<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get all inline access rules via API in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225919#M8723</link>
    <description>&lt;P&gt;I set both&amp;nbsp;"show-as-ranges" and "use-object-dictionary" to true and tried.&amp;nbsp; I got a mixed of results, some are good (clear texts like in SmarConsole, but in ranges), some are object ID's (which requires me to use show-access-rulebase again).&lt;/P&gt;&lt;P&gt;So, it seems there is no better solution than what I described initially.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;{"uid": "obj-id-xxx",&lt;BR /&gt;"limit": 500,&lt;BR /&gt;"offset": 0,&lt;BR /&gt;"details-level": "standard",&lt;BR /&gt;"show-as-ranges": true,&lt;BR /&gt;"use-object-dictionary": true&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;},&lt;BR /&gt;"source-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "1.1.1.1",&lt;BR /&gt;"end": "1.1.1.1"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"destination-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;"obj-id-xxx"&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"service-ranges": {&lt;BR /&gt;"tcp": [&lt;BR /&gt;{&lt;BR /&gt;"start": "1000",&lt;BR /&gt;"end": "1000"&lt;BR /&gt;}&lt;BR /&gt;],&lt;/P&gt;&lt;P&gt;"source-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0.0.0.0",&lt;BR /&gt;"end": "255.255.255.255"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0:0:0:0:0:0:0:0",&lt;BR /&gt;"end": "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"destination-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0.0.0.0",&lt;BR /&gt;"end": "255.255.255.255"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0:0:0:0:0:0:0:0",&lt;BR /&gt;"end": "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"&lt;BR /&gt;}&lt;/P&gt;</description>
    <pubDate>Fri, 06 Sep 2024 22:53:39 GMT</pubDate>
    <dc:creator>pdn</dc:creator>
    <dc:date>2024-09-06T22:53:39Z</dc:date>
    <item>
      <title>Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225893#M8716</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I wrote a python script to get all inline access rules from all firewall policies.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've used show-access-rulebase, in for loops, first to find the rules at the access-section layer.&amp;nbsp; Then using show-access-rulebase again, in for loops, to get all inline-layer access rules.&amp;nbsp; Then, I have to use&amp;nbsp;show-object, again in for loops, to convert source/destination/service uid objects into human readable texts.&amp;nbsp; Since source/destination/port for a specific inline rule can be a long list, my script is taking a while.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a better way than what I described?&amp;nbsp; Seems that the slowest part is using the&amp;nbsp;&amp;nbsp;show-object API calls.&amp;nbsp; Is there another API or option in the&amp;nbsp;show-access-rulebase to get the inline rules with human readable source/destination/port, directly without having to use the&amp;nbsp;show-object for conversion?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 17:21:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225893#M8716</guid>
      <dc:creator>pdn</dc:creator>
      <dc:date>2024-09-06T17:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225895#M8717</link>
      <description>&lt;P&gt;Use the following API command which translates Source / Destination / Service to values:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html?#cli/show-access-rulebase~v1.9.1%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/APIs/index.html?#cli/show-access-rulebase~v1.9.1%20&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show-access-rulebase with rules displayed as ranges&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For example:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="code"&gt;mgmt_cli show access-rulebase offset 0 limit 20 name "Network" show-as-ranges "true"  --format json
&lt;/PRE&gt;</description>
