1. Packages
  2. Packages
  3. Checkpoint Provider
  4. API Docs
  5. ManagementCommandSetGlobalProperties
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw

    Create ManagementCommandSetGlobalProperties Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ManagementCommandSetGlobalProperties(name: string, args?: ManagementCommandSetGlobalPropertiesArgs, opts?: CustomResourceOptions);
    @overload
    def ManagementCommandSetGlobalProperties(resource_name: str,
                                             args: Optional[ManagementCommandSetGlobalPropertiesArgs] = None,
                                             opts: Optional[ResourceOptions] = None)
    
    @overload
    def ManagementCommandSetGlobalProperties(resource_name: str,
                                             opts: Optional[ResourceOptions] = None,
                                             advanced_conf: Optional[ManagementCommandSetGlobalPropertiesAdvancedConfArgs] = None,
                                             allow_remote_registration_of_opsec_products: Optional[bool] = None,
                                             authentication: Optional[ManagementCommandSetGlobalPropertiesAuthenticationArgs] = None,
                                             carrier_security: Optional[ManagementCommandSetGlobalPropertiesCarrierSecurityArgs] = None,
                                             connect_control: Optional[ManagementCommandSetGlobalPropertiesConnectControlArgs] = None,
                                             data_access_control: Optional[ManagementCommandSetGlobalPropertiesDataAccessControlArgs] = None,
                                             domains_to_processes: Optional[Sequence[str]] = None,
                                             firewall: Optional[ManagementCommandSetGlobalPropertiesFirewallArgs] = None,
                                             hit_count: Optional[ManagementCommandSetGlobalPropertiesHitCountArgs] = None,
                                             ignore_errors: Optional[bool] = None,
                                             ignore_warnings: Optional[bool] = None,
                                             log_and_alerts: Optional[Sequence[ManagementCommandSetGlobalPropertiesLogAndAlertArgs]] = None,
                                             management_command_set_global_properties_id: Optional[str] = None,
                                             nat: Optional[ManagementCommandSetGlobalPropertiesNatArgs] = None,
                                             non_unique_ip_address_ranges: Optional[Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]] = None,
                                             num_spoofing_errs_that_trigger_brute_force: Optional[float] = None,
                                             proxy: Optional[ManagementCommandSetGlobalPropertiesProxyArgs] = None,
                                             qos: Optional[ManagementCommandSetGlobalPropertiesQosArgs] = None,
                                             remote_accesses: Optional[Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessArgs]] = None,
                                             stateful_inspection: Optional[ManagementCommandSetGlobalPropertiesStatefulInspectionArgs] = None,
                                             user_accounts: Optional[ManagementCommandSetGlobalPropertiesUserAccountsArgs] = None,
                                             user_authority: Optional[ManagementCommandSetGlobalPropertiesUserAuthorityArgs] = None,
                                             user_check: Optional[ManagementCommandSetGlobalPropertiesUserCheckArgs] = None,
                                             user_directory: Optional[ManagementCommandSetGlobalPropertiesUserDirectoryArgs] = None,
                                             vpn: Optional[ManagementCommandSetGlobalPropertiesVpnArgs] = None)
    func NewManagementCommandSetGlobalProperties(ctx *Context, name string, args *ManagementCommandSetGlobalPropertiesArgs, opts ...ResourceOption) (*ManagementCommandSetGlobalProperties, error)
    public ManagementCommandSetGlobalProperties(string name, ManagementCommandSetGlobalPropertiesArgs? args = null, CustomResourceOptions? opts = null)
    public ManagementCommandSetGlobalProperties(String name, ManagementCommandSetGlobalPropertiesArgs args)
    public ManagementCommandSetGlobalProperties(String name, ManagementCommandSetGlobalPropertiesArgs args, CustomResourceOptions options)
    
    type: checkpoint:ManagementCommandSetGlobalProperties
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ManagementCommandSetGlobalPropertiesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ManagementCommandSetGlobalPropertiesArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ManagementCommandSetGlobalPropertiesArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ManagementCommandSetGlobalPropertiesArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ManagementCommandSetGlobalPropertiesArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var managementCommandSetGlobalPropertiesResource = new Checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", new()
    {
        AdvancedConf = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesAdvancedConfArgs
        {
            CertsAndPki = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesAdvancedConfCertsAndPkiArgs
            {
                CertValidationEnforceKeySize = "string",
                HostCertsEcdsaKeySize = "string",
                HostCertsKeySize = "string",
            },
        },
        AllowRemoteRegistrationOfOpsecProducts = false,
        Authentication = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesAuthenticationArgs
        {
            AllowedSuffixForInternalUsers = "string",
            AuthInternalUsersWithSpecificSuffix = false,
            DelayEachAuthAttemptBy = 0,
            EnableDelayedAuth = false,
            MaxClientAuthAttemptsBeforeConnectionTermination = 0,
            MaxDaysBeforeExpirationOfNonPulledUserCertificates = 0,
            MaxRloginAttemptsBeforeConnectionTermination = 0,
            MaxSessionAuthAttemptsBeforeConnectionTermination = 0,
            MaxTelnetAttemptsBeforeConnectionTermination = 0,
        },
        CarrierSecurity = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesCarrierSecurityArgs
        {
            AggressiveAging = false,
            AggressiveTimeout = 0,
            AllowGgsnRepliesFromMultipleInterfaces = false,
            BlockGtpInGtp = false,
            EnableGPduSeqNumberCheckWithMaxDeviation = false,
            EnableReverseConnections = false,
            EnforceGtpAntiSpoofing = false,
            GPduSeqNumberCheckMaxDeviation = 0,
            GtpSignalingRateLimitSamplingInterval = 0,
            MemoryActivationThreshold = 0,
            MemoryDeactivationThreshold = 0,
            OneGtpEchoOnEachPathFrequency = 0,
            ProduceExtendedLogsOnUnmatchedPdus = false,
            ProduceExtendedLogsOnUnmatchedPdusPosition = "string",
            ProtocolViolationTrackOption = "string",
            TunnelActivationThreshold = 0,
            TunnelDeactivationThreshold = 0,
            VerifyFlowLabels = false,
        },
        ConnectControl = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesConnectControlArgs
        {
            LoadAgentsPort = 0,
            LoadMeasurementInterval = 0,
            PersistenceServerTimeout = 0,
            ServerAvailabilityCheckInterval = 0,
            ServerCheckRetries = 0,
        },
        DataAccessControl = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesDataAccessControlArgs
        {
            AutoDownloadImportantData = false,
            AutoDownloadSwUpdatesAndNewFeatures = false,
            SendAnonymousInfo = false,
            ShareSensitiveInfo = false,
        },
        DomainsToProcesses = new[]
        {
            "string",
        },
        Firewall = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesFirewallArgs
        {
            AcceptControlConnections = false,
            AcceptDomainNameOverTcp = false,
            AcceptDomainNameOverTcpPosition = "string",
            AcceptDomainNameOverUdp = false,
            AcceptDomainNameOverUdpPosition = "string",
            AcceptDynamicAddrModulesOutgoingInternetConnections = false,
            AcceptIcmpRequests = false,
            AcceptIcmpRequestsPosition = "string",
            AcceptIdentityAwarenessControlConnections = false,
            AcceptIdentityAwarenessControlConnectionsPosition = "string",
            AcceptIncomingTrafficToDhcpAndDnsServicesOfGws = false,
            AcceptIps1ManagementConnections = false,
            AcceptOutgoingPacketsOriginatingFromConnectraGw = false,
            AcceptOutgoingPacketsOriginatingFromGw = false,
            AcceptOutgoingPacketsOriginatingFromGwPosition = "string",
            AcceptOutgoingPacketsToCpOnlineServices = false,
            AcceptOutgoingPacketsToCpOnlineServicesPosition = "string",
            AcceptRemoteAccessControlConnections = false,
            AcceptRip = false,
            AcceptRipPosition = "string",
            AcceptSmartUpdateConnections = false,
            AcceptVrrpPacketsOriginatingFromClusterMembers = false,
            AcceptWebAndSshConnectionsForGwAdministration = false,
            LogImpliedRules = false,
            SecurityServer = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesFirewallSecurityServerArgs
            {
                ClientAuthWelcomeFile = "string",
                FtpWelcomeMsgFile = "string",
                HttpNextProxyHost = "string",
                HttpNextProxyPort = 0,
                HttpServers = new[]
                {
                    new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServerArgs
                    {
                        Host = "string",
                        LogicalName = "string",
                        Port = 0,
                        Reauthentication = "string",
                    },
                },
                MdqWelcomeMsg = "string",
                RloginWelcomeMsgFile = "string",
                ServerForNullRequests = "string",
                SmtpWelcomeMsg = "string",
                TelnetWelcomeMsgFile = "string",
            },
        },
        HitCount = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesHitCountArgs
        {
            EnableHitCount = false,
            KeepHitCountDataUpTo = "string",
        },
        IgnoreErrors = false,
        IgnoreWarnings = false,
        LogAndAlerts = new[]
        {
            new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesLogAndAlertArgs
            {
                AdministrativeNotifications = "string",
                Alerts = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesLogAndAlertAlertsArgs
                {
                    DefaultTrackOptionForSystemAlerts = "string",
                    MailAlertScript = "string",
                    PopupAlertScript = "string",
                    SendMailAlertToSmartviewMonitor = false,
                    SendPopupAlertToSmartviewMonitor = false,
                    SendSnmpTrapAlertToSmartviewMonitor = false,
                    SendUserDefinedAlertNum1ToSmartviewMonitor = false,
                    SendUserDefinedAlertNum2ToSmartviewMonitor = false,
                    SendUserDefinedAlertNum3ToSmartviewMonitor = false,
                    SnmpTrapAlertScript = "string",
                    UserDefinedScriptNum1 = "string",
                    UserDefinedScriptNum2 = "string",
                    UserDefinedScriptNum3 = "string",
                },
                ConnectionMatchedBySam = "string",
                DynamicObjectResolutionFailure = "string",
                LogEveryAuthenticatedHttpConnection = false,
                LogTraffic = "string",
                PacketIsIncorrectlyTagged = "string",
                PacketTaggingBruteForceAttack = "string",
                SlaViolation = "string",
                TimeSettings = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettingsArgs
                {
                    ExcessiveLogGracePeriod = 0,
                    LogsResolvingTimeout = 0,
                    StatusFetchingInterval = 0,
                    VirtualLinkStatisticsLoggingInterval = 0,
                },
                VpnConfAndKeyExchangeErrors = "string",
                VpnPacketHandlingError = "string",
                VpnSuccessfulKeyExchange = "string",
            },
        },
        ManagementCommandSetGlobalPropertiesId = "string",
        Nat = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesNatArgs
        {
            AddrAllocAndReleaseTrack = "string",
            AddrExhaustionTrack = "string",
            AllowBiDirectionalNat = false,
            AutoArpConf = false,
            AutoTranslateDestOnClientSide = false,
            EnableIpPoolNat = false,
            ManuallyTranslateDestOnClientSide = false,
            MergeManualProxyArpConf = false,
        },
        NonUniqueIpAddressRanges = new[]
        {
            new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs
            {
                AddressType = "string",
                FirstIpv4Address = "string",
                FirstIpv6Address = "string",
                LastIpv4Address = "string",
                LastIpv6Address = "string",
            },
        },
        NumSpoofingErrsThatTriggerBruteForce = 0,
        Proxy = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesProxyArgs
        {
            ProxyAddress = "string",
            ProxyPort = 0,
            UseProxyServer = false,
        },
        Qos = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesQosArgs
        {
            AuthenticatedIpExpiration = 0,
            DefaultWeightOfRule = 0,
            MaxWeightOfRule = 0,
            NonAuthenticatedIpExpiration = 0,
            UnansweredQueriedIpExpiration = 0,
            UnitOfMeasure = "string",
        },
        RemoteAccesses = new[]
        {
            new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessArgs
            {
                EnableBackConnections = false,
                EncryptDnsTraffic = false,
                EndpointConnect = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectArgs
                {
                    CachePasswordTimeout = 0,
                    ClientUpgradeMode = "string",
                    ConnectMode = "string",
                    DisconnectWhenConnToNetworkIsLost = "string",
                    DisconnectWhenDeviceIsIdle = "string",
                    EnablePasswordCaching = "string",
                    NetworkLocationAwareness = "string",
                    NetworkLocationAwarenessConf = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConfArgs
                    {
                        ConsiderUndefinedDnsSuffixesAsExternal = false,
                        ConsiderWirelessNetworksAsExternal = false,
                        DnsSuffixes = new[]
                        {
                            "string",
                        },
                        ExcludedInternalWirelessNetworks = new[]
                        {
                            "string",
                        },
                        NetworkOrGroupOfConnVpnClient = "string",
                        RememberPreviouslyDetectedExternalNetworks = false,
                        VpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient = "string",
                    },
                    ReAuthUserInterval = 0,
                    RouteAllTrafficToGw = "string",
                },
                HotSpotAndHotelRegistration = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistrationArgs
                {
                    EnableRegistration = false,
                    LocalSubnetsAccessOnly = false,
                    MaxIpAccessDuringRegistration = 0,
                    Ports = new[]
                    {
                        "string",
                    },
                    RegistrationTimeout = 0,
                    TrackLog = false,
                },
                KeepAlivePacketToGwInterval = 0,
                Scv = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessScvArgs
                {
                    ApplyScvOnSimplifiedModeFwPolicies = false,
                    Exceptions = new[]
                    {
                        new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessScvExceptionArgs
                        {
                            Hosts = new[]
                            {
                                "string",
                            },
                            Services = new[]
                            {
                                "string",
                            },
                        },
                    },
                    GenerateLog = false,
                    NoScvForUnsupportedCpClients = false,
                    NotifyUser = false,
                    OnlyTcpIpProtocolsAreUsed = false,
                    PolicyInstalledOnAllInterfaces = false,
                    UponVerificationAcceptAndLogClientConnection = false,
                },
                SecureClientMobile = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobileArgs
                {
                    AutomaticallyInitiateDialup = "string",
                    CachePasswordTimeout = 0,
                    ConnectMode = "string",
                    DisconnectWhenDeviceIsIdle = "string",
                    EnablePasswordCaching = "string",
                    ReAuthUserInterval = 0,
                    RouteAllTrafficToGw = "string",
                    SupportedEncryptionMethods = "string",
                    UserAuthMethod = "string",
                },
                SimultaneousLoginMode = "string",
                SslNetworkExtender = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtenderArgs
                {
                    ClientOutgoingKeepAlivePacketsFrequency = 0,
                    ClientUninstallUponDisconnection = "string",
                    ClientUpgradeUponConnection = "string",
                    ReAuthUserInterval = 0,
                    ScanEpMachineForComplianceWithEpCompliancePolicy = false,
                    SupportedEncryptionMethods = "string",
                    UserAuthMethod = "string",
                },
                VpnAdvanced = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvancedArgs
                {
                    AllowClearTrafficToEncryptionDomainWhenDisconnected = false,
                    EnableLoadDistributionForMepConf = false,
                    UseFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite = false,
                },
                VpnAuthenticationAndEncryptions = new[]
                {
                    new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionArgs
                    {
                        EncryptionAlgorithms = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsArgs
                        {
                            Ike = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeArgs
                            {
                                SupportDataIntegrity = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrityArgs
                                {
                                    AesXcbc = false,
                                    Md5 = false,
                                    Sha1 = false,
                                    Sha256 = false,
                                },
                                SupportDiffieHellmanGroups = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroupsArgs
                                {
                                    Group1 = false,
                                    Group14 = false,
                                    Group2 = false,
                                    Group5 = false,
                                },
                                SupportEncryptionAlgorithms = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithmsArgs
                                {
                                    Aes128 = false,
                                    Aes256 = false,
                                    Des = false,
                                    Tdes = false,
                                },
                                UseDataIntegrity = "string",
                                UseDiffieHellmanGroup = "string",
                                UseEncryptionAlgorithm = "string",
                            },
                            Ipsec = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecArgs
                            {
                                EnforceEncryptionAlgAndDataIntegrityOnAllUsers = false,
                                SupportDataIntegrity = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrityArgs
                                {
                                    AesXcbc = false,
                                    Md5 = false,
                                    Sha1 = false,
                                    Sha256 = false,
                                },
                                SupportEncryptionAlgorithms = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithmsArgs
                                {
                                    Aes128 = false,
                                    Aes256 = false,
                                    Des = false,
                                    Tdes = false,
                                },
                                UseDataIntegrity = "string",
                                UseEncryptionAlgorithm = "string",
                            },
                        },
                        EncryptionMethod = "string",
                        L2tpPreSharedKey = "string",
                        PreSharedSecret = false,
                        SupportL2tpWithPreSharedKey = false,
                        SupportLegacyAuthForScL2tpNokiaClients = false,
                        SupportLegacyEap = false,
                    },
                },
            },
        },
        StatefulInspection = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesStatefulInspectionArgs
        {
            AcceptStatefulIcmpErrors = false,
            AcceptStatefulIcmpReplies = false,
            AcceptStatefulOtherIpProtocolsRepliesForUnknownServices = false,
            AcceptStatefulUdpRepliesForUnknownServices = false,
            DropOutOfStateIcmpPackets = false,
            DropOutOfStateSctpPackets = false,
            DropOutOfStateTcpPackets = false,
            IcmpVirtualSessionTimeout = 0,
            LogOnDropOutOfStateIcmpPackets = false,
            LogOnDropOutOfStateSctpPackets = false,
            LogOnDropOutOfStateTcpPackets = false,
            OtherIpProtocolsVirtualSessionTimeout = 0,
            SctpEndTimeout = 0,
            SctpSessionTimeout = 0,
            SctpStartTimeout = 0,
            TcpEndTimeout = 0,
            TcpEndTimeoutR8020GwAndAbove = 0,
            TcpOutOfStateDropExceptions = new[]
            {
                "string",
            },
            TcpSessionTimeout = 0,
            TcpStartTimeout = 0,
            UdpVirtualSessionTimeout = 0,
        },
        UserAccounts = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesUserAccountsArgs
        {
            DaysUntilExpiration = 0,
            ExpirationDate = "string",
            ExpirationDateMethod = "string",
            ShowAccountsExpirationIndicationDaysInAdvance = false,
        },
        UserAuthority = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesUserAuthorityArgs
        {
            DisplayWebAccessView = false,
            TrustOnlyFollowingWindowsDomains = new[]
            {
                "string",
            },
            WindowsDomainsToTrust = "string",
        },
        UserCheck = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesUserCheckArgs
        {
            PreferredLanguage = "string",
            SendEmailsUsingMailServer = "string",
        },
        UserDirectory = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesUserDirectoryArgs
        {
            CacheSize = 0,
            DisplayUserDnAtLogin = "string",
            EnablePasswordChangeWhenUserActiveDirectoryExpires = false,
            EnablePasswordExpirationConfiguration = false,
            EnforceRulesForUserMgmtAdmins = false,
            MinPasswordLength = 0,
            PasswordExpiresAfter = 0,
            PasswordMustIncludeADigit = false,
            PasswordMustIncludeASymbol = false,
            PasswordMustIncludeLowercaseChar = false,
            PasswordMustIncludeUppercaseChar = false,
            TimeoutOnCachedUsers = 0,
        },
        Vpn = new Checkpoint.Inputs.ManagementCommandSetGlobalPropertiesVpnArgs
        {
            DomainNameForDnsResolving = "string",
            EnableBackupGw = false,
            EnableDecryptOnAcceptForGwToGwTraffic = false,
            EnableLoadDistributionForMepConf = false,
            EnableVpnDirectionalMatchInVpnColumn = false,
            GracePeriodAfterTheCrlIsNotValid = 0,
            GracePeriodBeforeTheCrlIsValid = 0,
            GracePeriodExtensionForSecureRemoteSecureClient = 0,
            SupportIkeDosProtectionFromIdentifiedSrc = "string",
            SupportIkeDosProtectionFromUnidentifiedSrc = "string",
            VpnConfMethod = "string",
        },
    });
    
