optional[Mapping[str, str]] = None,
non_unique_ip_address_ranges: Optional[Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]] = None,
num_spoofing_errs_that_trigger_brute_force: Optional[float] = None,
proxy: Optional[Mapping[str, str]] = None,
qos: Optional[Mapping[str, str]] = None,
remote_access: Optional[Mapping[str, str]] = None,
stateful_inspection: Optional[Mapping[str, str]] = None,
user_accounts: Optional[Mapping[str, str]] = None,
user_authority: Optional[Mapping[str, str]] = None,
user_check: Optional[Mapping[str, str]] = None,
user_directory: Optional[Mapping[str, str]] = None,
vpn: Optional[Mapping[str, str]] = None)
func NewManagementCommandSetGlobalProperties(ctx *Context, name string, args *ManagementCommandSetGlobalPropertiesArgs, opts ...ResourceOption) (*ManagementCommandSetGlobalProperties, error)
public ManagementCommandSetGlobalProperties(string name, ManagementCommandSetGlobalPropertiesArgs? args = null, CustomResourceOptions? opts = null)
public ManagementCommandSetGlobalProperties(String name, ManagementCommandSetGlobalPropertiesArgs args)
public ManagementCommandSetGlobalProperties(String name, ManagementCommandSetGlobalPropertiesArgs args, CustomResourceOptions options)
type: checkpoint:ManagementCommandSetGlobalProperties
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ManagementCommandSetGlobalPropertiesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ManagementCommandSetGlobalPropertiesArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ManagementCommandSetGlobalPropertiesArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ManagementCommandSetGlobalPropertiesArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ManagementCommandSetGlobalPropertiesArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var managementCommandSetGlobalPropertiesResource = new Checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", new()
{
AdvancedConf =
{
{ "string", "string" },
},
AllowRemoteRegistrationOfOpsecProducts = false,
Authentication =
{
{ "string", "string" },
},
CarrierSecurity =
{
{ "string", "string" },
},
ConnectControl =
{
{ "string", "string" },
},
DataAccessControl =
{
{ "string", "string" },
},
DomainsToProcesses = new[]
{
"string",
},
Firewall =
{
{ "string", "string" },
},
HitCount =
{
{ "string", "string" },
},
IgnoreErrors = false,
IgnoreWarnings = false,
LogAndAlert =
{
{ "string", "string" },
},
ManagementCommandSetGlobalPropertiesId = "string",
Nat =
{
{ "string", "string" },
},
NonUniqueIpAddressRanges = new[]
{
new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs
{
AddressType = "string",
FirstIpv4Address = "string",
FirstIpv6Address = "string",
LastIpv4Address = "string",
LastIpv6Address = "string",
},
},
NumSpoofingErrsThatTriggerBruteForce = 0,
Proxy =
{
{ "string", "string" },
},
Qos =
{
{ "string", "string" },
},
RemoteAccess =
{
{ "string", "string" },
},
StatefulInspection =
{
{ "string", "string" },
},
UserAccounts =
{
{ "string", "string" },
},
UserAuthority =
{
{ "string", "string" },
},
UserCheck =
{
{ "string", "string" },
},
UserDirectory =
{
{ "string", "string" },
},
Vpn =
{
{ "string", "string" },
},
});
example, err := checkpoint.NewManagementCommandSetGlobalProperties(ctx, "managementCommandSetGlobalPropertiesResource", &checkpoint.ManagementCommandSetGlobalPropertiesArgs{
AdvancedConf: pulumi.StringMap{
"string": pulumi.String("string"),
},
AllowRemoteRegistrationOfOpsecProducts: pulumi.Bool(false),
Authentication: pulumi.StringMap{
"string": pulumi.String("string"),
},
CarrierSecurity: pulumi.StringMap{
"string": pulumi.String("string"),
},
ConnectControl: pulumi.StringMap{
"string": pulumi.String("string"),
},
DataAccessControl: pulumi.StringMap{
"string": pulumi.String("string"),
},
DomainsToProcesses: pulumi.StringArray{
pulumi.String("string"),
},
Firewall: pulumi.StringMap{
"string": pulumi.String("string"),
},
HitCount: pulumi.StringMap{
"string": pulumi.String("string"),
},
IgnoreErrors: pulumi.Bool(false),
IgnoreWarnings: pulumi.Bool(false),
LogAndAlert: pulumi.StringMap{
"string": pulumi.String("string"),
},
ManagementCommandSetGlobalPropertiesId: pulumi.String("string"),
Nat: pulumi.StringMap{
"string": pulumi.String("string"),
},
NonUniqueIpAddressRanges: checkpoint.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArray{
&checkpoint.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs{
AddressType: pulumi.String("string"),
