<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What's an example of where-used indirectly? in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-s-an-example-of-where-used-indirectly/m-p/5245#M443</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/where-used~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/where-used~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;where-used name "Host 1" &lt;EM&gt;&lt;STRONG&gt;indirect true&lt;/STRONG&gt;&lt;/EM&gt; details-level "uid" indirect-max-depth 5 --format json&amp;nbsp; • "--format json" is optional. By default the output is presented in plain text.&lt;/PRE&gt;&lt;P class="" style="color: #333333; background-color: #ffffff; margin: 10px 0px 0px;"&gt;Output&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;{&amp;nbsp;&amp;nbsp; "used-directly" : {&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "total" : 2,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "objects" : [ "f5c7640d-92eb-4c91-b7ad-c9c972ec31d6" ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threat-prevention-rules" : [ ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "nat-rules" : [ ],&amp;nbsp;&amp;nbsp; &lt;STRONG&gt; &lt;EM&gt; "access-control-rules" : [ {&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "rule" : "6c4fc003-4a45-4a09-9438-b76745c55674",&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "position" : "2",&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "owner" : "f799c262-0942-4cb7-a7da-c5daed16b27b",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "policy" : "21bef0f6-026d-4730-80b2-b8159a0bc11a",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "layer" : "f799c262-0942-4cb7-a7da-c5daed16b27b",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "layer-position" : 0,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "package" : "68451b5c-c330-4b5c-a9f4-4c9ff97b7b2d"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; } ]&amp;nbsp;&amp;nbsp; },&amp;nbsp;&amp;nbsp; "used-indirectly" : {&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "total" : 6,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "objects" : [ "7a42b6fa-c0ab-4646-9f38-e6a75a2d1f65", "a991a0db-cf5b-4228-ab7f-3093f8018fae", "47f15ffc-a7ba-4a80-a58d-5a992c649c8e", "a652839f-2232-4db9-a444-b2f910fb0642", "d2ddc3ef-29bc-469b-ab6c-c469a778d31f" ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threat-prevention-rules" : [ ],&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;"nat-rules" : [ {&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "rule" : "774bafc8-38d9-4580-817e-14b0da4e605e",&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&amp;nbsp; &lt;EM&gt;&amp;nbsp; "position" : "1",&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "owner" : "20fd80bf-57f3-4c2b-8fa1-916f87375941",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "policy" : "ed31f1cb-3f02-4bec-b29f-3814cc4f0e07",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "package" : "68451b5c-c330-4b5c-a9f4-4c9ff97b7b2d"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; } ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "access-control-rules" : [ ]&amp;nbsp;&amp;nbsp; } }&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see this scenario:&lt;/P&gt;&lt;P&gt;"Web Server" is part of Group "aaaa"&lt;/P&gt;&lt;P&gt;Group "aaaa" is part of group "bbbb"&lt;/P&gt;&lt;P&gt;indirect of "&lt;SPAN&gt;Web Server" is "bbbb"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG alt="direct" class="image-1 jive-image j-img-original" src="https://s21.postimg.org/6vw8d122f/direct_Where_Used.png" style="height: auto;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="indirect" class="image-2 jive-image j-img-original" src="https://s22.postimg.org/4c9x9a2k1/indirect_Where_Used.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Aug 2017 07:19:50 GMT</pubDate>
    <dc:creator>Ofir_Shikolski</dc:creator>
    <dc:date>2017-08-17T07:19:50Z</dc:date>
    <item>
      <title>What's an example of where-used indirectly?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-s-an-example-of-where-used-indirectly/m-p/5244#M442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When using the "where-used" API call, all the results (so far) have come back as "used-directly". What would be an example of a result that would come back as used-indirectly?&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Aug 2017 21:02:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-s-an-example-of-where-used-indirectly/m-p/5244#M442</guid>
