checkpoint.ManagementHttpsRule
Explore with Pulumi AI
This resource allows you to execute Check Point Https Rule.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as checkpoint from "@pulumi/checkpoint";
const example = new checkpoint.ManagementHttpsRule("example", {
    layer: "MyLayer",
    position: {
        top: "top",
    },
});
import pulumi
import pulumi_checkpoint as checkpoint
example = checkpoint.ManagementHttpsRule("example",
    layer="MyLayer",
    position={
        "top": "top",
    })
package main
import (
	"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := checkpoint.NewManagementHttpsRule(ctx, "example", &checkpoint.ManagementHttpsRuleArgs{
			Layer: pulumi.String("MyLayer"),
			Position: pulumi.StringMap{
				"top": pulumi.String("top"),
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Checkpoint = Pulumi.Checkpoint;
return await Deployment.RunAsync(() => 
{
    var example = new Checkpoint.ManagementHttpsRule("example", new()
    {
        Layer = "MyLayer",
        Position = 
        {
            { "top", "top" },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.checkpoint.ManagementHttpsRule;
import com.pulumi.checkpoint.ManagementHttpsRuleArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var example = new ManagementHttpsRule("example", ManagementHttpsRuleArgs.builder()
            .layer("MyLayer")
            .position(Map.of("top", "top"))
            .build());
    }
}
resources:
  example:
    type: checkpoint:ManagementHttpsRule
    properties:
      layer: MyLayer
      position:
        top: top
Create ManagementHttpsRule Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new ManagementHttpsRule(name: string, args: ManagementHttpsRuleArgs, opts?: CustomResourceOptions);@overload
def ManagementHttpsRule(resource_name: str,
                        args: ManagementHttpsRuleArgs,
                        opts: Optional[ResourceOptions] = None)
@overload
def ManagementHttpsRule(resource_name: str,
                        opts: Optional[ResourceOptions] = None,
                        layer: Optional[str] = None,
                        position: Optional[Mapping[str, str]] = None,
                        destinations: Optional[Sequence[str]] = None,
                        management_https_rule_id: Optional[str] = None,
                        destination_negate: Optional[bool] = None,
                        action: Optional[str] = None,
                        enabled: Optional[bool] = None,
                        ignore_errors: Optional[bool] = None,
                        ignore_warnings: Optional[bool] = None,
                        install_ons: Optional[Sequence[str]] = None,
                        certificate: Optional[str] = None,
                        comments: Optional[str] = None,
                        name: Optional[str] = None,
                        blades: Optional[Sequence[str]] = None,
                        service_negate: Optional[bool] = None,
                        services: Optional[Sequence[str]] = None,
                        site_categories: Optional[Sequence[str]] = None,
                        site_category_negate: Optional[bool] = None,
                        source_negate: Optional[bool] = None,
                        sources: Optional[Sequence[str]] = None,
                        track: Optional[str] = None)func NewManagementHttpsRule(ctx *Context, name string, args ManagementHttpsRuleArgs, opts ...ResourceOption) (*ManagementHttpsRule, error)public ManagementHttpsRule(string name, ManagementHttpsRuleArgs args, CustomResourceOptions? opts = null)
public ManagementHttpsRule(String name, ManagementHttpsRuleArgs args)
public ManagementHttpsRule(String name, ManagementHttpsRuleArgs args, CustomResourceOptions options)
type: checkpoint:ManagementHttpsRule
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ManagementHttpsRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ManagementHttpsRuleArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ManagementHttpsRuleArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ManagementHttpsRuleArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ManagementHttpsRuleArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var managementHttpsRuleResource = new Checkpoint.ManagementHttpsRule("managementHttpsRuleResource", new()
{
    Layer = "string",
    Position = 
    {
        { "string", "string" },
    },
    Destinations = new[]
    {
        "string",
    },
    ManagementHttpsRuleId = "string",
    DestinationNegate = false,