FirstIpv4Address: pulumi.String("string"),
FirstIpv6Address: pulumi.String("string"),
LastIpv4Address: pulumi.String("string"),
LastIpv6Address: pulumi.String("string"),
},
},
NumSpoofingErrsThatTriggerBruteForce: pulumi.Float64(0),
Proxy: pulumi.StringMap{
"string": pulumi.String("string"),
},
Qos: pulumi.StringMap{
"string": pulumi.String("string"),
},
RemoteAccess: pulumi.StringMap{
"string": pulumi.String("string"),
},
StatefulInspection: pulumi.StringMap{
"string": pulumi.String("string"),
},
UserAccounts: pulumi.StringMap{
"string": pulumi.String("string"),
},
UserAuthority: pulumi.StringMap{
"string": pulumi.String("string"),
},
UserCheck: pulumi.StringMap{
"string": pulumi.String("string"),
},
UserDirectory: pulumi.StringMap{
"string": pulumi.String("string"),
},
Vpn: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var managementCommandSetGlobalPropertiesResource = new ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", ManagementCommandSetGlobalPropertiesArgs.builder()
.advancedConf(Map.of("string", "string"))
.allowRemoteRegistrationOfOpsecProducts(false)
.authentication(Map.of("string", "string"))
.carrierSecurity(Map.of("string", "string"))
.connectControl(Map.of("string", "string"))
.dataAccessControl(Map.of("string", "string"))
.domainsToProcesses("string")
.firewall(Map.of("string", "string"))
.hitCount(Map.of("string", "string"))
.ignoreErrors(false)
.ignoreWarnings(false)
.logAndAlert(Map.of("string", "string"))
.managementCommandSetGlobalPropertiesId("string")
.nat(Map.of("string", "string"))
.nonUniqueIpAddressRanges(ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs.builder()
.addressType("string")
.firstIpv4Address("string")
.firstIpv6Address("string")
.lastIpv4Address("string")
.lastIpv6Address("string")
.build())
.numSpoofingErrsThatTriggerBruteForce(0)
.proxy(Map.of("string", "string"))
.qos(Map.of("string", "string"))
.remoteAccess(Map.of("string", "string"))
.statefulInspection(Map.of("string", "string"))
.userAccounts(Map.of("string", "string"))
.userAuthority(Map.of("string", "string"))
.userCheck(Map.of("string", "string"))
.userDirectory(Map.of("string", "string"))
.vpn(Map.of("string", "string"))
.build());
management_command_set_global_properties_resource = checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource",
advanced_conf={
"string": "string",
},
allow_remote_registration_of_opsec_products=False,
authentication={
"string": "string",
},
carrier_security={
"string": "string",
},
connect_control={
"string": "string",
},
data_access_control={
"string": "string",
},
domains_to_processes=["string"],
firewall={
"string": "string",
},
hit_count={
"string": "string",
},
ignore_errors=False,
ignore_warnings=False,
log_and_alert={
"string": "string",
},
management_command_set_global_properties_id="string",
nat={
"string": "string",
},
non_unique_ip_address_ranges=[{
"address_type": "string",
"first_ipv4_address": "string",
"first_ipv6_address": "string",
"last_ipv4_address": "string",
"last_ipv6_address": "string",
}],
num_spoofing_errs_that_trigger_brute_force=0,
proxy={
"string": "string",
},
qos={
"string": "string",
},
remote_access={
"string": "string",
},
stateful_inspection={
"string": "string",
},
user_accounts={
"string": "string",
},
user_authority={
"string": "string",
},
user_check={
"string": "string",
},
user_directory={
"string": "string",
},
vpn={
"string": "string",
})
const managementCommandSetGlobalPropertiesResource = new checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", {
advancedConf: {
string: "string",
},
allowRemoteRegistrationOfOpsecProducts: false,
authentication: {
string: "string",
},
carrierSecurity: {
string: "string",
},
connectControl: {
string: "string",
},
dataAccessControl: {
string: "string",
},
domainsToProcesses: ["string"],
firewall: {
string: "string",
},
hitCount: {
string: "string",
},
ignoreErrors: false,
ignoreWarnings: false,
logAndAlert: {
string: "string",
},
managementCommandSetGlobalPropertiesId: "string",
nat: {
string: "string",
},
nonUniqueIpAddressRanges: [{
addressType: "string",
firstIpv4Address: "string",
firstIpv6Address: "string",
lastIpv4Address: "string",
lastIpv6Address: "string",
}],
numSpoofingErrsThatTriggerBruteForce: 0,
proxy: {
string: "string",
},
qos: {
string: "string",
},
remoteAccess: {
string: "string",
},
statefulInspection: {
string: "string",
},
userAccounts: {
string: "string",
},
userAuthority: {
