2828DOCUMENTATION = """
2929---
3030module: cp_mgmt_set_https_advanced_settings
31- short_description: Edit HTTPS Inspection's Blades' Settings .
31+ short_description: Configure advanced settings for HTTPS Inspection .
3232description:
33- - Edit HTTPS Inspection's Blades' Settings .
33+ - Configure advanced settings for HTTPS Inspection .
3434 - All operations are performed over Web Services API.
35- version_added: "6.0 .0"
35+ version_added: "6.1 .0"
3636author: "Eden Brillant (@chkp-edenbr)"
3737options:
3838 bypass_on_client_failure:
3939 description:
4040 - Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during
41- handshake)<br>true - Fail-open (bypass all requests)<br>false - Fail-close (block all requests).
41+ handshake)<br><ul style="list-style-type,square"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all
42+ requests.</li></ul><br>The default value is true.
4243 type: bool
4344 bypass_on_failure:
4445 description:
4546 - Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server
46- authentication)<br>true - Fail-open (bypass all requests)<br>false - Fail-close (block all requests).
47+ authentication)<br><ul style="list-style-type,square"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all
48+ requests.</li></ul><br>The default value is true.
4749 type: bool
4850 bypass_under_load:
4951 description:
6264 'user defined alert no.3']
6365 site_categorization_allow_mode:
6466 description:
65- - Whether all requests should be allowed or blocked until categorization is complete.<br>Background - in order to allow requests until
66- categorization is complete.<br>Hold- in order to block requests until categorization is complete.
67+ - Whether all requests should be allowed or blocked until categorization is complete.<br><ul style="list-style-type,square"><li>Background - to
68+ allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is
69+ hold.
6770 type: str
6871 choices: ['background', 'hold']
69- deny_untrusted_server_cert :
72+ server_certificate_validation_actions :
7073 description:
71- - Set to be true in order to drop traffic from servers with untrusted server certificate.
72- type: bool
73- deny_revoked_server_cert:
74- description:
75- - Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).
76- type: bool
77- deny_expired_server_cert:
78- description:
79- - Set to be true in order to drop traffic from servers with expired server certificate.
80- type: bool
81- track_validation_errors:
82- description:
83- - Whether to log and send a notification for the server validation errors,<br><ul style="list-style-type,square"><li>None - Does not record the
84- event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to
85- the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.
86- type: str
87- choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3']
74+ - When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it.
75+ type: dict
76+ suboptions:
77+ block_expired:
78+ description:
79+ - Set to be true in order to drop traffic from servers with expired server certificate.
80+ type: bool
81+ block_revoked:
82+ description:
83+ - Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).
84+ type: bool
85+ block_untrusted:
86+ description:
87+ - Set to be true in order to drop traffic from servers with untrusted server certificate.
88+ type: bool
89+ track_errors:
90+ description:
91+ - Whether to log and send a notification for the server validation errors,<br><ul style="list-style-type,square"><li>None - Does not
92+ record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail -
93+ Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized
94+ alerts.</li></ul>.
95+ type: str
96+ choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2',
97+ 'user defined alert no.3']
8898 retrieve_intermediate_ca_certificates:
8999 description:
90100 - Configure the value "true" to use the "Certificate Authority Information Access" extension to retrieve certificates that are missing from the
91- certificate chain.
101+ certificate chain.<br>The default value is true.
92102 type: bool
93103 blocked_certificates:
94104 description:
115125 the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.
116126 type: str
117127 choices: ['none', 'log', 'popup alert', 'mail alert', 'snmp trap alert', 'user defined alert no.1', 'user defined alert no.2', 'user defined alert no.3']
118- bypass_certificate_pinned_apps:
119- description:
120- - Configure the value "true" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect
121- connections initiated by certificate-pinned applications.
122- type: bool
123128 bypass_update_services:
124129 description:
125- - Configure the value "true" to bypass traffic to well-known software update services.
130+ - Configure the value "true" to bypass traffic to well-known software update services.<br>The default value is true.
126131 type: bool
127- httpsi_statistics_logs :
132+ certificate_pinned_apps_action :
128133 description:
129- - Configure the value "true" to send logs for every TLS session for all rules in HTTPS Inspection policy.
130- type: bool
131- log_empty_ssl_connections:
134+ - Configure the value "bypass" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot
135+ inspect connections initiated by certificate-pinned applications.<br>Configure the value "detect" to send logs for traffic from certificate-pinned
136+ applications approved by Check Point.<br>The default value is bypass.