    example, err := checkpoint.NewManagementCommandSetGlobalProperties(ctx, "managementCommandSetGlobalPropertiesResource", &checkpoint.ManagementCommandSetGlobalPropertiesArgs{
    	AdvancedConf: &checkpoint.ManagementCommandSetGlobalPropertiesAdvancedConfArgs{
    		CertsAndPki: &checkpoint.ManagementCommandSetGlobalPropertiesAdvancedConfCertsAndPkiArgs{
    			CertValidationEnforceKeySize: pulumi.String("string"),
    			HostCertsEcdsaKeySize:        pulumi.String("string"),
    			HostCertsKeySize:             pulumi.String("string"),
    		},
    	},
    	AllowRemoteRegistrationOfOpsecProducts: pulumi.Bool(false),
    	Authentication: &checkpoint.ManagementCommandSetGlobalPropertiesAuthenticationArgs{
    		AllowedSuffixForInternalUsers:                      pulumi.String("string"),
    		AuthInternalUsersWithSpecificSuffix:                pulumi.Bool(false),
    		DelayEachAuthAttemptBy:                             pulumi.Float64(0),
    		EnableDelayedAuth:                                  pulumi.Bool(false),
    		MaxClientAuthAttemptsBeforeConnectionTermination:   pulumi.Float64(0),
    		MaxDaysBeforeExpirationOfNonPulledUserCertificates: pulumi.Float64(0),
    		MaxRloginAttemptsBeforeConnectionTermination:       pulumi.Float64(0),
    		MaxSessionAuthAttemptsBeforeConnectionTermination:  pulumi.Float64(0),
    		MaxTelnetAttemptsBeforeConnectionTermination:       pulumi.Float64(0),
    	},
    	CarrierSecurity: &checkpoint.ManagementCommandSetGlobalPropertiesCarrierSecurityArgs{
    		AggressiveAging:                            pulumi.Bool(false),
    		AggressiveTimeout:                          pulumi.Float64(0),
    		AllowGgsnRepliesFromMultipleInterfaces:     pulumi.Bool(false),
    		BlockGtpInGtp:                              pulumi.Bool(false),
    		EnableGPduSeqNumberCheckWithMaxDeviation:   pulumi.Bool(false),
    		EnableReverseConnections:                   pulumi.Bool(false),
    		EnforceGtpAntiSpoofing:                     pulumi.Bool(false),
    		GPduSeqNumberCheckMaxDeviation:             pulumi.Float64(0),
    		GtpSignalingRateLimitSamplingInterval:      pulumi.Float64(0),
    		MemoryActivationThreshold:                  pulumi.Float64(0),
    		MemoryDeactivationThreshold:                pulumi.Float64(0),
    		OneGtpEchoOnEachPathFrequency:              pulumi.Float64(0),
    		ProduceExtendedLogsOnUnmatchedPdus:         pulumi.Bool(false),
    		ProduceExtendedLogsOnUnmatchedPdusPosition: pulumi.String("string"),
    		ProtocolViolationTrackOption:               pulumi.String("string"),
    		TunnelActivationThreshold:                  pulumi.Float64(0),
    		TunnelDeactivationThreshold:                pulumi.Float64(0),
    		VerifyFlowLabels:                           pulumi.Bool(false),
    	},
    	ConnectControl: &checkpoint.ManagementCommandSetGlobalPropertiesConnectControlArgs{
    		LoadAgentsPort:                  pulumi.Float64(0),
    		LoadMeasurementInterval:         pulumi.Float64(0),
    		PersistenceServerTimeout:        pulumi.Float64(0),
    		ServerAvailabilityCheckInterval: pulumi.Float64(0),
    		ServerCheckRetries:              pulumi.Float64(0),
    	},
    	DataAccessControl: &checkpoint.ManagementCommandSetGlobalPropertiesDataAccessControlArgs{
    		AutoDownloadImportantData:           pulumi.Bool(false),
    		AutoDownloadSwUpdatesAndNewFeatures: pulumi.Bool(false),
    		SendAnonymousInfo:                   pulumi.Bool(false),
    		ShareSensitiveInfo:                  pulumi.Bool(false),
    	},
    	DomainsToProcesses: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Firewall: &checkpoint.ManagementCommandSetGlobalPropertiesFirewallArgs{
    		AcceptControlConnections:                            pulumi.Bool(false),
    		AcceptDomainNameOverTcp:                             pulumi.Bool(false),
    		AcceptDomainNameOverTcpPosition:                     pulumi.String("string"),
    		AcceptDomainNameOverUdp:                             pulumi.Bool(false),
    		AcceptDomainNameOverUdpPosition:                     pulumi.String("string"),
    		AcceptDynamicAddrModulesOutgoingInternetConnections: pulumi.Bool(false),
    		AcceptIcmpRequests:                                  pulumi.Bool(false),
    		AcceptIcmpRequestsPosition:                          pulumi.String("string"),
    		AcceptIdentityAwarenessControlConnections:           pulumi.Bool(false),
    		AcceptIdentityAwarenessControlConnectionsPosition:   pulumi.String("string"),
    		AcceptIncomingTrafficToDhcpAndDnsServicesOfGws:      pulumi.Bool(false),
    		AcceptIps1ManagementConnections:                     pulumi.Bool(false),
    		AcceptOutgoingPacketsOriginatingFromConnectraGw:     pulumi.Bool(false),
    		AcceptOutgoingPacketsOriginatingFromGw:              pulumi.Bool(false),
    		AcceptOutgoingPacketsOriginatingFromGwPosition:      pulumi.String("string"),
    		AcceptOutgoingPacketsToCpOnlineServices:             pulumi.Bool(false),
    		AcceptOutgoingPacketsToCpOnlineServicesPosition:     pulumi.String("string"),
    		AcceptRemoteAccessControlConnections:                pulumi.Bool(false),
    		AcceptRip:                                           pulumi.Bool(false),
    		AcceptRipPosition:                                   pulumi.String("string"),
    		AcceptSmartUpdateConnections:                        pulumi.Bool(false),
    		AcceptVrrpPacketsOriginatingFromClusterMembers:      pulumi.Bool(false),
    		AcceptWebAndSshConnectionsForGwAdministration:       pulumi.Bool(false),
    		LogImpliedRules:                                     pulumi.Bool(false),
    		SecurityServer: &checkpoint.ManagementCommandSetGlobalPropertiesFirewallSecurityServerArgs{
    			ClientAuthWelcomeFile: pulumi.String("string"),
    			FtpWelcomeMsgFile:     pulumi.String("string"),
    			HttpNextProxyHost:     pulumi.String("string"),
    			HttpNextProxyPort:     pulumi.Float64(0),
    			HttpServers: checkpoint.ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServerArray{
    				&checkpoint.ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServerArgs{
    					Host:             pulumi.String("string"),
    					LogicalName:      pulumi.String("string"),
    					Port:             pulumi.Float64(0),
    					Reauthentication: pulumi.String("string"),
    				},
    			},
    			MdqWelcomeMsg:         pulumi.String("string"),
    			RloginWelcomeMsgFile:  pulumi.String("string"),
    			ServerForNullRequests: pulumi.String("string"),
    			SmtpWelcomeMsg:        pulumi.String("string"),
    			TelnetWelcomeMsgFile:  pulumi.String("string"),
    		},
    	},
    	HitCount: &checkpoint.ManagementCommandSetGlobalPropertiesHitCountArgs{
    		EnableHitCount:       pulumi.Bool(false),
    		KeepHitCountDataUpTo: pulumi.String("string"),
    	},
    	IgnoreErrors:   pulumi.Bool(false),
    	IgnoreWarnings: pulumi.Bool(false),
    	LogAndAlerts: checkpoint.ManagementCommandSetGlobalPropertiesLogAndAlertArray{
    		&checkpoint.ManagementCommandSetGlobalPropertiesLogAndAlertArgs{
    			AdministrativeNotifications: pulumi.String("string"),
    			Alerts: &checkpoint.ManagementCommandSetGlobalPropertiesLogAndAlertAlertsArgs{
    				DefaultTrackOptionForSystemAlerts:          pulumi.String("string"),
    				MailAlertScript:                            pulumi.String("string"),
    				PopupAlertScript:                           pulumi.String("string"),
    				SendMailAlertToSmartviewMonitor:            pulumi.Bool(false),
    				SendPopupAlertToSmartviewMonitor:           pulumi.Bool(false),
    				SendSnmpTrapAlertToSmartviewMonitor:        pulumi.Bool(false),
    				SendUserDefinedAlertNum1ToSmartviewMonitor: pulumi.Bool(false),
    				SendUserDefinedAlertNum2ToSmartviewMonitor: pulumi.Bool(false),
    				SendUserDefinedAlertNum3ToSmartviewMonitor: pulumi.Bool(false),
    				SnmpTrapAlertScript:                        pulumi.String("string"),
    				UserDefinedScriptNum1:                      pulumi.String("string"),
    				UserDefinedScriptNum2:                      pulumi.String("string"),
    				UserDefinedScriptNum3:                      pulumi.String("string"),
    			},
    			ConnectionMatchedBySam:              pulumi.String("string"),
    			DynamicObjectResolutionFailure:      pulumi.String("string"),
    			LogEveryAuthenticatedHttpConnection: pulumi.Bool(false),
    			LogTraffic:                          pulumi.String("string"),
    			PacketIsIncorrectlyTagged:           pulumi.String("string"),
    			PacketTaggingBruteForceAttack:       pulumi.String("string"),
    			SlaViolation:                        pulumi.String("string"),
    			TimeSettings: &checkpoint.ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettingsArgs{
    				ExcessiveLogGracePeriod:              pulumi.Float64(0),
    				LogsResolvingTimeout:                 pulumi.Float64(0),
    				StatusFetchingInterval:               pulumi.Float64(0),
    				VirtualLinkStatisticsLoggingInterval: pulumi.Float64(0),
    			},
    			VpnConfAndKeyExchangeErrors: pulumi.String("string"),
    			VpnPacketHandlingError:      pulumi.String("string"),
    			VpnSuccessfulKeyExchange:    pulumi.String("string"),
    		},
    	},
    	ManagementCommandSetGlobalPropertiesId: pulumi.String("string"),
    	Nat: &checkpoint.ManagementCommandSetGlobalPropertiesNatArgs{
    		AddrAllocAndReleaseTrack:          pulumi.String("string"),
    		AddrExhaustionTrack:               pulumi.String("string"),
    		AllowBiDirectionalNat:             pulumi.Bool(false),
    		AutoArpConf:                       pulumi.Bool(false),
    		AutoTranslateDestOnClientSide:     pulumi.Bool(false),
    		EnableIpPoolNat:                   pulumi.Bool(false),
    		ManuallyTranslateDestOnClientSide: pulumi.Bool(false),
    		MergeManualProxyArpConf:           pulumi.Bool(false),
    	},
    	NonUniqueIpAddressRanges: checkpoint.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArray{
    		&checkpoint.ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs{
    			AddressType:      pulumi.String("string"),
    			FirstIpv4Address: pulumi.String("string"),
    			FirstIpv6Address: pulumi.String("string"),
    			LastIpv4Address:  pulumi.String("string"),
    			LastIpv6Address:  pulumi.String("string"),
    		},
    	},
    	NumSpoofingErrsThatTriggerBruteForce: pulumi.Float64(0),
    	Proxy: &checkpoint.ManagementCommandSetGlobalPropertiesProxyArgs{
    		ProxyAddress:   pulumi.String("string"),
    		ProxyPort:      pulumi.Float64(0),
    		UseProxyServer: pulumi.Bool(false),
    	},
    	Qos: &checkpoint.ManagementCommandSetGlobalPropertiesQosArgs{
    		AuthenticatedIpExpiration:     pulumi.Float64(0),
    		DefaultWeightOfRule:           pulumi.Float64(0),
    		MaxWeightOfRule:               pulumi.Float64(0),
    		NonAuthenticatedIpExpiration:  pulumi.Float64(0),
    		UnansweredQueriedIpExpiration: pulumi.Float64(0),
    		UnitOfMeasure:                 pulumi.String("string"),
    	},
    	RemoteAccesses: checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessArray{
    		&checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessArgs{
    			EnableBackConnections: pulumi.Bool(false),
    			EncryptDnsTraffic:     pulumi.Bool(false),
    			EndpointConnect: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectArgs{
    				CachePasswordTimeout:              pulumi.Float64(0),
    				ClientUpgradeMode:                 pulumi.String("string"),
    				ConnectMode:                       pulumi.String("string"),
    				DisconnectWhenConnToNetworkIsLost: pulumi.String("string"),
    				DisconnectWhenDeviceIsIdle:        pulumi.String("string"),
    				EnablePasswordCaching:             pulumi.String("string"),
    				NetworkLocationAwareness:          pulumi.String("string"),
    				NetworkLocationAwarenessConf: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConfArgs{
    					ConsiderUndefinedDnsSuffixesAsExternal: pulumi.Bool(false),
    					ConsiderWirelessNetworksAsExternal:     pulumi.Bool(false),
    					DnsSuffixes: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					ExcludedInternalWirelessNetworks: pulumi.StringArray{
    						pulumi.String("string"),
    					},
    					NetworkOrGroupOfConnVpnClient:                                pulumi.String("string"),
    					RememberPreviouslyDetectedExternalNetworks:                   pulumi.Bool(false),
    					VpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient: pulumi.String("string"),
    				},
    				ReAuthUserInterval:  pulumi.Float64(0),
    				RouteAllTrafficToGw: pulumi.String("string"),
    			},
    			HotSpotAndHotelRegistration: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistrationArgs{
    				EnableRegistration:            pulumi.Bool(false),
    				LocalSubnetsAccessOnly:        pulumi.Bool(false),
    				MaxIpAccessDuringRegistration: pulumi.Float64(0),
    				Ports: pulumi.StringArray{
    					pulumi.String("string"),
    				},
    				RegistrationTimeout: pulumi.Float64(0),
    				TrackLog:            pulumi.Bool(false),
    			},
    			KeepAlivePacketToGwInterval: pulumi.Float64(0),
    			Scv: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessScvArgs{
    				ApplyScvOnSimplifiedModeFwPolicies: pulumi.Bool(false),
    				Exceptions: checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessScvExceptionArray{
    					&checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessScvExceptionArgs{
    						Hosts: pulumi.StringArray{
    							pulumi.String("string"),
    						},
    						Services: pulumi.StringArray{
    							pulumi.String("string"),
    						},
    					},
    				},
    				GenerateLog:                                  pulumi.Bool(false),
    				NoScvForUnsupportedCpClients:                 pulumi.Bool(false),
    				NotifyUser:                                   pulumi.Bool(false),
    				OnlyTcpIpProtocolsAreUsed:                    pulumi.Bool(false),
    				PolicyInstalledOnAllInterfaces:               pulumi.Bool(false),
    				UponVerificationAcceptAndLogClientConnection: pulumi.Bool(false),
    			},
    			SecureClientMobile: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobileArgs{
    				AutomaticallyInitiateDialup: pulumi.String("string"),
    				CachePasswordTimeout:        pulumi.Float64(0),
    				ConnectMode:                 pulumi.String("string"),
    				DisconnectWhenDeviceIsIdle:  pulumi.String("string"),
    				EnablePasswordCaching:       pulumi.String("string"),
    				ReAuthUserInterval:          pulumi.Float64(0),
    				RouteAllTrafficToGw:         pulumi.String("string"),
    				SupportedEncryptionMethods:  pulumi.String("string"),
    				UserAuthMethod:              pulumi.String("string"),
    			},
    			SimultaneousLoginMode: pulumi.String("string"),
    			SslNetworkExtender: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtenderArgs{
    				ClientOutgoingKeepAlivePacketsFrequency:          pulumi.Float64(0),
    				ClientUninstallUponDisconnection:                 pulumi.String("string"),
    				ClientUpgradeUponConnection:                      pulumi.String("string"),
    				ReAuthUserInterval:                               pulumi.Float64(0),
    				ScanEpMachineForComplianceWithEpCompliancePolicy: pulumi.Bool(false),
    				SupportedEncryptionMethods:                       pulumi.String("string"),
    				UserAuthMethod:                                   pulumi.String("string"),
    			},
    			VpnAdvanced: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvancedArgs{
    				AllowClearTrafficToEncryptionDomainWhenDisconnected:  pulumi.Bool(false),
    				EnableLoadDistributionForMepConf:                     pulumi.Bool(false),
    				UseFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite: pulumi.Bool(false),
    			},
    			VpnAuthenticationAndEncryptions: checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionArray{
    				&checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionArgs{
    					EncryptionAlgorithms: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsArgs{
    						Ike: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeArgs{
    							SupportDataIntegrity: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrityArgs{
    								AesXcbc: pulumi.Bool(false),
    								Md5:     pulumi.Bool(false),
    								Sha1:    pulumi.Bool(false),
    								Sha256:  pulumi.Bool(false),
    							},
    							SupportDiffieHellmanGroups: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroupsArgs{
    								Group1:  pulumi.Bool(false),
    								Group14: pulumi.Bool(false),
    								Group2:  pulumi.Bool(false),
    								Group5:  pulumi.Bool(false),
    							},
    							SupportEncryptionAlgorithms: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithmsArgs{
    								Aes128: pulumi.Bool(false),
    								Aes256: pulumi.Bool(false),
    								Des:    pulumi.Bool(false),
    								Tdes:   pulumi.Bool(false),
    							},
    							UseDataIntegrity:       pulumi.String("string"),
    							UseDiffieHellmanGroup:  pulumi.String("string"),
    							UseEncryptionAlgorithm: pulumi.String("string"),
    						},
    						Ipsec: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecArgs{
    							EnforceEncryptionAlgAndDataIntegrityOnAllUsers: pulumi.Bool(false),
    							SupportDataIntegrity: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrityArgs{
    								AesXcbc: pulumi.Bool(false),
    								Md5:     pulumi.Bool(false),
    								Sha1:    pulumi.Bool(false),
    								Sha256:  pulumi.Bool(false),
    							},
    							SupportEncryptionAlgorithms: &checkpoint.ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithmsArgs{
    								Aes128: pulumi.Bool(false),
    								Aes256: pulumi.Bool(false),
    								Des:    pulumi.Bool(false),
    								Tdes:   pulumi.Bool(false),
    							},
    							UseDataIntegrity:       pulumi.String("string"),
    							UseEncryptionAlgorithm: pulumi.String("string"),
    						},
    					},
    					EncryptionMethod:                       pulumi.String("string"),
    					L2tpPreSharedKey:                       pulumi.String("string"),
    					PreSharedSecret:                        pulumi.Bool(false),
    					SupportL2tpWithPreSharedKey:            pulumi.Bool(false),
    					SupportLegacyAuthForScL2tpNokiaClients: pulumi.Bool(false),
    					SupportLegacyEap:                       pulumi.Bool(false),
    				},
    			},
    		},
    	},
    	StatefulInspection: &checkpoint.ManagementCommandSetGlobalPropertiesStatefulInspectionArgs{
    		AcceptStatefulIcmpErrors:                                pulumi.Bool(false),
    		AcceptStatefulIcmpReplies:                               pulumi.Bool(false),
    		AcceptStatefulOtherIpProtocolsRepliesForUnknownServices: pulumi.Bool(false),
    		AcceptStatefulUdpRepliesForUnknownServices:              pulumi.Bool(false),
    		DropOutOfStateIcmpPackets:                               pulumi.Bool(false),
    		DropOutOfStateSctpPackets:                               pulumi.Bool(false),
    		DropOutOfStateTcpPackets:                                pulumi.Bool(false),
    		IcmpVirtualSessionTimeout:                               pulumi.Float64(0),
    		LogOnDropOutOfStateIcmpPackets:                          pulumi.Bool(false),
    		LogOnDropOutOfStateSctpPackets:                          pulumi.Bool(false),
    		LogOnDropOutOfStateTcpPackets:                           pulumi.Bool(false),
    		OtherIpProtocolsVirtualSessionTimeout:                   pulumi.Float64(0),
    		SctpEndTimeout:                                          pulumi.Float64(0),
    		SctpSessionTimeout:                                      pulumi.Float64(0),
    		SctpStartTimeout:                                        pulumi.Float64(0),
    		TcpEndTimeout:                                           pulumi.Float64(0),
    		TcpEndTimeoutR8020GwAndAbove:                            pulumi.Float64(0),
    		TcpOutOfStateDropExceptions: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		TcpSessionTimeout:        pulumi.Float64(0),
    		TcpStartTimeout:          pulumi.Float64(0),
    		UdpVirtualSessionTimeout: pulumi.Float64(0),
    	},
    	UserAccounts: &checkpoint.ManagementCommandSetGlobalPropertiesUserAccountsArgs{
    		DaysUntilExpiration:  pulumi.Float64(0),
    		ExpirationDate:       pulumi.String("string"),
    		ExpirationDateMethod: pulumi.String("string"),
    		ShowAccountsExpirationIndicationDaysInAdvance: pulumi.Bool(false),
    	},
    	UserAuthority: &checkpoint.ManagementCommandSetGlobalPropertiesUserAuthorityArgs{
    		DisplayWebAccessView: pulumi.Bool(false),
    		TrustOnlyFollowingWindowsDomains: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    		WindowsDomainsToTrust: pulumi.String("string"),
    	},
    	UserCheck: &checkpoint.ManagementCommandSetGlobalPropertiesUserCheckArgs{
    		PreferredLanguage:         pulumi.String("string"),
    		SendEmailsUsingMailServer: pulumi.String("string"),
    	},
    	UserDirectory: &checkpoint.ManagementCommandSetGlobalPropertiesUserDirectoryArgs{
    		CacheSize:            pulumi.Float64(0),
    		DisplayUserDnAtLogin: pulumi.String("string"),
    		EnablePasswordChangeWhenUserActiveDirectoryExpires: pulumi.Bool(false),
    		EnablePasswordExpirationConfiguration:              pulumi.Bool(false),
    		EnforceRulesForUserMgmtAdmins:                      pulumi.Bool(false),
    		MinPasswordLength:                                  pulumi.Float64(0),
    		PasswordExpiresAfter:                               pulumi.Float64(0),
    		PasswordMustIncludeADigit:                          pulumi.Bool(false),
    		PasswordMustIncludeASymbol:                         pulumi.Bool(false),
    		PasswordMustIncludeLowercaseChar:                   pulumi.Bool(false),
    		PasswordMustIncludeUppercaseChar:                   pulumi.Bool(false),
    		TimeoutOnCachedUsers:                               pulumi.Float64(0),
    	},
    	Vpn: &checkpoint.ManagementCommandSetGlobalPropertiesVpnArgs{
    		DomainNameForDnsResolving:                       pulumi.String("string"),
    		EnableBackupGw:                                  pulumi.Bool(false),
    		EnableDecryptOnAcceptForGwToGwTraffic:           pulumi.Bool(false),
    		EnableLoadDistributionForMepConf:                pulumi.Bool(false),
    		EnableVpnDirectionalMatchInVpnColumn:            pulumi.Bool(false),
    		GracePeriodAfterTheCrlIsNotValid:                pulumi.Float64(0),
    		GracePeriodBeforeTheCrlIsValid:                  pulumi.Float64(0),
    		GracePeriodExtensionForSecureRemoteSecureClient: pulumi.Float64(0),
    		SupportIkeDosProtectionFromIdentifiedSrc:        pulumi.String("string"),
    		SupportIkeDosProtectionFromUnidentifiedSrc:      pulumi.String("string"),
    		VpnConfMethod:                                   pulumi.String("string"),
    	},
    })
    
    var managementCommandSetGlobalPropertiesResource = new ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", ManagementCommandSetGlobalPropertiesArgs.builder()
        .advancedConf(ManagementCommandSetGlobalPropertiesAdvancedConfArgs.builder()
            .certsAndPki(ManagementCommandSetGlobalPropertiesAdvancedConfCertsAndPkiArgs.builder()
                .certValidationEnforceKeySize("string")
                .hostCertsEcdsaKeySize("string")
                .hostCertsKeySize("string")
                .build())
            .build())
        .allowRemoteRegistrationOfOpsecProducts(false)
        .authentication(ManagementCommandSetGlobalPropertiesAuthenticationArgs.builder()
            .allowedSuffixForInternalUsers("string")
            .authInternalUsersWithSpecificSuffix(false)
            .delayEachAuthAttemptBy(0.0)
            .enableDelayedAuth(false)
            .maxClientAuthAttemptsBeforeConnectionTermination(0.0)
            .maxDaysBeforeExpirationOfNonPulledUserCertificates(0.0)
            .maxRloginAttemptsBeforeConnectionTermination(0.0)
            .maxSessionAuthAttemptsBeforeConnectionTermination(0.0)
            .maxTelnetAttemptsBeforeConnectionTermination(0.0)
            .build())
        .carrierSecurity(ManagementCommandSetGlobalPropertiesCarrierSecurityArgs.builder()
            .aggressiveAging(false)
            .aggressiveTimeout(0.0)
            .allowGgsnRepliesFromMultipleInterfaces(false)
            .blockGtpInGtp(false)
            .enableGPduSeqNumberCheckWithMaxDeviation(false)
            .enableReverseConnections(false)
            .enforceGtpAntiSpoofing(false)
            .gPduSeqNumberCheckMaxDeviation(0.0)
            .gtpSignalingRateLimitSamplingInterval(0.0)
            .memoryActivationThreshold(0.0)
            .memoryDeactivationThreshold(0.0)
            .oneGtpEchoOnEachPathFrequency(0.0)
            .produceExtendedLogsOnUnmatchedPdus(false)
            .produceExtendedLogsOnUnmatchedPdusPosition("string")
            .protocolViolationTrackOption("string")
            .tunnelActivationThreshold(0.0)
            .tunnelDeactivationThreshold(0.0)
            .verifyFlowLabels(false)
            .build())
        .connectControl(ManagementCommandSetGlobalPropertiesConnectControlArgs.builder()
            .loadAgentsPort(0.0)
            .loadMeasurementInterval(0.0)
            .persistenceServerTimeout(0.0)
            .serverAvailabilityCheckInterval(0.0)
            .serverCheckRetries(0.0)
            .build())
        .dataAccessControl(ManagementCommandSetGlobalPropertiesDataAccessControlArgs.builder()
            .autoDownloadImportantData(false)
            .autoDownloadSwUpdatesAndNewFeatures(false)
            .sendAnonymousInfo(false)
            .shareSensitiveInfo(false)
            .build())
        .domainsToProcesses("string")
        .firewall(ManagementCommandSetGlobalPropertiesFirewallArgs.builder()
            .acceptControlConnections(false)
            .acceptDomainNameOverTcp(false)
            .acceptDomainNameOverTcpPosition("string")
            .acceptDomainNameOverUdp(false)
            .acceptDomainNameOverUdpPosition("string")
            .acceptDynamicAddrModulesOutgoingInternetConnections(false)
            .acceptIcmpRequests(false)
            .acceptIcmpRequestsPosition("string")
            .acceptIdentityAwarenessControlConnections(false)
            .acceptIdentityAwarenessControlConnectionsPosition("string")
            .acceptIncomingTrafficToDhcpAndDnsServicesOfGws(false)
            .acceptIps1ManagementConnections(false)
            .acceptOutgoingPacketsOriginatingFromConnectraGw(false)
            .acceptOutgoingPacketsOriginatingFromGw(false)
            .acceptOutgoingPacketsOriginatingFromGwPosition("string")
            .acceptOutgoingPacketsToCpOnlineServices(false)
            .acceptOutgoingPacketsToCpOnlineServicesPosition("string")
            .acceptRemoteAccessControlConnections(false)
            .acceptRip(false)
            .acceptRipPosition("string")
            .acceptSmartUpdateConnections(false)
            .acceptVrrpPacketsOriginatingFromClusterMembers(false)
            .acceptWebAndSshConnectionsForGwAdministration(false)
            .logImpliedRules(false)
            .securityServer(ManagementCommandSetGlobalPropertiesFirewallSecurityServerArgs.builder()
                .clientAuthWelcomeFile("string")
                .ftpWelcomeMsgFile("string")
                .httpNextProxyHost("string")
                .httpNextProxyPort(0.0)
                .httpServers(ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServerArgs.builder()
                    .host("string")
                    .logicalName("string")
                    .port(0.0)
                    .reauthentication("string")
                    .build())
                .mdqWelcomeMsg("string")
                .rloginWelcomeMsgFile("string")
                .serverForNullRequests("string")
                .smtpWelcomeMsg("string")
                .telnetWelcomeMsgFile("string")
                .build())
            .build())
        .hitCount(ManagementCommandSetGlobalPropertiesHitCountArgs.builder()
            .enableHitCount(false)
            .keepHitCountDataUpTo("string")
            .build())
        .ignoreErrors(false)
        .ignoreWarnings(false)
        .logAndAlerts(ManagementCommandSetGlobalPropertiesLogAndAlertArgs.builder()
            .administrativeNotifications("string")
            .alerts(ManagementCommandSetGlobalPropertiesLogAndAlertAlertsArgs.builder()
                .defaultTrackOptionForSystemAlerts("string")
                .mailAlertScript("string")
                .popupAlertScript("string")
                .sendMailAlertToSmartviewMonitor(false)
                .sendPopupAlertToSmartviewMonitor(false)
                .sendSnmpTrapAlertToSmartviewMonitor(false)
                .sendUserDefinedAlertNum1ToSmartviewMonitor(false)
                .sendUserDefinedAlertNum2ToSmartviewMonitor(false)
                .sendUserDefinedAlertNum3ToSmartviewMonitor(false)
                .snmpTrapAlertScript("string")
                .userDefinedScriptNum1("string")
                .userDefinedScriptNum2("string")
                .userDefinedScriptNum3("string")
                .build())
            .connectionMatchedBySam("string")
            .dynamicObjectResolutionFailure("string")
            .logEveryAuthenticatedHttpConnection(false)
            .logTraffic("string")
            .packetIsIncorrectlyTagged("string")
            .packetTaggingBruteForceAttack("string")
            .slaViolation("string")
            .timeSettings(ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettingsArgs.builder()
                .excessiveLogGracePeriod(0.0)
                .logsResolvingTimeout(0.0)
                .statusFetchingInterval(0.0)
                .virtualLinkStatisticsLoggingInterval(0.0)
                .build())
            .vpnConfAndKeyExchangeErrors("string")
            .vpnPacketHandlingError("string")
            .vpnSuccessfulKeyExchange("string")
            .build())
        .managementCommandSetGlobalPropertiesId("string")
        .nat(ManagementCommandSetGlobalPropertiesNatArgs.builder()
            .addrAllocAndReleaseTrack("string")
            .addrExhaustionTrack("string")
            .allowBiDirectionalNat(false)
            .autoArpConf(false)
            .autoTranslateDestOnClientSide(false)
            .enableIpPoolNat(false)
            .manuallyTranslateDestOnClientSide(false)
            .mergeManualProxyArpConf(false)
            .build())
        .nonUniqueIpAddressRanges(ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs.builder()
            .addressType("string")
            .firstIpv4Address("string")
            .firstIpv6Address("string")
            .lastIpv4Address("string")
            .lastIpv6Address("string")
            .build())
        .numSpoofingErrsThatTriggerBruteForce(0.0)
        .proxy(ManagementCommandSetGlobalPropertiesProxyArgs.builder()
            .proxyAddress("string")
            .proxyPort(0.0)
            .useProxyServer(false)
            .build())
        .qos(ManagementCommandSetGlobalPropertiesQosArgs.builder()
            .authenticatedIpExpiration(0.0)
            .defaultWeightOfRule(0.0)
            .maxWeightOfRule(0.0)
            .nonAuthenticatedIpExpiration(0.0)
            .unansweredQueriedIpExpiration(0.0)
            .unitOfMeasure("string")
            .build())
        .remoteAccesses(ManagementCommandSetGlobalPropertiesRemoteAccessArgs.builder()
            .enableBackConnections(false)
            .encryptDnsTraffic(false)
            .endpointConnect(ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectArgs.builder()
                .cachePasswordTimeout(0.0)
                .clientUpgradeMode("string")
                .connectMode("string")
                .disconnectWhenConnToNetworkIsLost("string")
                .disconnectWhenDeviceIsIdle("string")
                .enablePasswordCaching("string")
                .networkLocationAwareness("string")
                .networkLocationAwarenessConf(ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConfArgs.builder()
                    .considerUndefinedDnsSuffixesAsExternal(false)
                    .considerWirelessNetworksAsExternal(false)
                    .dnsSuffixes("string")
                    .excludedInternalWirelessNetworks("string")
                    .networkOrGroupOfConnVpnClient("string")
                    .rememberPreviouslyDetectedExternalNetworks(false)
                    .vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient("string")
                    .build())
                .reAuthUserInterval(0.0)
                .routeAllTrafficToGw("string")
                .build())
            .hotSpotAndHotelRegistration(ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistrationArgs.builder()
                .enableRegistration(false)
                .localSubnetsAccessOnly(false)
                .maxIpAccessDuringRegistration(0.0)
                .ports("string")
                .registrationTimeout(0.0)
                .trackLog(false)
                .build())
            .keepAlivePacketToGwInterval(0.0)
            .scv(ManagementCommandSetGlobalPropertiesRemoteAccessScvArgs.builder()
                .applyScvOnSimplifiedModeFwPolicies(false)
                .exceptions(ManagementCommandSetGlobalPropertiesRemoteAccessScvExceptionArgs.builder()
                    .hosts("string")
                    .services("string")
                    .build())
                .generateLog(false)
                .noScvForUnsupportedCpClients(false)
                .notifyUser(false)
                .onlyTcpIpProtocolsAreUsed(false)
                .policyInstalledOnAllInterfaces(false)
                .uponVerificationAcceptAndLogClientConnection(false)
                .build())
            .secureClientMobile(ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobileArgs.builder()
                .automaticallyInitiateDialup("string")
                .cachePasswordTimeout(0.0)
                .connectMode("string")
                .disconnectWhenDeviceIsIdle("string")
                .enablePasswordCaching("string")
                .reAuthUserInterval(0.0)
                .routeAllTrafficToGw("string")
                .supportedEncryptionMethods("string")
                .userAuthMethod("string")
                .build())
            .simultaneousLoginMode("string")
            .sslNetworkExtender(ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtenderArgs.builder()
                .clientOutgoingKeepAlivePacketsFrequency(0.0)
                .clientUninstallUponDisconnection("string")
                .clientUpgradeUponConnection("string")
                .reAuthUserInterval(0.0)
                .scanEpMachineForComplianceWithEpCompliancePolicy(false)
                .supportedEncryptionMethods("string")
                .userAuthMethod("string")
                .build())
            .vpnAdvanced(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvancedArgs.builder()
                .allowClearTrafficToEncryptionDomainWhenDisconnected(false)
                .enableLoadDistributionForMepConf(false)
                .useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite(false)
                .build())
            .vpnAuthenticationAndEncryptions(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionArgs.builder()
                .encryptionAlgorithms(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsArgs.builder()
                    .ike(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeArgs.builder()
                        .supportDataIntegrity(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrityArgs.builder()
                            .aesXcbc(false)
                            .md5(false)
                            .sha1(false)
                            .sha256(false)
                            .build())
                        .supportDiffieHellmanGroups(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroupsArgs.builder()
                            .group1(false)
                            .group14(false)
                            .group2(false)
                            .group5(false)
                            .build())
                        .supportEncryptionAlgorithms(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithmsArgs.builder()
                            .aes128(false)
                            .aes256(false)
                            .des(false)
                            .tdes(false)
                            .build())
                        .useDataIntegrity("string")
                        .useDiffieHellmanGroup("string")
                        .useEncryptionAlgorithm("string")
                        .build())
                    .ipsec(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecArgs.builder()
                        .enforceEncryptionAlgAndDataIntegrityOnAllUsers(false)
                        .supportDataIntegrity(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrityArgs.builder()
                            .aesXcbc(false)
                            .md5(false)
                            .sha1(false)
                            .sha256(false)
                            .build())
                        .supportEncryptionAlgorithms(ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithmsArgs.builder()
                            .aes128(false)
                            .aes256(false)
                            .des(false)
                            .tdes(false)
                            .build())
                        .useDataIntegrity("string")
                        .useEncryptionAlgorithm("string")
                        .build())
                    .build())
                .encryptionMethod("string")
                .l2tpPreSharedKey("string")
                .preSharedSecret(false)
                .supportL2tpWithPreSharedKey(false)
                .supportLegacyAuthForScL2tpNokiaClients(false)
                .supportLegacyEap(false)
                .build())
            .build())
        .statefulInspection(ManagementCommandSetGlobalPropertiesStatefulInspectionArgs.builder()
            .acceptStatefulIcmpErrors(false)
            .acceptStatefulIcmpReplies(false)
            .acceptStatefulOtherIpProtocolsRepliesForUnknownServices(false)
            .acceptStatefulUdpRepliesForUnknownServices(false)
            .dropOutOfStateIcmpPackets(false)
            .dropOutOfStateSctpPackets(false)
            .dropOutOfStateTcpPackets(false)
            .icmpVirtualSessionTimeout(0.0)
            .logOnDropOutOfStateIcmpPackets(false)
            .logOnDropOutOfStateSctpPackets(false)
            .logOnDropOutOfStateTcpPackets(false)
            .otherIpProtocolsVirtualSessionTimeout(0.0)
            .sctpEndTimeout(0.0)
            .sctpSessionTimeout(0.0)
            .sctpStartTimeout(0.0)
            .tcpEndTimeout(0.0)
            .tcpEndTimeoutR8020GwAndAbove(0.0)
            .tcpOutOfStateDropExceptions("string")
            .tcpSessionTimeout(0.0)
            .tcpStartTimeout(0.0)
            .udpVirtualSessionTimeout(0.0)
            .build())
        .userAccounts(ManagementCommandSetGlobalPropertiesUserAccountsArgs.builder()
            .daysUntilExpiration(0.0)
            .expirationDate("string")
            .expirationDateMethod("string")
            .showAccountsExpirationIndicationDaysInAdvance(false)
            .build())
        .userAuthority(ManagementCommandSetGlobalPropertiesUserAuthorityArgs.builder()
            .displayWebAccessView(false)
            .trustOnlyFollowingWindowsDomains("string")
            .windowsDomainsToTrust("string")
            .build())
        .userCheck(ManagementCommandSetGlobalPropertiesUserCheckArgs.builder()
            .preferredLanguage("string")
            .sendEmailsUsingMailServer("string")
            .build())
        .userDirectory(ManagementCommandSetGlobalPropertiesUserDirectoryArgs.builder()
            .cacheSize(0.0)
            .displayUserDnAtLogin("string")
            .enablePasswordChangeWhenUserActiveDirectoryExpires(false)
            .enablePasswordExpirationConfiguration(false)
            .enforceRulesForUserMgmtAdmins(false)
            .minPasswordLength(0.0)
            .passwordExpiresAfter(0.0)
            .passwordMustIncludeADigit(false)
            .passwordMustIncludeASymbol(false)
            .passwordMustIncludeLowercaseChar(false)
            .passwordMustIncludeUppercaseChar(false)
            .timeoutOnCachedUsers(0.0)
            .build())
        .vpn(ManagementCommandSetGlobalPropertiesVpnArgs.builder()
            .domainNameForDnsResolving("string")
            .enableBackupGw(false)
            .enableDecryptOnAcceptForGwToGwTraffic(false)
            .enableLoadDistributionForMepConf(false)
            .enableVpnDirectionalMatchInVpnColumn(false)
            .gracePeriodAfterTheCrlIsNotValid(0.0)
            .gracePeriodBeforeTheCrlIsValid(0.0)
            .gracePeriodExtensionForSecureRemoteSecureClient(0.0)
            .supportIkeDosProtectionFromIdentifiedSrc("string")
            .supportIkeDosProtectionFromUnidentifiedSrc("string")
            .vpnConfMethod("string")
            .build())
        .build());
    