    Action = "string",
    Enabled = false,
    IgnoreErrors = false,
    IgnoreWarnings = false,
    InstallOns = new[]
    {
        "string",
    },
    Certificate = "string",
    Comments = "string",
    Name = "string",
    Blades = new[]
    {
        "string",
    },
    ServiceNegate = false,
    Services = new[]
    {
        "string",
    },
    SiteCategories = new[]
    {
        "string",
    },
    SiteCategoryNegate = false,
    SourceNegate = false,
    Sources = new[]
    {
        "string",
    },
    Track = "string",
});
example, err := checkpoint.NewManagementHttpsRule(ctx, "managementHttpsRuleResource", &checkpoint.ManagementHttpsRuleArgs{
	Layer: pulumi.String("string"),
	Position: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	Destinations: pulumi.StringArray{
		pulumi.String("string"),
	},
	ManagementHttpsRuleId: pulumi.String("string"),
	DestinationNegate:     pulumi.Bool(false),
	Action:                pulumi.String("string"),
	Enabled:               pulumi.Bool(false),
	IgnoreErrors:          pulumi.Bool(false),
	IgnoreWarnings:        pulumi.Bool(false),
	InstallOns: pulumi.StringArray{
		pulumi.String("string"),
	},
	Certificate: pulumi.String("string"),
	Comments:    pulumi.String("string"),
	Name:        pulumi.String("string"),
	Blades: pulumi.StringArray{
		pulumi.String("string"),
	},
	ServiceNegate: pulumi.Bool(false),
	Services: pulumi.StringArray{
		pulumi.String("string"),
	},
	SiteCategories: pulumi.StringArray{
		pulumi.String("string"),
	},
	SiteCategoryNegate: pulumi.Bool(false),
	SourceNegate:       pulumi.Bool(false),
	Sources: pulumi.StringArray{
		pulumi.String("string"),
	},
	Track: pulumi.String("string"),
})
var managementHttpsRuleResource = new ManagementHttpsRule("managementHttpsRuleResource", ManagementHttpsRuleArgs.builder()
    .layer("string")
    .position(Map.of("string", "string"))
    .destinations("string")
    .managementHttpsRuleId("string")
    .destinationNegate(false)
    .action("string")
    .enabled(false)
    .ignoreErrors(false)
    .ignoreWarnings(false)
    .installOns("string")
    .certificate("string")
    .comments("string")
    .name("string")
    .blades("string")
    .serviceNegate(false)
    .services("string")
    .siteCategories("string")
    .siteCategoryNegate(false)
    .sourceNegate(false)
    .sources("string")
    .track("string")
    .build());
management_https_rule_resource = checkpoint.ManagementHttpsRule("managementHttpsRuleResource",
    layer="string",
    position={
        "string": "string",
    },
    destinations=["string"],
    management_https_rule_id="string",
    destination_negate=False,
    action="string",
    enabled=False,
    ignore_errors=False,
    ignore_warnings=False,
    install_ons=["string"],
    certificate="string",
    comments="string",
    name="string",
    blades=["string"],
    service_negate=False,
    services=["string"],
    site_categories=["string"],
    site_category_negate=False,
    source_negate=False,
    sources=["string"],
    track="string")
const managementHttpsRuleResource = new checkpoint.ManagementHttpsRule("managementHttpsRuleResource", {
    layer: "string",
    position: {
        string: "string",
    },
    destinations: ["string"],
    managementHttpsRuleId: "string",
    destinationNegate: false,
    action: "string",
    enabled: false,
    ignoreErrors: false,
    ignoreWarnings: false,
    installOns: ["string"],
    certificate: "string",
    comments: "string",
    name: "string",
    blades: ["string"],
    serviceNegate: false,
    services: ["string"],
    siteCategories: ["string"],
    siteCategoryNegate: false,
    sourceNegate: false,
    sources: ["string"],
    track: "string",
});
type: checkpoint:ManagementHttpsRule
properties:
    action: string
    blades:
        - string
    certificate: string
    comments: string
    destinationNegate: false
    destinations:
        - string
    enabled: false
    ignoreErrors: false
    ignoreWarnings: false
    installOns:
        - string
    layer: string
    managementHttpsRuleId: string
    name: string
    position:
        string: string
    serviceNegate: false
    services:
        - string
    siteCategories:
        - string
    siteCategoryNegate: false
    sourceNegate: false
    sources:
        - string
    track: string
ManagementHttpsRule Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The ManagementHttpsRule resource accepts the following input properties:
- Layer string
- Layer that holds the Object. Identified by the Name or UID.