string: "string",
},
userCheck: {
string: "string",
},
userDirectory: {
string: "string",
},
vpn: {
string: "string",
},
});
type: checkpoint:ManagementCommandSetGlobalProperties
properties:
advancedConf:
string: string
allowRemoteRegistrationOfOpsecProducts: false
authentication:
string: string
carrierSecurity:
string: string
connectControl:
string: string
dataAccessControl:
string: string
domainsToProcesses:
- string
firewall:
string: string
hitCount:
string: string
ignoreErrors: false
ignoreWarnings: false
logAndAlert:
string: string
managementCommandSetGlobalPropertiesId: string
nat:
string: string
nonUniqueIpAddressRanges:
- addressType: string
firstIpv4Address: string
firstIpv6Address: string
lastIpv4Address: string
lastIpv6Address: string
numSpoofingErrsThatTriggerBruteForce: 0
proxy:
string: string
qos:
string: string
remoteAccess:
string: string
statefulInspection:
string: string
userAccounts:
string: string
userAuthority:
string: string
userCheck:
string: string
userDirectory:
string: string
vpn:
string: string
ManagementCommandSetGlobalProperties Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ManagementCommandSetGlobalProperties resource accepts the following input properties:
- Advanced
Conf Dictionary<string, string> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- Allow
Remote boolRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- Authentication Dictionary<string, string>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- Carrier
Security Dictionary<string, string> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- Connect
Control Dictionary<string, string> - Configure settings that relate to ConnectControl server load balancing.
- Data
Access Dictionary<string, string>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- Domains
To List<string>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- Firewall Dictionary<string, string>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- Hit
Count Dictionary<string, string> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Log
And Dictionary<string, string>Alert - Define system-wide logging and alerting parameters.
- Management
Command stringSet Global Properties Id - Nat Dictionary<string, string>
- Configure settings that apply to all NAT connections.
- Non
Unique List<ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range> - Specify Non Unique IP Address Ranges.
- Num
Spoofing doubleErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- Proxy Dictionary<string, string>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- Qos Dictionary<string, string>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- Remote
Access Dictionary<string, string> - Configure Remote Access properties.
- Stateful
Inspection Dictionary<string, string> - Adjust Stateful Inspection parameters.
- User
Accounts Dictionary<string, string> - Set the expiration for a user account and configure "about to expire" warnings.
- Dictionary<string, string>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- User
Check Dictionary<string, string> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- User
Directory Dictionary<string, string> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- Vpn Dictionary<string, string>
- Configure settings relevant to VPN.
- Advanced
Conf map[string]string - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- Allow
Remote boolRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- Authentication map[string]string
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- Carrier
Security map[string]string - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- Connect
Control map[string]string - Configure settings that relate to ConnectControl server load balancing.
- Data
Access map[string]stringControl - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- Domains
To []stringProcesses - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- Firewall map[string]string
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- Hit
Count map[string]string - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Log
And map[string]stringAlert - Define system-wide logging and alerting parameters.
- Management
Command stringSet Global Properties Id - Nat map[string]string
- Configure settings that apply to all NAT connections.
- Non
Unique []ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range Args - Specify Non Unique IP Address Ranges.