    management_command_set_global_properties_resource = checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource",
        advanced_conf={
            "certs_and_pki": {
                "cert_validation_enforce_key_size": "string",
                "host_certs_ecdsa_key_size": "string",
                "host_certs_key_size": "string",
            },
        },
        allow_remote_registration_of_opsec_products=False,
        authentication={
            "allowed_suffix_for_internal_users": "string",
            "auth_internal_users_with_specific_suffix": False,
            "delay_each_auth_attempt_by": float(0),
            "enable_delayed_auth": False,
            "max_client_auth_attempts_before_connection_termination": float(0),
            "max_days_before_expiration_of_non_pulled_user_certificates": float(0),
            "max_rlogin_attempts_before_connection_termination": float(0),
            "max_session_auth_attempts_before_connection_termination": float(0),
            "max_telnet_attempts_before_connection_termination": float(0),
        },
        carrier_security={
            "aggressive_aging": False,
            "aggressive_timeout": float(0),
            "allow_ggsn_replies_from_multiple_interfaces": False,
            "block_gtp_in_gtp": False,
            "enable_g_pdu_seq_number_check_with_max_deviation": False,
            "enable_reverse_connections": False,
            "enforce_gtp_anti_spoofing": False,
            "g_pdu_seq_number_check_max_deviation": float(0),
            "gtp_signaling_rate_limit_sampling_interval": float(0),
            "memory_activation_threshold": float(0),
            "memory_deactivation_threshold": float(0),
            "one_gtp_echo_on_each_path_frequency": float(0),
            "produce_extended_logs_on_unmatched_pdus": False,
            "produce_extended_logs_on_unmatched_pdus_position": "string",
            "protocol_violation_track_option": "string",
            "tunnel_activation_threshold": float(0),
            "tunnel_deactivation_threshold": float(0),
            "verify_flow_labels": False,
        },
        connect_control={
            "load_agents_port": float(0),
            "load_measurement_interval": float(0),
            "persistence_server_timeout": float(0),
            "server_availability_check_interval": float(0),
            "server_check_retries": float(0),
        },
        data_access_control={
            "auto_download_important_data": False,
            "auto_download_sw_updates_and_new_features": False,
            "send_anonymous_info": False,
            "share_sensitive_info": False,
        },
        domains_to_processes=["string"],
        firewall={
            "accept_control_connections": False,
            "accept_domain_name_over_tcp": False,
            "accept_domain_name_over_tcp_position": "string",
            "accept_domain_name_over_udp": False,
            "accept_domain_name_over_udp_position": "string",
            "accept_dynamic_addr_modules_outgoing_internet_connections": False,
            "accept_icmp_requests": False,
            "accept_icmp_requests_position": "string",
            "accept_identity_awareness_control_connections": False,
            "accept_identity_awareness_control_connections_position": "string",
            "accept_incoming_traffic_to_dhcp_and_dns_services_of_gws": False,
            "accept_ips1_management_connections": False,
            "accept_outgoing_packets_originating_from_connectra_gw": False,
            "accept_outgoing_packets_originating_from_gw": False,
            "accept_outgoing_packets_originating_from_gw_position": "string",
            "accept_outgoing_packets_to_cp_online_services": False,
            "accept_outgoing_packets_to_cp_online_services_position": "string",
            "accept_remote_access_control_connections": False,
            "accept_rip": False,
            "accept_rip_position": "string",
            "accept_smart_update_connections": False,
            "accept_vrrp_packets_originating_from_cluster_members": False,
            "accept_web_and_ssh_connections_for_gw_administration": False,
            "log_implied_rules": False,
            "security_server": {
                "client_auth_welcome_file": "string",
                "ftp_welcome_msg_file": "string",
                "http_next_proxy_host": "string",
                "http_next_proxy_port": float(0),
                "http_servers": [{
                    "host": "string",
                    "logical_name": "string",
                    "port": float(0),
                    "reauthentication": "string",
                }],
                "mdq_welcome_msg": "string",
                "rlogin_welcome_msg_file": "string",
                "server_for_null_requests": "string",
                "smtp_welcome_msg": "string",
                "telnet_welcome_msg_file": "string",
            },
        },
        hit_count={
            "enable_hit_count": False,
            "keep_hit_count_data_up_to": "string",
        },
        ignore_errors=False,
        ignore_warnings=False,
        log_and_alerts=[{
            "administrative_notifications": "string",
            "alerts": {
                "default_track_option_for_system_alerts": "string",
                "mail_alert_script": "string",
                "popup_alert_script": "string",
                "send_mail_alert_to_smartview_monitor": False,
                "send_popup_alert_to_smartview_monitor": False,
                "send_snmp_trap_alert_to_smartview_monitor": False,
                "send_user_defined_alert_num1_to_smartview_monitor": False,
                "send_user_defined_alert_num2_to_smartview_monitor": False,
                "send_user_defined_alert_num3_to_smartview_monitor": False,
                "snmp_trap_alert_script": "string",
                "user_defined_script_num1": "string",
                "user_defined_script_num2": "string",
                "user_defined_script_num3": "string",
            },
            "connection_matched_by_sam": "string",
            "dynamic_object_resolution_failure": "string",
            "log_every_authenticated_http_connection": False,
            "log_traffic": "string",
            "packet_is_incorrectly_tagged": "string",
            "packet_tagging_brute_force_attack": "string",
            "sla_violation": "string",
            "time_settings": {
                "excessive_log_grace_period": float(0),
                "logs_resolving_timeout": float(0),
                "status_fetching_interval": float(0),
                "virtual_link_statistics_logging_interval": float(0),
            },
            "vpn_conf_and_key_exchange_errors": "string",
            "vpn_packet_handling_error": "string",
            "vpn_successful_key_exchange": "string",
        }],
        management_command_set_global_properties_id="string",
        nat={
            "addr_alloc_and_release_track": "string",
            "addr_exhaustion_track": "string",
            "allow_bi_directional_nat": False,
            "auto_arp_conf": False,
            "auto_translate_dest_on_client_side": False,
            "enable_ip_pool_nat": False,
            "manually_translate_dest_on_client_side": False,
            "merge_manual_proxy_arp_conf": False,
        },
        non_unique_ip_address_ranges=[{
            "address_type": "string",
            "first_ipv4_address": "string",
            "first_ipv6_address": "string",
            "last_ipv4_address": "string",
            "last_ipv6_address": "string",
        }],
        num_spoofing_errs_that_trigger_brute_force=float(0),
        proxy={
            "proxy_address": "string",
            "proxy_port": float(0),
            "use_proxy_server": False,
        },
        qos={
            "authenticated_ip_expiration": float(0),
            "default_weight_of_rule": float(0),
            "max_weight_of_rule": float(0),
            "non_authenticated_ip_expiration": float(0),
            "unanswered_queried_ip_expiration": float(0),
            "unit_of_measure": "string",
        },
        remote_accesses=[{
            "enable_back_connections": False,
            "encrypt_dns_traffic": False,
            "endpoint_connect": {
                "cache_password_timeout": float(0),
                "client_upgrade_mode": "string",
                "connect_mode": "string",
                "disconnect_when_conn_to_network_is_lost": "string",
                "disconnect_when_device_is_idle": "string",
                "enable_password_caching": "string",
                "network_location_awareness": "string",
                "network_location_awareness_conf": {
                    "consider_undefined_dns_suffixes_as_external": False,
                    "consider_wireless_networks_as_external": False,
                    "dns_suffixes": ["string"],
                    "excluded_internal_wireless_networks": ["string"],
                    "network_or_group_of_conn_vpn_client": "string",
                    "remember_previously_detected_external_networks": False,
                    "vpn_clients_are_considered_inside_the_internal_network_when_the_client": "string",
                },
                "re_auth_user_interval": float(0),
                "route_all_traffic_to_gw": "string",
            },
            "hot_spot_and_hotel_registration": {
                "enable_registration": False,
                "local_subnets_access_only": False,
                "max_ip_access_during_registration": float(0),
                "ports": ["string"],
                "registration_timeout": float(0),
                "track_log": False,
            },
            "keep_alive_packet_to_gw_interval": float(0),
            "scv": {
                "apply_scv_on_simplified_mode_fw_policies": False,
                "exceptions": [{
                    "hosts": ["string"],
                    "services": ["string"],
                }],
                "generate_log": False,
                "no_scv_for_unsupported_cp_clients": False,
                "notify_user": False,
                "only_tcp_ip_protocols_are_used": False,
                "policy_installed_on_all_interfaces": False,
                "upon_verification_accept_and_log_client_connection": False,
            },
            "secure_client_mobile": {
                "automatically_initiate_dialup": "string",
                "cache_password_timeout": float(0),
                "connect_mode": "string",
                "disconnect_when_device_is_idle": "string",
                "enable_password_caching": "string",
                "re_auth_user_interval": float(0),
                "route_all_traffic_to_gw": "string",
                "supported_encryption_methods": "string",
                "user_auth_method": "string",
            },
            "simultaneous_login_mode": "string",
            "ssl_network_extender": {
                "client_outgoing_keep_alive_packets_frequency": float(0),
                "client_uninstall_upon_disconnection": "string",
                "client_upgrade_upon_connection": "string",
                "re_auth_user_interval": float(0),
                "scan_ep_machine_for_compliance_with_ep_compliance_policy": False,
                "supported_encryption_methods": "string",
                "user_auth_method": "string",
            },
            "vpn_advanced": {
                "allow_clear_traffic_to_encryption_domain_when_disconnected": False,
                "enable_load_distribution_for_mep_conf": False,
                "use_first_allocated_om_ip_addr_for_all_conn_to_the_gws_of_the_site": False,
            },
            "vpn_authentication_and_encryptions": [{
                "encryption_algorithms": {
                    "ike": {
                        "support_data_integrity": {
                            "aes_xcbc": False,
                            "md5": False,
                            "sha1": False,
                            "sha256": False,
                        },
                        "support_diffie_hellman_groups": {
                            "group1": False,
                            "group14": False,
                            "group2": False,
                            "group5": False,
                        },
                        "support_encryption_algorithms": {
                            "aes128": False,
                            "aes256": False,
                            "des": False,
                            "tdes": False,
                        },
                        "use_data_integrity": "string",
                        "use_diffie_hellman_group": "string",
                        "use_encryption_algorithm": "string",
                    },
                    "ipsec": {
                        "enforce_encryption_alg_and_data_integrity_on_all_users": False,
                        "support_data_integrity": {
                            "aes_xcbc": False,
                            "md5": False,
                            "sha1": False,
                            "sha256": False,
                        },
                        "support_encryption_algorithms": {
                            "aes128": False,
                            "aes256": False,
                            "des": False,
                            "tdes": False,
                        },
                        "use_data_integrity": "string",
                        "use_encryption_algorithm": "string",
                    },
                },
                "encryption_method": "string",
                "l2tp_pre_shared_key": "string",
                "pre_shared_secret": False,
                "support_l2tp_with_pre_shared_key": False,
                "support_legacy_auth_for_sc_l2tp_nokia_clients": False,
                "support_legacy_eap": False,
            }],
        }],
        stateful_inspection={
            "accept_stateful_icmp_errors": False,
            "accept_stateful_icmp_replies": False,
            "accept_stateful_other_ip_protocols_replies_for_unknown_services": False,
            "accept_stateful_udp_replies_for_unknown_services": False,
            "drop_out_of_state_icmp_packets": False,
            "drop_out_of_state_sctp_packets": False,
            "drop_out_of_state_tcp_packets": False,
            "icmp_virtual_session_timeout": float(0),
            "log_on_drop_out_of_state_icmp_packets": False,
            "log_on_drop_out_of_state_sctp_packets": False,
            "log_on_drop_out_of_state_tcp_packets": False,
            "other_ip_protocols_virtual_session_timeout": float(0),
            "sctp_end_timeout": float(0),
            "sctp_session_timeout": float(0),
            "sctp_start_timeout": float(0),
            "tcp_end_timeout": float(0),
            "tcp_end_timeout_r8020_gw_and_above": float(0),
            "tcp_out_of_state_drop_exceptions": ["string"],
            "tcp_session_timeout": float(0),
            "tcp_start_timeout": float(0),
            "udp_virtual_session_timeout": float(0),
        },
        user_accounts={
            "days_until_expiration": float(0),
            "expiration_date": "string",
            "expiration_date_method": "string",
            "show_accounts_expiration_indication_days_in_advance": False,
        },
        user_authority={
            "display_web_access_view": False,
            "trust_only_following_windows_domains": ["string"],
            "windows_domains_to_trust": "string",
        },
        user_check={
            "preferred_language": "string",
            "send_emails_using_mail_server": "string",
        },
        user_directory={
            "cache_size": float(0),
            "display_user_dn_at_login": "string",
            "enable_password_change_when_user_active_directory_expires": False,
            "enable_password_expiration_configuration": False,
            "enforce_rules_for_user_mgmt_admins": False,
            "min_password_length": float(0),
            "password_expires_after": float(0),
            "password_must_include_a_digit": False,
            "password_must_include_a_symbol": False,
            "password_must_include_lowercase_char": False,
            "password_must_include_uppercase_char": False,
            "timeout_on_cached_users": float(0),
        },
        vpn={
            "domain_name_for_dns_resolving": "string",
            "enable_backup_gw": False,
            "enable_decrypt_on_accept_for_gw_to_gw_traffic": False,
            "enable_load_distribution_for_mep_conf": False,
            "enable_vpn_directional_match_in_vpn_column": False,
            "grace_period_after_the_crl_is_not_valid": float(0),
            "grace_period_before_the_crl_is_valid": float(0),
            "grace_period_extension_for_secure_remote_secure_client": float(0),
            "support_ike_dos_protection_from_identified_src": "string",
            "support_ike_dos_protection_from_unidentified_src": "string",
            "vpn_conf_method": "string",
        })
    
    const managementCommandSetGlobalPropertiesResource = new checkpoint.ManagementCommandSetGlobalProperties("managementCommandSetGlobalPropertiesResource", {
        advancedConf: {
            certsAndPki: {
                certValidationEnforceKeySize: "string",
                hostCertsEcdsaKeySize: "string",
                hostCertsKeySize: "string",
            },
        },
        allowRemoteRegistrationOfOpsecProducts: false,
        authentication: {
            allowedSuffixForInternalUsers: "string",
            authInternalUsersWithSpecificSuffix: false,
            delayEachAuthAttemptBy: 0,
            enableDelayedAuth: false,
            maxClientAuthAttemptsBeforeConnectionTermination: 0,
            maxDaysBeforeExpirationOfNonPulledUserCertificates: 0,
            maxRloginAttemptsBeforeConnectionTermination: 0,
            maxSessionAuthAttemptsBeforeConnectionTermination: 0,
            maxTelnetAttemptsBeforeConnectionTermination: 0,
        },
        carrierSecurity: {
            aggressiveAging: false,
            aggressiveTimeout: 0,
            allowGgsnRepliesFromMultipleInterfaces: false,
            blockGtpInGtp: false,
            enableGPduSeqNumberCheckWithMaxDeviation: false,
            enableReverseConnections: false,
            enforceGtpAntiSpoofing: false,
            gPduSeqNumberCheckMaxDeviation: 0,
            gtpSignalingRateLimitSamplingInterval: 0,
            memoryActivationThreshold: 0,
            memoryDeactivationThreshold: 0,
            oneGtpEchoOnEachPathFrequency: 0,
            produceExtendedLogsOnUnmatchedPdus: false,
            produceExtendedLogsOnUnmatchedPdusPosition: "string",
            protocolViolationTrackOption: "string",
            tunnelActivationThreshold: 0,
            tunnelDeactivationThreshold: 0,
            verifyFlowLabels: false,
        },
        connectControl: {
            loadAgentsPort: 0,
            loadMeasurementInterval: 0,
            persistenceServerTimeout: 0,
            serverAvailabilityCheckInterval: 0,
            serverCheckRetries: 0,
        },
        dataAccessControl: {
            autoDownloadImportantData: false,
            autoDownloadSwUpdatesAndNewFeatures: false,
            sendAnonymousInfo: false,
            shareSensitiveInfo: false,
        },
        domainsToProcesses: ["string"],
        firewall: {
            acceptControlConnections: false,
            acceptDomainNameOverTcp: false,
            acceptDomainNameOverTcpPosition: "string",
            acceptDomainNameOverUdp: false,
            acceptDomainNameOverUdpPosition: "string",
            acceptDynamicAddrModulesOutgoingInternetConnections: false,
            acceptIcmpRequests: false,
            acceptIcmpRequestsPosition: "string",
            acceptIdentityAwarenessControlConnections: false,
            acceptIdentityAwarenessControlConnectionsPosition: "string",
            acceptIncomingTrafficToDhcpAndDnsServicesOfGws: false,
            acceptIps1ManagementConnections: false,
            acceptOutgoingPacketsOriginatingFromConnectraGw: false,
            acceptOutgoingPacketsOriginatingFromGw: false,
            acceptOutgoingPacketsOriginatingFromGwPosition: "string",
            acceptOutgoingPacketsToCpOnlineServices: false,
            acceptOutgoingPacketsToCpOnlineServicesPosition: "string",
            acceptRemoteAccessControlConnections: false,
            acceptRip: false,
            acceptRipPosition: "string",
            acceptSmartUpdateConnections: false,
            acceptVrrpPacketsOriginatingFromClusterMembers: false,
            acceptWebAndSshConnectionsForGwAdministration: false,
            logImpliedRules: false,
            securityServer: {
                clientAuthWelcomeFile: "string",
                ftpWelcomeMsgFile: "string",
                httpNextProxyHost: "string",
                httpNextProxyPort: 0,
                httpServers: [{
                    host: "string",
                    logicalName: "string",
                    port: 0,
                    reauthentication: "string",
                }],
                mdqWelcomeMsg: "string",
                rloginWelcomeMsgFile: "string",
                serverForNullRequests: "string",
                smtpWelcomeMsg: "string",
                telnetWelcomeMsgFile: "string",
            },
        },
        hitCount: {
            enableHitCount: false,
            keepHitCountDataUpTo: "string",
        },
        ignoreErrors: false,
        ignoreWarnings: false,
        logAndAlerts: [{
            administrativeNotifications: "string",
            alerts: {
                defaultTrackOptionForSystemAlerts: "string",
                mailAlertScript: "string",
                popupAlertScript: "string",
                sendMailAlertToSmartviewMonitor: false,
                sendPopupAlertToSmartviewMonitor: false,
                sendSnmpTrapAlertToSmartviewMonitor: false,
                sendUserDefinedAlertNum1ToSmartviewMonitor: false,
                sendUserDefinedAlertNum2ToSmartviewMonitor: false,
                sendUserDefinedAlertNum3ToSmartviewMonitor: false,
                snmpTrapAlertScript: "string",
                userDefinedScriptNum1: "string",
                userDefinedScriptNum2: "string",
                userDefinedScriptNum3: "string",
            },
            connectionMatchedBySam: "string",
            dynamicObjectResolutionFailure: "string",
            logEveryAuthenticatedHttpConnection: false,
            logTraffic: "string",
            packetIsIncorrectlyTagged: "string",
            packetTaggingBruteForceAttack: "string",
            slaViolation: "string",
            timeSettings: {
                excessiveLogGracePeriod: 0,
                logsResolvingTimeout: 0,
                statusFetchingInterval: 0,
                virtualLinkStatisticsLoggingInterval: 0,
            },
            vpnConfAndKeyExchangeErrors: "string",
            vpnPacketHandlingError: "string",
            vpnSuccessfulKeyExchange: "string",
        }],
        managementCommandSetGlobalPropertiesId: "string",
        nat: {
            addrAllocAndReleaseTrack: "string",
            addrExhaustionTrack: "string",
            allowBiDirectionalNat: false,
            autoArpConf: false,
            autoTranslateDestOnClientSide: false,
            enableIpPoolNat: false,
            manuallyTranslateDestOnClientSide: false,
            mergeManualProxyArpConf: false,
        },
        nonUniqueIpAddressRanges: [{
            addressType: "string",
            firstIpv4Address: "string",
            firstIpv6Address: "string",
            lastIpv4Address: "string",
            lastIpv6Address: "string",
        }],
        numSpoofingErrsThatTriggerBruteForce: 0,
        proxy: {
            proxyAddress: "string",
            proxyPort: 0,
            useProxyServer: false,
        },
        qos: {
            authenticatedIpExpiration: 0,
            defaultWeightOfRule: 0,
            maxWeightOfRule: 0,
            nonAuthenticatedIpExpiration: 0,
            unansweredQueriedIpExpiration: 0,
            unitOfMeasure: "string",
        },
        remoteAccesses: [{
            enableBackConnections: false,
            encryptDnsTraffic: false,
            endpointConnect: {
                cachePasswordTimeout: 0,
                clientUpgradeMode: "string",
                connectMode: "string",
                disconnectWhenConnToNetworkIsLost: "string",
                disconnectWhenDeviceIsIdle: "string",
                enablePasswordCaching: "string",
                networkLocationAwareness: "string",
                networkLocationAwarenessConf: {
                    considerUndefinedDnsSuffixesAsExternal: false,
                    considerWirelessNetworksAsExternal: false,
                    dnsSuffixes: ["string"],
                    excludedInternalWirelessNetworks: ["string"],
                    networkOrGroupOfConnVpnClient: "string",
                    rememberPreviouslyDetectedExternalNetworks: false,
                    vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient: "string",
                },
                reAuthUserInterval: 0,
                routeAllTrafficToGw: "string",
            },
            hotSpotAndHotelRegistration: {
                enableRegistration: false,
                localSubnetsAccessOnly: false,
                maxIpAccessDuringRegistration: 0,
                ports: ["string"],
                registrationTimeout: 0,
                trackLog: false,
            },
            keepAlivePacketToGwInterval: 0,
            scv: {
                applyScvOnSimplifiedModeFwPolicies: false,
                exceptions: [{
                    hosts: ["string"],
                    services: ["string"],
                }],
                generateLog: false,
                noScvForUnsupportedCpClients: false,
                notifyUser: false,
                onlyTcpIpProtocolsAreUsed: false,
                policyInstalledOnAllInterfaces: false,
                uponVerificationAcceptAndLogClientConnection: false,
            },
            secureClientMobile: {
                automaticallyInitiateDialup: "string",
                cachePasswordTimeout: 0,
                connectMode: "string",
                disconnectWhenDeviceIsIdle: "string",
                enablePasswordCaching: "string",
                reAuthUserInterval: 0,
                routeAllTrafficToGw: "string",
                supportedEncryptionMethods: "string",
                userAuthMethod: "string",
            },
            simultaneousLoginMode: "string",
            sslNetworkExtender: {
                clientOutgoingKeepAlivePacketsFrequency: 0,
                clientUninstallUponDisconnection: "string",
                clientUpgradeUponConnection: "string",
                reAuthUserInterval: 0,
                scanEpMachineForComplianceWithEpCompliancePolicy: false,
                supportedEncryptionMethods: "string",
                userAuthMethod: "string",
            },
            vpnAdvanced: {
                allowClearTrafficToEncryptionDomainWhenDisconnected: false,
                enableLoadDistributionForMepConf: false,
                useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite: false,
            },
            vpnAuthenticationAndEncryptions: [{
                encryptionAlgorithms: {
                    ike: {
                        supportDataIntegrity: {
                            aesXcbc: false,
                            md5: false,
                            sha1: false,
                            sha256: false,
                        },
                        supportDiffieHellmanGroups: {
                            group1: false,
                            group14: false,
                            group2: false,
                            group5: false,
                        },
                        supportEncryptionAlgorithms: {
                            aes128: false,
                            aes256: false,
                            des: false,
                            tdes: false,
                        },
                        useDataIntegrity: "string",
                        useDiffieHellmanGroup: "string",
                        useEncryptionAlgorithm: "string",
                    },
                    ipsec: {
                        enforceEncryptionAlgAndDataIntegrityOnAllUsers: false,
                        supportDataIntegrity: {
                            aesXcbc: false,
                            md5: false,
                            sha1: false,
                            sha256: false,
                        },
                        supportEncryptionAlgorithms: {
                            aes128: false,
                            aes256: false,
                            des: false,
                            tdes: false,
                        },
                        useDataIntegrity: "string",
                        useEncryptionAlgorithm: "string",
                    },
                },
                encryptionMethod: "string",
                l2tpPreSharedKey: "string",
                preSharedSecret: false,
                supportL2tpWithPreSharedKey: false,
                supportLegacyAuthForScL2tpNokiaClients: false,
                supportLegacyEap: false,
            }],
        }],
        statefulInspection: {
            acceptStatefulIcmpErrors: false,
            acceptStatefulIcmpReplies: false,
            acceptStatefulOtherIpProtocolsRepliesForUnknownServices: false,
            acceptStatefulUdpRepliesForUnknownServices: false,
            dropOutOfStateIcmpPackets: false,
            dropOutOfStateSctpPackets: false,
            dropOutOfStateTcpPackets: false,
            icmpVirtualSessionTimeout: 0,
            logOnDropOutOfStateIcmpPackets: false,
            logOnDropOutOfStateSctpPackets: false,
            logOnDropOutOfStateTcpPackets: false,
            otherIpProtocolsVirtualSessionTimeout: 0,
            sctpEndTimeout: 0,
            sctpSessionTimeout: 0,
            sctpStartTimeout: 0,
            tcpEndTimeout: 0,
            tcpEndTimeoutR8020GwAndAbove: 0,
            tcpOutOfStateDropExceptions: ["string"],
            tcpSessionTimeout: 0,
            tcpStartTimeout: 0,
            udpVirtualSessionTimeout: 0,
        },
        userAccounts: {
            daysUntilExpiration: 0,
            expirationDate: "string",
            expirationDateMethod: "string",
            showAccountsExpirationIndicationDaysInAdvance: false,
        },
        userAuthority: {
            displayWebAccessView: false,
            trustOnlyFollowingWindowsDomains: ["string"],
            windowsDomainsToTrust: "string",
        },
        userCheck: {
            preferredLanguage: "string",
            sendEmailsUsingMailServer: "string",
        },
        userDirectory: {
            cacheSize: 0,
            displayUserDnAtLogin: "string",
            enablePasswordChangeWhenUserActiveDirectoryExpires: false,
            enablePasswordExpirationConfiguration: false,
            enforceRulesForUserMgmtAdmins: false,
            minPasswordLength: 0,
            passwordExpiresAfter: 0,
            passwordMustIncludeADigit: false,
            passwordMustIncludeASymbol: false,
            passwordMustIncludeLowercaseChar: false,
            passwordMustIncludeUppercaseChar: false,
            timeoutOnCachedUsers: 0,
        },
        vpn: {
            domainNameForDnsResolving: "string",
            enableBackupGw: false,
            enableDecryptOnAcceptForGwToGwTraffic: false,
            enableLoadDistributionForMepConf: false,
            enableVpnDirectionalMatchInVpnColumn: false,
            gracePeriodAfterTheCrlIsNotValid: 0,
            gracePeriodBeforeTheCrlIsValid: 0,
            gracePeriodExtensionForSecureRemoteSecureClient: 0,
            supportIkeDosProtectionFromIdentifiedSrc: "string",
            supportIkeDosProtectionFromUnidentifiedSrc: "string",
            vpnConfMethod: "string",
        },
    });
    
