<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 restrict user access to perform only specific commands in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80131#M6151</link>
    <description>&lt;P&gt;I saw this info earlier already. Point is that&amp;nbsp;&lt;SPAN&gt;User Defined (Extended) Commands requires path to the script.&lt;BR /&gt;I am not good at scripting, and what if i would like to create extended command for already existing command like 'fw ctl conntab'?&amp;nbsp; Is there already script written for that in the system that i could point to in the extended command?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 29 Mar 2020 20:19:35 GMT</pubDate>
    <dc:creator>trawa05</dc:creator>
    <dc:date>2020-03-29T20:19:35Z</dc:date>
    <item>
      <title>R80.20 restrict user access to perform only specific commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/79964#M6145</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;I got a very specific requirement to allow a user access the gateway and get info about 3 things:&lt;BR /&gt;a) session table&lt;BR /&gt;b) NAT session table&lt;BR /&gt;c) arp table&lt;BR /&gt;&lt;BR /&gt;So i am looking how i could create a user profile that could execute 3 (and only 3) specific commands on CLI.&lt;BR /&gt;&lt;BR /&gt;I would be glad if you could come with any ideas.&lt;BR /&gt;&lt;BR /&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 19:12:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/79964#M6145</guid>
      <dc:creator>trawa05</dc:creator>
      <dc:date>2020-03-27T19:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 restrict user access to perform only specific commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80050#M6146</link>
      <description>Two topics you need to refer to in the Gaia Admin Guide: &lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_Gaia_AdminGuide/html_frameset.htm&lt;/A&gt;&lt;BR /&gt;User Defined (Extended) Commands&lt;BR /&gt;Role Based Access&lt;BR /&gt;&lt;BR /&gt;Between those two features, you can achieve what you're after.</description>
      <pubDate>Sat, 28 Mar 2020 02:41:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80050#M6146</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-28T02:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 restrict user access to perform only specific commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80131#M6151</link>
      <description>&lt;P&gt;I saw this info earlier already. Point is that&amp;nbsp;&lt;SPAN&gt;User Defined (Extended) Commands requires path to the script.&lt;BR /&gt;I am not good at scripting, and what if i would like to create extended command for already existing command like 'fw ctl conntab'?&amp;nbsp; Is there already script written for that in the system that i could point to in the extended command?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 20:19:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80131#M6151</guid>
      <dc:creator>trawa05</dc:creator>
      <dc:date>2020-03-29T20:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 restrict user access to perform only specific commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80133#M6152</link>
      <description>Giving access to generic binary like "fw" gives you access to a LOT of things.&lt;BR /&gt;&lt;BR /&gt;To ensure only the appropriate commands can be run, you have to write a script that calls the necessary command(s).&lt;BR /&gt;This script would not be terribly complex.&lt;BR /&gt;In addition to the command you wish to run, make sure the appropriate environment variables are included, as shown here: &lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Add-sources-inside-bash-scripts/m-p/72630" target="_blank"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/Add-sources-inside-bash-scripts/m-p/72630&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Another approach is to see if what you're after can be achieved through Dynamic CLI which adds a bunch of other commands to clish, which can be subject to Role-Based Access.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk144112" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk144112&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Sun, 29 Mar 2020 21:34:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-restrict-user-access-to-perform-only-specific-commands/m-p/80133#M6152</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-29T21:34:31Z</dc:date>
    </item>
  </channel>
</rss>

