<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automating checkpoint Upgrade process for remote sites using Ansible in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82425#M4752</link>
    <description>What I meant by "checking for a new Deployment Agent" is to do the check out-of-band and deploy it either as part of or prior to your playbook. &lt;BR /&gt;The only way I can think of to potentially get around these checks would be to set updates.checkpoint.com via the hosts file to 127.0.0.1.&lt;BR /&gt;This will cause the update check to fail and may allow the CPUSE upgrade to take place without updating Deployment Agent.&lt;BR /&gt;&lt;BR /&gt;This change could have other side effects, so I recommend thorough testing.&lt;BR /&gt;</description>
    <pubDate>Mon, 20 Apr 2020 03:48:20 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-04-20T03:48:20Z</dc:date>
    <item>
      <title>Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79213#M4608</link>
      <description>&lt;P&gt;Hi Guys ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am creating an Automation script in Ansible to perform the Checkpoint &lt;STRONG&gt;R80.10&lt;/STRONG&gt; to &lt;STRONG&gt;R80.40 upgrade&lt;/STRONG&gt; remotely for our 100 + remote sites .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The script is almost ready utilizing the Ansible shell (pre , actual upgrade ) &amp;amp; uri (policy install - post upgrade ) modules expect for this step -&lt;/P&gt;&lt;P&gt;HOSTNAME#&lt;STRONG&gt;clish -c 'installer upgrade&amp;nbsp;Check_Point_R80.40_T294_Fresh_Install_and_Upgrade.tgz'&lt;/STRONG&gt;&lt;BR /&gt;Existing OS settings and Check Point database are preserved.&lt;BR /&gt;The machine will automatically reboot after upgrade.&lt;BR /&gt;Do you want to continue? ([y]es / [n]o)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since , the checkpoint doesn't support Pexpect or any other similar module for interactive automation , Is there a way to pass the response (&lt;STRONG&gt;yes&lt;/STRONG&gt;)to this command&amp;nbsp; ??&lt;/P&gt;&lt;P&gt;I have tried to send the traditional Linux way --y , but with no luck .&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; -- Do you have any insight , tricks to get this done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ? Any clish / expert command to pass 'yes' , or any&amp;nbsp;installer setting to force the default action as "yes" ??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 10:58:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79213#M4608</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-03-22T10:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79219#M4609</link>
      <description>&lt;P&gt;I applaud your efforts to automate these tasks.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;Out of interest have you considered using CDT and were there limitations specific to your scenario that&amp;nbsp; encouraged you to go a different way?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2020 12:40:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79219#M4609</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-03-22T12:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79221#M4610</link>
      <description>Hi Chris ,&lt;BR /&gt;&lt;BR /&gt;I missed the details , these 100+ sites are remote locations running Stand-alone ( Mgmt + Gateway) , not managed Centrally .Hence , cann't use CDT &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; .&lt;BR /&gt;&lt;BR /&gt;Also , we have very poor almost no connectivity to these mobile sites (VSAT connectivity ) , so the plan is to send the upgarde files .tgz and upload these to our Orchestrator (Ansible) . From where the Ansible upgrade script will initiate the entire Pre , Port upgrade on these Standalone firewalls.</description>
      <pubDate>Sun, 22 Mar 2020 12:49:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79221#M4610</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-03-22T12:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79244#M4611</link>
      <description>I don't know if this will actually work or not but you can try something like:&lt;BR /&gt;&lt;BR /&gt;echo yes | clish -c 'installer upgrade Check_Point_R80.40_T294_Fresh_Install_and_Upgrade.tgz'</description>
      <pubDate>Sun, 22 Mar 2020 20:26:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79244#M4611</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-22T20:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79250#M4612</link>
      <description>Already tried it, yet no luck :(.&lt;BR /&gt;&lt;BR /&gt;So far tried and failed attempts -&lt;BR /&gt;echo y | clish -c 'installer upgrade 1'&lt;BR /&gt;clish -c 'installer upgrade 1' | echo y&lt;BR /&gt;&lt;BR /&gt;yes | clish -c 'installer upgrade 1' --&amp;gt; works in terminal session, but fails with the ansible session cause of python subprocess killing the write pipe sig_ing handler.&lt;BR /&gt;&lt;BR /&gt;Is there a way to make default action as 'he's instead of cancel for this command? Or something from expert I can run for upgrade passing --y.</description>
      <pubDate>Mon, 23 Mar 2020 02:41:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79250#M4612</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-03-23T02:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79254#M4614</link>