    type: checkpoint:ManagementCommandSetGlobalProperties
    properties:
        advancedConf:
            certsAndPki:
                certValidationEnforceKeySize: string
                hostCertsEcdsaKeySize: string
                hostCertsKeySize: string
        allowRemoteRegistrationOfOpsecProducts: false
        authentication:
            allowedSuffixForInternalUsers: string
            authInternalUsersWithSpecificSuffix: false
            delayEachAuthAttemptBy: 0
            enableDelayedAuth: false
            maxClientAuthAttemptsBeforeConnectionTermination: 0
            maxDaysBeforeExpirationOfNonPulledUserCertificates: 0
            maxRloginAttemptsBeforeConnectionTermination: 0
            maxSessionAuthAttemptsBeforeConnectionTermination: 0
            maxTelnetAttemptsBeforeConnectionTermination: 0
        carrierSecurity:
            aggressiveAging: false
            aggressiveTimeout: 0
            allowGgsnRepliesFromMultipleInterfaces: false
            blockGtpInGtp: false
            enableGPduSeqNumberCheckWithMaxDeviation: false
            enableReverseConnections: false
            enforceGtpAntiSpoofing: false
            gPduSeqNumberCheckMaxDeviation: 0
            gtpSignalingRateLimitSamplingInterval: 0
            memoryActivationThreshold: 0
            memoryDeactivationThreshold: 0
            oneGtpEchoOnEachPathFrequency: 0
            produceExtendedLogsOnUnmatchedPdus: false
            produceExtendedLogsOnUnmatchedPdusPosition: string
            protocolViolationTrackOption: string
            tunnelActivationThreshold: 0
            tunnelDeactivationThreshold: 0
            verifyFlowLabels: false
        connectControl:
            loadAgentsPort: 0
            loadMeasurementInterval: 0
            persistenceServerTimeout: 0
            serverAvailabilityCheckInterval: 0
            serverCheckRetries: 0
        dataAccessControl:
            autoDownloadImportantData: false
            autoDownloadSwUpdatesAndNewFeatures: false
            sendAnonymousInfo: false
            shareSensitiveInfo: false
        domainsToProcesses:
            - string
        firewall:
            acceptControlConnections: false
            acceptDomainNameOverTcp: false
            acceptDomainNameOverTcpPosition: string
            acceptDomainNameOverUdp: false
            acceptDomainNameOverUdpPosition: string
            acceptDynamicAddrModulesOutgoingInternetConnections: false
            acceptIcmpRequests: false
            acceptIcmpRequestsPosition: string
            acceptIdentityAwarenessControlConnections: false
            acceptIdentityAwarenessControlConnectionsPosition: string
            acceptIncomingTrafficToDhcpAndDnsServicesOfGws: false
            acceptIps1ManagementConnections: false
            acceptOutgoingPacketsOriginatingFromConnectraGw: false
            acceptOutgoingPacketsOriginatingFromGw: false
            acceptOutgoingPacketsOriginatingFromGwPosition: string
            acceptOutgoingPacketsToCpOnlineServices: false
            acceptOutgoingPacketsToCpOnlineServicesPosition: string
            acceptRemoteAccessControlConnections: false
            acceptRip: false
            acceptRipPosition: string
            acceptSmartUpdateConnections: false
            acceptVrrpPacketsOriginatingFromClusterMembers: false
            acceptWebAndSshConnectionsForGwAdministration: false
            logImpliedRules: false
            securityServer:
                clientAuthWelcomeFile: string
                ftpWelcomeMsgFile: string
                httpNextProxyHost: string
                httpNextProxyPort: 0
                httpServers:
                    - host: string
                      logicalName: string
                      port: 0
                      reauthentication: string
                mdqWelcomeMsg: string
                rloginWelcomeMsgFile: string
                serverForNullRequests: string
                smtpWelcomeMsg: string
                telnetWelcomeMsgFile: string
        hitCount:
            enableHitCount: false
            keepHitCountDataUpTo: string
        ignoreErrors: false
        ignoreWarnings: false
        logAndAlerts:
            - administrativeNotifications: string
              alerts:
                defaultTrackOptionForSystemAlerts: string
                mailAlertScript: string
                popupAlertScript: string
                sendMailAlertToSmartviewMonitor: false
                sendPopupAlertToSmartviewMonitor: false
                sendSnmpTrapAlertToSmartviewMonitor: false
                sendUserDefinedAlertNum1ToSmartviewMonitor: false
                sendUserDefinedAlertNum2ToSmartviewMonitor: false
                sendUserDefinedAlertNum3ToSmartviewMonitor: false
                snmpTrapAlertScript: string
                userDefinedScriptNum1: string
                userDefinedScriptNum2: string
                userDefinedScriptNum3: string
              connectionMatchedBySam: string
              dynamicObjectResolutionFailure: string
              logEveryAuthenticatedHttpConnection: false
              logTraffic: string
              packetIsIncorrectlyTagged: string
              packetTaggingBruteForceAttack: string
              slaViolation: string
              timeSettings:
                excessiveLogGracePeriod: 0
                logsResolvingTimeout: 0
                statusFetchingInterval: 0
                virtualLinkStatisticsLoggingInterval: 0
              vpnConfAndKeyExchangeErrors: string
              vpnPacketHandlingError: string
              vpnSuccessfulKeyExchange: string
        managementCommandSetGlobalPropertiesId: string
        nat:
            addrAllocAndReleaseTrack: string
            addrExhaustionTrack: string
            allowBiDirectionalNat: false
            autoArpConf: false
            autoTranslateDestOnClientSide: false
            enableIpPoolNat: false
            manuallyTranslateDestOnClientSide: false
            mergeManualProxyArpConf: false
        nonUniqueIpAddressRanges:
            - addressType: string
              firstIpv4Address: string
              firstIpv6Address: string
              lastIpv4Address: string
              lastIpv6Address: string
        numSpoofingErrsThatTriggerBruteForce: 0
        proxy:
            proxyAddress: string
            proxyPort: 0
            useProxyServer: false
        qos:
            authenticatedIpExpiration: 0
            defaultWeightOfRule: 0
            maxWeightOfRule: 0
            nonAuthenticatedIpExpiration: 0
            unansweredQueriedIpExpiration: 0
            unitOfMeasure: string
        remoteAccesses:
            - enableBackConnections: false
              encryptDnsTraffic: false
              endpointConnect:
                cachePasswordTimeout: 0
                clientUpgradeMode: string
                connectMode: string
                disconnectWhenConnToNetworkIsLost: string
                disconnectWhenDeviceIsIdle: string
                enablePasswordCaching: string
                networkLocationAwareness: string
                networkLocationAwarenessConf:
                    considerUndefinedDnsSuffixesAsExternal: false
                    considerWirelessNetworksAsExternal: false
                    dnsSuffixes:
                        - string
                    excludedInternalWirelessNetworks:
                        - string
                    networkOrGroupOfConnVpnClient: string
                    rememberPreviouslyDetectedExternalNetworks: false
                    vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient: string
                reAuthUserInterval: 0
                routeAllTrafficToGw: string
              hotSpotAndHotelRegistration:
                enableRegistration: false
                localSubnetsAccessOnly: false
                maxIpAccessDuringRegistration: 0
                ports:
                    - string
                registrationTimeout: 0
                trackLog: false
              keepAlivePacketToGwInterval: 0
              scv:
                applyScvOnSimplifiedModeFwPolicies: false
                exceptions:
                    - hosts:
                        - string
                      services:
                        - string
                generateLog: false
                noScvForUnsupportedCpClients: false
                notifyUser: false
                onlyTcpIpProtocolsAreUsed: false
                policyInstalledOnAllInterfaces: false
                uponVerificationAcceptAndLogClientConnection: false
              secureClientMobile:
                automaticallyInitiateDialup: string
                cachePasswordTimeout: 0
                connectMode: string
                disconnectWhenDeviceIsIdle: string
                enablePasswordCaching: string
                reAuthUserInterval: 0
                routeAllTrafficToGw: string
                supportedEncryptionMethods: string
                userAuthMethod: string
              simultaneousLoginMode: string
              sslNetworkExtender:
                clientOutgoingKeepAlivePacketsFrequency: 0
                clientUninstallUponDisconnection: string
                clientUpgradeUponConnection: string
                reAuthUserInterval: 0
                scanEpMachineForComplianceWithEpCompliancePolicy: false
                supportedEncryptionMethods: string
                userAuthMethod: string
              vpnAdvanced:
                allowClearTrafficToEncryptionDomainWhenDisconnected: false
                enableLoadDistributionForMepConf: false
                useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite: false
              vpnAuthenticationAndEncryptions:
                - encryptionAlgorithms:
                    ike:
                        supportDataIntegrity:
                            aesXcbc: false
                            md5: false
                            sha1: false
                            sha256: false
                        supportDiffieHellmanGroups:
                            group1: false
                            group2: false
                            group5: false
                            group14: false
                        supportEncryptionAlgorithms:
                            aes128: false
                            aes256: false
                            des: false
                            tdes: false
                        useDataIntegrity: string
                        useDiffieHellmanGroup: string
                        useEncryptionAlgorithm: string
                    ipsec:
                        enforceEncryptionAlgAndDataIntegrityOnAllUsers: false
                        supportDataIntegrity:
                            aesXcbc: false
                            md5: false
                            sha1: false
                            sha256: false
                        supportEncryptionAlgorithms:
                            aes128: false
                            aes256: false
                            des: false
                            tdes: false
                        useDataIntegrity: string
                        useEncryptionAlgorithm: string
                  encryptionMethod: string
                  l2tpPreSharedKey: string
                  preSharedSecret: false
                  supportL2tpWithPreSharedKey: false
                  supportLegacyAuthForScL2tpNokiaClients: false
                  supportLegacyEap: false
        statefulInspection:
            acceptStatefulIcmpErrors: false
            acceptStatefulIcmpReplies: false
            acceptStatefulOtherIpProtocolsRepliesForUnknownServices: false
            acceptStatefulUdpRepliesForUnknownServices: false
            dropOutOfStateIcmpPackets: false
            dropOutOfStateSctpPackets: false
            dropOutOfStateTcpPackets: false
            icmpVirtualSessionTimeout: 0
            logOnDropOutOfStateIcmpPackets: false
            logOnDropOutOfStateSctpPackets: false
            logOnDropOutOfStateTcpPackets: false
            otherIpProtocolsVirtualSessionTimeout: 0
            sctpEndTimeout: 0
            sctpSessionTimeout: 0
            sctpStartTimeout: 0
            tcpEndTimeout: 0
            tcpEndTimeoutR8020GwAndAbove: 0
            tcpOutOfStateDropExceptions:
                - string
            tcpSessionTimeout: 0
            tcpStartTimeout: 0
            udpVirtualSessionTimeout: 0
        userAccounts:
            daysUntilExpiration: 0
            expirationDate: string
            expirationDateMethod: string
            showAccountsExpirationIndicationDaysInAdvance: false
        userAuthority:
            displayWebAccessView: false
            trustOnlyFollowingWindowsDomains:
                - string
            windowsDomainsToTrust: string
        userCheck:
            preferredLanguage: string
            sendEmailsUsingMailServer: string
        userDirectory:
            cacheSize: 0
            displayUserDnAtLogin: string
            enablePasswordChangeWhenUserActiveDirectoryExpires: false
            enablePasswordExpirationConfiguration: false
            enforceRulesForUserMgmtAdmins: false
            minPasswordLength: 0
            passwordExpiresAfter: 0
            passwordMustIncludeADigit: false
            passwordMustIncludeASymbol: false
            passwordMustIncludeLowercaseChar: false
            passwordMustIncludeUppercaseChar: false
            timeoutOnCachedUsers: 0
        vpn:
            domainNameForDnsResolving: string
            enableBackupGw: false
            enableDecryptOnAcceptForGwToGwTraffic: false
            enableLoadDistributionForMepConf: false
            enableVpnDirectionalMatchInVpnColumn: false
            gracePeriodAfterTheCrlIsNotValid: 0
            gracePeriodBeforeTheCrlIsValid: 0
            gracePeriodExtensionForSecureRemoteSecureClient: 0
            supportIkeDosProtectionFromIdentifiedSrc: string
            supportIkeDosProtectionFromUnidentifiedSrc: string
            vpnConfMethod: string
    

    ManagementCommandSetGlobalProperties Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ManagementCommandSetGlobalProperties resource accepts the following input properties:

    AdvancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    AllowRemoteRegistrationOfOpsecProducts bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    Authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    CarrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    ConnectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    DataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    DomainsToProcesses List<string>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    Firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    HitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    LogAndAlerts List<ManagementCommandSetGlobalPropertiesLogAndAlert>
    Define system-wide logging and alerting parameters.
    ManagementCommandSetGlobalPropertiesId string
    Nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    NonUniqueIpAddressRanges List<ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange>
    Specify Non Unique IP Address Ranges.
    NumSpoofingErrsThatTriggerBruteForce double
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    Proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    Qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    RemoteAccesses List<ManagementCommandSetGlobalPropertiesRemoteAccess>
    Configure Remote Access properties.
    StatefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    UserAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    UserAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    UserCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    UserDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    Vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    AdvancedConf ManagementCommandSetGlobalPropertiesAdvancedConfArgs
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    AllowRemoteRegistrationOfOpsecProducts bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    Authentication ManagementCommandSetGlobalPropertiesAuthenticationArgs
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    CarrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurityArgs
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    ConnectControl ManagementCommandSetGlobalPropertiesConnectControlArgs
    Configure settings that relate to ConnectControl server load balancing.
    DataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControlArgs
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    DomainsToProcesses []string
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    Firewall ManagementCommandSetGlobalPropertiesFirewallArgs
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    HitCount ManagementCommandSetGlobalPropertiesHitCountArgs
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    LogAndAlerts []ManagementCommandSetGlobalPropertiesLogAndAlertArgs
    Define system-wide logging and alerting parameters.
    ManagementCommandSetGlobalPropertiesId string
    Nat ManagementCommandSetGlobalPropertiesNatArgs
    Configure settings that apply to all NAT connections.
    NonUniqueIpAddressRanges []ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs
    Specify Non Unique IP Address Ranges.
    NumSpoofingErrsThatTriggerBruteForce float64
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    Proxy ManagementCommandSetGlobalPropertiesProxyArgs
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    Qos ManagementCommandSetGlobalPropertiesQosArgs
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    RemoteAccesses []ManagementCommandSetGlobalPropertiesRemoteAccessArgs
    Configure Remote Access properties.
    StatefulInspection ManagementCommandSetGlobalPropertiesStatefulInspectionArgs
    Adjust Stateful Inspection parameters.
    UserAccounts ManagementCommandSetGlobalPropertiesUserAccountsArgs
    Set the expiration for a user account and configure "about to expire" warnings.
    UserAuthority ManagementCommandSetGlobalPropertiesUserAuthorityArgs
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    UserCheck ManagementCommandSetGlobalPropertiesUserCheckArgs
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    UserDirectory ManagementCommandSetGlobalPropertiesUserDirectoryArgs
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    Vpn ManagementCommandSetGlobalPropertiesVpnArgs
    Configure settings relevant to VPN.
    advancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts Boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses List<String>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    logAndAlerts List<ManagementCommandSetGlobalPropertiesLogAndAlert>
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId String
    nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges List<ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange>
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce Double
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses List<ManagementCommandSetGlobalPropertiesRemoteAccess>
    Configure Remote Access properties.
    statefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    userAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    advancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses string[]
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    logAndAlerts ManagementCommandSetGlobalPropertiesLogAndAlert[]
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId string
    nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange[]
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce number
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses ManagementCommandSetGlobalPropertiesRemoteAccess[]
    Configure Remote Access properties.
    statefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    userAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    advanced_conf ManagementCommandSetGlobalPropertiesAdvancedConfArgs
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allow_remote_registration_of_opsec_products bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthenticationArgs
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrier_security ManagementCommandSetGlobalPropertiesCarrierSecurityArgs
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connect_control ManagementCommandSetGlobalPropertiesConnectControlArgs
    Configure settings that relate to ConnectControl server load balancing.
    data_access_control ManagementCommandSetGlobalPropertiesDataAccessControlArgs
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domains_to_processes Sequence[str]
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewallArgs
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hit_count ManagementCommandSetGlobalPropertiesHitCountArgs
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    log_and_alerts Sequence[ManagementCommandSetGlobalPropertiesLogAndAlertArgs]
    Define system-wide logging and alerting parameters.
    management_command_set_global_properties_id str
    nat ManagementCommandSetGlobalPropertiesNatArgs
    Configure settings that apply to all NAT connections.
    non_unique_ip_address_ranges Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]
    Specify Non Unique IP Address Ranges.
    num_spoofing_errs_that_trigger_brute_force float
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxyArgs
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQosArgs
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remote_accesses Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessArgs]
    Configure Remote Access properties.
    stateful_inspection ManagementCommandSetGlobalPropertiesStatefulInspectionArgs
    Adjust Stateful Inspection parameters.
    user_accounts ManagementCommandSetGlobalPropertiesUserAccountsArgs
    Set the expiration for a user account and configure "about to expire" warnings.
    user_authority ManagementCommandSetGlobalPropertiesUserAuthorityArgs
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    user_check ManagementCommandSetGlobalPropertiesUserCheckArgs
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    user_directory ManagementCommandSetGlobalPropertiesUserDirectoryArgs
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpnArgs
    Configure settings relevant to VPN.
    advancedConf Property Map
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts Boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication Property Map
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity Property Map
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl Property Map
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl Property Map
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses List<String>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall Property Map
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount Property Map
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    logAndAlerts List<Property Map>
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId String
    nat Property Map
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges List<Property Map>
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce Number
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy Property Map
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos Property Map
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses List<Property Map>
    Configure Remote Access properties.
    statefulInspection Property Map
    Adjust Stateful Inspection parameters.
    userAccounts Property Map
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority Property Map
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck Property Map
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory Property Map
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn Property Map
    Configure settings relevant to VPN.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ManagementCommandSetGlobalProperties resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ManagementCommandSetGlobalProperties Resource

    Get an existing ManagementCommandSetGlobalProperties resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ManagementCommandSetGlobalPropertiesState, opts?: CustomResourceOptions): ManagementCommandSetGlobalProperties
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            advanced_conf: Optional[ManagementCommandSetGlobalPropertiesAdvancedConfArgs] = None,
            allow_remote_registration_of_opsec_products: Optional[bool] = None,
            authentication: Optional[ManagementCommandSetGlobalPropertiesAuthenticationArgs] = None,
            carrier_security: Optional[ManagementCommandSetGlobalPropertiesCarrierSecurityArgs] = None,
            connect_control: Optional[ManagementCommandSetGlobalPropertiesConnectControlArgs] = None,
            data_access_control: Optional[ManagementCommandSetGlobalPropertiesDataAccessControlArgs] = None,
            domains_to_processes: Optional[Sequence[str]] = None,
            firewall: Optional[ManagementCommandSetGlobalPropertiesFirewallArgs] = None,
            hit_count: Optional[ManagementCommandSetGlobalPropertiesHitCountArgs] = None,
            ignore_errors: Optional[bool] = None,
            ignore_warnings: Optional[bool] = None,
            log_and_alerts: Optional[Sequence[ManagementCommandSetGlobalPropertiesLogAndAlertArgs]] = None,
            management_command_set_global_properties_id: Optional[str] = None,
            nat: Optional[ManagementCommandSetGlobalPropertiesNatArgs] = None,
            non_unique_ip_address_ranges: Optional[Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]] = None,
            num_spoofing_errs_that_trigger_brute_force: Optional[float] = None,
            proxy: Optional[ManagementCommandSetGlobalPropertiesProxyArgs] = None,
            qos: Optional[ManagementCommandSetGlobalPropertiesQosArgs] = None,
            remote_accesses: Optional[Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessArgs]] = None,
            stateful_inspection: Optional[ManagementCommandSetGlobalPropertiesStatefulInspectionArgs] = None,
            user_accounts: Optional[ManagementCommandSetGlobalPropertiesUserAccountsArgs] = None,
            user_authority: Optional[ManagementCommandSetGlobalPropertiesUserAuthorityArgs] = None,
            user_check: Optional[ManagementCommandSetGlobalPropertiesUserCheckArgs] = None,
            user_directory: Optional[ManagementCommandSetGlobalPropertiesUserDirectoryArgs] = None,
            vpn: Optional[ManagementCommandSetGlobalPropertiesVpnArgs] = None) -> ManagementCommandSetGlobalProperties
    func GetManagementCommandSetGlobalProperties(ctx *Context, name string, id IDInput, state *ManagementCommandSetGlobalPropertiesState, opts ...ResourceOption) (*ManagementCommandSetGlobalProperties, error)
    public static ManagementCommandSetGlobalProperties Get(string name, Input<string> id, ManagementCommandSetGlobalPropertiesState? state, CustomResourceOptions? opts = null)
    public static ManagementCommandSetGlobalProperties get(String name, Output<String> id, ManagementCommandSetGlobalPropertiesState state, CustomResourceOptions options)
    resources:  _:    type: checkpoint:ManagementCommandSetGlobalProperties    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AdvancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    AllowRemoteRegistrationOfOpsecProducts bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    Authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    CarrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    ConnectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    DataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    DomainsToProcesses List<string>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    Firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    HitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    LogAndAlerts List<ManagementCommandSetGlobalPropertiesLogAndAlert>
    Define system-wide logging and alerting parameters.
    ManagementCommandSetGlobalPropertiesId string
    Nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    NonUniqueIpAddressRanges List<ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange>
    Specify Non Unique IP Address Ranges.
    NumSpoofingErrsThatTriggerBruteForce double
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    Proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    Qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    RemoteAccesses List<ManagementCommandSetGlobalPropertiesRemoteAccess>
    Configure Remote Access properties.
    StatefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    UserAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    UserAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    UserCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    UserDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    Vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    AdvancedConf ManagementCommandSetGlobalPropertiesAdvancedConfArgs
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    AllowRemoteRegistrationOfOpsecProducts bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    Authentication ManagementCommandSetGlobalPropertiesAuthenticationArgs
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    CarrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurityArgs
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    ConnectControl ManagementCommandSetGlobalPropertiesConnectControlArgs
    Configure settings that relate to ConnectControl server load balancing.
    DataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControlArgs
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    DomainsToProcesses []string
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    Firewall ManagementCommandSetGlobalPropertiesFirewallArgs
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    HitCount ManagementCommandSetGlobalPropertiesHitCountArgs
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    LogAndAlerts []ManagementCommandSetGlobalPropertiesLogAndAlertArgs
    Define system-wide logging and alerting parameters.
    ManagementCommandSetGlobalPropertiesId string
    Nat ManagementCommandSetGlobalPropertiesNatArgs
    Configure settings that apply to all NAT connections.
    NonUniqueIpAddressRanges []ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs
    Specify Non Unique IP Address Ranges.
    NumSpoofingErrsThatTriggerBruteForce float64
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    Proxy ManagementCommandSetGlobalPropertiesProxyArgs
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    Qos ManagementCommandSetGlobalPropertiesQosArgs
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    RemoteAccesses []ManagementCommandSetGlobalPropertiesRemoteAccessArgs
    Configure Remote Access properties.
    StatefulInspection ManagementCommandSetGlobalPropertiesStatefulInspectionArgs
    Adjust Stateful Inspection parameters.
    UserAccounts ManagementCommandSetGlobalPropertiesUserAccountsArgs
    Set the expiration for a user account and configure "about to expire" warnings.
    UserAuthority ManagementCommandSetGlobalPropertiesUserAuthorityArgs
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    UserCheck ManagementCommandSetGlobalPropertiesUserCheckArgs
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    UserDirectory ManagementCommandSetGlobalPropertiesUserDirectoryArgs
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    Vpn ManagementCommandSetGlobalPropertiesVpnArgs
    Configure settings relevant to VPN.
    advancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts Boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses List<String>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    logAndAlerts List<ManagementCommandSetGlobalPropertiesLogAndAlert>
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId String
    nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges List<ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange>
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce Double
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses List<ManagementCommandSetGlobalPropertiesRemoteAccess>
    Configure Remote Access properties.
    statefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    userAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    advancedConf ManagementCommandSetGlobalPropertiesAdvancedConf
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthentication
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity ManagementCommandSetGlobalPropertiesCarrierSecurity
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl ManagementCommandSetGlobalPropertiesConnectControl
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl ManagementCommandSetGlobalPropertiesDataAccessControl
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses string[]
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewall
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount ManagementCommandSetGlobalPropertiesHitCount
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    logAndAlerts ManagementCommandSetGlobalPropertiesLogAndAlert[]
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId string
    nat ManagementCommandSetGlobalPropertiesNat
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange[]
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce number
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxy
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQos
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses ManagementCommandSetGlobalPropertiesRemoteAccess[]
    Configure Remote Access properties.
    statefulInspection ManagementCommandSetGlobalPropertiesStatefulInspection
    Adjust Stateful Inspection parameters.
    userAccounts ManagementCommandSetGlobalPropertiesUserAccounts
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority ManagementCommandSetGlobalPropertiesUserAuthority
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck ManagementCommandSetGlobalPropertiesUserCheck
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory ManagementCommandSetGlobalPropertiesUserDirectory
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpn
    Configure settings relevant to VPN.
    advanced_conf ManagementCommandSetGlobalPropertiesAdvancedConfArgs
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allow_remote_registration_of_opsec_products bool
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication ManagementCommandSetGlobalPropertiesAuthenticationArgs
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrier_security ManagementCommandSetGlobalPropertiesCarrierSecurityArgs
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connect_control ManagementCommandSetGlobalPropertiesConnectControlArgs
    Configure settings that relate to ConnectControl server load balancing.
    data_access_control ManagementCommandSetGlobalPropertiesDataAccessControlArgs
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domains_to_processes Sequence[str]
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall ManagementCommandSetGlobalPropertiesFirewallArgs
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hit_count ManagementCommandSetGlobalPropertiesHitCountArgs
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    log_and_alerts Sequence[ManagementCommandSetGlobalPropertiesLogAndAlertArgs]
    Define system-wide logging and alerting parameters.
    management_command_set_global_properties_id str
    nat ManagementCommandSetGlobalPropertiesNatArgs
    Configure settings that apply to all NAT connections.
    non_unique_ip_address_ranges Sequence[ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs]
    Specify Non Unique IP Address Ranges.
    num_spoofing_errs_that_trigger_brute_force float
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy ManagementCommandSetGlobalPropertiesProxyArgs
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos ManagementCommandSetGlobalPropertiesQosArgs
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remote_accesses Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessArgs]
    Configure Remote Access properties.
    stateful_inspection ManagementCommandSetGlobalPropertiesStatefulInspectionArgs
    Adjust Stateful Inspection parameters.
    user_accounts ManagementCommandSetGlobalPropertiesUserAccountsArgs
    Set the expiration for a user account and configure "about to expire" warnings.
    user_authority ManagementCommandSetGlobalPropertiesUserAuthorityArgs
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    user_check ManagementCommandSetGlobalPropertiesUserCheckArgs
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    user_directory ManagementCommandSetGlobalPropertiesUserDirectoryArgs
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn ManagementCommandSetGlobalPropertiesVpnArgs
    Configure settings relevant to VPN.
    advancedConf Property Map
    Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values.
    allowRemoteRegistrationOfOpsecProducts Boolean
    After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise, the RA utility can only be run from the Security Management host.
    authentication Property Map
    Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication).
    carrierSecurity Property Map
    Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests.
    connectControl Property Map
    Configure settings that relate to ConnectControl server load balancing.
    dataAccessControl Property Map
    Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server.
    domainsToProcesses List<String>
    Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.
    firewall Property Map
    Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them.
    hitCount Property Map
    Enable the Hit Count feature that tracks the number of connections that each rule matches.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    logAndAlerts List<Property Map>
    Define system-wide logging and alerting parameters.
    managementCommandSetGlobalPropertiesId String
    nat Property Map
    Configure settings that apply to all NAT connections.
    nonUniqueIpAddressRanges List<Property Map>
    Specify Non Unique IP Address Ranges.
    numSpoofingErrsThatTriggerBruteForce Number
    Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key.
    proxy Property Map
    Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used.
    qos Property Map
    Define the general parameters of Quality of Service (QoS) and apply them to QoS rules.
    remoteAccesses List<Property Map>
    Configure Remote Access properties.
    statefulInspection Property Map
    Adjust Stateful Inspection parameters.
    userAccounts Property Map
    Set the expiration for a user account and configure "about to expire" warnings.
    userAuthority Property Map
    Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization.
    userCheck Property Map
    Set a language for the UserCheck message if the language setting in the user's browser cannot be determined.
    userDirectory Property Map
    User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases.
    vpn Property Map
    Configure settings relevant to VPN.

    Supporting Types

    ManagementCommandSetGlobalPropertiesAdvancedConf, ManagementCommandSetGlobalPropertiesAdvancedConfArgs

    certsAndPki Property Map
    Configure Certificates and PKI properties.

    ManagementCommandSetGlobalPropertiesAdvancedConfCertsAndPki, ManagementCommandSetGlobalPropertiesAdvancedConfCertsAndPkiArgs

    CertValidationEnforceKeySize string
    Enforce key length in certificate validation (R80+ gateways only).
    HostCertsEcdsaKeySize string
    Select the key size for ECDSA of the host certificate.
    HostCertsKeySize string
    Select the key size of the host certificate.
    CertValidationEnforceKeySize string
    Enforce key length in certificate validation (R80+ gateways only).
    HostCertsEcdsaKeySize string
    Select the key size for ECDSA of the host certificate.
    HostCertsKeySize string
    Select the key size of the host certificate.
    certValidationEnforceKeySize String
    Enforce key length in certificate validation (R80+ gateways only).
    hostCertsEcdsaKeySize String
    Select the key size for ECDSA of the host certificate.
    hostCertsKeySize String
    Select the key size of the host certificate.
    certValidationEnforceKeySize string
    Enforce key length in certificate validation (R80+ gateways only).
    hostCertsEcdsaKeySize string
    Select the key size for ECDSA of the host certificate.
    hostCertsKeySize string
    Select the key size of the host certificate.
    cert_validation_enforce_key_size str
    Enforce key length in certificate validation (R80+ gateways only).
    host_certs_ecdsa_key_size str
    Select the key size for ECDSA of the host certificate.
    host_certs_key_size str
    Select the key size of the host certificate.
    certValidationEnforceKeySize String
    Enforce key length in certificate validation (R80+ gateways only).
    hostCertsEcdsaKeySize String
    Select the key size for ECDSA of the host certificate.
    hostCertsKeySize String
    Select the key size of the host certificate.

