@@ -409,21 +409,21 @@ releases:
409
409
- description : Workflow feature - Approve and Publish the session.
410
410
name : cp_mgmt_approve_session
411
411
namespace : " "
412
- - description : >
412
+ - description :
413
413
Check if a target can reach or parse a network feed;
414
414
can work with an existing feed object or with a new one
415
415
(by providing all relevant feed parameters).
416
416
name : cp_mgmt_check_network_feed
417
417
namespace : " "
418
- - description : >
418
+ - description :
419
419
Check if a target can reach or parse a threat IOC feed; can work with an existing feed
420
420
object or with a new one (by providing all relevant feed parameters).
421
421
name : cp_mgmt_check_threat_ioc_feed
422
422
namespace : " "
423
423
- description : Retrieve all existing cluster members in domain.
424
424
name : cp_mgmt_cluster_members_facts
425
425
namespace : " "
426
- - description : >
426
+ - description :
427
427
Securely connect the Management Server to Check Point's Infinity Portal.
428
428
This is a preliminary operation so that the management server can use
429
429
various Check Point cloud-based security services hosted in the Infinity Portal.
@@ -453,12 +453,12 @@ releases:
453
453
- description : Get idp-to-domain-assignment objects facts on Checkpoint over Web Services API
454
454
name : cp_mgmt_idp_to_domain_assignment_facts
455
455
namespace : " "
456
- - description : >
456
+ - description :
457
457
Executes the lsm-install-policy on a given list of targets. Install the LSM policy
458
458
that defined on the attached LSM profile on the targets devices.
459
459
name : cp_mgmt_install_lsm_policy
460
460
namespace : " "
461
- - description : >
461
+ - description :
462
462
Executes the lsm-install-settings on a given list of targets. Install the provisioning
463
463
settings that defined on the object on the targets devices.
464
464
name : cp_mgmt_install_lsm_settings
@@ -505,7 +505,7 @@ releases:
505
505
- description : Get repository-script objects facts on Checkpoint over Web Services API
506
506
name : cp_mgmt_repository_script_facts
507
507
namespace : " "
508
- - description : >
508
+ - description :
509
509
Reset Secure Internal Communication (SIC). To complete the reset operation need also
510
510
to reset the device in the Check Point Configuration Tool (by running cpconfig in Clish or Expert mode).
511
511
Communication will not be possible until you reset and re-initialize the device properly.
@@ -517,7 +517,7 @@ releases:
517
517
- description : Set default Identity Provider assignment to be use for Management server administrator access.
518
518
name : cp_mgmt_set_idp_default_assignment
519
519
namespace : " "
520
- - description : >
520
+ - description :
521
521
Set Identity Provider assignment to domain, to allow administrator login to that domain using
522
522
that identity provider, if there is no Identity Provider assigned to the domain the 'idp-default-assignment' will be used.
523
523
This command only available for Multi-Domain server.
@@ -535,7 +535,7 @@ releases:
535
535
- description : Retrieve default Identity Provider assignment that used for Management server administrator access.
536
536
name : cp_mgmt_show_idp_default_assignment
537
537
namespace : " "
538
- - description : >
538
+ - description :
539
539
Shows the status of all processes in the current machine (Multi-Domain Server and all Domain Management / Log Servers).
540
540
This command is available only on Multi-Domain Server.
541
541
name : cp_mgmt_show_servers_and_processes
@@ -558,7 +558,7 @@ releases:
558
558
- description : Workflow feature - Submit the session for approval.
559
559
name : cp_mgmt_submit_session
560
560
namespace : " "
561
- - description : >
561
+ - description :
562
562
Test SIC Status reflects the state of the gateway after it has received the certificate issued by the ICA.
563
563
If the SIC status is Unknown then there is no connection between the gateway and the Security Management Server.
564
564
If the SIC status is No Communication, an error message will appear. It may contain specific instructions on how to fix the situation.
@@ -656,7 +656,7 @@ releases:
656
656
- description : Get dynamic-global-network-object objects facts on Checkpoint over Web Services API
657
657
name : cp_mgmt_dynamic_global_network_object_facts
658
658
namespace : " "
659
- - description : >
659
+ - description :
660
660
Export the primary Security Management Server database or the primary Multi-Domain Server database or the
661
661
single Domain database and the applicable Check Point configuration.
662
662
name : cp_mgmt_export_management
@@ -688,7 +688,7 @@ releases:
688
688
- description : Get https-layer objects facts on Checkpoint over Web Services API
689
689
name : cp_mgmt_https_layer_facts
690
690
namespace : " "
691
- - description : >
691
+ - description :
692
692
Import the primary Security Management Server database or the primary Multi-Domain Server database or the single Domain
693
693
database and the applicable Check Point configuration.
694
694
name : cp_mgmt_import_management
@@ -1264,5 +1264,22 @@ releases:
1264
1264
release_summary : This is release 6.2.1 of ``check_point.mgmt``, released on
1265
1265
2024-08-28.
1266
1266
fragments :
1267
- - 6.2.1.yml
1267
+ - 6.2.1.yml
1268
1268
release_date : ' 2024-08-28'
1269
+ 6.3.0 :
1270
+ changes :
1271
+ minor_changes :
1272
+ - check_point.mgmt.cp_mgmt_lsm_cluster - support additional parameters (dynamic-objects, tags and topology)
1273
+ - check_point.mgmt.cp_mgmt_lsm_gateway - support additional parameters (device_id, dynamic-objects, tags and topology)
1274
+ release_summary : This is release 6.3.0 of ``check_point.mgmt``, released on
1275
+ 2025-01-23.
1276
+ fragments :
1277
+ - 6.3.0.yml
1278
+ modules :
1279
+ - description : Manages user objects on Checkpoint over Web Services API
1280
+ name : cp_mgmt_user
1281
+ namespace : ' '
1282
+ - description : Get user objects facts on Checkpoint over Web Services API
1283
+ name : cp_mgmt_user_facts
1284
+ namespace : ' '
1285
+ release_date : ' 2025-01-03'
0 commit comments