- Num
Spoofing float64Errs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- Proxy map[string]string
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- Qos map[string]string
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- Remote
Access map[string]string - Configure Remote Access properties.
- Stateful
Inspection map[string]string - Adjust Stateful Inspection parameters.
- User
Accounts map[string]string - Set the expiration for a user account and configure "about to expire" warnings.
- map[string]string
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- User
Check map[string]string - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- User
Directory map[string]string - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- Vpn map[string]string
- Configure settings relevant to VPN.
- advanced
Conf Map<String,String> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote BooleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Map<String,String>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security Map<String,String> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control Map<String,String> - Configure settings that relate to ConnectControl server load balancing.
- data
Access Map<String,String>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To List<String>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Map<String,String>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count Map<String,String> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- log
And Map<String,String>Alert - Define system-wide logging and alerting parameters.
- management
Command StringSet Global Properties Id - nat Map<String,String>
- Configure settings that apply to all NAT connections.
- non
Unique List<ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range> - Specify Non Unique IP Address Ranges.
- num
Spoofing DoubleErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Map<String,String>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Map<String,String>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access Map<String,String> - Configure Remote Access properties.
- stateful
Inspection Map<String,String> - Adjust Stateful Inspection parameters.
- user
Accounts Map<String,String> - Set the expiration for a user account and configure "about to expire" warnings.
- Map<String,String>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check Map<String,String> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory Map<String,String> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Map<String,String>
- Configure settings relevant to VPN.
- advanced
Conf {[key: string]: string} - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote booleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication {[key: string]: string}
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security {[key: string]: string} - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control {[key: string]: string} - Configure settings that relate to ConnectControl server load balancing.
- data
Access {[key: string]: string}Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To string[]Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall {[key: string]: string}
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count {[key: string]: string} - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- log
And {[key: string]: string}Alert - Define system-wide logging and alerting parameters.
- management
Command stringSet Global Properties Id - nat {[key: string]: string}
- Configure settings that apply to all NAT connections.
- non
Unique ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range[] - Specify Non Unique IP Address Ranges.
- num
Spoofing numberErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy {[key: string]: string}
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos {[key: string]: string}
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access {[key: string]: string} - Configure Remote Access properties.
- stateful
Inspection {[key: string]: string} - Adjust Stateful Inspection parameters.
- user
Accounts {[key: string]: string} - Set the expiration for a user account and configure "about to expire" warnings.
- {[key: string]: string}
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check {[key: string]: string} - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory {[key: string]: string} - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn {[key: string]: string}
- Configure settings relevant to VPN.
- advanced_
conf Mapping[str, str] - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow_
remote_ boolregistration_ of_ opsec_ products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Mapping[str, str]
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier_
security Mapping[str, str] - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect_
control Mapping[str, str] - Configure settings that relate to ConnectControl server load balancing.
- data_
access_ Mapping[str, str]control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains_
to_ Sequence[str]processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Mapping[str, str]
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit_
count Mapping[str, str] - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- log_
and_ Mapping[str, str]alert - Define system-wide logging and alerting parameters.
- management_
command_ strset_ global_ properties_ id - nat Mapping[str, str]
- Configure settings that apply to all NAT connections.
- non_
unique_ Sequence[Managementip_ address_ ranges Command Set Global Properties Non Unique Ip Address Range Args] - Specify Non Unique IP Address Ranges.
- num_
spoofing_ floaterrs_ that_ trigger_ brute_ force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Mapping[str, str]
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Mapping[str, str]
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote_
access Mapping[str, str] - Configure Remote Access properties.
- stateful_
inspection Mapping[str, str] - Adjust Stateful Inspection parameters.
- user_
accounts Mapping[str, str] - Set the expiration for a user account and configure "about to expire" warnings.
- Mapping[str, str]
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user_
check Mapping[str, str] - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user_
directory Mapping[str, str] - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Mapping[str, str]
- Configure settings relevant to VPN.
- advanced
Conf Map<String> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote BooleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Map<String>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security Map<String> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control Map<String> - Configure settings that relate to ConnectControl server load balancing.
- data
Access Map<String>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To List<String>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Map<String>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count Map<String> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- log
And Map<String>Alert - Define system-wide logging and alerting parameters.
- management
Command StringSet Global Properties Id - nat Map<String>
- Configure settings that apply to all NAT connections.