- Position Dictionary<string, string>
- Position in the rulebase.
- Action string
- Rule inspect level. "Bypass" or "Inspect".
- Blades List<string>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- Certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- Comments string
- Comments string.
- DestinationNegate bool
- TRUE if "negate" value is set for Destination.
- Destinations List<string>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- Enabled bool
- Enable/Disable the rule.
- IgnoreErrors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- IgnoreWarnings bool
- Apply changes ignoring warnings.
- InstallOns List<string>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- ManagementHttps stringRule Id 
- Name string
- HTTPS rule name.
- ServiceNegate bool
- TRUE if "negate" value is set for Service.
- Services List<string>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- SiteCategories List<string>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- SiteCategory boolNegate 
- TRUE if "negate" value is set for Site Category.
- SourceNegate bool
- TRUE if "negate" value is set for Source.
- Sources List<string>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- Track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- Layer string
- Layer that holds the Object. Identified by the Name or UID.
- Position map[string]string
- Position in the rulebase.
- Action string
- Rule inspect level. "Bypass" or "Inspect".
- Blades []string
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- Certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- Comments string
- Comments string.
- DestinationNegate bool
- TRUE if "negate" value is set for Destination.
- Destinations []string
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- Enabled bool
- Enable/Disable the rule.
- IgnoreErrors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- IgnoreWarnings bool
- Apply changes ignoring warnings.
- InstallOns []string
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- ManagementHttps stringRule Id 
- Name string
- HTTPS rule name.
- ServiceNegate bool
- TRUE if "negate" value is set for Service.
- Services []string
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- SiteCategories []string
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- SiteCategory boolNegate 
- TRUE if "negate" value is set for Site Category.
- SourceNegate bool
- TRUE if "negate" value is set for Source.
- Sources []string
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- Track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- layer String
- Layer that holds the Object. Identified by the Name or UID.
- position Map<String,String>
- Position in the rulebase.
- action String
- Rule inspect level. "Bypass" or "Inspect".
- blades List<String>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate String
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments String
- Comments string.
- destinationNegate Boolean
- TRUE if "negate" value is set for Destination.
- destinations List<String>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled Boolean
- Enable/Disable the rule.
- ignoreErrors Boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings Boolean
- Apply changes ignoring warnings.
- installOns List<String>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- managementHttps StringRule Id 
- name String
- HTTPS rule name.
- serviceNegate Boolean
- TRUE if "negate" value is set for Service.
- services List<String>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories List<String>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory BooleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate Boolean
- TRUE if "negate" value is set for Source.
- sources List<String>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track String
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- layer string
- Layer that holds the Object. Identified by the Name or UID.
- position {[key: string]: string}
- Position in the rulebase.
- action string
- Rule inspect level. "Bypass" or "Inspect".
- blades string[]
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments string
- Comments string.
- destinationNegate boolean
- TRUE if "negate" value is set for Destination.
- destinations string[]
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled boolean
- Enable/Disable the rule.
- ignoreErrors boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings boolean
- Apply changes ignoring warnings.
- installOns string[]
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- managementHttps stringRule Id 
- name string
- HTTPS rule name.
- serviceNegate boolean
- TRUE if "negate" value is set for Service.
- services string[]
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories string[]
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory booleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate boolean
- TRUE if "negate" value is set for Source.
- sources string[]
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- layer str
- Layer that holds the Object. Identified by the Name or UID.
- position Mapping[str, str]
- Position in the rulebase.
- action str
- Rule inspect level. "Bypass" or "Inspect".
- blades Sequence[str]
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate str
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments str
- Comments string.
- destination_negate bool
- TRUE if "negate" value is set for Destination.
- destinations Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled bool
- Enable/Disable the rule.
- ignore_errors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_warnings bool
- Apply changes ignoring warnings.
- install_ons Sequence[str]
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- management_https_ strrule_ id 
- name str
- HTTPS rule name.
- service_negate bool
- TRUE if "negate" value is set for Service.
- services Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- site_categories Sequence[str]
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- site_category_ boolnegate 
- TRUE if "negate" value is set for Site Category.
- source_negate bool
- TRUE if "negate" value is set for Source.
