<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migrating threat profiles using the R80 Web APIs, Python, and cpauto in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38856#M2344</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/50582"&gt;Jacob Blankenship&lt;/A&gt;‌ ... cpauto is an open source project that is not officially supported by Check Point. It was developed to abstract some of the common bits required to consume the early R80.x web APIs. There is documentation in the code itself in the form of Python comments. The Python comments are structured in a way to automatically generate documentation you can find here: &lt;A class="link-titled" href="https://cpauto.readthedocs.io/en/latest/" title="https://cpauto.readthedocs.io/en/latest/"&gt;Welcome to cpauto’s documentation! — cpauto 0.0.5 documentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it is an open source project that means you and others can contribute. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Please feel free to create documentation and submit pull requests via Github. The project is lagging behind advancements in the R80.x web APIs so there is plenty of Python to write for anyone interested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's also a project page on PyPI:&amp;nbsp;&lt;A class="link-titled" href="https://pypi.org/project/cpauto/" title="https://pypi.org/project/cpauto/"&gt;cpauto · PyPI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Feb 2019 22:26:52 GMT</pubDate>
    <dc:creator>Dana_Traversie</dc:creator>
    <dc:date>2019-02-13T22:26:52Z</dc:date>
    <item>
      <title>Migrating threat profiles using the R80 Web APIs, Python, and cpauto</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38854#M2342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H2&gt;Overview&lt;/H2&gt;&lt;P&gt;This script shows how threat profiles can be migrated from one R80 manager to another R80 or R80.10 manager programmatically using the R80 web APIs, Python, and cpauto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Description&lt;/H2&gt;&lt;P&gt;Script requires at least two R80/R80.10 managers with the web APIs enabled. The source manager should have some user-defined threat profiles for the demo to be useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The provided code is merely an example but is a viable pattern that can be reused for virtually all policy and object types.&lt;/P&gt;&lt;H2&gt;Instructions&lt;/H2&gt;&lt;P&gt;Download the archive and run the enclosed Python script on a system that meets the following requirements:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Python and cpauto installed correctly&lt;/LI&gt;&lt;LI&gt;Network access to the source and destination R80 web API resources&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Grab the code here: &lt;A href="https://www.dropbox.com/s/6o6fslt2yz4k8wa/cpauto-threat-profile-migrate-demo.tar.gz?dl=0"&gt;https://www.dropbox.com/s/6o6fslt2yz4k8wa/cpauto-threat-profile-migrate-demo.tar.gz?dl=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information on cpauto: &lt;A href="https://github.com/dana-at-cp/cpauto"&gt;https://github.com/dana-at-cp/cpauto&lt;/A&gt;&lt;/P&gt;&lt;H2&gt;Code Version&lt;/H2&gt;&lt;P&gt;Code version 1.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Tested on version&lt;/H2&gt;&lt;P&gt;R80, API version 1.0, 1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: center;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="color: #ff0000; font-size: 13px;"&gt;&lt;STRONG&gt;NOTICE: &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #999999; font-size: 10.66px;"&gt;&lt;STRONG&gt;By using this sample code you agree to terms and conditions in this &lt;A href="https://community.checkpoint.com/docs/DOC-1042"&gt;Not authorized to view the specified document 1042&lt;/A&gt;​&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: center;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;...&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2017 16:25:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38854#M2342</guid>
      <dc:creator>Dana_Traversie</dc:creator>
      <dc:date>2017-02-03T16:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating threat profiles using the R80 Web APIs, Python, and cpauto</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38855#M2343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would help if there was more documentation on cpauto.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2019 10:25:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38855#M2343</guid>
      <dc:creator>Jacob_Blankensh</dc:creator>
      <dc:date>2019-02-13T10:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: Migrating threat profiles using the R80 Web APIs, Python, and cpauto</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38856#M2344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/50582"&gt;Jacob Blankenship&lt;/A&gt;‌ ... cpauto is an open source project that is not officially supported by Check Point. It was developed to abstract some of the common bits required to consume the early R80.x web APIs. There is documentation in the code itself in the form of Python comments. The Python comments are structured in a way to automatically generate documentation you can find here: &lt;A class="link-titled" href="https://cpauto.readthedocs.io/en/latest/" title="https://cpauto.readthedocs.io/en/latest/"&gt;Welcome to cpauto’s documentation! — cpauto 0.0.5 documentation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it is an open source project that means you and others can contribute. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;Please feel free to create documentation and submit pull requests via Github. The project is lagging behind advancements in the R80.x web APIs so there is plenty of Python to write for anyone interested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's also a project page on PyPI:&amp;nbsp;&lt;A class="link-titled" href="https://pypi.org/project/cpauto/" title="https://pypi.org/project/cpauto/"&gt;cpauto · PyPI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2019 22:26:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Migrating-threat-profiles-using-the-R80-Web-APIs-Python-and/m-p/38856#M2344</guid>
      <dc:creator>Dana_Traversie</dc:creator>
      <dc:date>2019-02-13T22:26:52Z</dc:date>
    </item>
  </channel>
</rss>