      <dc:creator>Ryan_Puckett</dc:creator>
      <dc:date>2017-08-13T21:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: What's an example of where-used indirectly?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-s-an-example-of-where-used-indirectly/m-p/5245#M443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/where-used~v1.1" title="https://sc1.checkpoint.com/documents/latest/APIs/index.html#gui-cli/where-used~v1.1"&gt;Check Point - Management API reference&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;where-used name "Host 1" &lt;EM&gt;&lt;STRONG&gt;indirect true&lt;/STRONG&gt;&lt;/EM&gt; details-level "uid" indirect-max-depth 5 --format json&amp;nbsp; • "--format json" is optional. By default the output is presented in plain text.&lt;/PRE&gt;&lt;P class="" style="color: #333333; background-color: #ffffff; margin: 10px 0px 0px;"&gt;Output&lt;/P&gt;&lt;PRE class="" style="color: #191919; background: #efefef; border: 0px none; margin: 0px 0px 10px; padding: 9.5px;"&gt;{&amp;nbsp;&amp;nbsp; "used-directly" : {&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "total" : 2,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "objects" : [ "f5c7640d-92eb-4c91-b7ad-c9c972ec31d6" ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threat-prevention-rules" : [ ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "nat-rules" : [ ],&amp;nbsp;&amp;nbsp; &lt;STRONG&gt; &lt;EM&gt; "access-control-rules" : [ {&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "rule" : "6c4fc003-4a45-4a09-9438-b76745c55674",&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; "position" : "2",&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "owner" : "f799c262-0942-4cb7-a7da-c5daed16b27b",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "policy" : "21bef0f6-026d-4730-80b2-b8159a0bc11a",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "layer" : "f799c262-0942-4cb7-a7da-c5daed16b27b",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "layer-position" : 0,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "package" : "68451b5c-c330-4b5c-a9f4-4c9ff97b7b2d"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; } ]&amp;nbsp;&amp;nbsp; },&amp;nbsp;&amp;nbsp; "used-indirectly" : {&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "total" : 6,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "objects" : [ "7a42b6fa-c0ab-4646-9f38-e6a75a2d1f65", "a991a0db-cf5b-4228-ab7f-3093f8018fae", "47f15ffc-a7ba-4a80-a58d-5a992c649c8e", "a652839f-2232-4db9-a444-b2f910fb0642", "d2ddc3ef-29bc-469b-ab6c-c469a778d31f" ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threat-prevention-rules" : [ ],&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;EM&gt;"nat-rules" : [ {&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "rule" : "774bafc8-38d9-4580-817e-14b0da4e605e",&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;&amp;nbsp; &lt;EM&gt;&amp;nbsp; "position" : "1",&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "owner" : "20fd80bf-57f3-4c2b-8fa1-916f87375941",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "policy" : "ed31f1cb-3f02-4bec-b29f-3814cc4f0e07",&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "package" : "68451b5c-c330-4b5c-a9f4-4c9ff97b7b2d"&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; } ],&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "access-control-rules" : [ ]&amp;nbsp;&amp;nbsp; } }&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see this scenario:&lt;/P&gt;&lt;P&gt;"Web Server" is part of Group "aaaa"&lt;/P&gt;&lt;P&gt;Group "aaaa" is part of group "bbbb"&lt;/P&gt;&lt;P&gt;indirect of "&lt;SPAN&gt;Web Server" is "bbbb"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG alt="direct" class="image-1 jive-image j-img-original" src="https://s21.postimg.org/6vw8d122f/direct_Where_Used.png" style="height: auto;" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="indirect" class="image-2 jive-image j-img-original" src="https://s22.postimg.org/4c9x9a2k1/indirect_Where_Used.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Aug 2017 07:19:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-s-an-example-of-where-used-indirectly/m-p/5245#M443</guid>
      <dc:creator>Ofir_Shikolski</dc:creator>
      <dc:date>2017-08-17T07:19:50Z</dc:date>
    </item>
  </channel>
</rss>