- non
Unique List<Property Map>Ip Address Ranges - Specify Non Unique IP Address Ranges.
- num
Spoofing NumberErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Map<String>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Map<String>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access Map<String> - Configure Remote Access properties.
- stateful
Inspection Map<String> - Adjust Stateful Inspection parameters.
- user
Accounts Map<String> - Set the expiration for a user account and configure "about to expire" warnings.
- Map<String>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check Map<String> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory Map<String> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Map<String>
- Configure settings relevant to VPN.
Outputs
All input properties are implicitly available as output properties. Additionally, the ManagementCommandSetGlobalProperties resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ManagementCommandSetGlobalProperties Resource
Get an existing ManagementCommandSetGlobalProperties resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ManagementCommandSetGlobalPropertiesState, opts?: CustomResourceOptions): ManagementCommandSetGlobalProperties
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
advanced_conf: Optional[Mapping[str, str]] = None,
allow_remote_registration_of_opsec_products: Optional[bool] = None,
authentication: Optional[Mapping[str, str]] = None,
carrier_security: Optional[Mapping[str, str]] = None,
connect_control: Optional[Mapping[str, str]] = None,
data_access_control: Optional[Mapping[str, str]] = None,
domains_to_processes: Optional[Sequence[str]] = None,
firewall: Optional[Mapping[str, str]] = None,
hit_count: Optional[Mapping[str, str]] = None,
ignore_errors: Optional[bool] = None,
ignore_warnings: Optional[bool] = None,
log_and_alert: Optional[Mapping[str, str]] = None,
management_command_set_global_properties_id: Optional[str] = None,
nat: Optional[Mapping[str, str]] = None,
non_unique_ip_address_ranges: Optional[Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]] = None,
num_spoofing_errs_that_trigger_brute_force: Optional[float] = None,
proxy: Optional[Mapping[str, str]] = None,
qos: Optional[Mapping[str, str]] = None,
remote_access: Optional[Mapping[str, str]] = None,
stateful_inspection: Optional[Mapping[str, str]] = None,
user_accounts: Optional[Mapping[str, str]] = None,
user_authority: Optional[Mapping[str, str]] = None,
user_check: Optional[Mapping[str, str]] = None,
user_directory: Optional[Mapping[str, str]] = None,
vpn: Optional[Mapping[str, str]] = None) -> ManagementCommandSetGlobalProperties
func GetManagementCommandSetGlobalProperties(ctx *Context, name string, id IDInput, state *ManagementCommandSetGlobalPropertiesState, opts ...ResourceOption) (*ManagementCommandSetGlobalProperties, error)
public static ManagementCommandSetGlobalProperties Get(string name, Input<string> id, ManagementCommandSetGlobalPropertiesState? state, CustomResourceOptions? opts = null)
public static ManagementCommandSetGlobalProperties get(String name, Output<String> id, ManagementCommandSetGlobalPropertiesState state, CustomResourceOptions options)
resources: _: type: checkpoint:ManagementCommandSetGlobalProperties get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Advanced
Conf Dictionary<string, string> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- Allow
Remote boolRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- Authentication Dictionary<string, string>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- Carrier
Security Dictionary<string, string> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- Connect
Control Dictionary<string, string> - Configure settings that relate to ConnectControl server load balancing.
- Data
Access Dictionary<string, string>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- Domains
To List<string>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- Firewall Dictionary<string, string>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- Hit
Count Dictionary<string, string> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Log
And Dictionary<string, string>Alert - Define system-wide logging and alerting parameters.
- Management
Command stringSet Global Properties Id - Nat Dictionary<string, string>
- Configure settings that apply to all NAT connections.
- Non
Unique List<ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range> - Specify Non Unique IP Address Ranges.
- Num
Spoofing doubleErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- Proxy Dictionary<string, string>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- Qos Dictionary<string, string>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- Remote
Access Dictionary<string, string> - Configure Remote Access properties.
- Stateful
Inspection Dictionary<string, string> - Adjust Stateful Inspection parameters.
- User
Accounts Dictionary<string, string> - Set the expiration for a user account and configure "about to expire" warnings.