    ManagementCommandSetGlobalPropertiesAuthentication, ManagementCommandSetGlobalPropertiesAuthenticationArgs

    AllowedSuffixForInternalUsers string
    Suffix for internal users authentication.
    AuthInternalUsersWithSpecificSuffix bool
    Enforce suffix for internal users authentication.
    DelayEachAuthAttemptBy double
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    EnableDelayedAuth bool
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    MaxClientAuthAttemptsBeforeConnectionTermination double
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxDaysBeforeExpirationOfNonPulledUserCertificates double
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    MaxRloginAttemptsBeforeConnectionTermination double
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxSessionAuthAttemptsBeforeConnectionTermination double
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxTelnetAttemptsBeforeConnectionTermination double
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    AllowedSuffixForInternalUsers string
    Suffix for internal users authentication.
    AuthInternalUsersWithSpecificSuffix bool
    Enforce suffix for internal users authentication.
    DelayEachAuthAttemptBy float64
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    EnableDelayedAuth bool
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    MaxClientAuthAttemptsBeforeConnectionTermination float64
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxDaysBeforeExpirationOfNonPulledUserCertificates float64
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    MaxRloginAttemptsBeforeConnectionTermination float64
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxSessionAuthAttemptsBeforeConnectionTermination float64
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    MaxTelnetAttemptsBeforeConnectionTermination float64
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    allowedSuffixForInternalUsers String
    Suffix for internal users authentication.
    authInternalUsersWithSpecificSuffix Boolean
    Enforce suffix for internal users authentication.
    delayEachAuthAttemptBy Double
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    enableDelayedAuth Boolean
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    maxClientAuthAttemptsBeforeConnectionTermination Double
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxDaysBeforeExpirationOfNonPulledUserCertificates Double
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    maxRloginAttemptsBeforeConnectionTermination Double
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxSessionAuthAttemptsBeforeConnectionTermination Double
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxTelnetAttemptsBeforeConnectionTermination Double
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    allowedSuffixForInternalUsers string
    Suffix for internal users authentication.
    authInternalUsersWithSpecificSuffix boolean
    Enforce suffix for internal users authentication.
    delayEachAuthAttemptBy number
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    enableDelayedAuth boolean
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    maxClientAuthAttemptsBeforeConnectionTermination number
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxDaysBeforeExpirationOfNonPulledUserCertificates number
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    maxRloginAttemptsBeforeConnectionTermination number
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxSessionAuthAttemptsBeforeConnectionTermination number
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxTelnetAttemptsBeforeConnectionTermination number
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    allowed_suffix_for_internal_users str
    Suffix for internal users authentication.
    auth_internal_users_with_specific_suffix bool
    Enforce suffix for internal users authentication.
    delay_each_auth_attempt_by float
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    enable_delayed_auth bool
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    max_client_auth_attempts_before_connection_termination float
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    max_days_before_expiration_of_non_pulled_user_certificates float
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    max_rlogin_attempts_before_connection_termination float
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    max_session_auth_attempts_before_connection_termination float
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    max_telnet_attempts_before_connection_termination float
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    allowedSuffixForInternalUsers String
    Suffix for internal users authentication.
    authInternalUsersWithSpecificSuffix Boolean
    Enforce suffix for internal users authentication.
    delayEachAuthAttemptBy Number
    Delay each authentication attempt by the specified number of milliseconds. Any value from 1 to 25000 can be entered in this field.
    enableDelayedAuth Boolean
    all authentications other than certificate-based authentications will be delayed by the specified time. Applying this delay will stall brute force authentication attacks. The delay is applied for both failed and successful authentication attempts.
    maxClientAuthAttemptsBeforeConnectionTermination Number
    Allowed Number of Failed Client Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxDaysBeforeExpirationOfNonPulledUserCertificates Number
    Users certificates which were initiated but not pulled will expire after the specified number of days. Any value from 1 to 60 days can be entered in this field.
    maxRloginAttemptsBeforeConnectionTermination Number
    Allowed Number of Failed rlogin Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxSessionAuthAttemptsBeforeConnectionTermination Number
    Allowed Number of Failed Session Authentication Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.
    maxTelnetAttemptsBeforeConnectionTermination Number
    Allowed Number of Failed telnet Attempts Before Session Termination. Any value from 1 to 800 attempts can be entered in this field.

    ManagementCommandSetGlobalPropertiesCarrierSecurity, ManagementCommandSetGlobalPropertiesCarrierSecurityArgs

    AggressiveAging bool
    If true, enables configuring aggressive aging thresholds and time out value.
    AggressiveTimeout double
    Aggressive timeout. Available only if aggressive-aging is true.
    AllowGgsnRepliesFromMultipleInterfaces bool
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    BlockGtpInGtp bool
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    EnableGPduSeqNumberCheckWithMaxDeviation bool
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    EnableReverseConnections bool
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    EnforceGtpAntiSpoofing bool
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    GPduSeqNumberCheckMaxDeviation double
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    GtpSignalingRateLimitSamplingInterval double
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    MemoryActivationThreshold double
    Memory activation threshold. Available only if aggressive-aging is true.
    MemoryDeactivationThreshold double
    Memory deactivation threshold. Available only if aggressive-aging is true.
    OneGtpEchoOnEachPathFrequency double
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    ProduceExtendedLogsOnUnmatchedPdus bool
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    ProduceExtendedLogsOnUnmatchedPdusPosition string
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    ProtocolViolationTrackOption string
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    TunnelActivationThreshold double
    Tunnel activation threshold. Available only if aggressive-aging is true.
    TunnelDeactivationThreshold double
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    VerifyFlowLabels bool
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.
    AggressiveAging bool
    If true, enables configuring aggressive aging thresholds and time out value.
    AggressiveTimeout float64
    Aggressive timeout. Available only if aggressive-aging is true.
    AllowGgsnRepliesFromMultipleInterfaces bool
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    BlockGtpInGtp bool
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    EnableGPduSeqNumberCheckWithMaxDeviation bool
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    EnableReverseConnections bool
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    EnforceGtpAntiSpoofing bool
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    GPduSeqNumberCheckMaxDeviation float64
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    GtpSignalingRateLimitSamplingInterval float64
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    MemoryActivationThreshold float64
    Memory activation threshold. Available only if aggressive-aging is true.
    MemoryDeactivationThreshold float64
    Memory deactivation threshold. Available only if aggressive-aging is true.
    OneGtpEchoOnEachPathFrequency float64
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    ProduceExtendedLogsOnUnmatchedPdus bool
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    ProduceExtendedLogsOnUnmatchedPdusPosition string
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    ProtocolViolationTrackOption string
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    TunnelActivationThreshold float64
    Tunnel activation threshold. Available only if aggressive-aging is true.
    TunnelDeactivationThreshold float64
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    VerifyFlowLabels bool
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.
    aggressiveAging Boolean
    If true, enables configuring aggressive aging thresholds and time out value.
    aggressiveTimeout Double
    Aggressive timeout. Available only if aggressive-aging is true.
    allowGgsnRepliesFromMultipleInterfaces Boolean
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    blockGtpInGtp Boolean
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    enableGPduSeqNumberCheckWithMaxDeviation Boolean
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    enableReverseConnections Boolean
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    enforceGtpAntiSpoofing Boolean
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    gPduSeqNumberCheckMaxDeviation Double
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    gtpSignalingRateLimitSamplingInterval Double
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    memoryActivationThreshold Double
    Memory activation threshold. Available only if aggressive-aging is true.
    memoryDeactivationThreshold Double
    Memory deactivation threshold. Available only if aggressive-aging is true.
    oneGtpEchoOnEachPathFrequency Double
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    produceExtendedLogsOnUnmatchedPdus Boolean
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    produceExtendedLogsOnUnmatchedPdusPosition String
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    protocolViolationTrackOption String
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    tunnelActivationThreshold Double
    Tunnel activation threshold. Available only if aggressive-aging is true.
    tunnelDeactivationThreshold Double
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    verifyFlowLabels Boolean
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.
    aggressiveAging boolean
    If true, enables configuring aggressive aging thresholds and time out value.
    aggressiveTimeout number
    Aggressive timeout. Available only if aggressive-aging is true.
    allowGgsnRepliesFromMultipleInterfaces boolean
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    blockGtpInGtp boolean
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    enableGPduSeqNumberCheckWithMaxDeviation boolean
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    enableReverseConnections boolean
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    enforceGtpAntiSpoofing boolean
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    gPduSeqNumberCheckMaxDeviation number
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    gtpSignalingRateLimitSamplingInterval number
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    memoryActivationThreshold number
    Memory activation threshold. Available only if aggressive-aging is true.
    memoryDeactivationThreshold number
    Memory deactivation threshold. Available only if aggressive-aging is true.
    oneGtpEchoOnEachPathFrequency number
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    produceExtendedLogsOnUnmatchedPdus boolean
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    produceExtendedLogsOnUnmatchedPdusPosition string
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    protocolViolationTrackOption string
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    tunnelActivationThreshold number
    Tunnel activation threshold. Available only if aggressive-aging is true.
    tunnelDeactivationThreshold number
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    verifyFlowLabels boolean
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.
    aggressive_aging bool
    If true, enables configuring aggressive aging thresholds and time out value.
    aggressive_timeout float
    Aggressive timeout. Available only if aggressive-aging is true.
    allow_ggsn_replies_from_multiple_interfaces bool
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    block_gtp_in_gtp bool
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    enable_g_pdu_seq_number_check_with_max_deviation bool
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    enable_reverse_connections bool
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    enforce_gtp_anti_spoofing bool
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    g_pdu_seq_number_check_max_deviation float
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    gtp_signaling_rate_limit_sampling_interval float
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    memory_activation_threshold float
    Memory activation threshold. Available only if aggressive-aging is true.
    memory_deactivation_threshold float
    Memory deactivation threshold. Available only if aggressive-aging is true.
    one_gtp_echo_on_each_path_frequency float
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    produce_extended_logs_on_unmatched_pdus bool
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    produce_extended_logs_on_unmatched_pdus_position str
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    protocol_violation_track_option str
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    tunnel_activation_threshold float
    Tunnel activation threshold. Available only if aggressive-aging is true.
    tunnel_deactivation_threshold float
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    verify_flow_labels bool
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.
    aggressiveAging Boolean
    If true, enables configuring aggressive aging thresholds and time out value.
    aggressiveTimeout Number
    Aggressive timeout. Available only if aggressive-aging is true.
    allowGgsnRepliesFromMultipleInterfaces Boolean
    Allows GTP signaling replies from an IP address different from the IP address to which the requests are sent (Relevant only for gateways below R80).
    blockGtpInGtp Boolean
    Prevents GTP packets from being encapsulated inside GTP tunnels. When this option is checked, such packets are dropped and logged.
    enableGPduSeqNumberCheckWithMaxDeviation Boolean
    If set to false, sequence checking is not enforced and all out-of-sequence G-PDUs will be accepted.To enhance performance, disable this extended integrity test.
    enableReverseConnections Boolean
    Allows Carrier Security gateways to accept PDUs sent from the GGSN to the SGSN, on a previously established PDP context, even if these PDUs are sent over ports that do not match the ports of the established PDP context.
    enforceGtpAntiSpoofing Boolean
    verifies that G-PDUs are using the end user IP address that has been agreed upon in the PDP context activation process. When this option is checked, packets that do not use this IP address are dropped and logged.
    gPduSeqNumberCheckMaxDeviation Number
    specifies that a G-PDU is accepted only if the difference between its sequence number and the expected sequence number is less than or equal to the allowed deviation.Available only ifenable-g-pdu-seq-number-check-with-max-deviation is true.
    gtpSignalingRateLimitSamplingInterval Number
    Works in correlation with the property Enforce GTP Signal packet rate limit found in the Carrier Security window of the GSN network object. For example, with the rate limit sampling interval default of 1 second, and the network object enforced a GTP signal packet rate limit of the default 2048 PDU per second, sampling will occur one time per second, or 2048 signaling PDUs between two consecutive samplings.
    memoryActivationThreshold Number
    Memory activation threshold. Available only if aggressive-aging is true.
    memoryDeactivationThreshold Number
    Memory deactivation threshold. Available only if aggressive-aging is true.
    oneGtpEchoOnEachPathFrequency Number
    sets the number of GTP Echo exchanges per path allowed per configured time period. Echo requests exceeding this rate are dropped and logged. Setting the value to 0 disables the feature and allows an unlimited number of echo requests per path at any interval.
    produceExtendedLogsOnUnmatchedPdus Boolean
    logs GTP packets not matched by previous rules with Carrier Security's extended GTP-related log fields. These logs are brown and their Action attribute is empty. The default setting is checked.
    produceExtendedLogsOnUnmatchedPdusPosition String
    Choose to place this implicit rule Before Last or as the Last rule.Available only if produce-extended-logs-on-unmatched-pdus is true.
    protocolViolationTrackOption String
    Set the appropriate track or alert option to be used when a protocol violation (malformed packet) is detected.
    tunnelActivationThreshold Number
    Tunnel activation threshold. Available only if aggressive-aging is true.
    tunnelDeactivationThreshold Number
    Tunnel deactivation threshold. Available only if aggressive-aging is true.
    verifyFlowLabels Boolean
    See that each packet's flow label matches the flow labels defined by GTP signaling. This option is relevant for GTP version 0 only.To enhance performance, disable this extended integrity test.

    ManagementCommandSetGlobalPropertiesConnectControl, ManagementCommandSetGlobalPropertiesConnectControlArgs

    LoadAgentsPort double
    Sets the port number on which load measuring agents communicate with ConnectControl.
    LoadMeasurementInterval double
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    PersistenceServerTimeout double
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    ServerAvailabilityCheckInterval double
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    ServerCheckRetries double
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.
    LoadAgentsPort float64
    Sets the port number on which load measuring agents communicate with ConnectControl.
    LoadMeasurementInterval float64
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    PersistenceServerTimeout float64
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    ServerAvailabilityCheckInterval float64
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    ServerCheckRetries float64
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.
    loadAgentsPort Double
    Sets the port number on which load measuring agents communicate with ConnectControl.
    loadMeasurementInterval Double
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    persistenceServerTimeout Double
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    serverAvailabilityCheckInterval Double
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    serverCheckRetries Double
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.
    loadAgentsPort number
    Sets the port number on which load measuring agents communicate with ConnectControl.
    loadMeasurementInterval number
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    persistenceServerTimeout number
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    serverAvailabilityCheckInterval number
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    serverCheckRetries number
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.
    load_agents_port float
    Sets the port number on which load measuring agents communicate with ConnectControl.
    load_measurement_interval float
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    persistence_server_timeout float
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    server_availability_check_interval float
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    server_check_retries float
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.
    loadAgentsPort Number
    Sets the port number on which load measuring agents communicate with ConnectControl.
    loadMeasurementInterval Number
    sets how often (in seconds) the load measuring agents report their load status to ConnectControl.
    persistenceServerTimeout Number
    Sets the amount of time (in seconds) that a client, once directed to a particular server, will continue to be directed to that same server.
    serverAvailabilityCheckInterval Number
    Sets how often (in seconds) ConnectControl checks to make sure the load balanced servers are running and responding to service requests.
    serverCheckRetries Number
    Sets how many times ConnectControl attempts to contact a server before ceasing to direct traffic to it.

    ManagementCommandSetGlobalPropertiesDataAccessControl, ManagementCommandSetGlobalPropertiesDataAccessControlArgs

    AutoDownloadImportantData bool
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    AutoDownloadSwUpdatesAndNewFeatures bool
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    SendAnonymousInfo bool
    Help Check Point improve the product by sending anonymous information.
    ShareSensitiveInfo bool
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.
    AutoDownloadImportantData bool
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    AutoDownloadSwUpdatesAndNewFeatures bool
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    SendAnonymousInfo bool
    Help Check Point improve the product by sending anonymous information.
    ShareSensitiveInfo bool
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.
    autoDownloadImportantData Boolean
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    autoDownloadSwUpdatesAndNewFeatures Boolean
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    sendAnonymousInfo Boolean
    Help Check Point improve the product by sending anonymous information.
    shareSensitiveInfo Boolean
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.
    autoDownloadImportantData boolean
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    autoDownloadSwUpdatesAndNewFeatures boolean
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    sendAnonymousInfo boolean
    Help Check Point improve the product by sending anonymous information.
    shareSensitiveInfo boolean
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.
    auto_download_important_data bool
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    auto_download_sw_updates_and_new_features bool
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    send_anonymous_info bool
    Help Check Point improve the product by sending anonymous information.
    share_sensitive_info bool
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.
    autoDownloadImportantData Boolean
    Automatically download and install Software Blade Contracts, security updates and other important data (highly recommended).
    autoDownloadSwUpdatesAndNewFeatures Boolean
    Automatically download software updates and new features (highly recommended).Available only if auto-download-important-data is set to true.
    sendAnonymousInfo Boolean
    Help Check Point improve the product by sending anonymous information.
    shareSensitiveInfo Boolean
    Approve sharing core dump files and other relevant crash data which might contain personal information. All shared data will be processed in accordance with Check Point's Privacy Policy.Available only if send-anonymous-info is set to true.

    ManagementCommandSetGlobalPropertiesFirewall, ManagementCommandSetGlobalPropertiesFirewallArgs

    AcceptControlConnections bool
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    AcceptDomainNameOverTcp bool
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    AcceptDomainNameOverTcpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    AcceptDomainNameOverUdp bool
    Accepts Domain Name (DNS) queries and replies over UDP.
    AcceptDomainNameOverUdpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    AcceptDynamicAddrModulesOutgoingInternetConnections bool
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    AcceptIcmpRequests bool
    Accepts Internet Control Message Protocol messages.
    AcceptIcmpRequestsPosition string
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    AcceptIdentityAwarenessControlConnections bool
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    AcceptIdentityAwarenessControlConnectionsPosition string
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    AcceptIncomingTrafficToDhcpAndDnsServicesOfGws bool
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    AcceptIps1ManagementConnections bool
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    AcceptOutgoingPacketsOriginatingFromConnectraGw bool
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsOriginatingFromGw bool
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    AcceptOutgoingPacketsOriginatingFromGwPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsToCpOnlineServices bool
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsToCpOnlineServicesPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    AcceptRemoteAccessControlConnections bool
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    AcceptRip bool
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    AcceptRipPosition string
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    AcceptSmartUpdateConnections bool
    Accepts SmartUpdate connections.
    AcceptVrrpPacketsOriginatingFromClusterMembers bool
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    AcceptWebAndSshConnectionsForGwAdministration bool
    Accepts Web and SSH connections for Small Office Appliance gateways.
    LogImpliedRules bool
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    SecurityServer ManagementCommandSetGlobalPropertiesFirewallSecurityServer
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.
    AcceptControlConnections bool
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    AcceptDomainNameOverTcp bool
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    AcceptDomainNameOverTcpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    AcceptDomainNameOverUdp bool
    Accepts Domain Name (DNS) queries and replies over UDP.
    AcceptDomainNameOverUdpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    AcceptDynamicAddrModulesOutgoingInternetConnections bool
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    AcceptIcmpRequests bool
    Accepts Internet Control Message Protocol messages.
    AcceptIcmpRequestsPosition string
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    AcceptIdentityAwarenessControlConnections bool
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    AcceptIdentityAwarenessControlConnectionsPosition string
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    AcceptIncomingTrafficToDhcpAndDnsServicesOfGws bool
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    AcceptIps1ManagementConnections bool
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    AcceptOutgoingPacketsOriginatingFromConnectraGw bool
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsOriginatingFromGw bool
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    AcceptOutgoingPacketsOriginatingFromGwPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsToCpOnlineServices bool
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    AcceptOutgoingPacketsToCpOnlineServicesPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    AcceptRemoteAccessControlConnections bool
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    AcceptRip bool
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    AcceptRipPosition string
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    AcceptSmartUpdateConnections bool
    Accepts SmartUpdate connections.
    AcceptVrrpPacketsOriginatingFromClusterMembers bool
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    AcceptWebAndSshConnectionsForGwAdministration bool
    Accepts Web and SSH connections for Small Office Appliance gateways.
    LogImpliedRules bool
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    SecurityServer ManagementCommandSetGlobalPropertiesFirewallSecurityServer
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.
    acceptControlConnections Boolean
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    acceptDomainNameOverTcp Boolean
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    acceptDomainNameOverTcpPosition String
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    acceptDomainNameOverUdp Boolean
    Accepts Domain Name (DNS) queries and replies over UDP.
    acceptDomainNameOverUdpPosition String
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    acceptDynamicAddrModulesOutgoingInternetConnections Boolean
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    acceptIcmpRequests Boolean
    Accepts Internet Control Message Protocol messages.
    acceptIcmpRequestsPosition String
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    acceptIdentityAwarenessControlConnections Boolean
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    acceptIdentityAwarenessControlConnectionsPosition String
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    acceptIncomingTrafficToDhcpAndDnsServicesOfGws Boolean
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    acceptIps1ManagementConnections Boolean
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    acceptOutgoingPacketsOriginatingFromConnectraGw Boolean
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsOriginatingFromGw Boolean
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    acceptOutgoingPacketsOriginatingFromGwPosition String
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServices Boolean
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServicesPosition String
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    acceptRemoteAccessControlConnections Boolean
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    acceptRip Boolean
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    acceptRipPosition String
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    acceptSmartUpdateConnections Boolean
    Accepts SmartUpdate connections.
    acceptVrrpPacketsOriginatingFromClusterMembers Boolean
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    acceptWebAndSshConnectionsForGwAdministration Boolean
    Accepts Web and SSH connections for Small Office Appliance gateways.
    logImpliedRules Boolean
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    securityServer ManagementCommandSetGlobalPropertiesFirewallSecurityServer
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.
    acceptControlConnections boolean
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    acceptDomainNameOverTcp boolean
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    acceptDomainNameOverTcpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    acceptDomainNameOverUdp boolean
    Accepts Domain Name (DNS) queries and replies over UDP.
    acceptDomainNameOverUdpPosition string
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    acceptDynamicAddrModulesOutgoingInternetConnections boolean
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    acceptIcmpRequests boolean
    Accepts Internet Control Message Protocol messages.
    acceptIcmpRequestsPosition string
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    acceptIdentityAwarenessControlConnections boolean
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    acceptIdentityAwarenessControlConnectionsPosition string
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    acceptIncomingTrafficToDhcpAndDnsServicesOfGws boolean
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    acceptIps1ManagementConnections boolean
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    acceptOutgoingPacketsOriginatingFromConnectraGw boolean
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsOriginatingFromGw boolean
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    acceptOutgoingPacketsOriginatingFromGwPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServices boolean
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServicesPosition string
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    acceptRemoteAccessControlConnections boolean
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    acceptRip boolean
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    acceptRipPosition string
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    acceptSmartUpdateConnections boolean
    Accepts SmartUpdate connections.
    acceptVrrpPacketsOriginatingFromClusterMembers boolean
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    acceptWebAndSshConnectionsForGwAdministration boolean
    Accepts Web and SSH connections for Small Office Appliance gateways.
    logImpliedRules boolean
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    securityServer ManagementCommandSetGlobalPropertiesFirewallSecurityServer
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.
    accept_control_connections bool
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    accept_domain_name_over_tcp bool
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    accept_domain_name_over_tcp_position str
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    accept_domain_name_over_udp bool
    Accepts Domain Name (DNS) queries and replies over UDP.
    accept_domain_name_over_udp_position str
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    accept_dynamic_addr_modules_outgoing_internet_connections bool
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    accept_icmp_requests bool
    Accepts Internet Control Message Protocol messages.
    accept_icmp_requests_position str
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    accept_identity_awareness_control_connections bool
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    accept_identity_awareness_control_connections_position str
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    accept_incoming_traffic_to_dhcp_and_dns_services_of_gws bool
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    accept_ips1_management_connections bool
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    accept_outgoing_packets_originating_from_connectra_gw bool
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    accept_outgoing_packets_originating_from_gw bool
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    accept_outgoing_packets_originating_from_gw_position str
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    accept_outgoing_packets_to_cp_online_services bool
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    accept_outgoing_packets_to_cp_online_services_position str
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    accept_remote_access_control_connections bool
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    accept_rip bool
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    accept_rip_position str
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    accept_smart_update_connections bool
    Accepts SmartUpdate connections.
    accept_vrrp_packets_originating_from_cluster_members bool
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    accept_web_and_ssh_connections_for_gw_administration bool
    Accepts Web and SSH connections for Small Office Appliance gateways.
    log_implied_rules bool
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    security_server ManagementCommandSetGlobalPropertiesFirewallSecurityServer
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.
    acceptControlConnections Boolean
    Used for: Installing the security policy from the Security Management server to the gateways. Sending logs from the gateways to the Security Management server.Communication between SmartConsole clients and the Security Management Server. Communication between Firewall daemons on different machines (Security Management Server, Security Gateway).< Connecting to OPSEC applications such as RADIUS and TACACS authentication servers. If you disable Accept Control Connections and you want Check Point components to communicate with each other and with OPSEC components, you must explicitly allow these connections in the Rule Base.
    acceptDomainNameOverTcp Boolean
    Accepts Domain Name (DNS) queries and replies over TCP, to allow downloading of the domain name-resolving tables used for zone transfers between servers. For clients, DNS over TCP is only used if the tables to be transferred are very large.
    acceptDomainNameOverTcpPosition String
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-tcp is true.
    acceptDomainNameOverUdp Boolean
    Accepts Domain Name (DNS) queries and replies over UDP.
    acceptDomainNameOverUdpPosition String
    The position of the implied rules in the Rule Base. Available only if accept-domain-name-over-udp is true.
    acceptDynamicAddrModulesOutgoingInternetConnections Boolean
    Accept Dynamic Address modules' outgoing internet connections.Accepts DHCP traffic for DAIP (Dynamically Assigned IP Address) gateways. In Small Office Appliance gateways, this rule allows outgoing DHCP, PPP, PPTP and L2TP Internet connections (regardless of whether it is or is not a DAIP gateway).
    acceptIcmpRequests Boolean
    Accepts Internet Control Message Protocol messages.
    acceptIcmpRequestsPosition String
    The position of the implied rules in the Rule Base. Available only if accept-icmp-requests is true.
    acceptIdentityAwarenessControlConnections Boolean
    Accepts traffic between Security Gateways in distributed environment configurations of Identity Awareness.
    acceptIdentityAwarenessControlConnectionsPosition String
    The position of the implied rules in the Rule Base.Available only if accept-identity-awareness-control-connections is true.
    acceptIncomingTrafficToDhcpAndDnsServicesOfGws Boolean
    Allows the Small Office Appliance gateway to provide DHCP relay, DHCP server and DNS proxy services regardless of the rule base.
    acceptIps1ManagementConnections Boolean
    Accepts IPS-1 connections. Available only if accept-control-connections is true.
    acceptOutgoingPacketsOriginatingFromConnectraGw Boolean
    Accepts outgoing packets originating from Connectra gateway. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsOriginatingFromGw Boolean
    Accepts all packets from connections that originate at the Check Point Security Gateway.
    acceptOutgoingPacketsOriginatingFromGwPosition String
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServices Boolean
    Allow Security Gateways to access Check Point online services. Supported for R80.10 Gateway and higher. Available only if accept-outgoing-packets-originating-from-gw is false.
    acceptOutgoingPacketsToCpOnlineServicesPosition String
    The position of the implied rules in the Rule Base. Available only if accept-outgoing-packets-to-cp-online-services is true.
    acceptRemoteAccessControlConnections Boolean
    Accepts Remote Access connections. Available only if accept-control-connections is true.
    acceptRip Boolean
    Accepts Routing Information Protocol (RIP), using UDP on port 520.
    acceptRipPosition String
    The position of the implied rules in the Rule Base. Available only if accept-rip is true.
    acceptSmartUpdateConnections Boolean
    Accepts SmartUpdate connections.
    acceptVrrpPacketsOriginatingFromClusterMembers Boolean
    Selecting this option creates an implied rule in the security policy Rule Base that accepts VRRP inbound and outbound traffic to and from the members of the cluster.
    acceptWebAndSshConnectionsForGwAdministration Boolean
    Accepts Web and SSH connections for Small Office Appliance gateways.
    logImpliedRules Boolean
    Produces log records for communications that match the implied rules that are generated in the Rule Base from the properties defined in this window.
    securityServer Property Map
    Control the welcome messages that users will see when logging in to servers behind Check Point Security Gateways.