      <description>Perhaps you need to push a script that calls those commands in that order and execute that script via Ansible instead of trying to execute directly like you're doing?&lt;BR /&gt;In any case, I'm not aware of a way to force the installer to proceed without any input.&lt;BR /&gt;The "installer" commands aren't yet in the Gaia APIs either, which would be an RFE.</description>
      <pubDate>Mon, 23 Mar 2020 03:07:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79254#M4614</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-23T03:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79366#M4617</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Abhishek,&lt;/P&gt;
&lt;P&gt;You can use the "not interactive" option for this purpose, it's available for most installer commands&lt;/P&gt;
&lt;P&gt;Example:&lt;BR /&gt;clish -c "installer upgrade Check_Point_R80.40_T294_Fresh_Install_and_Upgrade.tgz not-interactive"&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 14:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79366#M4617</guid>
      <dc:creator>Vadim9</dc:creator>
      <dc:date>2020-03-23T14:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79655#M4626</link>
      <description>Thanks for the insight. Creating a shell script and getting it executed via Ansible did the trick...&lt;BR /&gt;&lt;BR /&gt;Now I am at the last stage where the upgrade is done and Initial Policy is pushed on the GW. Since my Ansible server is South the GW it's access to trigger policy install to the firewall is getting blocked cause of this initial policy...&lt;BR /&gt;&lt;BR /&gt;I am thinking of creating an cron job ( on R80.10 before upgrade) that performs policy install every 25 mins ---&amp;gt; thinking post the upgarde it ll trigger and overcome the lockdown imposed by the Initial policy. Am I correct in this approach??&lt;BR /&gt;Do the cron jobs sustain Upgrades??&lt;BR /&gt;Or is there anyway around this?</description>
      <pubDate>Wed, 25 Mar 2020 09:32:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79655#M4626</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-03-25T09:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79656#M4627</link>
      <description>Thanks Vadim . But with not-interactive option, I don't get to see the live status of the installation progress... I know that can be fetched with the 'show installer package &amp;lt;no.&amp;gt; -- but this needs to be executed multiple times... So dropped the idea of using it.&lt;BR /&gt;&lt;BR /&gt;BTW do you have any tweak/insight on how to avoid initial policy lockdown? Does the crob job survive upgrade ( R80.10 to R80.40) ?</description>
      <pubDate>Wed, 25 Mar 2020 09:36:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79656#M4627</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-03-25T09:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79694#M4628</link>
      <description>Believe that will work.&lt;BR /&gt;Assuming you've configured cron jobs via Gaia WebUI/clish, they should persist across upgrades.</description>
      <pubDate>Wed, 25 Mar 2020 16:42:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/79694#M4628</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-25T16:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82419#M4749</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt; ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally I was able to write the entire role for the firewall upgrade in ansible .&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I just realized the potential isuue with the CPUSE runs out-of-date so quickly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I have mentioned we have 100+ standalone firewalls , we have shipped the DA-18665, upgrade .tzp files to be installed with the ansible role locally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now it fails complaining of - new deployment agent is available -18889 , pls update to proceed kinda msg.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But unfortunately as these standalone firewalls don't have internet access most of the time, in place online da update is not possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any workaround to execute the upgarde process with old Deployment Agent (CPUSE) ... Cause again if we decide to ship the new DA file we have a chance that in a week or so it ll again be outdated &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tx,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Abhishek&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 02:20:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82419#M4749</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-04-20T02:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82421#M4750</link>
      <description>If these gateways don't have Internet access, how do they know Deployment Agent isn't up to date?&lt;BR /&gt;Seems like you should be checking for a new Deployment Agent before you run your playbook and use that.</description>
      <pubDate>Mon, 20 Apr 2020 03:31:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82421#M4750</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-20T03:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82422#M4751</link>
      <description>I mean they have internet access, but with limited bandwidth (few kbps) and availability. Like we cannt trust as and when the internet uplink (VSAT) is functional or not.&lt;BR /&gt;&lt;BR /&gt;Checking for new DA on these standalones is neither an feasible not an garaunteed shot ( cause the way these VSAT links work )&lt;BR /&gt;&lt;BR /&gt;I was looking for any command or flag to force - don't check for latest DA or run upgarde with existing DA or force the upgrade to be in offline mode. Is there any??</description>
