check_point.mgmt.cp_mgmt_set_https_advanced_settings module – Configure advanced settings for HTTPS Inspection.
Note
This module is part of the check_point.mgmt collection (version 6.5.0).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install check_point.mgmt.
To use it in a playbook, specify: check_point.mgmt.cp_mgmt_set_https_advanced_settings.
New in check_point.mgmt 6.1.0
Synopsis
- Configure advanced settings for HTTPS Inspection. 
- All operations are performed over Web Services API. 
- Available from R82 management version. 
Parameters
| Parameter | Comments | 
|---|---|
| Publish the current session if changes have been performed after task completes. Choices: 
 | |
| Controls whether to log and send a notification for dropped traffic.<br><ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>. Choices: 
 | |
| Collection of certificates objects identified by serial number.<br>Drop traffic from servers using the blocked certificate. | |
| Certificate Serial Number (unique) in hexadecimal format HH,HH. | |
| Describes the certificate by default, can be overridden by any text. | |
| Describes the name, cannot be overridden. | |
| Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during handshake)<br><ul style=”list-style-type,square”><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true. Choices: 
 | |
| Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server authentication)<br><ul style=”list-style-type,square”><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true. Choices: 
 | |
| Bypass the HTTPS Inspection temporarily to improve connectivity during a heavy load on the Security Gateway. The HTTPS Inspection would resume as soon as the load decreases. | |
| Whether to log and send a notification for the bypass under load,<ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details. Use SmartConsole or SmartView to see the logs.</li><li>Alert - Logs the event and executes a command you configured.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the configured SNMP Management Server.</li><li>User Defined Alert - Sends a custom alert.</li></ul>. Choices: 
 | |
| Configure the value “true” to bypass traffic to well-known software update services.<br>The default value is true. Choices: 
 | |
| Configure the value “bypass” to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect connections initiated by certificate-pinned applications.<br>Configure the value “detect” to send logs for traffic from certificate-pinned applications approved by Check Point.<br>The default value is bypass. Choices: 
 | |
| The level of detail for some of the fields in the response can vary from showing only the UID value of the object to a fully detailed representation of the object. Choices: 
 | |
| Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are, CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER. | |
| Apply changes ignoring errors. You won’t be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored. Choices: 
 | |
| Apply changes ignoring warnings. Choices: 
 | |
| The value “true” configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true. Choices: 
 | |
| Configure the value “true” to use the “Certificate Authority Information Access” extension to retrieve certificates that are missing from the certificate chain.<br>The default value is true. Choices: 
 | |
| When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it. | |
| Set to be true in order to drop traffic from servers with expired server certificate. Choices: 
 | |
| Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL). Choices: 
 | |
| Set to be true in order to drop traffic from servers with untrusted server certificate. Choices: 
 | |
| Whether to log and send a notification for the server validation errors,<br><ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>. Choices: 
 | |
| Whether all requests should be allowed or blocked until categorization is complete.<br><ul style=”list-style-type,square”><li>Background - to allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is hold. Choices: 
 | |
| Version of checkpoint. If not given one, the latest version taken. | |
| Wait for the task to end. Such as publish task. Choices: 
 | |
| How many minutes to wait until throwing a timeout error. Default:  | 
Examples
- name: set-https-advanced-settings
  cp_mgmt_set_https_advanced_settings:
    blocked_certificate_tracking: popup alert
    bypass_on_client_failure: 'false'
    bypass_on_failure: 'false'
    bypass_under_load:
      track: log
    bypass_update_services: 'true'
    certificate_pinned_apps_action: bypass
    log_sessions: 'true'
    retrieve_intermediate_ca_certificates: 'true'
    server_certificate_validation_actions:
      block_expired: 'true'
      block_revoked: 'false'
      block_untrusted: 'true'
      track_errors: snmp trap alert
    site_categorization_allow_mode: background
Return Values
Common return values are documented here, the following are the fields unique to this module:
| Key | Description | 
|---|---|
| The checkpoint set-https-advanced-settings output. Returned: always. | 
