check_point.mgmt.cp_mgmt_set_https_advanced_settings module – Configure advanced settings for HTTPS Inspection.
Note
This module is part of the check_point.mgmt collection (version 6.2.1).
You might already have this collection installed if you are using the ansible
package.
It is not included in ansible-core
.
To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install check_point.mgmt
.
To use it in a playbook, specify: check_point.mgmt.cp_mgmt_set_https_advanced_settings
.
New in check_point.mgmt 6.1.0
Synopsis
Configure advanced settings for HTTPS Inspection.
All operations are performed over Web Services API.
Parameters
Parameter |
Comments |
---|---|
Publish the current session if changes have been performed after task completes. Choices:
|
|
Controls whether to log and send a notification for dropped traffic.<br><ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>. Choices:
|
|
Collection of certificates objects identified by serial number.<br>Drop traffic from servers using the blocked certificate. |
|
Certificate Serial Number (unique) in hexadecimal format HH,HH. |
|
Describes the certificate by default, can be overridden by any text. |
|
Describes the name, cannot be overridden. |
|
Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during handshake)<br><ul style=”list-style-type,square”><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true. Choices:
|
|
Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server authentication)<br><ul style=”list-style-type,square”><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true. Choices:
|
|
Bypass the HTTPS Inspection temporarily to improve connectivity during a heavy load on the Security Gateway. The HTTPS Inspection would resume as soon as the load decreases. |
|
Whether to log and send a notification for the bypass under load,<ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details. Use SmartConsole or SmartView to see the logs.</li><li>Alert - Logs the event and executes a command you configured.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the configured SNMP Management Server.</li><li>User Defined Alert - Sends a custom alert.</li></ul>. Choices:
|
|
Configure the value “true” to bypass traffic to well-known software update services.<br>The default value is true. Choices:
|
|
Configure the value “bypass” to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect connections initiated by certificate-pinned applications.<br>Configure the value “detect” to send logs for traffic from certificate-pinned applications approved by Check Point.<br>The default value is bypass. Choices:
|
|
The level of detail for some of the fields in the response can vary from showing only the UID value of the object to a fully detailed representation of the object. Choices:
|
|
Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are, CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER. |
|
Apply changes ignoring errors. You won’t be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored. Choices:
|
|
Apply changes ignoring warnings. Choices:
|
|
The value “true” configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true. Choices:
|
|
Configure the value “true” to use the “Certificate Authority Information Access” extension to retrieve certificates that are missing from the certificate chain.<br>The default value is true. Choices:
|
|
When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it. |
|
Set to be true in order to drop traffic from servers with expired server certificate. Choices:
|
|
Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL). Choices:
|
|
Set to be true in order to drop traffic from servers with untrusted server certificate. Choices:
|
|
Whether to log and send a notification for the server validation errors,<br><ul style=”list-style-type,square”><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>. Choices:
|
|
Whether all requests should be allowed or blocked until categorization is complete.<br><ul style=”list-style-type,square”><li>Background - to allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is hold. Choices:
|
|
Version of checkpoint. If not given one, the latest version taken. |
|
Wait for the task to end. Such as publish task. Choices:
|
|
How many minutes to wait until throwing a timeout error. Default: |
Examples
- name: set-https-advanced-settings
cp_mgmt_set_https_advanced_settings:
blocked_certificate_tracking: popup alert
bypass_on_client_failure: 'false'
bypass_on_failure: 'false'
bypass_under_load:
track: log
bypass_update_services: 'true'
certificate_pinned_apps_action: bypass
log_sessions: 'true'
retrieve_intermediate_ca_certificates: 'true'
server_certificate_validation_actions:
block_expired: 'true'
block_revoked: 'false'
block_untrusted: 'true'
track_errors: snmp trap alert
site_categorization_allow_mode: background
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key |
Description |
---|---|
The checkpoint set-https-advanced-settings output. Returned: always. |