- sources Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track str
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- layer String
- Layer that holds the Object. Identified by the Name or UID.
- position Map<String>
- Position in the rulebase.
- action String
- Rule inspect level. "Bypass" or "Inspect".
- blades List<String>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate String
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments String
- Comments string.
- destinationNegate Boolean
- TRUE if "negate" value is set for Destination.
- destinations List<String>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled Boolean
- Enable/Disable the rule.
- ignoreErrors Boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings Boolean
- Apply changes ignoring warnings.
- installOns List<String>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- managementHttps StringRule Id 
- name String
- HTTPS rule name.
- serviceNegate Boolean
- TRUE if "negate" value is set for Service.
- services List<String>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories List<String>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory BooleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate Boolean
- TRUE if "negate" value is set for Source.
- sources List<String>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track String
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
Outputs
All input properties are implicitly available as output properties. Additionally, the ManagementHttpsRule resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing ManagementHttpsRule Resource
Get an existing ManagementHttpsRule resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: ManagementHttpsRuleState, opts?: CustomResourceOptions): ManagementHttpsRule@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        action: Optional[str] = None,
        blades: Optional[Sequence[str]] = None,
        certificate: Optional[str] = None,
        comments: Optional[str] = None,
        destination_negate: Optional[bool] = None,
        destinations: Optional[Sequence[str]] = None,
        enabled: Optional[bool] = None,
        ignore_errors: Optional[bool] = None,
        ignore_warnings: Optional[bool] = None,
        install_ons: Optional[Sequence[str]] = None,
        layer: Optional[str] = None,
        management_https_rule_id: Optional[str] = None,
        name: Optional[str] = None,
        position: Optional[Mapping[str, str]] = None,
        service_negate: Optional[bool] = None,
        services: Optional[Sequence[str]] = None,
        site_categories: Optional[Sequence[str]] = None,
        site_category_negate: Optional[bool] = None,
        source_negate: Optional[bool] = None,
        sources: Optional[Sequence[str]] = None,
        track: Optional[str] = None) -> ManagementHttpsRulefunc GetManagementHttpsRule(ctx *Context, name string, id IDInput, state *ManagementHttpsRuleState, opts ...ResourceOption) (*ManagementHttpsRule, error)public static ManagementHttpsRule Get(string name, Input<string> id, ManagementHttpsRuleState? state, CustomResourceOptions? opts = null)public static ManagementHttpsRule get(String name, Output<String> id, ManagementHttpsRuleState state, CustomResourceOptions options)resources:  _:    type: checkpoint:ManagementHttpsRule    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Action string
- Rule inspect level. "Bypass" or "Inspect".
- Blades List<string>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- Certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- Comments string
- Comments string.
- DestinationNegate bool
- TRUE if "negate" value is set for Destination.
- Destinations List<string>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- Enabled bool
- Enable/Disable the rule.
- IgnoreErrors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- IgnoreWarnings bool
- Apply changes ignoring warnings.
- InstallOns List<string>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- Layer string
- Layer that holds the Object. Identified by the Name or UID.
- ManagementHttps stringRule Id 
- Name string
- HTTPS rule name.
- Position Dictionary<string, string>
- Position in the rulebase.
- ServiceNegate bool
- TRUE if "negate" value is set for Service.
- Services List<string>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- SiteCategories List<string>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- SiteCategory boolNegate 
- TRUE if "negate" value is set for Site Category.
- SourceNegate bool
- TRUE if "negate" value is set for Source.
- Sources List<string>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- Track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- Action string
- Rule inspect level. "Bypass" or "Inspect".
- Blades []string
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- Certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- Comments string
- Comments string.
- DestinationNegate bool
- TRUE if "negate" value is set for Destination.
- Destinations []string
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- Enabled bool
- Enable/Disable the rule.
- IgnoreErrors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- IgnoreWarnings bool
- Apply changes ignoring warnings.
- InstallOns []string
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- Layer string
- Layer that holds the Object. Identified by the Name or UID.
- ManagementHttps stringRule Id 
- Name string
- HTTPS rule name.
- Position map[string]string
- Position in the rulebase.
- ServiceNegate bool
- TRUE if "negate" value is set for Service.