      <pubDate>Fri, 06 Sep 2024 17:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225895#M8717</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2024-09-06T17:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225896#M8718</link>
      <description>&lt;P&gt;Thanks&amp;nbsp; Tal_Paz-Fridman.&amp;nbsp; I tried that before, but it didn't display the source/destination/service as what is shown in SmartConsole (ie, source/destination =&amp;nbsp; abc.company.com, 1.1.1.1, service = tcp_1000).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I recalled correctly, ranges were shown instead, not the actually values shown in SmartConsole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe I am missing something or mispeaking?&amp;nbsp; Can you provide an example API?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 18:05:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225896#M8718</guid>
      <dc:creator>pdn</dc:creator>
      <dc:date>2024-09-06T18:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225898#M8719</link>
      <description>&lt;P&gt;You're right - it only shows ranges but if the start and end are the same its a single value.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created an Order layer or Inline where the second rule is:&lt;/P&gt;
&lt;DIV id="tinyMceEditor_d9aa9140abfbaTal_PazFridman_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule 2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27523iF40A5E9609666F79/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule 2.png" alt="Rule 2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The IP of host_for_server10 is 10.10.10.10&lt;/P&gt;
&lt;P&gt;I ran the command:&lt;/P&gt;
&lt;P&gt;mgmt_cli show access-rulebase name "Layer name" show-as-ranges "true" --format json&lt;/P&gt;
&lt;P&gt;The is the command output (I highlighted the relevant values):&lt;/P&gt;
&lt;P&gt;}, {&lt;BR /&gt;"uid" : "4960587a-7376-450c-b8b6-00b766eda078",&lt;BR /&gt;"type" : "access-rule",&lt;BR /&gt;"domain" : {&lt;BR /&gt;"uid" : "41e821a0-3720-11e3-aa6e-0800200c9fde",&lt;BR /&gt;"name" : "SMC User",&lt;BR /&gt;"domain-type" : "domain"&lt;BR /&gt;},&lt;BR /&gt;"enabled" : true,&lt;BR /&gt;"comments" : "",&lt;BR /&gt;"meta-info" : {&lt;BR /&gt;"lock" : "unlocked",&lt;BR /&gt;"validation-state" : "ok",&lt;BR /&gt;"last-modify-time" : {&lt;BR /&gt;"posix" : 1725646212468,&lt;BR /&gt;"iso-8601" : "2024-09-06T21:10+0300"&lt;BR /&gt;},&lt;BR /&gt;"last-modifier" : "cc",&lt;BR /&gt;"creation-time" : {&lt;BR /&gt;"posix" : 1725646212468,&lt;BR /&gt;"iso-8601" : "2024-09-06T21:10+0300"&lt;BR /&gt;},&lt;BR /&gt;"creator" : "cc"&lt;BR /&gt;},&lt;BR /&gt;"available-actions" : {&lt;BR /&gt;"clone" : "not_supported"&lt;BR /&gt;},&lt;BR /&gt;"install-on" : [ "6c488338-8eec-4103-ad21-cd461ac2c476" ],&lt;BR /&gt;"tags" : [ ],&lt;BR /&gt;"source-ranges" : {&lt;BR /&gt;"ipv4" : [ {&lt;BR /&gt;&lt;STRONG&gt;"start" : "10.10.10.10",&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;"end" : "10.10.10.10"&lt;/STRONG&gt;&lt;BR /&gt;} ],&lt;BR /&gt;"ipv6" : [ ],&lt;BR /&gt;"others" : [ ],&lt;BR /&gt;"excluded-others" : [ ]&lt;BR /&gt;},&lt;BR /&gt;"destination-ranges" : {&lt;BR /&gt;"ipv4" : [ {&lt;BR /&gt;"start" : "0.0.0.0",&lt;BR /&gt;"end" : "255.255.255.255"&lt;BR /&gt;} ],&lt;BR /&gt;"ipv6" : [ {&lt;BR /&gt;"start" : "0:0:0:0:0:0:0:0",&lt;BR /&gt;"end" : "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"&lt;BR /&gt;} ],&lt;BR /&gt;"others" : [ ],&lt;BR /&gt;"excluded-others" : [ ]&lt;BR /&gt;},&lt;BR /&gt;"service-ranges" : {&lt;BR /&gt;"tcp" : [ {&lt;BR /&gt;&lt;STRONG&gt;"start" : "80",&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;"end" : "80"&lt;/STRONG&gt;&lt;BR /&gt;} ],&lt;BR /&gt;"udp" : [ ],&lt;BR /&gt;"others" : [ ],&lt;BR /&gt;"excluded-others" : [ ]&lt;BR /&gt;},&lt;BR /&gt;"vpn" : [ "97aeb369-9aea-11d5-bd16-0090272ccb30" ],&lt;BR /&gt;"action" : "6c488338-8eec-4103-ad21-cd461ac2c472",&lt;BR /&gt;"action-settings" : {&lt;BR /&gt;"enable-identity-captive-portal" : false&lt;BR /&gt;},&lt;BR /&gt;"content" : [ "97aeb369-9aea-11d5-bd16-0090272ccb30" ],&lt;BR /&gt;"content-negate" : false,&lt;BR /&gt;"content-direction" : "any",&lt;BR /&gt;"time" : [ "97aeb369-9aea-11d5-bd16-0090272ccb30" ],&lt;BR /&gt;"custom-fields" : {&lt;BR /&gt;"field-1" : "",&lt;BR /&gt;"field-2" : "",&lt;BR /&gt;"field-3" : ""&lt;BR /&gt;},&lt;BR /&gt;"rule-number" : 2,&lt;BR /&gt;"track" : {&lt;BR /&gt;"type" : "29e53e3d-23bf-48fe-b6b1-d59bd88036f9",&lt;BR /&gt;"per-session" : false,&lt;BR /&gt;"per-connection" : false,&lt;BR /&gt;"accounting" : false,&lt;BR /&gt;"enable-firewall-session" : false,&lt;BR /&gt;"alert" : "none"&lt;BR /&gt;}&lt;BR /&gt;}, {&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 18:21:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225898#M8719</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2024-09-06T18:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225906#M8721</link>
      <description>&lt;P&gt;Add&amp;nbsp;&lt;SPAN&gt;use-object-dictionary true to the call and it should include a translation for the various objects as part of the JSON output.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 19:47:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225906#M8721</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-06T19:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225918#M8722</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;I thought I tried that flag before as well, but didn't see what I was looking for.&amp;nbsp; I can try again.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 22:37:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225918#M8722</guid>
      <dc:creator>pdn</dc:creator>
      <dc:date>2024-09-06T22:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225919#M8723</link>
      <description>&lt;P&gt;I set both&amp;nbsp;"show-as-ranges" and "use-object-dictionary" to true and tried.&amp;nbsp; I got a mixed of results, some are good (clear texts like in SmarConsole, but in ranges), some are object ID's (which requires me to use show-access-rulebase again).&lt;/P&gt;&lt;P&gt;So, it seems there is no better solution than what I described initially.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;{"uid": "obj-id-xxx",&lt;BR /&gt;"limit": 500,&lt;BR /&gt;"offset": 0,&lt;BR /&gt;"details-level": "standard",&lt;BR /&gt;"show-as-ranges": true,&lt;BR /&gt;"use-object-dictionary": true&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;},&lt;BR /&gt;"source-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "1.1.1.1",&lt;BR /&gt;"end": "1.1.1.1"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"destination-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;"obj-id-xxx"&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"service-ranges": {&lt;BR /&gt;"tcp": [&lt;BR /&gt;{&lt;BR /&gt;"start": "1000",&lt;BR /&gt;"end": "1000"&lt;BR /&gt;}&lt;BR /&gt;],&lt;/P&gt;&lt;P&gt;"source-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0.0.0.0",&lt;BR /&gt;"end": "255.255.255.255"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0:0:0:0:0:0:0:0",&lt;BR /&gt;"end": "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"others": [&lt;BR /&gt;],&lt;BR /&gt;"excluded-others": [&lt;BR /&gt;]&lt;BR /&gt;},&lt;BR /&gt;"destination-ranges": {&lt;BR /&gt;"ipv4": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0.0.0.0",&lt;BR /&gt;"end": "255.255.255.255"&lt;BR /&gt;}&lt;BR /&gt;],&lt;BR /&gt;"ipv6": [&lt;BR /&gt;{&lt;BR /&gt;"start": "0:0:0:0:0:0:0:0",&lt;BR /&gt;"end": "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff"&lt;BR /&gt;}&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 22:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225919#M8723</guid>
      <dc:creator>pdn</dc:creator>
      <dc:date>2024-09-06T22:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Get all inline access rules via API</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225944#M8724</link>
      <description>&lt;P&gt;"use-object-dictionary" defaults to true. By default, you will get output like this:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[Expert@DallasSA]# mgmt_cli -f json -r true show access-rulebase uid 8a994dd3-993e-4c0c-92a1-a8630b153f4c limit 1 | jq .
