- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Team,
We are able to fetch NAT rules by specifying the Policy package name through "postman_collection_v2-v1.7" ( CP R81 )
But not able to fetch Rule base of all policy packages. Not getting option to set Policy package name in reqest body.
Let me know which postman collection reqest can provide Network Policy details and how to set policy package name.
Regards,
Satish
Is the name "Network" correct for the access control layer? It seems the API request couldn't find it.
Attached is an example how it should look like.
I reproduced this exact error while using MDS but not regular SMS.
Are you using MDS?
No . I am using SMS.
Not able to fetch rulesbase of any policy package.
Regards,
Satish
You should name the package.
Try running this in SSH:
mgmt_cli -r true show access-rulebase offset 0 limit 20 package <policy_package_name> name "Network" details-level "standard" use-object-dictionary true --format json
Hi @Satish, I think the url in the Postman collection is wrong. It should be "{{server}}/web_api/show-access-rulebase".
Daniel
Hi Daniel,
It's not working. Error "404 not found".
Attaching snap for working NAT & non working Access Rule postman collection.
Access rule postman query not providing option to filter Policy package name.
I have added those parameters by refering NAT rules postman query. But no luck...
Regards,
Satish
Ah, sorry. You're are right. Your url was correct. Can you try without the package in the body of the request for the access rulebase?
3 suggestion:
a. Try with command in SSH to see if there's a difference.
b. If you're not working with JHF, try to download latest.
c. Try to add "--domain "System Data"" to the command to see if it makes a difference.
Thanks a lot Daniel...
I have used the specific access profile name to extract the Application , Network rules..
It's working now..8)
Regards,
Satish
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 5 | |
| 3 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 20 Nov 2025 @ 10:00 AM (CST)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - EMEAWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY