<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to select a Security profile via API in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-select-a-Security-profile-via-API/m-p/21519#M1348</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Hi Team&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;I have been working on automating site2site vpn with a Check Point Gateway and an Interoperable device, and setting up a vpn community.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7668-how-to-add-interoperative-device-via-api"&gt;https://community.checkpoint.com/message/18635-how-to-add-interoperative-device-via-api&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;The next step my search to complete my use of API is Add my site2site firewall rule to gateway cluster Security policy.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;When I use the active example from the API doc it us being published to the standard security profile. I’ve &amp;nbsp;multiple profile to each of my rule set per secure gateway.&lt;/P&gt;&lt;P class=""&gt;I have been able find my security profiles by using commands to extract uid.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7703-how-to-find-generic-object-that-is-not-defined-in-the-api"&gt;https://community.checkpoint.com/message/18729-how-to-find-generic-object-that-is-not-defined-in-the-api&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;And I also had to find out how to extract and set values I dont find any documentation of.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7701-missing-api-possibility-to-set-vpn-community-star-objects"&gt;https://community.checkpoint.com/message/18727-missing-api-possibility-to-set-vpn-community-star-objects&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;For example how to set ipsec and ike rekey values because Cisco device ASA5506 or Cisco router 1921/1941 have been configured differnetly than default vpn community values as 1440 min, and 86400 sec.&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;I can publish a firewall rule&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;#############################&lt;BR /&gt;# Add FW rule &lt;BR /&gt;#############################&lt;BR /&gt;# Name of rule WP-&amp;lt;Parkname&amp;gt;&lt;BR /&gt;# source "Hobro_Scada_Internal" &amp;amp; "WP_Gettrup_Internal_Network"&lt;BR /&gt;# destination "WP_Gettrup_Internal_Network" &amp;amp; "Hobro_Scada_Internal" &lt;BR /&gt;# services "Vestas Park Services"&lt;BR /&gt;# vpn-community "WP-Gettrup"&lt;BR /&gt;# action "Accept"&lt;BR /&gt;# track "Log"&lt;BR /&gt;# install-on "gwcluster"&lt;/P&gt;&lt;P&gt;mgmt_cli -u admin add access-rule layer "Network" position 1 name "Windpark Getrrup" source.1 "Hobro_Scada_Internal" source.2 "WP_Gettrup_Internal_Network" destination.1 "WP_Gettrup_Internal_Network" destination.2 "Hobro_Scada_Internal" service.1 "Vestas Park Services" vpn "WP-Gettrup" action "Accept" track.type "Log" install-on "gwcluster"&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;As you can see it add itself to the security policy [Standard]&lt;/P&gt;&lt;P class=""&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65342_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;How do I select a security profile by either using the name or uid to publish my new firewall rule?&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;Thanks&lt;/P&gt;&lt;P class=""&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 May 2018 05:37:57 GMT</pubDate>
    <dc:creator>Kim_Moberg</dc:creator>
    <dc:date>2018-05-04T05:37:57Z</dc:date>
    <item>
      <title>How to select a Security profile via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-select-a-Security-profile-via-API/m-p/21519#M1348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Hi Team&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;I have been working on automating site2site vpn with a Check Point Gateway and an Interoperable device, and setting up a vpn community.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7668-how-to-add-interoperative-device-via-api"&gt;https://community.checkpoint.com/message/18635-how-to-add-interoperative-device-via-api&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;The next step my search to complete my use of API is Add my site2site firewall rule to gateway cluster Security policy.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;When I use the active example from the API doc it us being published to the standard security profile. I’ve &amp;nbsp;multiple profile to each of my rule set per secure gateway.&lt;/P&gt;&lt;P class=""&gt;I have been able find my security profiles by using commands to extract uid.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7703-how-to-find-generic-object-that-is-not-defined-in-the-api"&gt;https://community.checkpoint.com/message/18729-how-to-find-generic-object-that-is-not-defined-in-the-api&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN style="-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);"&gt;And I also had to find out how to extract and set values I dont find any documentation of.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7701-missing-api-possibility-to-set-vpn-community-star-objects"&gt;https://community.checkpoint.com/message/18727-missing-api-possibility-to-set-vpn-community-star-objects&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;For example how to set ipsec and ike rekey values because Cisco device ASA5506 or Cisco router 1921/1941 have been configured differnetly than default vpn community values as 1440 min, and 86400 sec.&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;I can publish a firewall rule&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;#############################&lt;BR /&gt;# Add FW rule &lt;BR /&gt;#############################&lt;BR /&gt;# Name of rule WP-&amp;lt;Parkname&amp;gt;&lt;BR /&gt;# source "Hobro_Scada_Internal" &amp;amp; "WP_Gettrup_Internal_Network"&lt;BR /&gt;# destination "WP_Gettrup_Internal_Network" &amp;amp; "Hobro_Scada_Internal" &lt;BR /&gt;# services "Vestas Park Services"&lt;BR /&gt;# vpn-community "WP-Gettrup"&lt;BR /&gt;# action "Accept"&lt;BR /&gt;# track "Log"&lt;BR /&gt;# install-on "gwcluster"&lt;/P&gt;&lt;P&gt;mgmt_cli -u admin add access-rule layer "Network" position 1 name "Windpark Getrrup" source.1 "Hobro_Scada_Internal" source.2 "WP_Gettrup_Internal_Network" destination.1 "WP_Gettrup_Internal_Network" destination.2 "Hobro_Scada_Internal" service.1 "Vestas Park Services" vpn "WP-Gettrup" action "Accept" track.type "Log" install-on "gwcluster"&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;As you can see it add itself to the security policy [Standard]&lt;/P&gt;&lt;P class=""&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65342_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;How do I select a security profile by either using the name or uid to publish my new firewall rule?&lt;/P&gt;&lt;P class=""&gt;&lt;/P&gt;&lt;P class=""&gt;Thanks&lt;/P&gt;&lt;P class=""&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2018 05:37:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-select-a-Security-profile-via-API/m-p/21519#M1348</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-05-04T05:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to select a Security profile via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-select-a-Security-profile-via-API/m-p/21520#M1349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, this is because you specified the layer “network” at your add access-rule call. Find out the name of the policy layer of the other policy and change your “add access-rule” call. Some of these names for layers may have been created automatically based on logics that I described at&amp;nbsp;&lt;A href="https://community.checkpoint.com/message/16940-editing-policy-from-no-layers-to-2-layers" target="_blank"&gt;https://community.checkpoint.com/message/16940-editing-policy-from-no-layers-to-2-layers&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:10:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/How-to-select-a-Security-profile-via-API/m-p/21520#M1349</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2019-06-21T09:10:31Z</dc:date>
    </item>
  </channel>
</rss>