- Dictionary<string, string>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- User
Check Dictionary<string, string> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- User
Directory Dictionary<string, string> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- Vpn Dictionary<string, string>
- Configure settings relevant to VPN.
- Advanced
Conf map[string]string - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- Allow
Remote boolRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- Authentication map[string]string
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- Carrier
Security map[string]string - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- Connect
Control map[string]string - Configure settings that relate to ConnectControl server load balancing.
- Data
Access map[string]stringControl - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- Domains
To []stringProcesses - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- Firewall map[string]string
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- Hit
Count map[string]string - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- Ignore
Errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- Ignore
Warnings bool - Apply changes ignoring warnings.
- Log
And map[string]stringAlert - Define system-wide logging and alerting parameters.
- Management
Command stringSet Global Properties Id - Nat map[string]string
- Configure settings that apply to all NAT connections.
- Non
Unique []ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range Args - Specify Non Unique IP Address Ranges.
- Num
Spoofing float64Errs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- Proxy map[string]string
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- Qos map[string]string
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- Remote
Access map[string]string - Configure Remote Access properties.
- Stateful
Inspection map[string]string - Adjust Stateful Inspection parameters.
- User
Accounts map[string]string - Set the expiration for a user account and configure "about to expire" warnings.
- map[string]string
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- User
Check map[string]string - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- User
Directory map[string]string - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- Vpn map[string]string
- Configure settings relevant to VPN.
- advanced
Conf Map<String,String> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote BooleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Map<String,String>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security Map<String,String> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control Map<String,String> - Configure settings that relate to ConnectControl server load balancing.
- data
Access Map<String,String>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To List<String>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Map<String,String>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count Map<String,String> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- log
And Map<String,String>Alert - Define system-wide logging and alerting parameters.
- management
Command StringSet Global Properties Id - nat Map<String,String>
- Configure settings that apply to all NAT connections.
- non
Unique List<ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range> - Specify Non Unique IP Address Ranges.
- num
Spoofing DoubleErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Map<String,String>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Map<String,String>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access Map<String,String> - Configure Remote Access properties.
- stateful
Inspection Map<String,String> - Adjust Stateful Inspection parameters.
- user
Accounts Map<String,String> - Set the expiration for a user account and configure "about to expire" warnings.
- Map<String,String>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check Map<String,String> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory Map<String,String> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Map<String,String>
- Configure settings relevant to VPN.
- advanced
Conf {[key: string]: string} - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote booleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication {[key: string]: string}
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security {[key: string]: string} - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control {[key: string]: string} - Configure settings that relate to ConnectControl server load balancing.
- data
Access {[key: string]: string}Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To string[]Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall {[key: string]: string}
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count {[key: string]: string} - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings boolean - Apply changes ignoring warnings.
- log
And {[key: string]: string}Alert - Define system-wide logging and alerting parameters.
- management
Command stringSet Global Properties Id - nat {[key: string]: string}
- Configure settings that apply to all NAT connections.
- non
Unique ManagementIp Address Ranges Command Set Global Properties Non Unique Ip Address Range[] - Specify Non Unique IP Address Ranges.
- num
Spoofing numberErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy {[key: string]: string}
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos {[key: string]: string}
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access {[key: string]: string} - Configure Remote Access properties.
- stateful
Inspection {[key: string]: string} - Adjust Stateful Inspection parameters.
- user
Accounts {[key: string]: string} - Set the expiration for a user account and configure "about to expire" warnings.
- {[key: string]: string}
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check {[key: string]: string} - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory {[key: string]: string} - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn {[key: string]: string}
- Configure settings relevant to VPN.
- advanced_
conf Mapping[str, str] - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow_
remote_ boolregistration_ of_ opsec_ products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Mapping[str, str]
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier_
security Mapping[str, str] - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect_
control Mapping[str, str] - Configure settings that relate to ConnectControl server load balancing.
- data_
access_ Mapping[str, str]control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains_
to_ Sequence[str]processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Mapping[str, str]
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit_
count Mapping[str, str] - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore_
errors bool - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_
warnings bool - Apply changes ignoring warnings.
- log_
and_ Mapping[str, str]alert - Define system-wide logging and alerting parameters.
- management_
command_ strset_ global_ properties_ id - nat Mapping[str, str]
- Configure settings that apply to all NAT connections.