- Services []string
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- SiteCategories []string
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- SiteCategory boolNegate 
- TRUE if "negate" value is set for Site Category.
- SourceNegate bool
- TRUE if "negate" value is set for Source.
- Sources []string
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- Track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- action String
- Rule inspect level. "Bypass" or "Inspect".
- blades List<String>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate String
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments String
- Comments string.
- destinationNegate Boolean
- TRUE if "negate" value is set for Destination.
- destinations List<String>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled Boolean
- Enable/Disable the rule.
- ignoreErrors Boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings Boolean
- Apply changes ignoring warnings.
- installOns List<String>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- layer String
- Layer that holds the Object. Identified by the Name or UID.
- managementHttps StringRule Id 
- name String
- HTTPS rule name.
- position Map<String,String>
- Position in the rulebase.
- serviceNegate Boolean
- TRUE if "negate" value is set for Service.
- services List<String>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories List<String>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory BooleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate Boolean
- TRUE if "negate" value is set for Source.
- sources List<String>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track String
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- action string
- Rule inspect level. "Bypass" or "Inspect".
- blades string[]
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate string
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments string
- Comments string.
- destinationNegate boolean
- TRUE if "negate" value is set for Destination.
- destinations string[]
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled boolean
- Enable/Disable the rule.
- ignoreErrors boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings boolean
- Apply changes ignoring warnings.
- installOns string[]
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- layer string
- Layer that holds the Object. Identified by the Name or UID.
- managementHttps stringRule Id 
- name string
- HTTPS rule name.
- position {[key: string]: string}
- Position in the rulebase.
- serviceNegate boolean
- TRUE if "negate" value is set for Service.
- services string[]
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories string[]
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory booleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate boolean
- TRUE if "negate" value is set for Source.
- sources string[]
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track string
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- action str
- Rule inspect level. "Bypass" or "Inspect".
- blades Sequence[str]
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate str
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments str
- Comments string.
- destination_negate bool
- TRUE if "negate" value is set for Destination.
- destinations Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled bool
- Enable/Disable the rule.
- ignore_errors bool
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignore_warnings bool
- Apply changes ignoring warnings.
- install_ons Sequence[str]
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- layer str
- Layer that holds the Object. Identified by the Name or UID.
- management_https_ strrule_ id 
- name str
- HTTPS rule name.
- position Mapping[str, str]
- Position in the rulebase.
- service_negate bool
- TRUE if "negate" value is set for Service.
- services Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- site_categories Sequence[str]
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- site_category_ boolnegate 
- TRUE if "negate" value is set for Site Category.
- source_negate bool
- TRUE if "negate" value is set for Source.
- sources Sequence[str]
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track str
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
- action String
- Rule inspect level. "Bypass" or "Inspect".
- blades List<String>
- Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for. "Anti Bot","Anti Virus","Application Control","Data Awareness","DLP","IPS","Threat Emulation","Url Filtering".blade blocks are documented below.
- certificate String
- Internal Server Certificate identified by Name or UID, otherwise, "Outbound Certificate" is a default value.
- comments String
- Comments string.
- destinationNegate Boolean
- TRUE if "negate" value is set for Destination.
- destinations List<String>
- Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.
- enabled Boolean
- Enable/Disable the rule.
- ignoreErrors Boolean
- Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
- ignoreWarnings Boolean
- Apply changes ignoring warnings.
- installOns List<String>
- Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.
- layer String
- Layer that holds the Object. Identified by the Name or UID.
- managementHttps StringRule Id 
- name String
- HTTPS rule name.
- position Map<String>
- Position in the rulebase.
- serviceNegate Boolean
- TRUE if "negate" value is set for Service.
- services List<String>
- Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.
- siteCategories List<String>
- Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.
- siteCategory BooleanNegate 
- TRUE if "negate" value is set for Site Category.
- sourceNegate Boolean
- TRUE if "negate" value is set for Source.
- sources List<String>
- Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.
- track String
- "None","Log","Alert","Mail","SNMP trap","Mail","User Alert", "User Alert 2", "User Alert 3".
Package Details
- Repository
- checkpoint checkpointsw/terraform-provider-checkpoint
- License
- Notes
- This Pulumi package is based on the checkpointTerraform Provider.