      <pubDate>Mon, 20 Apr 2020 03:40:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82422#M4751</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-04-20T03:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82425#M4752</link>
      <description>What I meant by "checking for a new Deployment Agent" is to do the check out-of-band and deploy it either as part of or prior to your playbook. &lt;BR /&gt;The only way I can think of to potentially get around these checks would be to set updates.checkpoint.com via the hosts file to 127.0.0.1.&lt;BR /&gt;This will cause the update check to fail and may allow the CPUSE upgrade to take place without updating Deployment Agent.&lt;BR /&gt;&lt;BR /&gt;This change could have other side effects, so I recommend thorough testing.&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2020 03:48:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82425#M4752</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-20T03:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82434#M4753</link>
      <description>&lt;P&gt;The reason we force check for DA version is that we had seen failures in combination of DA and CPUSE pkg and we are trying to shape the process to 100% success ...&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i am therefore not sure its good to void the check for DA. The cases that it will fail may be “side cases” or they can be relevant in your case. If you decide to void the check, i recommend to talk to our deployment team (thru phone boy or thru support).&amp;nbsp;&lt;BR /&gt;i suspect it may be easier to send updated version of DA and deploy it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 05:44:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/82434#M4753</guid>
      <dc:creator>Dorit_Dor</dc:creator>
      <dc:date>2020-04-20T05:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86039#M4888</link>
      <description>Thanks for the quick response . Finally the Upgarde script is completed and we have managed to upgrade 80+ Standalone FWs.&lt;BR /&gt;&lt;BR /&gt;Over few FW (5-8%), I have noticed the CP services dont start for almost more than 30-35mins after the upgrade and hence stalling the post upgrade policy install .&lt;BR /&gt;&lt;BR /&gt;We are running , 2 CPU - 6GB RAM --- Deployment type(Standalone) on HyperV VM.&lt;BR /&gt;&lt;BR /&gt;Upgrading from R80.10 to R80.40 - build 038.&lt;BR /&gt;&lt;BR /&gt;To me this looks like standard CPU load issue , so far I am not able to confirm the recommended Specifications for HyperV Standalone FW deployement from official R80.40 release notes.&lt;BR /&gt;Can you please point me towards the required specifications wrt to CPU , RAM , Storage to support this .&lt;BR /&gt;&lt;BR /&gt;Tx,&lt;BR /&gt;Abhishek.</description>
      <pubDate>Fri, 22 May 2020 07:16:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86039#M4888</guid>
      <dc:creator>Abhishek_Singh1</dc:creator>
      <dc:date>2020-05-22T07:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86040#M4889</link>
      <description>&lt;P&gt;For mind those would be aligned to minimum specifications, more accurate sizing depends on your underlying hardware / dedicated resources / traffic demand / enabled blades and in turn this will help determine any licensing implications.&lt;/P&gt;</description>
      <pubDate>Fri, 22 May 2020 07:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86040#M4889</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-05-22T07:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86073#M4890</link>
      <description>6GB of RAM is bare minimum for management alone.&lt;BR /&gt;Standalone bare minimum is 8GB of RAM.&lt;BR /&gt;More RAM is highly recommended.&lt;BR /&gt;&lt;BR /&gt;The minimum specifications are listed in the Release Notes: &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_RN/Content/Topics/Hardware-Requirements.htm?tocpath=Open" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_RN/Content/Topics/Hardware-Requirements.htm?tocpath=Open&lt;/A&gt; Server Hardware Requirements|_____0#Open_Server_Hardware_Requirements&lt;BR /&gt;It mentions "Open Server" but they apply to installation in any environment.</description>
      <pubDate>Fri, 22 May 2020 13:57:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/86073#M4890</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-22T13:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/128971#M6226</link>
      <description>&lt;P&gt;Would you be able to post an example of your update script?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 17:30:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/128971#M6226</guid>
      <dc:creator>kylesmith58</dc:creator>
      <dc:date>2021-09-08T17:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Automating checkpoint Upgrade process for remote sites using Ansible</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/139854#M6574</link>
      <description>&lt;P&gt;instead of cpuse use&amp;nbsp;da_cli&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 22:08:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Automating-checkpoint-Upgrade-process-for-remote-sites-using/m-p/139854#M6574</guid>
      <dc:creator>Douglas_Rich</dc:creator>
      <dc:date>2022-01-28T22:08:05Z</dc:date>
    </item>
  </channel>
</rss>