    ManagementCommandSetGlobalPropertiesFirewallSecurityServer, ManagementCommandSetGlobalPropertiesFirewallSecurityServerArgs

    ClientAuthWelcomeFile string
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    FtpWelcomeMsgFile string
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    HttpNextProxyHost string
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    HttpNextProxyPort double
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    HttpServers List<ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer>
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    MdqWelcomeMsg string
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    RloginWelcomeMsgFile string
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    ServerForNullRequests string
    The Logical Name of a Null Requests Server from http-servers.
    SmtpWelcomeMsg string
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    TelnetWelcomeMsgFile string
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.
    ClientAuthWelcomeFile string
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    FtpWelcomeMsgFile string
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    HttpNextProxyHost string
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    HttpNextProxyPort float64
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    HttpServers []ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    MdqWelcomeMsg string
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    RloginWelcomeMsgFile string
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    ServerForNullRequests string
    The Logical Name of a Null Requests Server from http-servers.
    SmtpWelcomeMsg string
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    TelnetWelcomeMsgFile string
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.
    clientAuthWelcomeFile String
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    ftpWelcomeMsgFile String
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    httpNextProxyHost String
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpNextProxyPort Double
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpServers List<ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer>
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    mdqWelcomeMsg String
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    rloginWelcomeMsgFile String
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    serverForNullRequests String
    The Logical Name of a Null Requests Server from http-servers.
    smtpWelcomeMsg String
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    telnetWelcomeMsgFile String
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.
    clientAuthWelcomeFile string
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    ftpWelcomeMsgFile string
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    httpNextProxyHost string
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpNextProxyPort number
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpServers ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer[]
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    mdqWelcomeMsg string
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    rloginWelcomeMsgFile string
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    serverForNullRequests string
    The Logical Name of a Null Requests Server from http-servers.
    smtpWelcomeMsg string
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    telnetWelcomeMsgFile string
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.
    client_auth_welcome_file str
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    ftp_welcome_msg_file str
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    http_next_proxy_host str
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    http_next_proxy_port float
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    http_servers Sequence[ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer]
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    mdq_welcome_msg str
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    rlogin_welcome_msg_file str
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    server_for_null_requests str
    The Logical Name of a Null Requests Server from http-servers.
    smtp_welcome_msg str
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    telnet_welcome_msg_file str
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.
    clientAuthWelcomeFile String
    Client authentication welcome file is the name of a file whose contents are to be displayed when a user begins a Client Authenticated session (optional) using the Manual Sign On Method. Client Authenticated Sessions initiated by Manual Sign On are not mediated by a security server.
    ftpWelcomeMsgFile String
    FTP welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated FTP session.
    httpNextProxyHost String
    HTTP next proxy host is the host name of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpNextProxyPort Number
    HTTP next proxy port is the port of the HTTP proxy behind the Check Point Security Gateway HTTP security server (if there is one). Changing the HTTP Next Proxy fields takes effect after the Security Gateway database is downloaded to the authenticating gateway, or after the security policy is re-installed. These settings apply only to firewalled gateways prior to NG. For later versions, these settings should be defined in the Node Properties window.
    httpServers List<Property Map>
    This list specifies the HTTP servers. Defining HTTP servers allows you to restrict incoming HTTP.
    mdqWelcomeMsg String
    MDQ Welcome Message is the message to be displayed when a user begins an MDQ session. The MDQ Welcome Message should contain characters according to RFC 1035 and it must follow the ARPANET host name rules: - This message must begin with a number or letter. After the first letter or number character the remaining characters can be a letter, number, space, tab or hyphen. - This message must not end with a space or a tab and is limited to 63 characters.
    rloginWelcomeMsgFile String
    Rlogin welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated RLOGIN session.
    serverForNullRequests String
    The Logical Name of a Null Requests Server from http-servers.
    smtpWelcomeMsg String
    SMTP Welcome Message is the message to be displayed when a user begins an SMTP session.
    telnetWelcomeMsgFile String
    Telnet welcome message file is the name of a file whose contents are to be displayed when a user begins an Authenticated Telnet session.

    ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServer, ManagementCommandSetGlobalPropertiesFirewallSecurityServerHttpServerArgs

    Host string
    Host name of the HTTP Server.
    LogicalName string
    Unique Logical Name of the HTTP Server.
    Port double
    Port number of the HTTP Server.
    Reauthentication string
    Specify whether users must reauthenticate when accessing a specific server.
    Host string
    Host name of the HTTP Server.
    LogicalName string
    Unique Logical Name of the HTTP Server.
    Port float64
    Port number of the HTTP Server.
    Reauthentication string
    Specify whether users must reauthenticate when accessing a specific server.
    host String
    Host name of the HTTP Server.
    logicalName String
    Unique Logical Name of the HTTP Server.
    port Double
    Port number of the HTTP Server.
    reauthentication String
    Specify whether users must reauthenticate when accessing a specific server.
    host string
    Host name of the HTTP Server.
    logicalName string
    Unique Logical Name of the HTTP Server.
    port number
    Port number of the HTTP Server.
    reauthentication string
    Specify whether users must reauthenticate when accessing a specific server.
    host str
    Host name of the HTTP Server.
    logical_name str
    Unique Logical Name of the HTTP Server.
    port float
    Port number of the HTTP Server.
    reauthentication str
    Specify whether users must reauthenticate when accessing a specific server.
    host String
    Host name of the HTTP Server.
    logicalName String
    Unique Logical Name of the HTTP Server.
    port Number
    Port number of the HTTP Server.
    reauthentication String
    Specify whether users must reauthenticate when accessing a specific server.

    ManagementCommandSetGlobalPropertiesHitCount, ManagementCommandSetGlobalPropertiesHitCountArgs

    EnableHitCount bool
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    KeepHitCountDataUpTo string
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.
    EnableHitCount bool
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    KeepHitCountDataUpTo string
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.
    enableHitCount Boolean
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    keepHitCountDataUpTo String
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.
    enableHitCount boolean
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    keepHitCountDataUpTo string
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.
    enable_hit_count bool
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    keep_hit_count_data_up_to str
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.
    enableHitCount Boolean
    Select to enable or clear to disable all Security Gateways to monitor the number of connections each rule matches.
    keepHitCountDataUpTo String
    Select one of the time range options. Data is kept in the Security Management Server database for this period and is shown in the Hits column.

    ManagementCommandSetGlobalPropertiesLogAndAlert, ManagementCommandSetGlobalPropertiesLogAndAlertArgs

    AdministrativeNotifications string
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    Alerts ManagementCommandSetGlobalPropertiesLogAndAlertAlerts
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    ConnectionMatchedBySam string
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    DynamicObjectResolutionFailure string
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    LogEveryAuthenticatedHttpConnection bool
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    LogTraffic string
    Log Traffic specifies whether or not to log traffic.
    PacketIsIncorrectlyTagged string
    Packet is incorrectly tagged.
    PacketTaggingBruteForceAttack string
    Packet tagging brute force attack.
    SlaViolation string
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    TimeSettings ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings
    Configure the time settings associated with system-wide logging and alerting parameters.
    VpnConfAndKeyExchangeErrors string
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    VpnPacketHandlingError string
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    VpnSuccessfulKeyExchange string
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.
    AdministrativeNotifications string
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    Alerts ManagementCommandSetGlobalPropertiesLogAndAlertAlerts
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    ConnectionMatchedBySam string
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    DynamicObjectResolutionFailure string
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    LogEveryAuthenticatedHttpConnection bool
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    LogTraffic string
    Log Traffic specifies whether or not to log traffic.
    PacketIsIncorrectlyTagged string
    Packet is incorrectly tagged.
    PacketTaggingBruteForceAttack string
    Packet tagging brute force attack.
    SlaViolation string
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    TimeSettings ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings
    Configure the time settings associated with system-wide logging and alerting parameters.
    VpnConfAndKeyExchangeErrors string
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    VpnPacketHandlingError string
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    VpnSuccessfulKeyExchange string
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.
    administrativeNotifications String
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    alerts ManagementCommandSetGlobalPropertiesLogAndAlertAlerts
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    connectionMatchedBySam String
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    dynamicObjectResolutionFailure String
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    logEveryAuthenticatedHttpConnection Boolean
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    logTraffic String
    Log Traffic specifies whether or not to log traffic.
    packetIsIncorrectlyTagged String
    Packet is incorrectly tagged.
    packetTaggingBruteForceAttack String
    Packet tagging brute force attack.
    slaViolation String
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    timeSettings ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings
    Configure the time settings associated with system-wide logging and alerting parameters.
    vpnConfAndKeyExchangeErrors String
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    vpnPacketHandlingError String
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    vpnSuccessfulKeyExchange String
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.
    administrativeNotifications string
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    alerts ManagementCommandSetGlobalPropertiesLogAndAlertAlerts
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    connectionMatchedBySam string
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    dynamicObjectResolutionFailure string
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    logEveryAuthenticatedHttpConnection boolean
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    logTraffic string
    Log Traffic specifies whether or not to log traffic.
    packetIsIncorrectlyTagged string
    Packet is incorrectly tagged.
    packetTaggingBruteForceAttack string
    Packet tagging brute force attack.
    slaViolation string
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    timeSettings ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings
    Configure the time settings associated with system-wide logging and alerting parameters.
    vpnConfAndKeyExchangeErrors string
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    vpnPacketHandlingError string
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    vpnSuccessfulKeyExchange string
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.
    administrative_notifications str
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    alerts ManagementCommandSetGlobalPropertiesLogAndAlertAlerts
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    connection_matched_by_sam str
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    dynamic_object_resolution_failure str
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    log_every_authenticated_http_connection bool
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    log_traffic str
    Log Traffic specifies whether or not to log traffic.
    packet_is_incorrectly_tagged str
    Packet is incorrectly tagged.
    packet_tagging_brute_force_attack str
    Packet tagging brute force attack.
    sla_violation str
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    time_settings ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings
    Configure the time settings associated with system-wide logging and alerting parameters.
    vpn_conf_and_key_exchange_errors str
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    vpn_packet_handling_error str
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    vpn_successful_key_exchange str
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.
    administrativeNotifications String
    Administrative notifications specifies the action to be taken when an administrative event (for example, when a certificate is about to expire) occurs.
    alerts Property Map
    Define the behavior of alert logs and the type of alert used for System Alert logs.
    connectionMatchedBySam String
    Connection matched by SAM specifies the action to be taken when a connection is blocked by SAM (Suspicious Activities Monitoring).
    dynamicObjectResolutionFailure String
    Dynamic object resolution failure specifies the action to be taken when a dynamic object cannot be resolved.
    logEveryAuthenticatedHttpConnection Boolean
    Log every authenticated HTTP connection specifies that a log entry should be generated for every authenticated HTTP connection.
    logTraffic String
    Log Traffic specifies whether or not to log traffic.
    packetIsIncorrectlyTagged String
    Packet is incorrectly tagged.
    packetTaggingBruteForceAttack String
    Packet tagging brute force attack.
    slaViolation String
    SLA violation specifies the action to be taken when an SLA violation occurs, as defined in the Virtual Links window.
    timeSettings Property Map
    Configure the time settings associated with system-wide logging and alerting parameters.
    vpnConfAndKeyExchangeErrors String
    VPN configuration & key exchange errors specifies the action to be taken when logging configuration or key exchange errors occur, for example, when attempting to establish encrypted communication with a network object inside the same encryption domain.
    vpnPacketHandlingError String
    VPN packet handling errors specifies the action to be taken when encryption or decryption errors occurs. A log entry contains the action performed (Drop or Reject) and a short description of the error cause, for example, scheme or method mismatch.
    vpnSuccessfulKeyExchange String
    VPN successful key exchange specifies the action to be taken when VPN keys are successfully exchanged.

    ManagementCommandSetGlobalPropertiesLogAndAlertAlerts, ManagementCommandSetGlobalPropertiesLogAndAlertAlertsArgs

    DefaultTrackOptionForSystemAlerts string
    Set the default track option for System Alerts.
    MailAlertScript string
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    PopupAlertScript string
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    SendMailAlertToSmartviewMonitor bool
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    SendPopupAlertToSmartviewMonitor bool
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendSnmpTrapAlertToSmartviewMonitor bool
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum1ToSmartviewMonitor bool
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum2ToSmartviewMonitor bool
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum3ToSmartviewMonitor bool
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SnmpTrapAlertScript string
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    UserDefinedScriptNum1 string
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    UserDefinedScriptNum2 string
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    UserDefinedScriptNum3 string
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.
    DefaultTrackOptionForSystemAlerts string
    Set the default track option for System Alerts.
    MailAlertScript string
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    PopupAlertScript string
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    SendMailAlertToSmartviewMonitor bool
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    SendPopupAlertToSmartviewMonitor bool
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendSnmpTrapAlertToSmartviewMonitor bool
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum1ToSmartviewMonitor bool
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum2ToSmartviewMonitor bool
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SendUserDefinedAlertNum3ToSmartviewMonitor bool
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    SnmpTrapAlertScript string
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    UserDefinedScriptNum1 string
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    UserDefinedScriptNum2 string
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    UserDefinedScriptNum3 string
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.
    defaultTrackOptionForSystemAlerts String
    Set the default track option for System Alerts.
    mailAlertScript String
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    popupAlertScript String
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    sendMailAlertToSmartviewMonitor Boolean
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    sendPopupAlertToSmartviewMonitor Boolean
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendSnmpTrapAlertToSmartviewMonitor Boolean
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum1ToSmartviewMonitor Boolean
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum2ToSmartviewMonitor Boolean
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum3ToSmartviewMonitor Boolean
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    snmpTrapAlertScript String
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    userDefinedScriptNum1 String
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    userDefinedScriptNum2 String
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    userDefinedScriptNum3 String
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.
    defaultTrackOptionForSystemAlerts string
    Set the default track option for System Alerts.
    mailAlertScript string
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    popupAlertScript string
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    sendMailAlertToSmartviewMonitor boolean
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    sendPopupAlertToSmartviewMonitor boolean
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendSnmpTrapAlertToSmartviewMonitor boolean
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum1ToSmartviewMonitor boolean
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum2ToSmartviewMonitor boolean
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum3ToSmartviewMonitor boolean
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    snmpTrapAlertScript string
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    userDefinedScriptNum1 string
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    userDefinedScriptNum2 string
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    userDefinedScriptNum3 string
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.
    default_track_option_for_system_alerts str
    Set the default track option for System Alerts.
    mail_alert_script str
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    popup_alert_script str
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    send_mail_alert_to_smartview_monitor bool
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    send_popup_alert_to_smartview_monitor bool
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    send_snmp_trap_alert_to_smartview_monitor bool
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    send_user_defined_alert_num1_to_smartview_monitor bool
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    send_user_defined_alert_num2_to_smartview_monitor bool
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    send_user_defined_alert_num3_to_smartview_monitor bool
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    snmp_trap_alert_script str
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    user_defined_script_num1 str
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    user_defined_script_num2 str
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    user_defined_script_num3 str
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.
    defaultTrackOptionForSystemAlerts String
    Set the default track option for System Alerts.
    mailAlertScript String
    Run mail alert script the operating system script to be executed when Mail is specified as the Track in a rule. The default is internal_sendmail, which is not a script but an internal Security Gateway command.
    popupAlertScript String
    Run popup alert script the operating system script to be executed when an alert is issued. For example, set another form of notification, such as an email or a user-defined command.
    sendMailAlertToSmartviewMonitor Boolean
    Send mail alert to SmartView Monitor when a mail alert is issued, it is also sent to SmartView Monitor.
    sendPopupAlertToSmartviewMonitor Boolean
    Send popup alert to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendSnmpTrapAlertToSmartviewMonitor Boolean
    Send SNMP trap alert to SmartView Monitor when an SNMP trap alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum1ToSmartviewMonitor Boolean
    Send user defined alert no. 1 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum2ToSmartviewMonitor Boolean
    Send user defined alert no. 2 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    sendUserDefinedAlertNum3ToSmartviewMonitor Boolean
    Send user defined alert no. 3 to SmartView Monitor when an alert is issued, it is also sent to SmartView Monitor.
    snmpTrapAlertScript String
    Run SNMP trap alert script command to be executed when SNMP Trap is specified as the Track in a rule. By default the internal_snmp_trap is used. This command is executed by the fwd process.
    userDefinedScriptNum1 String
    Run user defined script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 1 is selected as a Track Option.
    userDefinedScriptNum2 String
    Run user defined 2 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 2 is selected as a Track Option.
    userDefinedScriptNum3 String
    Run user defined 3 script the operating system script to be run when User-Defined is specified as the Track in a rule, or when User Defined Alert no. 3 is selected as a Track Option.

    ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettings, ManagementCommandSetGlobalPropertiesLogAndAlertTimeSettingsArgs

    ExcessiveLogGracePeriod double
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    LogsResolvingTimeout double
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    StatusFetchingInterval double
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    VirtualLinkStatisticsLoggingInterval double
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.
    ExcessiveLogGracePeriod float64
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    LogsResolvingTimeout float64
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    StatusFetchingInterval float64
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    VirtualLinkStatisticsLoggingInterval float64
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.
    excessiveLogGracePeriod Double
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    logsResolvingTimeout Double
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    statusFetchingInterval Double
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    virtualLinkStatisticsLoggingInterval Double
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.
    excessiveLogGracePeriod number
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    logsResolvingTimeout number
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    statusFetchingInterval number
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    virtualLinkStatisticsLoggingInterval number
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.
    excessive_log_grace_period float
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    logs_resolving_timeout float
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    status_fetching_interval float
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    virtual_link_statistics_logging_interval float
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.
    excessiveLogGracePeriod Number
    Specifies the minimum amount of time (in seconds) between consecutive logs of similar packets. Two packets are considered similar if they have the same source address, source port, destination address, and destination port; and the same protocol was used. After the first packet, similar packets encountered in the grace period will be acted upon according to the security policy, but only the first packet generates a log entry or an alert. Any value from 0 to 90 seconds can be entered in this field.Note: This option only applies for DROP rules with logging.
    logsResolvingTimeout Number
    Specifies the amount of time (in seconds), after which the log page is displayed without resolving names and while showing only IP addresses. Any value from 0 to 90 seconds can be entered in this field.
    statusFetchingInterval Number
    Specifies the frequency at which the Security Management server queries the Check Point Security gateway, Check Point QoS and other gateways it manages for status information. Any value from 30 to 900 seconds can be entered in this field.
    virtualLinkStatisticsLoggingInterval Number
    Specifies the frequency (in seconds) with which Virtual Link statistics will be logged. This parameter is relevant only for Virtual Links defined with SmartView Monitor statistics enabled in the SLA Parameters tab of the Virtual Link window. Any value from 60 to 3600 seconds can be entered in this field.

    ManagementCommandSetGlobalPropertiesNat, ManagementCommandSetGlobalPropertiesNatArgs

    AddrAllocAndReleaseTrack string
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    AddrExhaustionTrack string
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    AllowBiDirectionalNat bool
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    AutoArpConf bool
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    AutoTranslateDestOnClientSide bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    EnableIpPoolNat bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    ManuallyTranslateDestOnClientSide bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    MergeManualProxyArpConf bool
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.
    AddrAllocAndReleaseTrack string
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    AddrExhaustionTrack string
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    AllowBiDirectionalNat bool
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    AutoArpConf bool
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    AutoTranslateDestOnClientSide bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    EnableIpPoolNat bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    ManuallyTranslateDestOnClientSide bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    MergeManualProxyArpConf bool
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.
    addrAllocAndReleaseTrack String
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    addrExhaustionTrack String
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    allowBiDirectionalNat Boolean
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    autoArpConf Boolean
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    autoTranslateDestOnClientSide Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    enableIpPoolNat Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    manuallyTranslateDestOnClientSide Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    mergeManualProxyArpConf Boolean
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.
    addrAllocAndReleaseTrack string
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    addrExhaustionTrack string
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    allowBiDirectionalNat boolean
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    autoArpConf boolean
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    autoTranslateDestOnClientSide boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    enableIpPoolNat boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    manuallyTranslateDestOnClientSide boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    mergeManualProxyArpConf boolean
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.
    addr_alloc_and_release_track str
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    addr_exhaustion_track str
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    allow_bi_directional_nat bool
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    auto_arp_conf bool
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    auto_translate_dest_on_client_side bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    enable_ip_pool_nat bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    manually_translate_dest_on_client_side bool
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    merge_manual_proxy_arp_conf bool
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.
    addrAllocAndReleaseTrack String
    Specifies whether to log each allocation and release of an IP address from the IP Pool. Available only if enable-ip-pool-nat is true.
    addrExhaustionTrack String
    Specifies the action to take if the IP Pool is exhausted. Available only if enable-ip-pool-nat is true.
    allowBiDirectionalNat Boolean
    Applies to automatic NAT rules in the NAT Rule Base, and allows two automatic NAT rules to match a connection. Without Bidirectional NAT, only one automatic NAT rule can match a connection.
    autoArpConf Boolean
    Ensures that ARP requests for a translated (NATed) machine, network or address range are answered by the Check Point Security Gateway.
    autoTranslateDestOnClientSide Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    enableIpPoolNat Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    manuallyTranslateDestOnClientSide Boolean
    Applies to packets originating at the client, with the server as its destination. Static NAT for the server is performed on the client side.
    mergeManualProxyArpConf Boolean
    Merges the automatic and manual ARP configurations. Manual proxy ARP configuration is required for manual Static NAT rules.Available only if auto-arp-conf is true.

    ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange, ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRangeArgs

    AddressType string
    The type of the IP Address.
    FirstIpv4Address string
    The first IPV4 Address in the range.
    FirstIpv6Address string
    The first IPV6 Address in the range.
    LastIpv4Address string
    The last IPV4 Address in the range.
    LastIpv6Address string
    The last IPV6 Address in the range.
    AddressType string
    The type of the IP Address.
    FirstIpv4Address string
    The first IPV4 Address in the range.
    FirstIpv6Address string
    The first IPV6 Address in the range.
    LastIpv4Address string
    The last IPV4 Address in the range.
    LastIpv6Address string
    The last IPV6 Address in the range.
    addressType String
    The type of the IP Address.
    firstIpv4Address String
    The first IPV4 Address in the range.
    firstIpv6Address String
    The first IPV6 Address in the range.
    lastIpv4Address String
    The last IPV4 Address in the range.
    lastIpv6Address String
    The last IPV6 Address in the range.
    addressType string
    The type of the IP Address.
    firstIpv4Address string
    The first IPV4 Address in the range.
    firstIpv6Address string
    The first IPV6 Address in the range.
    lastIpv4Address string
    The last IPV4 Address in the range.
    lastIpv6Address string
    The last IPV6 Address in the range.
    address_type str
    The type of the IP Address.
    first_ipv4_address str
    The first IPV4 Address in the range.
    first_ipv6_address str
    The first IPV6 Address in the range.
    last_ipv4_address str
    The last IPV4 Address in the range.
    last_ipv6_address str
    The last IPV6 Address in the range.
    addressType String
    The type of the IP Address.
    firstIpv4Address String
    The first IPV4 Address in the range.
    firstIpv6Address String
    The first IPV6 Address in the range.
    lastIpv4Address String
    The last IPV4 Address in the range.
    lastIpv6Address String
    The last IPV6 Address in the range.

    ManagementCommandSetGlobalPropertiesProxy, ManagementCommandSetGlobalPropertiesProxyArgs

    ProxyAddress string
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    ProxyPort double
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    UseProxyServer bool
    If set to true, a proxy server is used when features need to access the internet.
    ProxyAddress string
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    ProxyPort float64
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    UseProxyServer bool
    If set to true, a proxy server is used when features need to access the internet.
    proxyAddress String
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    proxyPort Double
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    useProxyServer Boolean
    If set to true, a proxy server is used when features need to access the internet.
    proxyAddress string
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    proxyPort number
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    useProxyServer boolean
    If set to true, a proxy server is used when features need to access the internet.
    proxy_address str
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    proxy_port float
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    use_proxy_server bool
    If set to true, a proxy server is used when features need to access the internet.
    proxyAddress String
    Specify the URL or IP address of the proxy server.Available only if use-proxy-server is set to true.
    proxyPort Number
    Specify the Port on which the server will be accessed.Available only if use-proxy-server is set to true.
    useProxyServer Boolean
    If set to true, a proxy server is used when features need to access the internet.

    ManagementCommandSetGlobalPropertiesQos, ManagementCommandSetGlobalPropertiesQosArgs

    AuthenticatedIpExpiration double
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    DefaultWeightOfRule double
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    MaxWeightOfRule double
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    NonAuthenticatedIpExpiration double
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    UnansweredQueriedIpExpiration double
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    UnitOfMeasure string
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.
    AuthenticatedIpExpiration float64
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    DefaultWeightOfRule float64
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    MaxWeightOfRule float64
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    NonAuthenticatedIpExpiration float64
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    UnansweredQueriedIpExpiration float64
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    UnitOfMeasure string
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.
    authenticatedIpExpiration Double
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    defaultWeightOfRule Double
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    maxWeightOfRule Double
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    nonAuthenticatedIpExpiration Double
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unansweredQueriedIpExpiration Double
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unitOfMeasure String
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.
    authenticatedIpExpiration number
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    defaultWeightOfRule number
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    maxWeightOfRule number
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    nonAuthenticatedIpExpiration number
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unansweredQueriedIpExpiration number
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unitOfMeasure string
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.
    authenticated_ip_expiration float
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    default_weight_of_rule float
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    max_weight_of_rule float
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    non_authenticated_ip_expiration float
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unanswered_queried_ip_expiration float
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unit_of_measure str
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.
    authenticatedIpExpiration Number
    Define the Authentication time-out for QoS. This timeout is set in minutes. In an Authenticated IP all connections which are open in a specified time limit will be guaranteed bandwidth, but will not be guaranteed bandwidth after the time limit.
    defaultWeightOfRule Number
    Define a Weight at which bandwidth will be guaranteed. Set a default weight for a rule.Note: Value will be applied to new rules only.
    maxWeightOfRule Number
    Define a Weight at which bandwidth will be guaranteed. Set a maximum weight for a rule.
    nonAuthenticatedIpExpiration Number
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unansweredQueriedIpExpiration Number
    Define the Authentication time-out for QoS. This timeout is set in minutes.
    unitOfMeasure String
    Define the Rate at which packets are transmitted, for which bandwidth will be guaranteed. Set a Unit of measure.

    ManagementCommandSetGlobalPropertiesRemoteAccess, ManagementCommandSetGlobalPropertiesRemoteAccessArgs

    EnableBackConnections bool
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    EncryptDnsTraffic bool
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    EndpointConnect ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    HotSpotAndHotelRegistration ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    KeepAlivePacketToGwInterval double
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    Scv ManagementCommandSetGlobalPropertiesRemoteAccessScv
    Define properties of the Secure Configuration Verification process.
    SecureClientMobile ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile
    Define properties for SecureClient Mobile.
    SimultaneousLoginMode string
    Select the simultaneous login mode.
    SslNetworkExtender ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender
    Define properties for SSL Network Extender users.
    VpnAdvanced ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced
    Configure encryption methods and interface resolution for remote access clients.
    VpnAuthenticationAndEncryptions List<ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption>
    configure supported Encryption and Authentication methods for Remote Access clients.
    EnableBackConnections bool
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    EncryptDnsTraffic bool
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    EndpointConnect ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    HotSpotAndHotelRegistration ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    KeepAlivePacketToGwInterval float64
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    Scv ManagementCommandSetGlobalPropertiesRemoteAccessScv
    Define properties of the Secure Configuration Verification process.
    SecureClientMobile ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile
    Define properties for SecureClient Mobile.
    SimultaneousLoginMode string
    Select the simultaneous login mode.
    SslNetworkExtender ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender
    Define properties for SSL Network Extender users.
    VpnAdvanced ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced
    Configure encryption methods and interface resolution for remote access clients.
    VpnAuthenticationAndEncryptions []ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption
    configure supported Encryption and Authentication methods for Remote Access clients.
    enableBackConnections Boolean
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    encryptDnsTraffic Boolean
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    endpointConnect ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    hotSpotAndHotelRegistration ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    keepAlivePacketToGwInterval Double
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    scv ManagementCommandSetGlobalPropertiesRemoteAccessScv
    Define properties of the Secure Configuration Verification process.
    secureClientMobile ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile
    Define properties for SecureClient Mobile.
    simultaneousLoginMode String
    Select the simultaneous login mode.
    sslNetworkExtender ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender
    Define properties for SSL Network Extender users.
    vpnAdvanced ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced
    Configure encryption methods and interface resolution for remote access clients.
    vpnAuthenticationAndEncryptions List<ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption>
    configure supported Encryption and Authentication methods for Remote Access clients.
    enableBackConnections boolean
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    encryptDnsTraffic boolean
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    endpointConnect ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    hotSpotAndHotelRegistration ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    keepAlivePacketToGwInterval number
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    scv ManagementCommandSetGlobalPropertiesRemoteAccessScv
    Define properties of the Secure Configuration Verification process.
    secureClientMobile ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile
    Define properties for SecureClient Mobile.
    simultaneousLoginMode string
    Select the simultaneous login mode.
    sslNetworkExtender ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender
    Define properties for SSL Network Extender users.
    vpnAdvanced ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced
    Configure encryption methods and interface resolution for remote access clients.
    vpnAuthenticationAndEncryptions ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption[]
    configure supported Encryption and Authentication methods for Remote Access clients.
    enable_back_connections bool
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    encrypt_dns_traffic bool
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    endpoint_connect ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    hot_spot_and_hotel_registration ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    keep_alive_packet_to_gw_interval float
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    scv ManagementCommandSetGlobalPropertiesRemoteAccessScv
    Define properties of the Secure Configuration Verification process.
    secure_client_mobile ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile
    Define properties for SecureClient Mobile.
    simultaneous_login_mode str
    Select the simultaneous login mode.
    ssl_network_extender ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender
    Define properties for SSL Network Extender users.
    vpn_advanced ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced
    Configure encryption methods and interface resolution for remote access clients.
    vpn_authentication_and_encryptions Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption]
    configure supported Encryption and Authentication methods for Remote Access clients.
    enableBackConnections Boolean
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine whether the back connection is enabled.
    encryptDnsTraffic Boolean
    You can decide whether DNS queries sent by the remote client to a DNS server located on the corporate LAN are passed through the VPN tunnel or not. Disable this option if the client has to make DNS queries to the DNS server on the corporate LAN while connecting to the organization but without using the SecuRemote client.
    endpointConnect Property Map
    Configure global settings for Endpoint Connect. These settings apply to all gateways.
    hotSpotAndHotelRegistration Property Map
    Configure the settings for Wireless Hot Spot and Hotel Internet access registration.
    keepAlivePacketToGwInterval Number
    Usually communication with remote clients must be initialized by the clients. However, once a client has opened a connection, the hosts behind VPN can open a return or back connection to the client. For a back connection, the client's details must be maintained on all the devices between the client and the gateway, and on the gateway itself. Determine frequency (in seconds) of the Keep Alive packets sent by the client in order to maintain the connection with the gateway.Available only if enable-back-connections is true.
    scv Property Map
    Define properties of the Secure Configuration Verification process.
    secureClientMobile Property Map
    Define properties for SecureClient Mobile.
    simultaneousLoginMode String
    Select the simultaneous login mode.
    sslNetworkExtender Property Map
    Define properties for SSL Network Extender users.
    vpnAdvanced Property Map
    Configure encryption methods and interface resolution for remote access clients.
    vpnAuthenticationAndEncryptions List<Property Map>
    configure supported Encryption and Authentication methods for Remote Access clients.

    ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnect, ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectArgs

    CachePasswordTimeout double
    Cached password timeout (in minutes).
    ClientUpgradeMode string
    Select an option to determine how the client is upgraded.
    ConnectMode string
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    DisconnectWhenConnToNetworkIsLost string
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    DisconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    EnablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    NetworkLocationAwareness string
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    NetworkLocationAwarenessConf ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf
    Configure how the client determines its location in relation to the internal network.
    ReAuthUserInterval double
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    RouteAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    CachePasswordTimeout float64
    Cached password timeout (in minutes).
    ClientUpgradeMode string
    Select an option to determine how the client is upgraded.
    ConnectMode string
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    DisconnectWhenConnToNetworkIsLost string
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    DisconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    EnablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    NetworkLocationAwareness string
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    NetworkLocationAwarenessConf ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf
    Configure how the client determines its location in relation to the internal network.
    ReAuthUserInterval float64
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    RouteAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    cachePasswordTimeout Double
    Cached password timeout (in minutes).
    clientUpgradeMode String
    Select an option to determine how the client is upgraded.
    connectMode String
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    disconnectWhenConnToNetworkIsLost String
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    disconnectWhenDeviceIsIdle String
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching String
    If the password entered to authenticate is saved locally on the user's machine.
    networkLocationAwareness String
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    networkLocationAwarenessConf ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf
    Configure how the client determines its location in relation to the internal network.
    reAuthUserInterval Double
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw String
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    cachePasswordTimeout number
    Cached password timeout (in minutes).
    clientUpgradeMode string
    Select an option to determine how the client is upgraded.
    connectMode string
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    disconnectWhenConnToNetworkIsLost string
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    disconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    networkLocationAwareness string
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    networkLocationAwarenessConf ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf
    Configure how the client determines its location in relation to the internal network.
    reAuthUserInterval number
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    cache_password_timeout float
    Cached password timeout (in minutes).
    client_upgrade_mode str
    Select an option to determine how the client is upgraded.
    connect_mode str
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    disconnect_when_conn_to_network_is_lost str
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    disconnect_when_device_is_idle str
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enable_password_caching str
    If the password entered to authenticate is saved locally on the user's machine.
    network_location_awareness str
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    network_location_awareness_conf ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf
    Configure how the client determines its location in relation to the internal network.
    re_auth_user_interval float
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    route_all_traffic_to_gw str
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    cachePasswordTimeout Number
    Cached password timeout (in minutes).
    clientUpgradeMode String
    Select an option to determine how the client is upgraded.
    connectMode String
    Methods by which a connection to the gateway will be initiated:Manual - VPN connections will not be initiated automatically.Always connected - Endpoint Connect will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).Configured on endpoint client - the method used for initiating a connection to a gateway is determined by the endpoint client.
    disconnectWhenConnToNetworkIsLost String
    Enabling this feature disconnects users from the gateway when connectivity to the network is lost.
    disconnectWhenDeviceIsIdle String
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching String
    If the password entered to authenticate is saved locally on the user's machine.
    networkLocationAwareness String
    Wide Impact: Also applies for Check Point GO clients!Endpoint Connect intelligently detects whether it is inside or outside of the VPN domain (Enterprise LAN), and automatically connects or disconnects as required. Select true and edit network-location-awareness-conf to configure this capability.
    networkLocationAwarenessConf Property Map
    Configure how the client determines its location in relation to the internal network.
    reAuthUserInterval Number
    The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw String
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.

    ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConf, ManagementCommandSetGlobalPropertiesRemoteAccessEndpointConnectNetworkLocationAwarenessConfArgs

    ConsiderUndefinedDnsSuffixesAsExternal bool
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    ConsiderWirelessNetworksAsExternal bool
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    DnsSuffixes List<string>
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    ExcludedInternalWirelessNetworks List<string>
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    NetworkOrGroupOfConnVpnClient string
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    RememberPreviouslyDetectedExternalNetworks bool
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    VpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient string
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.
    ConsiderUndefinedDnsSuffixesAsExternal bool
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    ConsiderWirelessNetworksAsExternal bool
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    DnsSuffixes []string
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    ExcludedInternalWirelessNetworks []string
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    NetworkOrGroupOfConnVpnClient string
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    RememberPreviouslyDetectedExternalNetworks bool
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    VpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient string
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.
    considerUndefinedDnsSuffixesAsExternal Boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    considerWirelessNetworksAsExternal Boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    dnsSuffixes List<String>
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    excludedInternalWirelessNetworks List<String>
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    networkOrGroupOfConnVpnClient String
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    rememberPreviouslyDetectedExternalNetworks Boolean
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient String
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.
    considerUndefinedDnsSuffixesAsExternal boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    considerWirelessNetworksAsExternal boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    dnsSuffixes string[]
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    excludedInternalWirelessNetworks string[]
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    networkOrGroupOfConnVpnClient string
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    rememberPreviouslyDetectedExternalNetworks boolean
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient string
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.
    consider_undefined_dns_suffixes_as_external bool
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    consider_wireless_networks_as_external bool
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    dns_suffixes Sequence[str]
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    excluded_internal_wireless_networks Sequence[str]
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    network_or_group_of_conn_vpn_client str
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    remember_previously_detected_external_networks bool
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    vpn_clients_are_considered_inside_the_internal_network_when_the_client str
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.
    considerUndefinedDnsSuffixesAsExternal Boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of DNS suffixes that are known to be external. Enable this to be able to define DNS suffixes which won't be considered external.
    considerWirelessNetworksAsExternal Boolean
    The speed at which locations are classified as internal or external can be increased by creating a list of wireless networks that are known to be external. A wireless network is identified by its Service Set Identifier (SSID) a name used to identify a particular 802.11 wireless LAN.
    dnsSuffixes List<String>
    DNS suffixes not defined here will be considered as external. If this list is empty consider-undefined-dns-suffixes-as-external will automatically be set to false.Available only if consider-undefined-dns-suffixes-as-external is set to true.
    excludedInternalWirelessNetworks List<String>
    Excludes the specified internal networks names (SSIDs).Available only if consider-wireless-networks-as-external is set to true.
    networkOrGroupOfConnVpnClient String
    Name or UID of Network or Group the VPN client is connected from.Available only if vpn-clients-are-considered-inside-the-internal-network-when-the-client is set to "Connects from network or group".
    rememberPreviouslyDetectedExternalNetworks Boolean
    The speed at which locations are classified as internal or external can be increased by caching (on the client side) names of networks that were previously determined to be external.
    vpnClientsAreConsideredInsideTheInternalNetworkWhenTheClient String
    When a VPN client is within the internal network, the internal resources are available and the VPN tunnel should be disconnected. Determine when VPN clients are considered inside the internal network:Connects to GW through internal interface - The client connects to the gateway through one of its internal interfaces (recommended).Connects from network or group - The client connects from a network or group specified in network-or-group-of-conn-vpn-client.Runs on computer with access to Active Directory domain - The client runs on a computer that can access its Active Directory domain.Note: The VPN tunnel will resume automatically when the VPN client is no longer in the internal network and the client is set to "Always connected" mode.

    ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistration, ManagementCommandSetGlobalPropertiesRemoteAccessHotSpotAndHotelRegistrationArgs

    EnableRegistration bool
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    LocalSubnetsAccessOnly bool
    Local subnets access only.
    MaxIpAccessDuringRegistration double
    Maximum number of addresses to allow access to during registration.
    Ports List<string>
    Ports to be opened during registration (up to 10 ports).
    RegistrationTimeout double
    Maximum time (in seconds) to complete registration.
    TrackLog bool
    Track log.
    EnableRegistration bool
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    LocalSubnetsAccessOnly bool
    Local subnets access only.
    MaxIpAccessDuringRegistration float64
    Maximum number of addresses to allow access to during registration.
    Ports []string
    Ports to be opened during registration (up to 10 ports).
    RegistrationTimeout float64
    Maximum time (in seconds) to complete registration.
    TrackLog bool
    Track log.
    enableRegistration Boolean
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    localSubnetsAccessOnly Boolean
    Local subnets access only.
    maxIpAccessDuringRegistration Double
    Maximum number of addresses to allow access to during registration.
    ports List<String>
    Ports to be opened during registration (up to 10 ports).
    registrationTimeout Double
    Maximum time (in seconds) to complete registration.
    trackLog Boolean
    Track log.
    enableRegistration boolean
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    localSubnetsAccessOnly boolean
    Local subnets access only.
    maxIpAccessDuringRegistration number
    Maximum number of addresses to allow access to during registration.
    ports string[]
    Ports to be opened during registration (up to 10 ports).
    registrationTimeout number
    Maximum time (in seconds) to complete registration.
    trackLog boolean
    Track log.
    enable_registration bool
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    local_subnets_access_only bool
    Local subnets access only.
    max_ip_access_during_registration float
    Maximum number of addresses to allow access to during registration.
    ports Sequence[str]
    Ports to be opened during registration (up to 10 ports).
    registration_timeout float
    Maximum time (in seconds) to complete registration.
    track_log bool
    Track log.
    enableRegistration Boolean
    Set Enable registration to true in order to configure settings. Set Enable registration to false in order to cancel registration (the configurations below won't be available). When the feature is enabled, you have several minutes to complete registration.
    localSubnetsAccessOnly Boolean
    Local subnets access only.
    maxIpAccessDuringRegistration Number
    Maximum number of addresses to allow access to during registration.
    ports List<String>
    Ports to be opened during registration (up to 10 ports).
    registrationTimeout Number
    Maximum time (in seconds) to complete registration.
    trackLog Boolean
    Track log.

    ManagementCommandSetGlobalPropertiesRemoteAccessScv, ManagementCommandSetGlobalPropertiesRemoteAccessScvArgs

    ApplyScvOnSimplifiedModeFwPolicies bool
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    Exceptions List<ManagementCommandSetGlobalPropertiesRemoteAccessScvException>
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    GenerateLog bool
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    NoScvForUnsupportedCpClients bool
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    NotifyUser bool
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    OnlyTcpIpProtocolsAreUsed bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    PolicyInstalledOnAllInterfaces bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    UponVerificationAcceptAndLogClientConnection bool
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.
    ApplyScvOnSimplifiedModeFwPolicies bool
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    Exceptions []ManagementCommandSetGlobalPropertiesRemoteAccessScvException
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    GenerateLog bool
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    NoScvForUnsupportedCpClients bool
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    NotifyUser bool
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    OnlyTcpIpProtocolsAreUsed bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    PolicyInstalledOnAllInterfaces bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    UponVerificationAcceptAndLogClientConnection bool
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.
    applyScvOnSimplifiedModeFwPolicies Boolean
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    exceptions List<ManagementCommandSetGlobalPropertiesRemoteAccessScvException>
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    generateLog Boolean
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    noScvForUnsupportedCpClients Boolean
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    notifyUser Boolean
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    onlyTcpIpProtocolsAreUsed Boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    policyInstalledOnAllInterfaces Boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    uponVerificationAcceptAndLogClientConnection Boolean
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.
    applyScvOnSimplifiedModeFwPolicies boolean
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    exceptions ManagementCommandSetGlobalPropertiesRemoteAccessScvException[]
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    generateLog boolean
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    noScvForUnsupportedCpClients boolean
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    notifyUser boolean
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    onlyTcpIpProtocolsAreUsed boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    policyInstalledOnAllInterfaces boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    uponVerificationAcceptAndLogClientConnection boolean
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.
    apply_scv_on_simplified_mode_fw_policies bool
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    exceptions Sequence[ManagementCommandSetGlobalPropertiesRemoteAccessScvException]
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    generate_log bool
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    no_scv_for_unsupported_cp_clients bool
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    notify_user bool
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    only_tcp_ip_protocols_are_used bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    policy_installed_on_all_interfaces bool
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    upon_verification_accept_and_log_client_connection bool
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.
    applyScvOnSimplifiedModeFwPolicies Boolean
    Determine whether the gateway verifies that remote access clients are securely configured. This is set here only if the security policy is defined in the Simplified Mode. If the security policy is defined in the Traditional Mode, verification takes place per rule.
    exceptions List<Property Map>
    Specify the hosts that can be accessed using the selected services even if the client is not verified.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    generateLog Boolean
    If the client identifies that the secure configuration has been violated, select whether a log is generated by the remote access client and sent to the Security Management server.
    noScvForUnsupportedCpClients Boolean
    Do not apply Secure Configuration Verification for connections from Check Point VPN clients that don't support it, such as SSL Network Extender, GO, Capsule VPN / Connect, Endpoint Connects lower than R75, or L2TP clients.Available only if apply-scv-on-simplified-mode-fw-policies is true.
    notifyUser Boolean
    If the client identifies that the secure configuration has been violated, select whether to user should be notified.
    onlyTcpIpProtocolsAreUsed Boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that only TCP/IP protocols are used.
    policyInstalledOnAllInterfaces Boolean
    Most SCV checks are configured via the SCV policy. Specify whether to verify that the Desktop Security Policy is installed on all the interfaces of the client.
    uponVerificationAcceptAndLogClientConnection Boolean
    If the gateway verifies the client's configuration, decide how the gateway should handle connections with clients that fail the Security Configuration Verification. It is possible to either drop the connection or Accept the connection and log it.

    ManagementCommandSetGlobalPropertiesRemoteAccessScvException, ManagementCommandSetGlobalPropertiesRemoteAccessScvExceptionArgs

    Hosts List<string>
    Specify the Hosts to be excluded from SCV.
    Services List<string>
    Specify the services to be accessed.
    Hosts []string
    Specify the Hosts to be excluded from SCV.
    Services []string
    Specify the services to be accessed.
    hosts List<String>
    Specify the Hosts to be excluded from SCV.
    services List<String>
    Specify the services to be accessed.
    hosts string[]
    Specify the Hosts to be excluded from SCV.
    services string[]
    Specify the services to be accessed.
    hosts Sequence[str]
    Specify the Hosts to be excluded from SCV.
    services Sequence[str]
    Specify the services to be accessed.
    hosts List<String>
    Specify the Hosts to be excluded from SCV.
    services List<String>
    Specify the services to be accessed.

    ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobile, ManagementCommandSetGlobalPropertiesRemoteAccessSecureClientMobileArgs

    AutomaticallyInitiateDialup string
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    CachePasswordTimeout double
    Cached password timeout (in minutes).
    ConnectMode string
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    DisconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    EnablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    ReAuthUserInterval double
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    RouteAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    SupportedEncryptionMethods string
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    UserAuthMethod string
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.
    AutomaticallyInitiateDialup string
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    CachePasswordTimeout float64
    Cached password timeout (in minutes).
    ConnectMode string
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    DisconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    EnablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    ReAuthUserInterval float64
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    RouteAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    SupportedEncryptionMethods string
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    UserAuthMethod string
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.
    automaticallyInitiateDialup String
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    cachePasswordTimeout Double
    Cached password timeout (in minutes).
    connectMode String
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    disconnectWhenDeviceIsIdle String
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching String
    If the password entered to authenticate is saved locally on the user's machine.
    reAuthUserInterval Double
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw String
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    supportedEncryptionMethods String
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    userAuthMethod String
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.
    automaticallyInitiateDialup string
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    cachePasswordTimeout number
    Cached password timeout (in minutes).
    connectMode string
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    disconnectWhenDeviceIsIdle string
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching string
    If the password entered to authenticate is saved locally on the user's machine.
    reAuthUserInterval number
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw string
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    supportedEncryptionMethods string
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    userAuthMethod string
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.
    automatically_initiate_dialup str
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    cache_password_timeout float
    Cached password timeout (in minutes).
    connect_mode str
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    disconnect_when_device_is_idle str
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enable_password_caching str
    If the password entered to authenticate is saved locally on the user's machine.
    re_auth_user_interval float
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    route_all_traffic_to_gw str
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    supported_encryption_methods str
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    user_auth_method str
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.
    automaticallyInitiateDialup String
    When selected, the client will initiate a GPRS dialup connection before attempting to establish the VPN connection. Note that if a local IP address is already available through another network interface, then the GPRS dialup is not initiated.
    cachePasswordTimeout Number
    Cached password timeout (in minutes).
    connectMode String
    Methods by which a connection to the gateway will be initiated:Configured On Endpoint Client - the method used for initiating a connection to a gateway is determined by the endpoint clientManual - VPN connections will not be initiated automatically.Always connected - SecureClient Mobile will automatically establish a connection to the last connected gateway under the following circumstances: (a) the device has a valid IP address, (b) when the device "wakes up" from a low-power state or a soft-reset, or (c) after a condition that caused the device to automatically disconnect ceases to exist (for example, Device is out of PC Sync, Disconnect is not idle.).On application request - Applications requiring access to resources through the VPN will be able to initiate a VPN connection.
    disconnectWhenDeviceIsIdle String
    Enabling this feature will disconnect users from the gateway if there is no traffic sent during the defined time period.
    enablePasswordCaching String
    If the password entered to authenticate is saved locally on the user's machine.
    reAuthUserInterval Number
    Wide Impact: Also applies for SSL Network Extender clients!The length of time (in minutes) until the user's credentials are resent to the gateway to verify authorization.
    routeAllTrafficToGw String
    Operates the client in Hub Mode, sending all traffic to the VPN server for routing, filtering, and processing.
    supportedEncryptionMethods String
    Wide Impact: Also applies for SSL Network Extender clients!Select the encryption algorithms that will be supported with remote users.
    userAuthMethod String
    Wide Impact: Also applies for SSL Network Extender clients and Check Point GO clients.How the user will be authenticated by the gateway.

    ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtender, ManagementCommandSetGlobalPropertiesRemoteAccessSslNetworkExtenderArgs

    ClientOutgoingKeepAlivePacketsFrequency double
    Select the interval which the keep-alive packets are sent.
    ClientUninstallUponDisconnection string
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    ClientUpgradeUponConnection string
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    ReAuthUserInterval double
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    ScanEpMachineForComplianceWithEpCompliancePolicy bool
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    SupportedEncryptionMethods string
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    UserAuthMethod string
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.
    ClientOutgoingKeepAlivePacketsFrequency float64
    Select the interval which the keep-alive packets are sent.
    ClientUninstallUponDisconnection string
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    ClientUpgradeUponConnection string
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    ReAuthUserInterval float64
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    ScanEpMachineForComplianceWithEpCompliancePolicy bool
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    SupportedEncryptionMethods string
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    UserAuthMethod string
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.
    clientOutgoingKeepAlivePacketsFrequency Double
    Select the interval which the keep-alive packets are sent.
    clientUninstallUponDisconnection String
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    clientUpgradeUponConnection String
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    reAuthUserInterval Double
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    scanEpMachineForComplianceWithEpCompliancePolicy Boolean
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    supportedEncryptionMethods String
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    userAuthMethod String
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.
    clientOutgoingKeepAlivePacketsFrequency number
    Select the interval which the keep-alive packets are sent.
    clientUninstallUponDisconnection string
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    clientUpgradeUponConnection string
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    reAuthUserInterval number
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    scanEpMachineForComplianceWithEpCompliancePolicy boolean
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    supportedEncryptionMethods string
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    userAuthMethod string
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.
    client_outgoing_keep_alive_packets_frequency float
    Select the interval which the keep-alive packets are sent.
    client_uninstall_upon_disconnection str
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    client_upgrade_upon_connection str
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    re_auth_user_interval float
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    scan_ep_machine_for_compliance_with_ep_compliance_policy bool
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    supported_encryption_methods str
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    user_auth_method str
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.
    clientOutgoingKeepAlivePacketsFrequency Number
    Select the interval which the keep-alive packets are sent.
    clientUninstallUponDisconnection String
    Select whether the client should automatically uninstall SSL Network Extender when it disconnects from the gateway.
    clientUpgradeUponConnection String
    When a client connects to the gateway with SSL Network Extender, the client automatically checks for upgrade. Select whether the client should automatically upgrade.
    reAuthUserInterval Number
    Wide Impact: Applies for the SecureClient Mobile!Select the interval that users will need to reauthenticate.
    scanEpMachineForComplianceWithEpCompliancePolicy Boolean
    Set to true if you want endpoint machines to be scanned for compliance with the Endpoint Compliance Policy.
    supportedEncryptionMethods String
    Wide Impact: Also applies to SecureClient Mobile devices!Select the encryption algorithms that will be supported for remote users. Changes made here will also apply for all SSL clients.
    userAuthMethod String
    Wide Impact: Also applies for SecureClient Mobile devices and Check Point GO clients!User authentication method indicates how the user will be authenticated by the gateway. Changes made here will also apply for SSL clients.Legacy - Username and password only.Certificate - Certificate only with an existing certificate.Certificate with Enrollment - Allows you to obtain a new certificate and then use certificate authentication only.Mixed - Can use either username and password or certificate.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvanced, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAdvancedArgs

    AllowClearTrafficToEncryptionDomainWhenDisconnected bool
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    EnableLoadDistributionForMepConf bool
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    UseFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite bool
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.
    AllowClearTrafficToEncryptionDomainWhenDisconnected bool
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    EnableLoadDistributionForMepConf bool
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    UseFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite bool
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.
    allowClearTrafficToEncryptionDomainWhenDisconnected Boolean
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    enableLoadDistributionForMepConf Boolean
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite Boolean
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.
    allowClearTrafficToEncryptionDomainWhenDisconnected boolean
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    enableLoadDistributionForMepConf boolean
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite boolean
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.
    allow_clear_traffic_to_encryption_domain_when_disconnected bool
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    enable_load_distribution_for_mep_conf bool
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    use_first_allocated_om_ip_addr_for_all_conn_to_the_gws_of_the_site bool
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.
    allowClearTrafficToEncryptionDomainWhenDisconnected Boolean
    SecuRemote/SecureClient behavior while disconnected - How traffic to the VPN domain is handled when the Remote Access VPN client is not connected to the site. Traffic can either be dropped or sent in clear without encryption.
    enableLoadDistributionForMepConf Boolean
    Load distribution for Multiple Entry Points configurations - Remote access clients will randomly select a gateway from the list of entry points. Make sure to define the same VPN domain for all the Security Gateways you want to be entry points.
    useFirstAllocatedOmIpAddrForAllConnToTheGwsOfTheSite Boolean
    Use first allocated Office Mode IP Address for all connections to the Gateways of the site.After a remote user connects and receives an Office Mode IP address from a gateway, every connection to that gateways encryption domain will go out with the Office Mode IP as the internal source IP. The Office Mode IP is what hosts in the encryption domain will recognize as the remote user's IP address. The Office Mode IP address assigned by a specific gateway can be used in its own encryption domain and in neighboring encryption domains as well. The neighboring encryption domains should reside behind gateways that are members of the same VPN community as the assigning gateway. Since the remote hosts connections are dependant on the Office Mode IP address it received, should the gateway that issued the IP become unavailable, all the connections to the site will terminate.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryption, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionArgs

    EncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    EncryptionMethod string
    Select the encryption method.
    L2tpPreSharedKey string
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    PreSharedSecret bool
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    SupportL2tpWithPreSharedKey bool
    Use a centrally managed pre-shared key for IKE.
    SupportLegacyAuthForScL2tpNokiaClients bool
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    SupportLegacyEap bool
    Support Legacy EAP (Extensible Authentication Protocol).
    EncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    EncryptionMethod string
    Select the encryption method.
    L2tpPreSharedKey string
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    PreSharedSecret bool
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    SupportL2tpWithPreSharedKey bool
    Use a centrally managed pre-shared key for IKE.
    SupportLegacyAuthForScL2tpNokiaClients bool
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    SupportLegacyEap bool
    Support Legacy EAP (Extensible Authentication Protocol).
    encryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    encryptionMethod String
    Select the encryption method.
    l2tpPreSharedKey String
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    preSharedSecret Boolean
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    supportL2tpWithPreSharedKey Boolean
    Use a centrally managed pre-shared key for IKE.
    supportLegacyAuthForScL2tpNokiaClients Boolean
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    supportLegacyEap Boolean
    Support Legacy EAP (Extensible Authentication Protocol).
    encryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    encryptionMethod string
    Select the encryption method.
    l2tpPreSharedKey string
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    preSharedSecret boolean
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    supportL2tpWithPreSharedKey boolean
    Use a centrally managed pre-shared key for IKE.
    supportLegacyAuthForScL2tpNokiaClients boolean
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    supportLegacyEap boolean
    Support Legacy EAP (Extensible Authentication Protocol).
    encryption_algorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    encryption_method str
    Select the encryption method.
    l2tp_pre_shared_key str
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    pre_shared_secret bool
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    support_l2tp_with_pre_shared_key bool
    Use a centrally managed pre-shared key for IKE.
    support_legacy_auth_for_sc_l2tp_nokia_clients bool
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    support_legacy_eap bool
    Support Legacy EAP (Extensible Authentication Protocol).
    encryptionAlgorithms Property Map
    Select the methods negotiated in IKE phase 2 and used in IPSec connections.
    encryptionMethod String
    Select the encryption method.
    l2tpPreSharedKey String
    Type in the pre-shared key.Available only if support-l2tp-with-pre-shared-key is set to true.
    preSharedSecret Boolean
    the user password is specified in the Authentication tab in the user's IKE properties (in the user properties window: Encryption tab > Edit).
    supportL2tpWithPreSharedKey Boolean
    Use a centrally managed pre-shared key for IKE.
    supportLegacyAuthForScL2tpNokiaClients Boolean
    Support Legacy Authentication for SC (hybrid mode), L2TP (PAP) and Nokia clients (CRACK).
    supportLegacyEap Boolean
    Support Legacy EAP (Extensible Authentication Protocol).

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithms, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsArgs

    ike Property Map
    Configure the IKE Phase 1 settings.
    ipsec Property Map
    Configure the IPSEC Phase 2 settings.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIke, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeArgs

    SupportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    SupportDiffieHellmanGroups ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    SupportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    UseDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    UseDiffieHellmanGroup string
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    UseEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    SupportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    SupportDiffieHellmanGroups ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    SupportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    UseDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    UseDiffieHellmanGroup string
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    UseEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    supportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportDiffieHellmanGroups ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    supportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity String
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useDiffieHellmanGroup String
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    useEncryptionAlgorithm String
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    supportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportDiffieHellmanGroups ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    supportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useDiffieHellmanGroup string
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    useEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    support_data_integrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    support_diffie_hellman_groups ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    support_encryption_algorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    use_data_integrity str
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    use_diffie_hellman_group str
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    use_encryption_algorithm str
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    supportDataIntegrity Property Map
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportDiffieHellmanGroups Property Map
    Select the Diffie-Hellman groups that will be supported with remote hosts.
    supportEncryptionAlgorithms Property Map
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity String
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useDiffieHellmanGroup String
    SecureClient users utilize the Diffie-Hellman group selected in this field.
    useEncryptionAlgorithm String
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrity, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDataIntegrityArgs

    AesXcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    Md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    AesXcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    Md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc Boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 Boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 Boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 Boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aes_xcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc Boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 Boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 Boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 Boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroups, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportDiffieHellmanGroupsArgs

    Group1 bool
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    Group14 bool
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    Group2 bool
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    Group5 bool
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.
    Group1 bool
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    Group14 bool
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    Group2 bool
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    Group5 bool
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.
    group1 Boolean
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    group14 Boolean
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    group2 Boolean
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    group5 Boolean
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.
    group1 boolean
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    group14 boolean
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    group2 boolean
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    group5 boolean
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.
    group1 bool
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    group14 bool
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    group2 bool
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    group5 bool
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.
    group1 Boolean
    Select whether Diffie-Hellman Group 1 (768 bit) will be supported with remote hosts.
    group14 Boolean
    Select whether Diffie-Hellman Group 14 (2048 bit) will be supported with remote hosts.
    group2 Boolean
    Select whether Diffie-Hellman Group 2 (1024 bit) will be supported with remote hosts.
    group5 Boolean
    Select whether Diffie-Hellman Group 5 (1536 bit) will be supported with remote hosts.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithms, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIkeSupportEncryptionAlgorithmsArgs

    Aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    Aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    Des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    Tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    Aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    Aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    Des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    Tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 Boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 Boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des Boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes Boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 Boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 Boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des Boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes Boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsec, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecArgs

    EnforceEncryptionAlgAndDataIntegrityOnAllUsers bool
    Enforce Encryption Algorithm and Data Integrity on all users.
    SupportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    SupportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    UseDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    UseEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    EnforceEncryptionAlgAndDataIntegrityOnAllUsers bool
    Enforce Encryption Algorithm and Data Integrity on all users.
    SupportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    SupportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    UseDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    UseEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    enforceEncryptionAlgAndDataIntegrityOnAllUsers Boolean
    Enforce Encryption Algorithm and Data Integrity on all users.
    supportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity String
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useEncryptionAlgorithm String
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    enforceEncryptionAlgAndDataIntegrityOnAllUsers boolean
    Enforce Encryption Algorithm and Data Integrity on all users.
    supportDataIntegrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportEncryptionAlgorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity string
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useEncryptionAlgorithm string
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    enforce_encryption_alg_and_data_integrity_on_all_users bool
    Enforce Encryption Algorithm and Data Integrity on all users.
    support_data_integrity ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    support_encryption_algorithms ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms
    Select the encryption algorithms that will be supported with remote hosts.
    use_data_integrity str
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    use_encryption_algorithm str
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.
    enforceEncryptionAlgAndDataIntegrityOnAllUsers Boolean
    Enforce Encryption Algorithm and Data Integrity on all users.
    supportDataIntegrity Property Map
    Select the hash algorithms that will be supported with remote hosts to ensure data integrity.
    supportEncryptionAlgorithms Property Map
    Select the encryption algorithms that will be supported with remote hosts.
    useDataIntegrity String
    The hash algorithm chosen here will be given the highest priority if more than one choice is offered.
    useEncryptionAlgorithm String
    Choose the encryption algorithm that will have the highest priority of the selected algorithms. If given a choice of more that one encryption algorithm to use, the algorithm selected in this field will be used.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrity, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportDataIntegrityArgs

    AesXcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    Md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    AesXcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    Md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    Sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc Boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 Boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 Boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 Boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aes_xcbc bool
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 bool
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 bool
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 bool
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.
    aesXcbc Boolean
    Select whether the AES-XCBC hash algorithm will be supported with remote hosts to ensure data integrity.
    md5 Boolean
    Select whether the MD5 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha1 Boolean
    Select whether the SHA1 hash algorithm will be supported with remote hosts to ensure data integrity.
    sha256 Boolean
    Select whether the SHA256 hash algorithm will be supported with remote hosts to ensure data integrity.

    ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithms, ManagementCommandSetGlobalPropertiesRemoteAccessVpnAuthenticationAndEncryptionEncryptionAlgorithmsIpsecSupportEncryptionAlgorithmsArgs

    Aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    Aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    Des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    Tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    Aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    Aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    Des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    Tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 Boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 Boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des Boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes Boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 bool
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 bool
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des bool
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes bool
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.
    aes128 Boolean
    Select whether the AES-128 encryption algorithm will be supported with remote hosts.
    aes256 Boolean
    Select whether the AES-256 encryption algorithm will be supported with remote hosts.
    des Boolean
    Select whether the DES encryption algorithm will be supported with remote hosts.
    tdes Boolean
    Select whether the Triple DES encryption algorithm will be supported with remote hosts.

    ManagementCommandSetGlobalPropertiesStatefulInspection, ManagementCommandSetGlobalPropertiesStatefulInspectionArgs

    AcceptStatefulIcmpErrors bool
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    AcceptStatefulIcmpReplies bool
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    AcceptStatefulOtherIpProtocolsRepliesForUnknownServices bool
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    AcceptStatefulUdpRepliesForUnknownServices bool
    Specifies if UDP replies are to be accepted for unknown services.
    DropOutOfStateIcmpPackets bool
    Drop ICMP packets which are not consistent with the current state of the connection.
    DropOutOfStateSctpPackets bool
    Drop SCTP packets which are not consistent with the current state of the connection.
    DropOutOfStateTcpPackets bool
    Drop TCP packets which are not consistent with the current state of the connection.
    IcmpVirtualSessionTimeout double
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    LogOnDropOutOfStateIcmpPackets bool
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    LogOnDropOutOfStateSctpPackets bool
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    LogOnDropOutOfStateTcpPackets bool
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    OtherIpProtocolsVirtualSessionTimeout double
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    SctpEndTimeout double
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    SctpSessionTimeout double
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    SctpStartTimeout double
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    TcpEndTimeout double
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    TcpEndTimeoutR8020GwAndAbove double
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    TcpOutOfStateDropExceptions List<string>
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    TcpSessionTimeout double
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    TcpStartTimeout double
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    UdpVirtualSessionTimeout double
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.
    AcceptStatefulIcmpErrors bool
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    AcceptStatefulIcmpReplies bool
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    AcceptStatefulOtherIpProtocolsRepliesForUnknownServices bool
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    AcceptStatefulUdpRepliesForUnknownServices bool
    Specifies if UDP replies are to be accepted for unknown services.
    DropOutOfStateIcmpPackets bool
    Drop ICMP packets which are not consistent with the current state of the connection.
    DropOutOfStateSctpPackets bool
    Drop SCTP packets which are not consistent with the current state of the connection.
    DropOutOfStateTcpPackets bool
    Drop TCP packets which are not consistent with the current state of the connection.
    IcmpVirtualSessionTimeout float64
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    LogOnDropOutOfStateIcmpPackets bool
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    LogOnDropOutOfStateSctpPackets bool
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    LogOnDropOutOfStateTcpPackets bool
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    OtherIpProtocolsVirtualSessionTimeout float64
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    SctpEndTimeout float64
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    SctpSessionTimeout float64
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    SctpStartTimeout float64
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    TcpEndTimeout float64
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    TcpEndTimeoutR8020GwAndAbove float64
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    TcpOutOfStateDropExceptions []string
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    TcpSessionTimeout float64
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    TcpStartTimeout float64
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    UdpVirtualSessionTimeout float64
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.
    acceptStatefulIcmpErrors Boolean
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    acceptStatefulIcmpReplies Boolean
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    acceptStatefulOtherIpProtocolsRepliesForUnknownServices Boolean
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    acceptStatefulUdpRepliesForUnknownServices Boolean
    Specifies if UDP replies are to be accepted for unknown services.
    dropOutOfStateIcmpPackets Boolean
    Drop ICMP packets which are not consistent with the current state of the connection.
    dropOutOfStateSctpPackets Boolean
    Drop SCTP packets which are not consistent with the current state of the connection.
    dropOutOfStateTcpPackets Boolean
    Drop TCP packets which are not consistent with the current state of the connection.
    icmpVirtualSessionTimeout Double
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    logOnDropOutOfStateIcmpPackets Boolean
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    logOnDropOutOfStateSctpPackets Boolean
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    logOnDropOutOfStateTcpPackets Boolean
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    otherIpProtocolsVirtualSessionTimeout Double
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    sctpEndTimeout Double
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    sctpSessionTimeout Double
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    sctpStartTimeout Double
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    tcpEndTimeout Double
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpEndTimeoutR8020GwAndAbove Double
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpOutOfStateDropExceptions List<String>
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    tcpSessionTimeout Double
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    tcpStartTimeout Double
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    udpVirtualSessionTimeout Double
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.
    acceptStatefulIcmpErrors boolean
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    acceptStatefulIcmpReplies boolean
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    acceptStatefulOtherIpProtocolsRepliesForUnknownServices boolean
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    acceptStatefulUdpRepliesForUnknownServices boolean
    Specifies if UDP replies are to be accepted for unknown services.
    dropOutOfStateIcmpPackets boolean
    Drop ICMP packets which are not consistent with the current state of the connection.
    dropOutOfStateSctpPackets boolean
    Drop SCTP packets which are not consistent with the current state of the connection.
    dropOutOfStateTcpPackets boolean
    Drop TCP packets which are not consistent with the current state of the connection.
    icmpVirtualSessionTimeout number
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    logOnDropOutOfStateIcmpPackets boolean
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    logOnDropOutOfStateSctpPackets boolean
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    logOnDropOutOfStateTcpPackets boolean
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    otherIpProtocolsVirtualSessionTimeout number
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    sctpEndTimeout number
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    sctpSessionTimeout number
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    sctpStartTimeout number
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    tcpEndTimeout number
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpEndTimeoutR8020GwAndAbove number
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpOutOfStateDropExceptions string[]
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    tcpSessionTimeout number
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    tcpStartTimeout number
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    udpVirtualSessionTimeout number
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.
    accept_stateful_icmp_errors bool
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    accept_stateful_icmp_replies bool
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    accept_stateful_other_ip_protocols_replies_for_unknown_services bool
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    accept_stateful_udp_replies_for_unknown_services bool
    Specifies if UDP replies are to be accepted for unknown services.
    drop_out_of_state_icmp_packets bool
    Drop ICMP packets which are not consistent with the current state of the connection.
    drop_out_of_state_sctp_packets bool
    Drop SCTP packets which are not consistent with the current state of the connection.
    drop_out_of_state_tcp_packets bool
    Drop TCP packets which are not consistent with the current state of the connection.
    icmp_virtual_session_timeout float
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    log_on_drop_out_of_state_icmp_packets bool
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    log_on_drop_out_of_state_sctp_packets bool
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    log_on_drop_out_of_state_tcp_packets bool
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    other_ip_protocols_virtual_session_timeout float
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    sctp_end_timeout float
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    sctp_session_timeout float
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    sctp_start_timeout float
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    tcp_end_timeout float
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcp_end_timeout_r8020_gw_and_above float
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcp_out_of_state_drop_exceptions Sequence[str]
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    tcp_session_timeout float
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    tcp_start_timeout float
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    udp_virtual_session_timeout float
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.
    acceptStatefulIcmpErrors Boolean
    Accept ICMP error packets which refer to another non-ICMP connection (for example, to an ongoing TCP or UDP connection) that was accepted by the Rule Base.
    acceptStatefulIcmpReplies Boolean
    Accept ICMP reply packets for ICMP requests that were accepted by the Rule Base.
    acceptStatefulOtherIpProtocolsRepliesForUnknownServices Boolean
    Accept reply packets for other undefined services (that is, services which are not one of the following: TCP, UDP, ICMP).
    acceptStatefulUdpRepliesForUnknownServices Boolean
    Specifies if UDP replies are to be accepted for unknown services.
    dropOutOfStateIcmpPackets Boolean
    Drop ICMP packets which are not consistent with the current state of the connection.
    dropOutOfStateSctpPackets Boolean
    Drop SCTP packets which are not consistent with the current state of the connection.
    dropOutOfStateTcpPackets Boolean
    Drop TCP packets which are not consistent with the current state of the connection.
    icmpVirtualSessionTimeout Number
    An ICMP virtual session will be considered to have timed out after this time period (in seconds).
    logOnDropOutOfStateIcmpPackets Boolean
    Generates a log entry when these out of state ICMP packets are dropped.Available only if drop-out-of-state-icmp-packets is true.
    logOnDropOutOfStateSctpPackets Boolean
    Generates a log entry when these out of state SCTP packets are dropped.Available only if drop-out-of-state-sctp-packets is true.
    logOnDropOutOfStateTcpPackets Boolean
    Generates a log entry when these out of state TCP packets are dropped.Available only if drop-out-of-state-tcp-packets is true.
    otherIpProtocolsVirtualSessionTimeout Number
    A virtual session of services which are not explicitly configured here will be considered to have timed out after this time period (in seconds).
    sctpEndTimeout Number
    SCTP connections end after this number of seconds, after the connection ends or is reset, to allow for stray ACKs of the connection that arrive late.
    sctpSessionTimeout Number
    Time (in seconds) an idle connection will remain in the Security Gateway connections table.
    sctpStartTimeout Number
    SCTP connections will be timed out if the interval between the arrival of the first packet and establishment of the connection exceeds this value (in seconds).
    tcpEndTimeout Number
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpEndTimeoutR8020GwAndAbove Number
    A TCP connection will only terminate TCP end timeout seconds after two FIN packets (one in each direction: client-to-server, and server-to-client) or an RST packet. When a TCP connection ends (FIN packets sent or connection reset) the Check Point Security Gateway will keep the connection in the connections table for another TCP end timeout seconds, to allow for stray ACKs of the connection that arrive late.
    tcpOutOfStateDropExceptions List<String>
    Name or uid of the gateways and clusters for which Out of State packets are allowed.
    tcpSessionTimeout Number
    The length of time (in seconds) an idle connection will remain in the Security Gateway connections table.
    tcpStartTimeout Number
    A TCP connection will be timed out if the interval between the arrival of the first packet and establishment of the connection (TCP three-way handshake) exceeds TCP start timeout seconds.
    udpVirtualSessionTimeout Number
    Specifies the amount of time (in seconds) a UDP reply channel may remain open without any packets being returned.

    ManagementCommandSetGlobalPropertiesUserAccounts, ManagementCommandSetGlobalPropertiesUserAccountsArgs

    DaysUntilExpiration double
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    ExpirationDate string
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    ExpirationDateMethod string
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    ShowAccountsExpirationIndicationDaysInAdvance bool
    Activates the Expired Accounts link, to open the Expired Accounts window.
    DaysUntilExpiration float64
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    ExpirationDate string
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    ExpirationDateMethod string
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    ShowAccountsExpirationIndicationDaysInAdvance bool
    Activates the Expired Accounts link, to open the Expired Accounts window.
    daysUntilExpiration Double
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    expirationDate String
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    expirationDateMethod String
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    showAccountsExpirationIndicationDaysInAdvance Boolean
    Activates the Expired Accounts link, to open the Expired Accounts window.
    daysUntilExpiration number
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    expirationDate string
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    expirationDateMethod string
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    showAccountsExpirationIndicationDaysInAdvance boolean
    Activates the Expired Accounts link, to open the Expired Accounts window.
    days_until_expiration float
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    expiration_date str
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    expiration_date_method str
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    show_accounts_expiration_indication_days_in_advance bool
    Activates the Expired Accounts link, to open the Expired Accounts window.
    daysUntilExpiration Number
    Account expires after the number of days that you select.Available only if expiration-date-method is set to "expire after".
    expirationDate String
    Specify an Expiration Date in the following format: YYYY-MM-DD.Available only if expiration-date-method is set to "expire at".
    expirationDateMethod String
    Select an Expiration Date Method.Expire at - Account expires on the date that you select.Expire after - Account expires after the number of days that you select.
    showAccountsExpirationIndicationDaysInAdvance Boolean
    Activates the Expired Accounts link, to open the Expired Accounts window.

    ManagementCommandSetGlobalPropertiesUserAuthority, ManagementCommandSetGlobalPropertiesUserAuthorityArgs

    DisplayWebAccessView bool
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    TrustOnlyFollowingWindowsDomains List<string>
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    WindowsDomainsToTrust string
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.
    DisplayWebAccessView bool
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    TrustOnlyFollowingWindowsDomains []string
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    WindowsDomainsToTrust string
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.
    displayWebAccessView Boolean
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    trustOnlyFollowingWindowsDomains List<String>
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    windowsDomainsToTrust String
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.
    displayWebAccessView boolean
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    trustOnlyFollowingWindowsDomains string[]
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    windowsDomainsToTrust string
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.
    display_web_access_view bool
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    trust_only_following_windows_domains Sequence[str]
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    windows_domains_to_trust str
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.
    displayWebAccessView Boolean
    Specify whether or not to display the WebAccess rule base. This rule base is used for UserAuthority.
    trustOnlyFollowingWindowsDomains List<String>
    Specify which Windows domains will have access to the internal sites of the organization.Available only if windows-domains-to-trust is set to SELECTIVELY.
    windowsDomainsToTrust String
    When matching Firewall usernames to Windows Domains usernames for Single Sign on, selectwhether to trust all or specify which Windows Domain should be trusted.ALL - Enables you to allow all Windows domains to access the internal sites of the organization.SELECTIVELY - Enables you to specify which Windows domains will have access to the internal sites of the organization.

    ManagementCommandSetGlobalPropertiesUserCheck, ManagementCommandSetGlobalPropertiesUserCheckArgs

    PreferredLanguage string
    The preferred language for new UserCheck message.
    SendEmailsUsingMailServer string
    Name or UID of mail server to send emails to.
    PreferredLanguage string
    The preferred language for new UserCheck message.
    SendEmailsUsingMailServer string
    Name or UID of mail server to send emails to.
    preferredLanguage String
    The preferred language for new UserCheck message.
    sendEmailsUsingMailServer String
    Name or UID of mail server to send emails to.
    preferredLanguage string
    The preferred language for new UserCheck message.
    sendEmailsUsingMailServer string
    Name or UID of mail server to send emails to.
    preferred_language str
    The preferred language for new UserCheck message.
    send_emails_using_mail_server str
    Name or UID of mail server to send emails to.
    preferredLanguage String
    The preferred language for new UserCheck message.
    sendEmailsUsingMailServer String
    Name or UID of mail server to send emails to.

    ManagementCommandSetGlobalPropertiesUserDirectory, ManagementCommandSetGlobalPropertiesUserDirectoryArgs

    CacheSize double
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    DisplayUserDnAtLogin string
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    EnablePasswordChangeWhenUserActiveDirectoryExpires bool
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    EnablePasswordExpirationConfiguration bool
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    EnforceRulesForUserMgmtAdmins bool
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    MinPasswordLength double
    Specifies the minimum length (in characters) of the password.
    PasswordExpiresAfter double
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    PasswordMustIncludeADigit bool
    Password must include a digit.
    PasswordMustIncludeASymbol bool
    Password must include a symbol.
    PasswordMustIncludeLowercaseChar bool
    Password must include a lowercase character.
    PasswordMustIncludeUppercaseChar bool
    Password must include an uppercase character.
    TimeoutOnCachedUsers double
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.
    CacheSize float64
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    DisplayUserDnAtLogin string
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    EnablePasswordChangeWhenUserActiveDirectoryExpires bool
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    EnablePasswordExpirationConfiguration bool
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    EnforceRulesForUserMgmtAdmins bool
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    MinPasswordLength float64
    Specifies the minimum length (in characters) of the password.
    PasswordExpiresAfter float64
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    PasswordMustIncludeADigit bool
    Password must include a digit.
    PasswordMustIncludeASymbol bool
    Password must include a symbol.
    PasswordMustIncludeLowercaseChar bool
    Password must include a lowercase character.
    PasswordMustIncludeUppercaseChar bool
    Password must include an uppercase character.
    TimeoutOnCachedUsers float64
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.
    cacheSize Double
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    displayUserDnAtLogin String
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    enablePasswordChangeWhenUserActiveDirectoryExpires Boolean
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    enablePasswordExpirationConfiguration Boolean
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    enforceRulesForUserMgmtAdmins Boolean
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    minPasswordLength Double
    Specifies the minimum length (in characters) of the password.
    passwordExpiresAfter Double
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    passwordMustIncludeADigit Boolean
    Password must include a digit.
    passwordMustIncludeASymbol Boolean
    Password must include a symbol.
    passwordMustIncludeLowercaseChar Boolean
    Password must include a lowercase character.
    passwordMustIncludeUppercaseChar Boolean
    Password must include an uppercase character.
    timeoutOnCachedUsers Double
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.
    cacheSize number
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    displayUserDnAtLogin string
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    enablePasswordChangeWhenUserActiveDirectoryExpires boolean
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    enablePasswordExpirationConfiguration boolean
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    enforceRulesForUserMgmtAdmins boolean
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    minPasswordLength number
    Specifies the minimum length (in characters) of the password.
    passwordExpiresAfter number
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    passwordMustIncludeADigit boolean
    Password must include a digit.
    passwordMustIncludeASymbol boolean
    Password must include a symbol.
    passwordMustIncludeLowercaseChar boolean
    Password must include a lowercase character.
    passwordMustIncludeUppercaseChar boolean
    Password must include an uppercase character.
    timeoutOnCachedUsers number
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.
    cache_size float
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    display_user_dn_at_login str
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    enable_password_change_when_user_active_directory_expires bool
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    enable_password_expiration_configuration bool
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    enforce_rules_for_user_mgmt_admins bool
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    min_password_length float
    Specifies the minimum length (in characters) of the password.
    password_expires_after float
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    password_must_include_a_digit bool
    Password must include a digit.
    password_must_include_a_symbol bool
    Password must include a symbol.
    password_must_include_lowercase_char bool
    Password must include a lowercase character.
    password_must_include_uppercase_char bool
    Password must include an uppercase character.
    timeout_on_cached_users float
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.
    cacheSize Number
    The maximum number of cached users allowed. The cache is FIFO (first-in, first-out). When a new user is added to a full cache, the first user is deleted to make room for the new user. The Check Point Security Gateway does not query the LDAP server for users already in the cache, unless the cache has timed out.
    displayUserDnAtLogin String
    Decide whether or not you would like to display the user's DN when logging in. If you choose to display the user DN, you can select whether to display it, when the user is prompted for the password at login, or on the request of the authentication scheme. This property is a useful diagnostic tool when there is more than one user with the same name in an Account Unit. In this case, the first one is chosen and the others are ignored.
    enablePasswordChangeWhenUserActiveDirectoryExpires Boolean
    For organizations using MS Active Directory, this setting enables users whose passwords have expired to automatically create new passwords.
    enablePasswordExpirationConfiguration Boolean
    Enable configuring of the number of days during which the password is valid.If enable-password-change-when-user-active-directory-expires is true, the password expiration time is determined by the Active Directory. In this case it is recommended not to set this to true.
    enforceRulesForUserMgmtAdmins Boolean
    Enforces password strength rules on LDAP users when you create or modify a Check Point Password.
    minPasswordLength Number
    Specifies the minimum length (in characters) of the password.
    passwordExpiresAfter Number
    Specifies the number of days during which the password is valid. Users are authenticated using a special LDAP password. Should this password expire, a new password must be defined.Available only if enable-password-expiration-configuration is true.
    passwordMustIncludeADigit Boolean
    Password must include a digit.
    passwordMustIncludeASymbol Boolean
    Password must include a symbol.
    passwordMustIncludeLowercaseChar Boolean
    Password must include a lowercase character.
    passwordMustIncludeUppercaseChar Boolean
    Password must include an uppercase character.
    timeoutOnCachedUsers Number
    The period of time in which a cached user is timed out and will need to be fetched again from the LDAP server.

    ManagementCommandSetGlobalPropertiesVpn, ManagementCommandSetGlobalPropertiesVpnArgs

    DomainNameForDnsResolving string
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    EnableBackupGw bool
    Enable Backup Gateway.
    EnableDecryptOnAcceptForGwToGwTraffic bool
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    EnableLoadDistributionForMepConf bool
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    EnableVpnDirectionalMatchInVpnColumn bool
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    GracePeriodAfterTheCrlIsNotValid double
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    GracePeriodBeforeTheCrlIsValid double
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    GracePeriodExtensionForSecureRemoteSecureClient double
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    SupportIkeDosProtectionFromIdentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    SupportIkeDosProtectionFromUnidentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    VpnConfMethod string
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.
    DomainNameForDnsResolving string
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    EnableBackupGw bool
    Enable Backup Gateway.
    EnableDecryptOnAcceptForGwToGwTraffic bool
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    EnableLoadDistributionForMepConf bool
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    EnableVpnDirectionalMatchInVpnColumn bool
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    GracePeriodAfterTheCrlIsNotValid float64
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    GracePeriodBeforeTheCrlIsValid float64
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    GracePeriodExtensionForSecureRemoteSecureClient float64
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    SupportIkeDosProtectionFromIdentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    SupportIkeDosProtectionFromUnidentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    VpnConfMethod string
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.
    domainNameForDnsResolving String
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    enableBackupGw Boolean
    Enable Backup Gateway.
    enableDecryptOnAcceptForGwToGwTraffic Boolean
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    enableLoadDistributionForMepConf Boolean
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    enableVpnDirectionalMatchInVpnColumn Boolean
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    gracePeriodAfterTheCrlIsNotValid Double
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodBeforeTheCrlIsValid Double
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodExtensionForSecureRemoteSecureClient Double
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    supportIkeDosProtectionFromIdentifiedSrc String
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    supportIkeDosProtectionFromUnidentifiedSrc String
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    vpnConfMethod String
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.
    domainNameForDnsResolving string
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    enableBackupGw boolean
    Enable Backup Gateway.
    enableDecryptOnAcceptForGwToGwTraffic boolean
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    enableLoadDistributionForMepConf boolean
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    enableVpnDirectionalMatchInVpnColumn boolean
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    gracePeriodAfterTheCrlIsNotValid number
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodBeforeTheCrlIsValid number
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodExtensionForSecureRemoteSecureClient number
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    supportIkeDosProtectionFromIdentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    supportIkeDosProtectionFromUnidentifiedSrc string
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    vpnConfMethod string
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.
    domain_name_for_dns_resolving str
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    enable_backup_gw bool
    Enable Backup Gateway.
    enable_decrypt_on_accept_for_gw_to_gw_traffic bool
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    enable_load_distribution_for_mep_conf bool
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    enable_vpn_directional_match_in_vpn_column bool
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    grace_period_after_the_crl_is_not_valid float
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    grace_period_before_the_crl_is_valid float
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    grace_period_extension_for_secure_remote_secure_client float
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    support_ike_dos_protection_from_identified_src str
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    support_ike_dos_protection_from_unidentified_src str
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    vpn_conf_method str
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.
    domainNameForDnsResolving String
    Enter the domain name that will be used for gateways DNS lookup. The DNS host name that is used is "gateway_name.domain_name".
    enableBackupGw Boolean
    Enable Backup Gateway.
    enableDecryptOnAcceptForGwToGwTraffic Boolean
    Enable decrypt on accept for gateway to gateway traffic. This is only relevant for policies in traditional mode. In Traditional Mode, the 'Accept' action determines that a connection is allowed, while the 'Encrypt' action determines that a connection is allowed and encrypted. Select whether VPN accepts an encrypted packet that matches a rule with an 'Accept' action or drops it.
    enableLoadDistributionForMepConf Boolean
    Enable load distribution for Multiple Entry Points configurations (Site To Site connections). The VPN Multiple Entry Point (MEP) feature supplies high availability and load distribution for Check Point Security Gateways. MEP works in four modes:     First to Respond, in which the first gateway to reply to the peer gateway is chosen. An organization would choose this option if, for example, the organization has two gateways in a MEPed configuration - one in London, the other in New York. It makes sense for Check Point Security Gateway peers located in England to try the London gateway first and the NY gateway second. Being geographically closer to Check Point Security Gateway peers in England, the London gateway will be the first to respond, and becomes the entry point to the internal network.     VPN Domain, is when the destination IP belongs to a particular VPN domain, the gateway of that domain becomes the chosen entry point. This gateway becomes the primary gateway while other gateways in the MEP configuration become its backup gateways.     Random Selection, in which the remote Check Point Security Gateway peer randomly selects a gateway with which to open a VPN connection. For each IP source/destination address pair, a new gateway is randomly selected. An organization might have a number of machines with equal performance abilities. In this case, it makes sense to enable load distribution. The machines are used in a random and equal way.     Manually set priority list, gateway priorities can be set manually for the entire community or for individual satellite gateways..
    enableVpnDirectionalMatchInVpnColumn Boolean
    Enable VPN Directional Match in VPN Column.Note: VPN Directional Match is supported only on Gaia, SecurePlatform, Linux and IPSO.
    gracePeriodAfterTheCrlIsNotValid Number
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodBeforeTheCrlIsValid Number
    When establishing VPN tunnels, the peer presents its certificate for authentication. The clock on the gateway machine must be synchronized with the clock on the Certificate Authority machine. Otherwise, the Certificate Revocation List (CRL) used for validating the peer's certificate may be considered invalid and thus the authentication fails. To resolve the issue of differing clock times, a Grace Period permits a wider window for CRL validity.
    gracePeriodExtensionForSecureRemoteSecureClient Number
    When dealing with remote clients the Grace Period needs to be extended. The remote client sometimes relies on the peer gateway to supply the CRL. If the client's clock is not synchronized with the gateway's clock, a CRL that is considered valid by the gateway may be considered invalid by the client.
    supportIkeDosProtectionFromIdentifiedSrc String
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    supportIkeDosProtectionFromUnidentifiedSrc String
    When the number of IKE negotiations handled simultaneously exceeds a threshold above VPN's capacity, a gateway concludes that it is either under a high load or experiencing a Denial of Service attack. VPN can filter out peers that are the probable source of the potential Denial of Service attack. There are two kinds of protection:     Stateless - the peer has to respond to an IKE notification in a way that proves the peer's IP address is not spoofed. If the peer cannot prove this, VPN does not allocate resources for the IKE negotiation     Puzzles - this is the same as Stateless, but in addition, the peer has to solve a mathematical puzzle. Solving this puzzle consumes peer CPU resources in a way that makes it difficult to initiate multiple IKE negotiations simultaneously.Puzzles is more secure then Stateless, but affects performance.Since these kinds of attacks involve a new proprietary addition to the IKE protocol, enabling these protection mechanisms may cause difficulties with non Check Point VPN products or older versions of VPN.
    vpnConfMethod String
    Decide on Simplified or Traditional mode for all new security policies or decide which mode to use on a policy by policy basis.

    Package Details

    Repository
    checkpoint checkpointsw/terraform-provider-checkpoint
    License
    Notes
    This Pulumi package is based on the checkpoint Terraform Provider.
    Viewing docs for checkpoint 3.0.0
    published on Monday, Mar 30, 2026 by checkpointsw
      Try Pulumi Cloud free. Your team will thank you.