137+ type: str
138+ choices: ['bypass', 'detect', 'none']
139+ log_sessions:
132140 description:
133- - Configure the value "true" to send logs about SSL connections that are closed without data or are closed in the middle of a handshake .
141+ - The value "true" configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true .
134142 type: bool
135143 details_level:
136144 description:
159167- name: set-https-advanced-settings
160168 cp_mgmt_set_https_advanced_settings:
161169 blocked_certificate_tracking: popup alert
162- bypass_certificate_pinned_apps: 'false'
163170 bypass_on_client_failure: 'false'
164171 bypass_on_failure: 'false'
165172 bypass_under_load:
166- track: log
173+ track: log
167174 bypass_update_services: 'true'
168- deny_expired_server_cert: 'true'
169- deny_revoked_server_cert: 'false'
170- deny_untrusted_server_cert: 'true'
171- httpsi_statistics_logs: 'true'
172- log_empty_ssl_connections: 'true'
175+ certificate_pinned_apps_action: bypass
176+ log_sessions: 'true'
173177 retrieve_intermediate_ca_certificates: 'true'
178+ server_certificate_validation_actions:
179+ block_expired: 'true'
180+ block_revoked: 'false'
181+ block_untrusted: 'true'
182+ track_errors: snmp trap alert
174183 site_categorization_allow_mode: background
175- track_validation_errors: snmp trap alert
176184"""
177185
178186RETURN = """
@@ -190,16 +198,19 @@ def main():
190198 argument_spec = dict (
191199 bypass_on_client_failure = dict (type = 'bool' ),
192200 bypass_on_failure = dict (type = 'bool' ),
193- bypass_under_load = dict (type = 'dict' , options = dict (
201+ bypass_under_load = dict (type = 'dict' , no_log = False , options = dict (
194202 track = dict (type = 'str' , choices = ['none' , 'log' , 'popup alert' , 'mail alert' , 'snmp trap alert' ,
195203 'user defined alert no.1' , 'user defined alert no.2' , 'user defined alert no.3' ])
196204 )),
197205 site_categorization_allow_mode = dict (type = 'str' , choices = ['background' , 'hold' ]),
198- deny_untrusted_server_cert = dict (type = 'bool' ),
199- deny_revoked_server_cert = dict (type = 'bool' ),
200- deny_expired_server_cert = dict (type = 'bool' ),
201- track_validation_errors = dict (type = 'str' , choices = ['none' , 'log' , 'popup alert' , 'mail alert' ,
202- 'snmp trap alert' , 'user defined alert no.1' , 'user defined alert no.2' , 'user defined alert no.3' ]),
206+ server_certificate_validation_actions = dict (type = 'dict' , options = dict (
207+ block_expired = dict (type = 'bool' ),
208+ block_revoked = dict (type = 'bool' ),
209+ block_untrusted = dict (type = 'bool' ),
210+ track_errors = dict (type = 'str' , choices = ['none' , 'log' , 'popup alert' , 'mail alert' ,
211+ 'snmp trap alert' , 'user defined alert no.1' ,
212+ 'user defined alert no.2' , 'user defined alert no.3' ])
213+ )),
203214 retrieve_intermediate_ca_certificates = dict (type = 'bool' ),
204215 blocked_certificates = dict (type = 'list' , elements = 'dict' , options = dict (
205216 name = dict (type = 'str' ),
@@ -209,10 +220,9 @@ def main():
209220 blocked_certificate_tracking = dict (type = 'str' , choices = ['none' , 'log' , 'popup alert' ,
210221 'mail alert' , 'snmp trap alert' , 'user defined alert no.1' , 'user defined alert no.2' ,
211222 'user defined alert no.3' ]),
212- bypass_certificate_pinned_apps = dict (type = 'bool' ),
213223 bypass_update_services = dict (type = 'bool' ),
214- httpsi_statistics_logs = dict (type = 'bool' ),
215- log_empty_ssl_connections = dict (type = 'bool' ),
224+ certificate_pinned_apps_action = dict (type = 'str' , choices = [ 'bypass' , 'detect' , 'none' ] ),
225+ log_sessions = dict (type = 'bool' ),
216226 details_level = dict (type = 'str' , choices = ['uid' , 'standard' , 'full' ]),
217227 domains_to_process = dict (type = 'list' , elements = 'str' ),
218228 ignore_warnings = dict (type = 'bool' ),
0 commit comments