- non_
unique_ Sequence[Managementip_ address_ ranges Command Set Global Properties Non Unique Ip Address Range Args] - Specify Non Unique IP Address Ranges.
- num_
spoofing_ floaterrs_ that_ trigger_ brute_ force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Mapping[str, str]
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Mapping[str, str]
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote_
access Mapping[str, str] - Configure Remote Access properties.
- stateful_
inspection Mapping[str, str] - Adjust Stateful Inspection parameters.
- user_
accounts Mapping[str, str] - Set the expiration for a user account and configure "about to expire" warnings.
- Mapping[str, str]
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user_
check Mapping[str, str] - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user_
directory Mapping[str, str] - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Mapping[str, str]
- Configure settings relevant to VPN.
- advanced
Conf Map<String> - Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
- allow
Remote BooleanRegistration Of Opsec Products - After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
- authentication Map<String>
- Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
- carrier
Security Map<String> - Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
- connect
Control Map<String> - Configure settings that relate to ConnectControl server load balancing.
- data
Access Map<String>Control - Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
- domains
To List<String>Processes - Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
- firewall Map<String>
- Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
- hit
Count Map<String> - Enable the Hit Count feature that tracks the number of connections that each rule matches.
- ignore
Errors Boolean - Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore
Warnings Boolean - Apply changes ignoring warnings.
- log
And Map<String>Alert - Define system-wide logging and alerting parameters.
- management
Command StringSet Global Properties Id - nat Map<String>
- Configure settings that apply to all NAT connections.
- non
Unique List<Property Map>Ip Address Ranges - Specify Non Unique IP Address Ranges.
- num
Spoofing NumberErrs That Trigger Brute Force - Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
- proxy Map<String>
- Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
- qos Map<String>
- Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
- remote
Access Map<String> - Configure Remote Access properties.
- stateful
Inspection Map<String> - Adjust Stateful Inspection parameters.
- user
Accounts Map<String> - Set the expiration for a user account and configure "about to expire" warnings.
- Map<String>
- Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
- user
Check Map<String> - Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
- user
Directory Map<String> - User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
- vpn Map<String>
- Configure settings relevant to VPN.
Supporting Types
ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange, ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs
- Address
Type string - The type of the IP Address.
- First
Ipv4Address string - The first IPV4 Address in the range.
- First
Ipv6Address string - The first IPV6 Address in the range.
- Last
Ipv4Address string - The last IPV4 Address in the range.
- Last
Ipv6Address string - The last IPV6 Address in the range.
- Address
Type string - The type of the IP Address.
- First
Ipv4Address string - The first IPV4 Address in the range.
- First
Ipv6Address string - The first IPV6 Address in the range.
- Last
Ipv4Address string - The last IPV4 Address in the range.
- Last
Ipv6Address string - The last IPV6 Address in the range.
- address
Type String - The type of the IP Address.
- first
Ipv4Address String - The first IPV4 Address in the range.
- first
Ipv6Address String - The first IPV6 Address in the range.
- last
Ipv4Address String - The last IPV4 Address in the range.
- last
Ipv6Address String - The last IPV6 Address in the range.
- address
Type string - The type of the IP Address.
- first
Ipv4Address string - The first IPV4 Address in the range.
- first
Ipv6Address string - The first IPV6 Address in the range.
- last
Ipv4Address string - The last IPV4 Address in the range.
- last
Ipv6Address string - The last IPV6 Address in the range.
- address_
type str - The type of the IP Address.
- first_
ipv4_ straddress - The first IPV4 Address in the range.
- first_
ipv6_ straddress - The first IPV6 Address in the range.
- last_
ipv4_ straddress - The last IPV4 Address in the range.
- last_
ipv6_ straddress - The last IPV6 Address in the range.
- address
Type String - The type of the IP Address.
- first
Ipv4Address String - The first IPV4 Address in the range.
- first
Ipv6Address String - The first IPV6 Address in the range.
- last
Ipv4Address String - The last IPV4 Address in the range.
- last
Ipv6Address String - The last IPV6 Address in the range.
Package Details
- Repository
- checkpoint checkpointsw/terraform-provider-checkpoint
- License
- Notes
- This Pulumi package is based on the
checkpoint
Terraform Provider.