{
  "uid": "8a994dd3-993e-4c0c-92a1-a8630b153f4c",
  "name": "Network",
  "rulebase": [
    {
      "uid": "9d820cd3-fb7b-44ef-b3e0-399fca6a44a4",
      "name": "Sectionless",
      "type": "access-rule",
      "domain": {...},
      "rule-number": 1,
      "track": {...},
      "source": [
        "97aeb369-9aea-11d5-bd16-0090272ccb30"
      ],
      "source-negate": false,
      "destination": [
        "97aeb369-9aea-11d5-bd16-0090272ccb30"
      ],
      "destination-negate": false,
      "service": [
        "97aeb40a-9aea-11d5-bd16-0090272ccb30"
      ],
      "service-negate": false,
      "service-resource": "",
      "vpn": [
        "97aeb369-9aea-11d5-bd16-0090272ccb30"
      ],
      "action": "6c488338-8eec-4103-ad21-cd461ac2c472",
      "action-settings": {
        "enable-identity-captive-portal": false
      },
      "content": [
        "97aeb369-9aea-11d5-bd16-0090272ccb30"
      ],
      "content-negate": false,
      "content-direction": "any",
      "time": [
        "97aeb369-9aea-11d5-bd16-0090272ccb30"
      ],
      "custom-fields": {
        "field-1": "",
        "field-2": "",
        "field-3": ""
      },
      "meta-info": {...},
      "comments": "",
      "enabled": true,
      "install-on": [
        "6c488338-8eec-4103-ad21-cd461ac2c476"
      ],
      "tags": []
    }
  ],
  "objects-dictionary": [
    {
      "uid": "6c488338-8eec-4103-ad21-cd461ac2c472",
      "name": "Accept",
      "type": "RulebaseAction",
      "domain": {...},
      "icon": "Actions/actionsAccept",
      "color": "none"
    },
    {
      "uid": "97aeb369-9aea-11d5-bd16-0090272ccb30",
      "name": "Any",
      "type": "CpmiAnyObject",
      "domain": {...},
      "icon": "General/globalsAny",
      "color": "black"
    },
    {
      "uid": "97aeb40a-9aea-11d5-bd16-0090272ccb30",
      "name": "echo-request",
      "type": "service-icmp",
      "domain": {...},
      "icon": "Services/ICMPService",
      "color": "orchid"
    },
    {
      "uid": "29e53e3d-23bf-48fe-b6b1-d59bd88036f9",
      "name": "None",
      "type": "Track",
      "domain": {...},
      "icon": "General/globalsNone",
      "color": "none"
    },
    {
      "uid": "6c488338-8eec-4103-ad21-cd461ac2c476",
      "name": "Policy Targets",
      "type": "Global",
      "domain": {...},
      "icon": "General/globalsAny",
      "color": "none"
    }
  ],
  "from": 1,
  "to": 1,
  "total": 29
}&lt;/LI-CODE&gt;
&lt;P&gt;The "objects-dictionary" key contains a list of all of the objects referenced in the rules covered by the API call. The "details-level" key in the call controls the level of detail of the rule and of these objects. This does have a significant limitation, though: group members are not included. You can resolve group members one at a time, but like you said, that's really slow.&lt;/P&gt;
&lt;P&gt;If you can afford to spend the RAM, it's a &lt;EM&gt;lot&lt;/EM&gt; faster to start by calling "/show-objects" over and over to ingest all objects into a local cache. You then pull the rules, ignore the "objects-dictionary" key, and ingest the rule using the objects from your local cache.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Sep 2024 18:44:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-all-inline-access-rules-via-API/m-p/225944#M8724</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2024-09-07T18:44:44Z</dc:date>
    </item>
  </channel>
</rss>

